In this assignment, you will write an essay that examines the rise of one of the Jihadist networks to include: ISIS, Boko Haram, and Al Qaeda. You will research that group’s background, recruitment ta

Ace your studies with our custom writing services! We've got your back for top grades and timely submissions, so you can say goodbye to the stress. Trust us to get you there!


Order a Similar Paper Order a Different Paper

In this assignment, you will write an essay that examines the rise of one of the Jihadist networks to include: ISIS, Boko Haram, and Al Qaeda. You will research that group’s background, recruitment tactics, and targets. Additionally, you will reflect on one recent attack from the past 5 years from your selected group. Answer the following questions in your essay.

  • What is a Jihadist network?
  • Where does your selected group primarily operate? (Cite specific geographic locations such as country, region, and/or province.)
  • What are the psychological and primary motivators for your selected group?
  • What are the psychological and primary motivators for your selected group, and what sociological impacts exist?
  • What are the organization’s targets? How are they chosen?
  • What has the United Nations (UN) done to counter the terrorist organization? Are these efforts effective?

Your completed essay should be a minimum of two pages in length, not counting the title and reference pages. You are required to use at least one outside source. All sources used, including the textbook, must be cited and referenced according to APA guidelines.

Course Textbook: Terrorism and Homeland Security, 9th Edition

In this assignment, you will write an essay that examines the rise of one of the Jihadist networks to include: ISIS, Boko Haram, and Al Qaeda. You will research that group’s background, recruitment ta
MCJ 6453, Global Terrorism 1 Cou rse Learning Outcomes for Unit III Upon completion of this unit, students should be able to: 5. Analyze global threats posed by terrorism. 5.1 Examine the specifics of Jihadist networks, such as ISIS, Boko Haram, and Al Qaeda. 5.2 Identify the specific targets and counterterrorism measures related to the Jihadist networks. 6. Evaluate current strategies for the United States’ efforts to cope with terrorism. 6.1 Evaluate the efforts of the United Nations (UN) to counter the effects of the Jihadist networks. Course/Unit Learning Outcomes Learning Activity 5.1 Unit Lesson Chapter 2 Chapter 5 Chapter 11 Unit III Essay 5.2 Unit Lesson Chapter 2 Chapter 5 Chapter 11 Unit III Essay 6.1 Unit Lesson Chapter 11 Unit III Essay Reading Assignment Chapter 2 : Practical Criminology, Radicalization, and Types of Terrorism Chapter 5: Force Multipliers, Gender Roles, and Tactics Chapter 11: Jihadist Networks Unit Lesson Introduction: Global Terrorism There are many different types of terrorists that exist today. Domestic and global terrorism attacks, threats, and potential plots c ontinue to rise at an exponential rate. The battle to subdue these threats and terrorist attacks continues to be a growing issue among the global community , includ ing the United States and its allies. In this unit, you will learn about the different types of terrorism threats that exist in the United States and abroad. Threats range from small individual suicide bombing attacks to large -scale incidents such as the 9/11 attacks on multiple U.S. critical infrastructures. Additionally, you will learn how the g ender role of women has changed domestic and global terrorism and how it has affected the rise of Jihadist networks . Lastly, you will learn about the radicalization process that takes place on the Internet by groups such as ISIS and Al Qaeda. UNIT III STUDY GUIDE Global Terrorism Threats: Recruitment and Radicalization Today MCJ 6453, Global Terrorism 2 UNIT x STUDY GUIDE Title Global Terrorism Threats and Targets —Critical Infrastructures Domestic and global terrorists today are looking to impose shock and awe into the hearts of their victims. For terrorist organizations to gain media notoriety and attention, many have determine d that they need to think bigger and outside the traditional box. Terrorists have determined that creating plans and plots to target critical infrastructures of the global community can draw more attentio n and leave the biggest impact on the international community. The U.S. Department of Homeland Security (DHS , 2013 ) h as 16 domestic critical infrastructure sectors that could be targeted by global