Peer Responses

User Generated

xnmrwva_91423

Humanities

Description

Instructions: Reply to these peer responses must be minimum 400 words. To demonstrate knowledge of the readings, students must use citations in parenthetical reference format and a reference list in the initial post. A minimum of 2 sources in each response.

Format: All assignments for the School of Security and Global Studies (papers, essays, exams, and Forums) must follow the Chicago Style Manual guidelines. Refer to Kate Turabian,A Manual for Writers of Research Papers, Theses, and Dissertations, 7th ed. Chicago: University of Chicago Press. The format for in-text citations is given in the Turabian guide linked above. Students are to use the parenthetical form (P) within the text of the document and the reference list form (R) in providing a list of sources.

Unformatted Attachment Preview

Instructions: Reply to these peer responses must be minimum 400 words. To demonstrate knowledge of the readings, students must use citations in parenthetical reference format and a reference list in the initial post. A minimum of 2 sources in each response. Format: All assignments for the School of Security and Global Studies (papers, essays, exams, and Forums) must follow the Chicago Style Manual guidelines. Refer to Kate Turabian,A Manual for Writers of Research Papers, Theses, and Dissertations, 7 ed. Chicago: University of Chicago Press. The format for in-text th citations is given in the Turabian guide linked above. Students are to use the parenthetical form (P) within the text of the document and the reference list form (R) in providing a list of sources. http://www.press.uchicago.edu/books/turabian/turabian_citationguide.html. Post 1 New developments in future methods of terrorism will likely include the use of terrorism by not only states but great powers. Because of the development and deployment of nuclear weapons and domestic distaste for proxy conflicts, the ability of great powers to indirectly engage each other has been severely limited. As demonstrated by the United States in 2010, with the deployment of the STUXNET virus, the use of cyberwarfare can have kinetic effects on an adversary (Zetter, 2014). The development of kinetic abilities in cyberspace makes it a vital domain for states to operate within. The fact that this is a relatively new domain also makes it dangerous to operate in because there are not the long standing international rules and norms that govern traditional methods of conflict. For example, concerning the definition of what constitutes an act of war, is a cyber-attack on a military installation the same as a traditional attack? It is easy to cross “red-lines” in the cyber domain because they may not always be communicated effectively. The ability of a state to attribute attacks to another state is hampered by the desire to conceal the sources and methods used to determine the source of the attack. The future of United States counterterrorism methods will be similar in that it will have to continue to identify individuals and exploit their knowledge of the network to attempt to bring it down. What will be difficult will be finding the correct balance between relying on a digital counterterror strategy and maintaining an effective network of human counterterror experts. The United States’ reliance on technology and bureaucracy were some of the reasons that prevented the intelligence community (IC) from predicting and preventing 9/11. Similarly, since 2001, the focus of a lot of the IC has been in Central and Southwest Asia. The future of international terrorism will likely be located in Russia and China. The United States will have to attempt to gain and maintain a technological edge in the cyber domain. The United States’ dominance in other domains, including space, will be pivotal in its dominance of the cyber domain. The United States will also have to develop and potentially force private sector industries to create and maintain effective cyber defense if they are operating national critical infrastructure. An adversary to the United States may not need to blow up a bomb in the future to grievously injure the United States. The shut down a power grid or a communications node could have a tremendous and long lasting financial cost in which no individuals are injured. Post 2 Terrorism has changed and evolved with time, this includes the tactics used by terrorists. In the future terrorists will continue to use conventional weapons as they have been. Recent terrorist attacks show that this form of terrorism will continue to be used and the United States need to be ready and prepared to prevent, deter and be resilient from these types of attacks. Recent terrorism proves that conventional warfare tactics will continue to be used. Conventional warfare refers to the use of “conventional” weapons such as guns and bombs; and these are still the preferred method. Most recently on September 19, 2016 Ahmad Rahami set off a pipe bomb in Seaside, New Jersey as well as a pressure cooker bomb in Chelsea, New York (Schwalbe, 2016). The most popular form of conventional terrorist weapon is the bomb. Such as Rahami, many others have used bombs as their choice of conventional warfare. The 1998 bombings at the U.S. Embassies in Kenya and Tanzania as well as the 1993 World Trade Center bombing are examples of this (Hoffman, n.d.). The most notable use of a conventional bomb was in 1995 when Timothy McVeigh committed the Oklahoma City bombing (Wong, 2011). These all represent the use of conventional warfare for terroristic purposes. The United States needs to be prepared for this type of terrorism to occur; one downfall of all of these events was the lack of intelligence before the events happened. The United States needs to use the resources it has in the intelligence community to better prepare themselves for a future attack. There are several methods in which the intelligence community can be of aid. One of the most productive agencies in the intelligence community that can be relied on is US Northern Command (USNORTHCOM). Nightingale (n.d.) says that USNORTHCOM includes government, non-government and private sector industries to create new concepts and technologies, plan for emergency preparedness, support law enforcement and to train and educate on homeland security issues. This type of cooperation allows for the intelligence community to be better prepared for any type of attack that may occur. Another positive aspect to providing support that we have implemented is the use of fusion centers. The purpose of fusion centers is to embody collaboration and maximize resources to create an elaborate environment for the intelligence community to share information by developing communications and producing strategic intelligence support for missions (Department of Justice, 2006). Fusion centers allow for intelligence to be shared amongst all agencies and levels of government involved in protecting us; this allows for a more secure Nation. Post 3 How did the author information best support your own ideas here? This is referring to the last assignment you did for me
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Hello buddy,Here you go, kindly check it out and feel free to hit me up for any edits.

1

The Future of Terrorism

Name
Course
Tutor
Date

2

The Future of Terrorism
Post 1
The future of terrorism is a matter that raises eyebrows in the world today. It is with no
doubt that the use of terrorism by the state as well as great powers will be a part of the new
developments in future methods for terrorism1. The use of cyber warfare will definitely be a part
of the future actions and developments of terrorism. Currently, this has been shown with
incidents such as the deployment of the STUXNET virus in 2010. I feel that this was a clear
demonstration of the kinetic impact that cyber warfare can have on an opponent. It is agreeable
that states have realized that kinetic abilities development is a crucial area where they can freely
operate. However, this domain is new and it comes with some dangers, especially because there
are no laid up international rules or limitations like those that govern traditional methods of
conflict. This suggests that such states and great powers will be at liberty to do whatever they
please in this domain. A good example is the red-lines that are not effectively outlined and
defined in the cyberspace. Crossing such red-lines by states is easy and this may lead to a
stimulation of terror-like cyber-attacks.
The United States counterterrorism units ...


Anonymous
I was struggling with this subject, and this helped me a ton!

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags