Business Finance
Terrorism, law homework help

Question Description

I need an explanation for this Business Law question to help me study.

Submit an 8 to 10 page paper that includes a separate title and reference page. The final paper due must be Times New Roman 12-point font, double-spaced. Include a cover page, introduction or abstract, body of the report, summary or conclusion, and references page. This paper should be well organized and follow the outline submitted for Week 2. It should also include the list of references, but not the annotations, submitted during Week 5. The final paper should adhere to all APA guidelines.

Attached are the first two assignments submitted for this project.

Unformatted Attachment Preview

Running head: OUTLINE 1 Outline Timothy Jones DeVry University JADM 470 3/10/2017 OUTLINE 2 Outline for the paper Abstract This is a brief discussion on what the entire paper will focus on including all the issues surrounding terrorism. The section will briefly introduce what each part of the paper will cover. An overview of the paper will be important in allowing the reader learns what he expects from the paper. Introduction This is a section focusing on what terrorism is and how an occurrence is known as either a terrorist act or not. The section will also identify some of the places where terrorism has had major effects. The part will also consist of the thesis statement of the paper explaining the details of the paper in different aspects of terrorism in the world. History The background information on terrorism will be expounded stating where terrorism originated. The cities mostly affected by terrorism will be looked into and the terrorism in history that left the world in shock will also be examined. All information pertaining to why terrorism exists in the world will be looked into and a detailed account of some major terrorist attacks will be identified. Causes of terrorism • Ethno- nationalism- having a group in a given state resisting the rule of a government. Such a group can form an alliance that will work against the government through terrorist attacks. OUTLINE • 3 Alienation/discrimination- when a group of people feel discriminated and inferior in a given state, they will focus on implementing revenge measures. Discrimination may be based on religion, culture, races and nation of origin. • Religion- There are some religious beliefs that facilitate the act of terrorism. Reviving the glory of some religions has led to terrorist acts being facilitated and becoming common all over the world. • Socio-economic status- there are some groups of people who find it hard to move upwards in their social status which leads to them becoming violent and revengeful. Globalization has also facilitated the growth of terrorist acts all over the world with a high rate. • Political grievances- lack of political order may lead to groups forming and becoming violent in different states. Some leadership styles used in the government may also facilitate terrorist acts where citizens are against them. Effects of terrorism • Political- focuses on what terrorism does to political systems of nations affected. It is more likely that the political stability of a given state will be negatively impacted on by acts of terrorism. Governments may fear facing the terrorist challenges making their reign collapse. • Economical- destruction of property and death of working people leads to deterioration of the economy. Governments also spend large amounts of money in fighting against OUTLINE 4 terrorists. Some economic sectors such as tourism are affected by terrorism leading to decreased income in the affected nations. • Security policies- some terrorist attacks are focused on attacking the security systems of different states leading to inefficiency and ineffectiveness of security policies. Alteration of the security policies leads to unsure safety of citizens in a given state. • Social- terrorist attacks lead to deaths of parents for many children which then leads to suffering of these children as they have no person to take care of their needs. Other people get permanent injuries during attacks making their lives hard as they may never have the ability to work as before. Combating terrorism • Increase security measures- security policies should implemented to ensure that all incoming visitors in a state are thoroughly checked. • Understand the strategies used by terrorists- the measure will enable security systems formulate policies that will overcome the terrorist strategies. • Fight against those who fund terrorists- some groups of people and organizations fund terrorists in their activities making them strong. Conclusion A summary of all the topics covered in the paper. Recommendations will also be stated in this section. References A list of sources from where information presented in the paper is derived. Running Head: Terrorism Annotation Terrorism Annotation Timothy Jones JADM 470 DeVry University 3/30/2017 Terrorism Annotation Chalk, P. (2008). The maritime dimension of international security: Terrorism, piracy, and challenges for the United States. Santa Monica, CA: RAND. The objectives of terrorist groups or organizations are to create an emotional impact through their criminal activities. The United States has encountered several terrorist attacks for decades. Some of the types of targets used by organized crime organizations and terrorist include the following. Firstly, terrorist uses economic targets such as the invasion of the World Trade Centre, Financial Institutions, and oil companies among others. The main aim is to destabilize the economy through demolitions of industrial facilities. Second, the terrorists use political targets to threaten the ruling government. For example, when the former United States President, George Bush was in power, he was the main terrorist target. Political targets are directly linked the ruling government thus assassination of leader may lead to adverse effects on the economy. Lastly but not the least, the terrorists and organized crime organizations use educational and ecological targets to threaten the government. Educational institutions such as Universities are soft targets that terrorists may use to accomplish their missions. Some of the tactics used by terrorized