terrorists. These key critical infrastructures exist globally as well . Domestic Critical Infrastructure Exam ple Chemical Sector Chemical plants and factories Commercial Facilities Sector Shopping malls, private businesses, office buildings Communications Sector Satellites, cell phone towers, telecommunications systems Critical Manufacturing Sector Manufacturing plants, transportation manufacturing facilities, electrical equipment manufacturing plants Dams Sector Large dams, such as the Hoover Dam in Las Vegas, Nevada; levees; irrigation systems; large capacity wells Defense Industrial Base Sector Companies supporting military operations, defense contracting organizations Emergency Services Sector Fire departments; police stations; local, state, and federal emergency responders/buildings Energy Sector Power plants, power girds, wind farms, solar farms, petroleum facilities Financial Services Sector New York Stock Exchange (NYSE), financial institutions, credit facilities Food and Agriculture Sector Farms, greenhouses, restaurants, food manufacturing facilities, storage facilities Government Facilities Sector Local, state, and federal government buildings; military installations; court houses; U.S. embassies Healthcare and Public Health Sector Hospitals, clinics, Red Cross, Salvation Army, research laboratories Information Technology Sector Public and private information technology facilities, Internet service providers (ISPs), fiber optic networks Nuclear Reactors, Materials, and W aste Sector Nuclear power plants, nuclear waste facilities, radiological storage facilities Transportation Sys tems Sector Mass transit systems (e.g., air, highway, maritime, rail, postal) Water and Wastewater Systems Sector Waste treatment plants, waste water plants, storage facilities, filtration facilities, water towers Reflection: Take a moment and think about the 16 critical infrastructure sectors outlined above. Critical infrastructures are all around you — everywhere you go. As an example, in Omaha, Nebraska , the Fort Calhoun Nuclear Power Plant was one of the largest nuclear sites in the Iowa and Nebrask a geog raphic area. The facility was decommissioned by the Omaha Public Power District and federal regul ators. The decommissioning process of this nuclear facility will take more than 60 years to complete (Epley, 2016). Although this nuclear power plant is no longer in active operation, the radiological material that it houses poses a significant threat to the citizens of Omaha and the surrounding communities. This critical MCJ 6453, Global Terrorism 3 UNIT x STUDY GUIDE Title infrastructure would be considered an ideal target for domestic or international terr orist organizations. As a citizen of the United States, think about the questions below.  What critical infrastructures exist in your town or city ?  What critical infrastructures exist in your county ?  What critical infrastructures exist in your state ?  Whi ch critical infrastructure would be the perfect target for a domestic or international terrorist attack?  What impact would it leave on your community, county, or state?  How many individuals would perish or be injured?  What environmental impacts would the terrorist attack have?  What impacts on your local economy would take place? Understanding Jihadist Networks The number of Jihadist networks is growing exponentially as time moves forward. Jihadism has existed since the late 1980s and 1990s. However, in the aftermath of the 9/11 attacks, government agencies and the global community began using the terms jihadism and global jihadism more extensively when referring to terrorist organizations that were rooted in Islam. The term jihadism is very difficult to define as local, state, federal, tribal, and international government agencies have their own individual definitions for the term. One of the common themes and motivators in Jihadist networks today is the affiliation and correlation o f religious and political views. The political and religious views of Jihadists are drastically different from those of Western society. There is often a misconception between the religion of Islam and Islamic extremists. It is vital to understand the differences between Islamists and jihadists . As Nelly LaHoud (2010) outlines, in light of the current media coverage of Islamic expressions, it is critical to outline the differences between one who practices Islam and one who is a Jihadist. Traditional Isla mists believe in the teachings of social justice