Order for this Paper or Similar Assignment Writing Help

Click to fill the order details form in a few minute.

Posted: October 2nd, 2022

Terrorism

Assignment
Q.1 From your understanding of the term “force multiplier,” provide an example of how terrorists use of the media in this context? (Use at least one quotation from the textbook to support your perspective – ensure you cite the source(s) using the APA writing style.)
Q.2 The text suggests “cyberterrorism” could potentially have a more devastating impact on terrorist targets than other terrorist tactics used. Based on your understanding of the term provide examples of some actions you would take to protect your business, company, or faith based organization against such a threat.(Use at least one quotation from the textbook to support your perspective – ensure you cite the source(s) using the APA writing style.)

Q. 3Let’s assume that you are a police officer in a major urban area. What thoughts will be running through your mind as you begin your shift for the day? Link your discussion post to the readings and / or assignment topics for this week.

Terrorism
Question #1
Terrorists use social media tools to gain influence, power, recruit more members, and build a strategic advantage over their opponents. “Terrorists routinely use force multipliers because they add to their aura. All political terrorists want to give the illusion that they can fight on a higher, more powerful level” (White, 2016 p. 101). The most commonly used social media tools include Twitter, Facebook, and YouTube, among others. They use these tools to publicize and celebrate their battlefield achievements, spread propaganda, and take responsibility for various terror activities. As a force multiplier, social media is used to coordinate their assaults to cause chaos, panic, destruction, and deaths. As Lyons (2012) explains, a social media force multiplier is a person or a group who use unique tactics to cause more massive force damage. A well-skilled sniper is an example of a force multiplier on the battlefield. They are capable of force multiplication without engaging the enemy directly. Terrorists use an exponential scale that is non-linear in transmitting their recruits’ tactics, ideologies, blood lust, battles, and psychological operations. They also use social media to upload their combat and films showcasing recruitment and training of their militia, and the execution of their victims, among other heinous acts.
Question #2
Unlike other forms of terrorism, cyberterrorism is quite complex to manage. This is primarily because its perpetrators are not defined but are rather common individuals with knowledge in computing. More so, these attacks can take any form and can also be launched from any location as long internet connection exists. According to Gordon, and Ford (2002), it can be hard to protect an organization against any cyberterrorism. Threats could be from criminal operations, terrorist groups, anti-established organizations that are disruptive, and the government. The necessary steps that the organization can undertake to safeguard it include securing the systems with software and hardware protection, installing systems of intrusion detection, and a quick response to any intrusions. Secondly, the organization needs to affiliate with other defensive organizations to help in tracking threats. Thirdly, the organization needs to create a security policy and train employees to protect the network. As White (2016 p. 301) “states, cyberterrorism has yet to reach its full potential, and the United States remains vulnerable to attack”.
Question #3
As an officer in an urban area at the beginning of my shift, some of the thoughts that will be running through my mind include the following. How am I going to deal with with minorities today without being appearing to profile them? I’m aware that there are crime hotspots such as the inner cities and they tend to be very hostile to policie officers. How will I carry out by policing duties in these areas while at the same time protecting myself from any harm. Urban centres are full of mahy people. Which techniques will best work when dealing with criminals without distrupting the public normalcy? Terrorists usually target urban areas where the population is quite high. How can I use my policing skills and training to ensure that such events do not occur. How safe am I while doing my duties? Does my partner have my back? Do I have the mental alertness and stability that will enable me make rational decisions?

References
Gordon, S., & Ford, R. (2002). Cyberterrorism?. Computers & Security, 21(7), 636-647.
Lyons, P. L. (2012). Web of Deception: Social Media and Implications for Military Deception. Air Command And Staff College Maxwell Air Force Base United States.
White, J. R. (2016). Terrorism and homeland security. Cengage Learning.

Check Price Discount

Study Notes & Homework Samples: »

Why Choose our Custom Writing Services

We prioritize delivering top quality work sought by students.

Top Tutors

The team is composed solely of exceptionally skilled graduate writers, each possessing specialized knowledge in specific subject areas and extensive expertise in academic writing.

Discounted Pricing

Our writing services uphold the utmost quality standards while remaining budget-friendly for students. Our pricing is not only equitable but also competitive in comparison to other writing services available.

0% similarity Index

Guaranteed Plagiarism-Free Content: We assure you that every product you receive is entirely free from plagiarism. Prior to delivery, we meticulously scan each final draft to ensure its originality and authenticity for our valued customers.

How it works

When you decide to place an order with Dissertation Help, here is what happens:

Complete the Order Form

You will complete our order form, filling in all of the fields and giving us as much instructions detail as possible.

Assignment of Writer

We analyze your order and match it with a custom writer who has the unique qualifications for that subject, and he begins from scratch.

Order in Production and Delivered

You and your writer communicate directly during the process, and, once you receive the final draft, you either approve it or ask for revisions.

Giving us Feedback (and other options)

We want to know how your experience went. You can read other clients’ testimonials too. And among many options, you can choose a favorite writer.

Expert paper writers are just a few clicks away

Place an order in 3 easy steps. Takes less than 5 mins.

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
$0.00