and organized crime organizations include kidnappings, bombings, hijackings, armed assaults, assassinations, and barricade-hostage incidences. James, Paul; Friedman, Jonathan (2006). Globalization and Violence, Vol. 3: Globalizing War and Intervention. London: Sage Publications. p. xxx.; and Nairn, Tom; James, Paul (2005). Global Matrix: Nationalism, Globalism and State-Terrorism. London and New York: Pluto Press. In order to fight any terrorist group, on must know its structures. Two major structures form crime groups. These include hierarchical and network structure. Well established terrorist organizations use hierarchical structures while new groups inherit network model. The Terrorism Annotation hierarchical structure is mainly followed by terrorist groups that engage in political activities to help coordinate violence. For example, the Islamic terrorist organizations that are state supported absorbs a region structure with a hierarchical model. Armed forces easily handle terrorist groups that use network model. Pape, Robert A. "The Strategic Logic of Suicide Terrorism", American Political Science Review, 2003. 97 (3): pp. 1–19. Terrorists and organized crime organizations have own reporting structures and communication networks. In most cases, they use public media to acknowledge an attack. The hierarchical structure outlines the reporting model. That is, reporting of information is systematic and flows from top to bottom. Orders are made by the leaders and must be followed up to least in the group. Different terrorist groups various communication strategies. In many cases, communication among the terrorist is high encrypted and not frequent. For instance, communication is made six months beforean attack. Some terrorist groups such as Jihadist have media structures and rely on the internet heavily. They use this media structures to communicate and plan for an assault. Bruce Hoffman (June 2003). "The Logic of Suicide Terrorism". The Atlantic. Archived from the original on October 1, 2009. Retrieved 2010-01-11. The terrorists appear to be deliberately homing in on the few remaining places where Israelis thought they could socialize in peace. Terrorists and organized crime organizationspossess several threats to countries and the entire world. The two organizations have the potential to decline the global economy through the destruction of economic pillars such as trade centers, institutions, and natural resources. More so, Terrorism Annotation the two organizations possess a significant threat to ruling government. For instance, attack of U.S white house may result to fall of the administration and the economy. Furthermore, it may lead to political instability and loss of lives. The center of gravity for the terrorist group may be its headquarters. The attack on its base and assassination of top leaders may make the unitineffective. The governments sponsor most organized crime organizations thus acting as a center of gravity. Frequent attacks on such countries and closing all its external links may lead decrease the efficiency of an organized crime organization. National Strategy for Combating Terrorism. (2016). Retrieved 15 September 2016, from In the border of America and further beyond, suicide attacks are directly associated with at least three percent of tourist attacks. Half of terrorism deaths in the USA result from the suicide attack. Some research into the reasons behind the suicidal attacks in the USA to figure out their intentions and developed certain elements. The first one got traced to an inadequacy of formal education, poverty, and personal motives. The reported focused on determining the rationale behind the minds of suicidal attackers. The revelations that came out indicated that they did not have psychological pathologies, though they had the same content of education and financial power just as their neighboring population. The reasons that led them to suicide are social and not physical. Collectively, the report figured that in the context of the USA, pervasive sense, historical injustices and social humiliation sense alongside global powers Terrorism Annotation Philip P. Purpura (2007). Terrorism and homeland security: an introduction with applications. Butterworth-Heinemann. pp. 16–19. ISBN 0-7506-7843-7. The processes of securing land borders and the coastal waterways use the strategy of increasing the security patrol agents to prevent international terrorism. To properly and effectively man the country’s borders especially the northern border, the Department of Homeland Security in collaboration with the Customs and Border patrol agency deployed 2, 000 border patrol agents to man the American northern border. This was a 500 % increase to the agents on board during the 9/11 terrorist attack. About the process of securing the coastal waterways, a similar strategy was adopted by the United States Coast Guard (USCG), by deploying 3700 maritime security personnel. The various bodies in charge such as the department of Homeland Security as well as the United States Coast Guard have put in place various strategies such as the use of technology, as well as radiation, physical manning to prevent the entry of illegal people who may engage in terrorist activities Coppola, D. P. (2011). Introduction to International Disaster Management. Burlington: Elsevier Science. In emergency management, plans formulated to handle disasters and reduce the probable threats. It is worth noting that, this form of control does not seek to get rid of threats. Instead, it dwells on ways through which the disasters can be nullified. The key goal for an emergency Terrorism Annotation management plan is to reduce instances of life and revenue loss, as well as other resultant forms of damage When it comes to disasters such as those arising from terrorism, the goal of emergency management it to counteract the effects of such attacks. Terrorism presents a new form of threat due to the high probability of casualties. As such, emergency management for this disaster is different from that from causes such as fire or public disorder. Terrorism requires that the response teams are timely. In addition, the team ought to keep the public off the crime scenes, just in case there are subsequent attacks aimed at the responders. In addition, it aims at being ready to respond in the event of an assault. Readiness leads to responsiveness. Terrorist attacks could also be in the form of shootings. Here, the plan requires offensive tactics alongside the remediating techniques. Chiefly, emergency management ensures that the terrorism threats nullified, and the damage reduced significantly. Abrahms, Max (March 2008). "What Terrorists Really Want: Terrorist Motives and Counterterrorism Strategy" (PDF 1933 KB). International Security. Cambridge, MA: MIT Press. 