Place your order

Fill in the order form and provide all details of your assignment.

Proceed with the payment

Choose the payment system that suits you most.

Receive the final file

Once your paper is ready, we will email it to you

Module 2 – SLPTERRORISM AND DOMESTIC TERRORISM TACTICS AND VULNERABILITIESThis m

AMAIZING OFFER GET 25% OFF YOUR FIRST ORDER CODE FIRST25

Module 2 – SLPTERRORISM AND DOMESTIC TERRORISM TACTICS AND VULNERABILITIESThis module has introduced you to terrorist tactics and targeting. Recommend you read Mao’s book and the Al Qaeda manual. These two sources along with many others available for free on the internet invite persons and groups to imitate, motivate, plan, and act in accordance with their motivations. Understanding this capability and resource, this SLP will be historical in intent. The student will research one of the key domestic terror events or identified person who was charged with the perpetuation of the event. And then answer the basic questions outlined in this module.Select one of the following events/person: the 1993 World Trade Center Bombing, the Oklahoma City Bombing, the Unabomber, the Centennial Olympic Park Bombing, 2001 Anthrax Attacks, or the Fort Hood Attack.Session Long ProjectExplain the following:What was the target/s?Why was it selected?What tactics were used?What tools were used?What were the expectations?What were the outcomes of the events; e.g., media coverage, public acceptance, goals achieved?What vulnerabilities were recognized and mitigated after the event? Or, were they?The following items will be assessed in particular:1.Your ability to comprehend the historical (past, present and future) significance of the event you selected in the overall U.S. Domestic Terrorism paradigm and the potential differences in response and acceptance for and from this group/individual compared to others in the spectrum.2.Some in-text references to modular background readings (APA formatting requested) and a reference page.SLP Assignment ExpectationsLength: This SLP Assignment should be at least 3-5 pages not counting the title page and references.References: At least two references should be included from academic sources (e.g. peer-reviewed journal articles). Required readings are included. Quoted material should not exceed 10% of the total paper (since the focus of these assignments is critical thinking). Use your own words and build on the ideas of others. When material is copied verbatim from external sources, it MUST be enclosed in quotes. The references should be cited within the text and also listed at the end of the assignment in the References section (preferably in APA format).Organization: Subheadings should be used to organize your paper according to question.Grammar and Spelling: While no points are deducted for minor errors, assignments are expected to adhere to standard guidelines of grammar, spelling, punctuation, and sentence syntax. Points may be deducted if grammar and spelling impact clarity.The following items will be assessed in particular:Relevance: All content is connected to the question.Precision: Specific question is addressed. Statements, facts, and statistics are specific and accurate.Depth of discussion: Present and integrate points that lead to deeper issues.Breadth: Multiple perspectives and references, multiple issues and factors considered.Evidence: Points are well-supported with facts, statistics and references.Logic: Presented discussion makes sense, conclusions are logically supported by premises, statements, or factual information.Clarity: Writing is concise, understandable, and contains sufficient detail or examples.Objectivity: Avoid use of first person and subjective bias.______________________________________________________________________________________Module 2 – BackgroundTERRORISM AND DOMESTIC TERRORISM TACTICS AND VULNERABILITIESRequired ReadingRequired ReadingBoyd, J. (2011). Information warfare: OODA loop. Retrieved from http://www.valuebasedmanagement.net/methods_boyd_o…Brandt, P. T. and Sandler, T. (2009). What do transnational terrorists target? Has it changed? Are we safer? Journal of Conflict Resolution. Retrieved from http://www.utdallas.edu/~tms063000/website/TargetS…Cilluffo, F. J., Cozzens, J. B., and Ranstorp, M. (2010). Foreign fighters: Trends, trajectories, and conflict zones. The George Washington University, Homeland Security Policy Institute. Retrieved from http://cchs.auburn.edu/_files/foreign-fighters-tre…Silber, M. D., & Bhatt A. (2007). Radicalization in the West: The homegrown threat. New York City Police Department. Retrieved from https://sethgodin.typepad.com/seths_blog/files/NYP…Libicki, M.C., Chalk, P., & Sisson, M. (2007). Exploring terrorist targeting preferences. RAND Corporation.Retrieved from http://www.rand.org/content/dam/rand/pubs/monograp…Mao, Tse-Tung (1937). On guerrilla warfare. Retrieved from http://www.marxists.org/reference/archive/mao/work… [classic]Mostaghni, M. (2010). OODA loop. Infantry, 99(1), 49-50. Retrieved from ProQuest in the Trident Online Library.The Al Qaeda Manual (2002). Department of Justice. Retrieved from https://www.justice.gov/sites/default/files/ag/leg…
Requirements: .doc file