from the Koran; Jihadist s are the opposite and do not. Jihadists reject many of the teachings outlined in the Koran and also reject the world order of nation states. Jihadists hold the position that these te achings are a continuation of Western Imperialism. There are three core strengths that exist in Jihadist networks and ideologies, which are explained in detail below . Idealism: Jihadists often believe that actions must take place for one primary cause or set of actions. These individuals have a direct loyalty for their religion and terrorist organization leader. They often do not pledge allegiance to political leaders or nations. Further, every individual is welcome to join the Jihadist movement if he or she embraces the beliefs and views (LaHoud, 2010) . Jihadist networks do not discriminate based on gender, color, sex, etc. Many Americans have become radicalized online and have traveled to war -torn areas in the Middle East to train with Jihadist networks. Individualist in interpreting religion : Jihadists interpret Islam differently than those who are Muslim. They believe in certain sections of the Koran and teachings of Allah but have established a set of norms that is much different from traditional Islamic beliefs ( LaHoud, 2010) . Jihad as an individual duty: Jihadists believe that Jihad is the individual duty of each Muslim throughout the world. They also believe that anyone who supports Western values and norms is a threat and an enemy (LaHoud, 2010) . Jihadist networks exist globally and include many terrorist organizations .  ISIS/ISIL : ISIS was established in 2014 by Abu Bakr al -Baghdadi in Iraq and is referred to as ISIL or the Islamic State of Iraq and the Levant (Daesh). This grou p has grown significantly and conducts operations in Iraq and Syria (Elbaum, 2018). ISIS has been responsible for hundreds of attacks throughout the world and is considered one of the biggest terrorist threat s to the global community by the Federal Bureau of Investigation (FBI).  Boko Haram: This terrorist organization was established in 2002 in Nigeria by Mohammed Yusuf and was later led by Abubakar Shekau ( “Boko Haram ,” 2016). This terrorist group seeks to spread the teachings of Jihadist beliefs. Boko Har am is most known for kidnappings and abductions. In April of MCJ 6453, Global Terrorism 4 UNIT x STUDY GUIDE Title 2014, this terrorist organization kidnapped 276 school girls in Nigeria ( “Boko Haram,” 2016). They have killed tens of thousands since inception.  Al Qaeda: Al Qaeda was created by Osama bin Laden in the 1980s in Afghanistan while at war with the Soviet Union ( Al Qaeda International , 2001). Al Qaeda slowly began establishing terror networks in the Middle East and abroad to include Afghanistan, Pakistan, and the United States. Al Qaeda is most known for the 9/11 attacks against the United States. Global Terrorist Recruitment and Radicalization Terrorist organizations , such as ISIS and Al Qaeda , are using social media platforms ( e.g., Facebook, Twitter, LinkedIn, YouTube), the Internet, the Dark Web, encrypted chatrooms, and other online methods to actively recruit and radicalize individuals from around the world. Further, these types of global terrorist organizations are also using these mediums to promote propaganda and to gather intelligence. Ter rorists choose to use the Internet because it is accessible from nearly anywhere around the globe. Terrorists can remain anonymous and post material from behind en crypted connections and hidden I nter net protocol (IP) addresses. It is nearly impossible to track down the physical location of most computer networks linked to terrorist organizations because of the vast network of encrypted tools available. Terrorist groups use the same hardware, softwar e applications, methodologies, and strategies as the military and law enforcement agencies. As an example, geographic information systems (GIS) technology can be used to capture, store, and analyze geography. Law enforcement and the U.S. military have been using this type of technology for decades in the fight against terrorism. Terrorists are also using this same technology to monitor the geographic locations and operations of the United States and U.S. allies. In addition to recruiting individuals through social media platforms, terrorist organizations are also creating websites, establishing hidden/encrypted chatrooms, posting videos, and uploading propaganda on the Internet. These tools of destruction have effectively