Top Professionals
The tutoring and assignment help team consists exclusively of highly qualified graduate writers, each professional with in-depth subject matter expertise and significant experience in academic writing.
Click to fill the order details form in a few minute.
Posted: October 2nd, 2022
Assignment
Q.1 From your understanding of the term “force multiplier,” provide an example of how terrorists use of the media in this context? (Use at least one quotation from the textbook to support your perspective – ensure you cite the source(s) using the APA writing style.)
Q.2 The text suggests “cyberterrorism” could potentially have a more devastating impact on terrorist targets than other terrorist tactics used. Based on your understanding of the term provide examples of some actions you would take to protect your business, company, or faith based organization against such a threat.(Use at least one quotation from the textbook to support your perspective – ensure you cite the source(s) using the APA writing style.)
Q. 3Let’s assume that you are a police officer in a major urban area. What thoughts will be running through your mind as you begin your shift for the day? Link your discussion post to the readings and / or assignment topics for this week.
Terrorism
Question #1
Terrorists use social media tools to gain influence, power, recruit more members, and build a strategic advantage over their opponents. “Terrorists routinely use force multipliers because they add to their aura. All political terrorists want to give the illusion that they can fight on a higher, more powerful level” (White, 2016 p. 101). The most commonly used social media tools include Twitter, Facebook, and YouTube, among others. They use these tools to publicize and celebrate their battlefield achievements, spread propaganda, and take responsibility for various terror activities. As a force multiplier, social media is used to coordinate their assaults to cause chaos, panic, destruction, and deaths. As Lyons (2012) explains, a social media force multiplier is a person or a group who use unique tactics to cause more massive force damage. A well-skilled sniper is an example of a force multiplier on the battlefield. They are capable of force multiplication without engaging the enemy directly. Terrorists use an exponential scale that is non-linear in transmitting their recruits’ tactics, ideologies, blood lust, battles, and psychological operations. They also use social media to upload their combat and films showcasing recruitment and training of their militia, and the execution of their victims, among other heinous acts.
Question #2
Unlike other forms of terrorism, cyberterrorism is quite complex to manage. This is primarily because its perpetrators are not defined but are rather common individuals with knowledge in computing. More so, these attacks can take any form and can also be launched from any location as long internet connection exists. According to Gordon, and Ford (2002), it can be hard to protect an organization against any cyberterrorism. Threats could be from criminal operations, terrorist groups, anti-established organizations that are disruptive, and the government. The necessary steps that the organization can undertake to safeguard it include securing the systems with software and hardware protection, installing systems of intrusion detection, and a quick response to any intrusions. Secondly, the organization needs to affiliate with other defensive organizations to help in tracking threats. Thirdly, the organization needs to create a security policy and train employees to protect the network. As White (2016 p. 301) “states, cyberterrorism has yet to reach its full potential, and the United States remains vulnerable to attack”.
Question #3
As an officer in an urban area at the beginning of my shift, some of the thoughts that will be running through my mind include the following. How am I going to deal with with minorities today without being appearing to profile them? I’m aware that there are crime hotspots such as the inner cities and they tend to be very hostile to policie officers. How will I carry out by policing duties in these areas while at the same time protecting myself from any harm. Urban centres are full of mahy people. Which techniques will best work when dealing with criminals without distrupting the public normalcy? Terrorists usually target urban areas where the population is quite high. How can I use my policing skills and training to ensure that such events do not occur. How safe am I while doing my duties? Does my partner have my back? Do I have the mental alertness and stability that will enable me make rational decisions?
References
Gordon, S., & Ford, R. (2002). Cyberterrorism?. Computers & Security, 21(7), 636-647.
Lyons, P. L. (2012). Web of Deception: Social Media and Implications for Military Deception. Air Command And Staff College Maxwell Air Force Base United States.
White, J. R. (2016). Terrorism and homeland security. Cengage Learning.
We prioritize delivering top quality work sought by college students.
The tutoring and assignment help team consists exclusively of highly qualified graduate writers, each professional with in-depth subject matter expertise and significant experience in academic writing.
Our custom writing services maintain the highest quality while remaining affordable for students. Our pricing for research papers, theses, and dissertations is not only fair considering the superior quality but also competitive with other writing services.
We guarantee plagiarism-free, human-written content. Every product is assured to be original and not AI-generated. Our writers, tutors and editors are research experts who ensures the right formating and citation sytles are followed. To note, all the final drafts undergo rigorous plagiarism checks before delivery for submission to ensure authenticity for our valued customers.
When you decide to place an order with Dissertation Help, here is what happens:
Place an order in 3 easy steps. Takes less than 5 mins.