Description
Instructions: Reply to these peer responses must be minimum 400 words. To demonstrate knowledge of the readings, students must use citations in parenthetical reference format and a reference list in the initial post. A minimum of 2 sources in each response.
Format: All assignments for the School of Security and Global Studies (papers, essays, exams, and Forums) must follow the Chicago Style Manual guidelines. Refer to Kate Turabian,A Manual for Writers of Research Papers, Theses, and Dissertations, 7th ed. Chicago: University of Chicago Press. The format for in-text citations is given in the Turabian guide linked above. Students are to use the parenthetical form (P) within the text of the document and the reference list form (R) in providing a list of sources.
Unformatted Attachment Preview
Purchase answer to see full attachment
Explanation & Answer
Hello buddy,Here you go, kindly check it out and feel free to hit me up for any edits.
1
The Future of Terrorism
Name
Course
Tutor
Date
2
The Future of Terrorism
Post 1
The future of terrorism is a matter that raises eyebrows in the world today. It is with no
doubt that the use of terrorism by the state as well as great powers will be a part of the new
developments in future methods for terrorism1. The use of cyber warfare will definitely be a part
of the future actions and developments of terrorism. Currently, this has been shown with
incidents such as the deployment of the STUXNET virus in 2010. I feel that this was a clear
demonstration of the kinetic impact that cyber warfare can have on an opponent. It is agreeable
that states have realized that kinetic abilities development is a crucial area where they can freely
operate. However, this domain is new and it comes with some dangers, especially because there
are no laid up international rules or limitations like those that govern traditional methods of
conflict. This suggests that such states and great powers will be at liberty to do whatever they
please in this domain. A good example is the red-lines that are not effectively outlined and
defined in the cyberspace. Crossing such red-lines by states is easy and this may lead to a
stimulation of terror-like cyber-attacks.
The United States counterterrorism units ...