32 (4): 86–89. doi:10.1162/isec.2008.32.4.78. ISSN 0162-2889. Retrieved 2008-11-04. Fortna, Virginia Page (20 May 2015). "Do Terrorists Win? Rebels' Use of Terrorism and Civil War Outcomes". International Organization. 69 (3): 519–556. doi:10.1017/S0020818315000089. Retrieved 28 September 2016. Terrorism Annotation The worst terror attack of the nature of keeping hostages occurred in 2004 in Beslan, Russia. The terrorists demanded ambiguously to Russian government for the removal of Russian troops from the territory of Chechnya and recognition as a sovereign country. The demands were so unfulfillable and the terrorists did not demand anything less than that so it was a point where the talks were useless but only a way to keep the innocents alive inside the school, and taking corrective measures from the law enforcing authorities. So, it took three days to result in an exchange of fire and out of 1100 hostages, 385 including 186 school children were killed by the terrorists. The article confers that this incident was a complete failure of the talks due to the nature of demands or incompetent negotiators who could not persuade the terrorists for any possible way out of the situation. There are situations where successful negotiations save the innocent lives but even then, the number of failed talks are higher. Moreover, the successful ones also could save the hostages at some extent but could not beat the terrorists for their intentions and plans. Gould Eric D.; Klor, Esteban F. (1 January 2010). "DOES TERRORISM WORK?". The Quarterly Journal of Economics. 125 (4): 1459–1510. The American-led invasion of Iraq not only diverted attention away from the perpetrators of the 9/11 attacks, it also gave rise to a new wave of research and analysis on insurgency and Terrorism Annotation counterinsurgency warfare. While the Al-Qaeda terrorist threat was not entirely ignored, research on terrorism tended to aggregate America’s terrorism and insurgency threats and frame counterterrorism within the context of counterinsurgency warfare, leading to the misleading conclusion that both strategies where mutually reinforcing. There were at least three perceptions of the problem at hand. The criminal justice model needs to be updated when we consider the current form of terrorism. The line between counter terrorism and counterinsurgency has become increasingly blurred. For example, since 9/11 the United States has been trying to disrupt, destroy and dismantle the Al-Qaeda operations in Pakistan and Afghanistan by trying to prevent their longterm commitment, however it looks they are avoiding important decisions about what counterterrorism should consist of at an international level. Invasion of Iraq gave rise to new forms of research and analysis of insurgencies and counterinsurgencies warfare. When the terrorist threat was not ignored, research on terrorism increased. The research leads to at least three perceptions. Sönmez, S. F.; Apostolopoulos, Y.; Tarlow, P. (1999). "Tourism in crisis: Managing the effects of terrorism". Journal of Travel Research. 38 (1): 13–18. doi:10.1177/004728759903800104 Terrorism Annotation Control Risks has analysts based all around the world, giving us on-the-ground knowledge of local terrorist groups. The team brings together experts in counter-terrorism, security consultancy and civil engineering. Their services in this sector include: Threat assessment:The artcle provides analysis of relevant terrorist groups and extremists and their modus operandi to define the potential threats faced, Blast damage assessments: Our experts can undertake an explosive effects assessment that will show the vulnerability of a structure, its occupants, its façade and glazing based on agreed external and/or internal scenarios. Building on this, we develop mitigation strategies that will reduce the risk of death, injury and catastrophic damage to structures. Control Risks has extensive experience, and is a recognized expert, in providing probable/estimated maximum loss studies, per international, national and industry best practice standards, Hostile vehicle mitigation: Using vehicles to breach site perimeters and building envelopes has become a common methodology for that intent on causing harm to others. Control Risks has helped clients to design and install tested and certified passive and active barriers to counter this threat, Ballistic mitigation: In high-risk regions, where such measures are appropriate, our consultants have designed proportionate ballistic mitigation systems into clients’ buildings. Terrorism Annotation ...
Purchase answer to see full attachment
Student has agreed that all tutoring, explanations, and answers provided by the tutor will be used to help in the learning process and in accordance with Studypool's honor code & terms of service.

Final Answer

Find attached com...

peachblack (35136)
University of Virginia

I was on a very tight deadline but thanks to Studypool I was able to deliver my assignment on time.

The tutor was pretty knowledgeable, efficient and polite. Great service!

Heard about Studypool for a while and finally tried it. Glad I did caus this was really helpful.


Brown University

1271 Tutors

California Institute of Technology

2131 Tutors

Carnegie Mellon University

982 Tutors

Columbia University

1256 Tutors

Dartmouth University

2113 Tutors

Emory University

2279 Tutors

Harvard University

599 Tutors

Massachusetts Institute of Technology

2319 Tutors

New York University

1645 Tutors

Notre Dam University

1911 Tutors

Oklahoma University

2122 Tutors

Pennsylvania State University

932 Tutors

Princeton University

1211 Tutors

Stanford University

983 Tutors

University of California

1282 Tutors

Oxford University

123 Tutors

Yale University

2325 Tutors