radicalized tens of thousands of individuals from around the globe. As an example, after the Boston Marathon bombings, ISIS uploaded multiple videos of the heinous attacks and urged the global community to join their movement of fighting the West and Western values. These types of videos slowly begin to change the political, religious, and basic views of individual s. In time, many of these individuals self -radicalize, and they are guided by groups such as ISIS to complete an act of terrorism. Conclusion In sum mary , this unit lesson has covered a multitude of topics and subtopics related to the global threats posed by domestic and international terrorist organizations. Further, the rise of Jihadist networks globally and the managing ideologies was outlined in detail . As technology continues to emerge, terrorist organizations will continue to grow their base of operations through social media and the Internet. The radicalization and recruitment process for international terrorism is ever -evolving and will continue to be a challenge for the United States and U.S. allies. Through effective and efficient counterterrorism tactics and partnerships with organizations , such as the United Nations (UN) , the War on Terror will possibly soon conclude. References Al Qaeda Inter national: Hearings before the Subcommittee on International Operations and Terrorism, Committee on Foreign Relations, U.S. Senate (2001) ( Testimony of J. T. Caruso). Retrieved from https://archives.fbi.gov/archives/news/testimony/al -qaeda -international Recruiting via the Internet (Rawpixelimages, 2018) MCJ 6453, Global Terrorism 5 UNIT x STUDY GUIDE Title Bo ko Haram: Behind the rise of Nigeria’s armed group. (2016). Retrieved from https://www.aljazeera.com/programmes/specialseries/2016/11/boko -haram -rise -nigeria -armed -group – 161101145500150.html Elbaum, R. (2018). W hat is ISIS? What you need to know about Isl amic State in Iraq and Syria. Retrieved from https://www.nbcnews.com/storyline/smart -facts/what -isis -what -you -need -know -about -islamic – state -iraq -n8 59996 Epley, C. (2016 , October 24 ). Today, Fort Calhoun nuclear plant will go offline for good, marking the end of an era at OPPD. Omaha World -Herald . Retrieved from https://www.omaha.com/money/today -fort – calhoun -nuclear -plant -will -go -offline -for -good/article_0ff3a902 -5cd6 -52d8 -a720 -b2b9bc6ec0de.html Lahoud, N. (2010). The strengths and weaknesses of Jihadist i deology. CTC Sentinel, 3 (10), 1 –3. Retrieved from https://ctc.usma.edu/the -strengths -and -weaknesses -of-jihadist -ideology/ Rawpixelimages. (2018). Hackers with computer hacking concept , ID 12155087 3 [Photograph]. Retrieved from h ttps://www.dreamstime.com/h ackers -computer -hacking -concept -image121550873 U.S. Department of Homeland Security. (2013). Critical infrastructure sectors. Retrieved from https://www.dhs.gov/cisa/critical -infrastructure -sectors Suggested Reading In order to access the following resources, click the links below. This unit and course discuss the trends in terrorism, including the recruitment tactics. The resource below explains the psychology behind terrorism . Horgan, J. G. (2017). Psychology of terrorism: Introduction to the spe cial issue. American Psychologist , 72 (3), 199 –204. Retrieved from https://library resources.columbiasouthern.edu/login?url=http://search.ebscohost.com/login.aspx?direc t=true&db=pdh&AN=2017 -13879 -001&site=ehost -live&scope=site In the unit lesson, we discussed the details of the Jihadist ideology. If you would like to review this furthe r, consider reading the below article . Lahoud, N. (2010). The strengths and weaknesses of Jihadist ideology. CTC Sentinel, 3 (10), 1 –3. Retrieved from https://ctc.usma.edu/the -strengths -and -weaknesses -of-jihadist -ideology/ Learning Activities (Nong raded) Nongraded Learning Activities are provided to aid students in their course of study. You do not have to submit them. If you have questions, contact your instructor for further guidance and information. Consider three ways that social media platforms , such as Facebook, Twitter, and LinkedIn , can counter the actions of global terrorist organizations from promoting propaganda and recruitment material on their websites.

Writerbay.net

Looking for top-notch essay writing services? We've got you covered! Connect with our writing experts today. Placing your order is easy, taking less than 5 minutes. Click below to get started.


Order a Similar Paper Order a Different Paper