SuperTutor

(15)

$15/per page/Negotiable

About SuperTutor

Levels Tought:
Elementary,Middle School,High School,College,University,PHD

Expertise:
Accounting,Business & Finance See all
Accounting,Business & Finance,Economics,Engineering,HR Management,Math Hide all
Teaching Since: Apr 2017
Last Sign in: 327 Weeks Ago, 4 Days Ago
Questions Answered: 12843
Tutorials Posted: 12834

Education

  • MBA, Ph.D in Management
    Harvard university
    Feb-1997 - Aug-2003

Experience

  • Professor
    Strayer University
    Jan-2007 - Present

Category > Economics Posted 17 May 2017 My Price 12.00

terrorism strategy

(451 pau) I agree with the post below 100 percent with the post below. 200 words supporting the post below list references

 

 

To have an effective counter terrorism strategy, the government should identify four parts and develop ways to manage those areas. Pillar States, “The major fronts on which the problem of terrorism can be addressed are the root conditions and issues that give rise to terrorist groups in the first place and motivate individuals to join them; the ability of such groups to conduct terrorist attacks and the defenses erected against such attacks (Pillar 2001). By identifying terrorist groups roots, capabilities, intentions, and our defense against attacks will help in developing an effective counter terrorism policy.

Roots: The majority of terrorists come from poverty, in areas where finding a job to support a family is scarce. Young men in these areas will find it profitable to join a terrorist organization. A good strategy to eliminate the root cause in this situation is to bring some sort of industry or way out poverty, to make terrorism unattractive to young people. In order to accomplish this, the government should tailor a foreign policy with those countries governments become more a stable in order to allow foreign investors and business in to increase the quality of life in these areas.

Capabilities: The United States plays an active role in using its military to limit the resources of terrorist groups, Byman explains, “The “kinetic” military operations have relied on the use of drones, conventional military operations and raids by special operations forces…military forces usually eliminate training, and operating grounds, often referred to as havens” (Byman 2015). The use of special operations in destroying the terrorist’s ability to hold terrain, destroying assets, and eliminating key members is essential however, they can also destroy or damage surrounding areas unintentionally and upset the indigenous population. While it necessary to strike at times, the military needs to be more cognizant of the possible repercussions it might have before undertaking the mission.

Intentions: Understanding what the terrorists end state is would be the most important part in developing and effective counter terrorism strategy. There might be some for negotiations and convince them to lay down their arms and peacefully lay out their grievances. For those groups that are apocalyptic in nature and do not care about peace, the strategy must be more straight forwards in finding ways to eliminate them without further destabilizing the region. There is no one way to defeat terrorists, it must be tailored to each group and threat.

Defense: To have an effective counter terrorism strategy you must also accept that at some point there could possibly be an attack. Identifying important facilities and vital infrastructure is vulnerable to terrorist attacks is paramount. By improving facilities defensive measures is imperative especially if the destruction of those facilities could have a debilitating effect on the ability to govern or provide essential services to the public.

 

Bibliography

Byman, Daniel. Al Qaeda, the Islamic State, and the Global Jihadist Movement. . London: Oxford University Press, 2015.

Pillar, Paul R. Terrorism and U.S. Foreign Policy. Washington, D.C.: Brookings Institution Press, 2001.

Answers

(15)
Status NEW Posted 17 May 2017 01:05 AM My Price 12.00

-----------

Attachments

file 1494984162-Solutions file.docx preview (56 words )
S-----------olu-----------tio-----------ns -----------fil-----------e -----------Hel-----------lo -----------Sir-----------/Ma-----------dam----------- T-----------han-----------k y-----------ou -----------for----------- yo-----------ur -----------int-----------ere-----------st -----------and----------- bu-----------yin-----------g m-----------y p-----------ost-----------ed -----------sol-----------uti-----------on.----------- Pl-----------eas-----------e p-----------ing----------- me----------- on----------- ch-----------at -----------I a-----------m o-----------nli-----------ne -----------or -----------inb-----------ox -----------me -----------a m-----------ess-----------age----------- I -----------wil-----------l b-----------e q-----------uic-----------kly----------- on-----------lin-----------e a-----------nd -----------giv-----------e y-----------ou -----------exa-----------ct -----------fil-----------e a-----------nd -----------the----------- sa-----------me -----------fil-----------e i-----------s a-----------lso----------- se-----------nt -----------to -----------you-----------r e-----------mai-----------l t-----------hat----------- is----------- re-----------gis-----------ter-----------ed -----------on-----------th-----------is -----------web-----------sit-----------e. ----------- H-----------YPE-----------RLI-----------NK -----------&qu-----------ot;-----------htt-----------p:/-----------/wo-----------rkb-----------ank-----------247-----------.co-----------m/&-----------quo-----------t; -----------\t -----------&qu-----------ot;-----------_bl-----------ank-----------&qu-----------ot;----------- -----------Tha-----------nk -----------you----------- -----------
Not Rated(0)