Choose research topic

User Generated

yzgnyyl

Business Finance

Description

A minimum 2250-word (excluding the separate cover, abstract, and reference pages), APA-style research paper. No more than 25% of the written assignment in this course may be attributed to referenced sources. Your paper must be 75% original thought. Again, your cited work and quotations must not exceed 25%. You must use and cite a minimum of five primary sources (with no more than two being internet sources) in the text and References page. Dictionaries and encyclopedias are not appropriate or considered adequate as referenced sources. Turnitin originality reports provide the instructor with the word count in addition to the percentage of wording attributable to other sources. Do not cut and paste from other sources. Your failure to cite sources by using in-text citations and failure to use APA quotation.

You must select a research topic from the following list and use your research to relate the topic to exploiting specifically identified weaknesses in transnational terrorist organizations while demonstrating an understanding of the Saint Leo core value of integrity as it relates to addressing one of the following terrorism-related topics:

  • Terrorist Cells in America
  • The Threat and Work of Lone Wolf Terrorists in America
  • The Roles, Responsibilities, and Work of Three Major Local and/or State Intelligence Units
  • The Similarities in Homegrown Violent Extremist Groups
  • The Common Characteristics of American Residents (and/or Citizens) Radicalized for Terrorism and the Motivation of the Groups They Formed or Joined (e.g., Lackawanna Six, Fort Dix Group, Virginia Jihad, etc.)
  • Domestic Radicalization and Recruitment to Jihadist Terrorism
  • U.S. Capacity for Combatting Weapons of Mass Destruction
  • Tangible Connections Associated With Organized Crime and Terrorism
  • To What Extent Can Publicly Available Information Be Used in Planning Terrorist Attacks
  • The Use of the Internet to Radicalize and Recruit Terrorists
  • The Use of the Internet to Train Terrorists
  • The Use of the Internet to Distribute Propaganda and to Cultivate Material Support
  • The Use of the Internet to Plan Terrorist Attacks
  • Cyber Terrorism: The Greatest Risks in the U.S.
  • Prisoner Radicalization and Terrorism
  • Financing Terrorism
  • Joint Terrorism Task Forces: The Return-On-Investment (with Multiple Case Studies)
  • How the Patriot Act Improved the U.S. Ability to Detect and Investigate Terrorism (include specific case studies)
  • The Major Investigative Techniques Employed in Terrorist Investigations and a Real-Life Success for Each
-The Potential Use and Possible Impact of a Specific Modality of Weapon of Mass Destruction

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Financing Terrorism

Student Name:
Professor’s Name:
Course:
Date:

Terrorisms financing linked to both formal and informal sources of finance. There are
various methods that terrorists have raised money for their terrorist activities. The methods
terrorist groups use to finance their operations are an illegal trade, money laundering, kidnapping
and ransom activities, taxation, criminal animal tusks trade, black market activities and charity
operations. Terrorists have been known to fundraise for social, educational and health projects
that acted as a cover for large volumes of funds transfer into terrorist activities. The Hawalas and
other informal money transfer services have been used to move large quantities of cash.
Terrorism finance is an elaborate network of activities from legal business to illegal businesses.
Money laundering is one of the significant activities that terrorist groups use to finance
their operations. Money laundering described as disguising the proceeds of a transaction in
conversion, transfer or movement of money. The most common sources of cash that are cash
laundered are drugs money proceeds, illegal arms trade as well as unlawful trade proceeds.
Money laundered is discreetly moved from the informal markets to the mainstream financial and
property markets by being used to purchase properties, investment in the stock markets or fixed
assets. Money laundering remains a broad cash conversion strategy for the terrorist source of
finance for their business. The proceeds money laundering come from illegal activities like drug
trafficking, poaching, pyramid schemes and arms trade.
The drugs trade is another source of terrorist finance. Narcotics trade is very lucrative and
operates discreetly. The terrorist networks can control production, movement, and sales of
narcotics. The trade in drugs like heroin, marijuana and other hard drugs is regulated or outright
banned. Illegal trade in the narcotics thus becomes attractive due to high prices that they fetch in
the black market. In countries like Afghanistan, and neighboring countries with weak legislation
trade in drugs provide terrorist cells with means of financing their activities. The business of

Khat, a form of chewable leaves from Somalia taxed by the Al Shaabab providing much-needed
revenue for its operations. According to CNN news Mackenzie, Leposo and Karmeliotis reported
that Al-Qaeda benefited from Khat taxation to finance its activities (2012). In Venezuela, the
terrorist group Hezbollah was known to control narcotics black market trade to fund its terrorist
operations in the Middle East. The terrorist organizations have the capabilities and the
knowledge to regulate businesses that involve large volumes of cash. The Al Shaabab was
known to control charcoal trade in Somalia through taxation providing much-needed finance in
addition to piracy in the Indian Ocean. The instability in Somalia provided the terrorist outfit
with means to offer security through extortion, illegal taxation and solicitation.
The terrorist groups have secretly used charitabl...


Anonymous
I was struggling with this subject, and this helped me a ton!

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags