100% (1)
Pages:
7 pages/≈1925 words
Sources:
17
Style:
Harvard
Subject:
Literature & Language
Type:
Essay
Language:
English (U.K.)
Document:
MS Word
Date:
Total cost:
$ 25.2
Topic:

Why is it Difficult or Impossible to Profile Terrorist Behavior: 4 questions

Essay Instructions:
DEAR WRITER THIS IS AN EXAM NO EXTENSION POSSIBLE 5 DAYS DEATHLINE ! This is an 3rd year University essay very important high level of skill and up to standart, no plagiarism as they check with special system!!Knowledge of contemporary issues and trends in terrorism and counter-terrorism .. Instructions Please answer FOUR of the questions. Questions may be answered in any order. Please write the number of the question and the question at the top of the page on which your answer begins. Each answer must: - Be between 600 and 700 words (there is no ±10% allowance); - Be started on a new page (use the page break feature); - Include conceptual discussion (definition/discussion of concepts, key issues/debates/dynamics); - Include empirical material (evidence to help support your response); - Cite AT LEAST ONE of the required readings listed on attachment ; - Referencing should be Harvard style with page numbers where appropriate, with the full reference(s) given at the end of the answer. Direct quotations are not expected nor recommended !! Here the question: The Questions: 1. Why is it difficult or impossible to profile terrorist behaviour? 2. How objective is the Western media in its reporting of terrorism? Use examples to support your answer. 3. How effective is suicide bombing as a tactic? Use examples to support your answer. 4. What are the causes of Islamist terrorism? Why does it target the West? 5. Is it acceptable to trade off liberty for security? Discuss in the context of the Israel-Palestine conflict. 6. Are violent acts in the campaign against abortion really terrorism? 7. Why do States have a monopoly on violence? 8. In what ways, if any, is terrorism a threat to Australia? 9. Terrorism has been described as a ‘cry for help'. Do you agree? Why or why not? 10. Is there a cross-over between secular and religious terrorism? Use examples to support your answer. 11. In what ways, if any, does the suppression of dissent encourage terrorism? File and Document Formatting File format: - All scripts must be submitted in either .doc or .docx format. Other formats are not permitted. - Please submit only one file that contains all your answers. - Please name your file using the following format: surname-student number-AIE363 exam. (example: meinhoff-23001567-AIE363exam.doc) Document format: - Please put full name and student number in a header. - Your document should have standard margins and use a black sans-serif font (11 or 12 point). - Page numbers should be shown. - Please start each answer on a new page. - Write the question number and question in bold at the top of the first page of your answer. 3. Assessment Aims The aim of this assessment is for students to demonstrate: - Familiarity with and understanding of the topics covered in the unit in terms of being able to define key concepts, issues and debates; - Knowledge of contemporary issues and trends in terrorism and counter-terrorism; - Ability to relate concepts and debates to empirical examples in order to produce analysis; - Ability to respond to the question concisely, with an appropriate focus and in the required format. 4. Assessment Format and Advice for How To Tackle It This is a "take home" exam, or, if you prefer, a time- and word-limited piece of coursework. Like any piece of work, it is best to start early. In contrast to preparing an essay, however, you may wish to treat this more like a traditional exam initially, but then review your answers against the assessment rubric and instructions and revise/polish them accordingly before submission. This of course is only one possible way of approaching the exercise, and each of you will have to decide how you wish to tackle it, especially if you are less familiar with the weekly readings or current affairs. Keep the assessment criteria in mind and work on meeting them as fully as possible, but remember it doesn't have to be perfect, just good enough – which is about all that can be achieved given the time- and word-limits. One unusual feature of this particular take-home exam is that there is a requirement to cite at least one source from the required readings listed in the unit guide in each answer (see section 6 for full instructions). Verbatim quotations are not expected nor encouraged, reflecting the fact that the aim is to require you to demonstrate basic familiarity with course material and the ability to relate it to the topic within a pretty tight word limit. 5. Assessment Rubric and Mark Allocation Each question will be marked out of 25. Marks for each question will be added together to give an overall mark out of 100. This mark will be worth 50% of your final unit mark. Marks will be allocated equally between five criteria: 1. Evidence of conceptual/theoretical engagement; 2. Evidence of engagement with empirical material; 3. Evidence of analysis; 4. Structure and clarity of response; 5. Conformity to assessment requirements and instructions (response length, formatting and presentation requirements, referencing). The rubric below gives descriptors for the requirements for each criterion at each attainment level: High DistinctDetailed, accurate and precise definition or discussion of key concepts/themes /issues. Excellent and well-balanced understanding of concept/topic and related debates. Empirical material present, entirely relevant, well-selected to support answer and excellent level of detailDiscussion clearly relates material to conceptual/theor etical content and to the question. Very good or excellent depth of analysis. Excellent and entirely logical structure both overall and within paragraphs. Effective and clear linking of points. Meaning entirely clear with precise and sophisticated use of language. Response coherent, easy to follow and stylistically sophisticated. Excellent conformity with only one or two minor lapses..ion . 6. Instructions Please answer FOUR of the questions. Questions may be answered in any order. Please write the number of the question and the question at the top of the page on which your answer begins. Each answer must: - Be between 600 and 700 words (there is no ±10% allowance); - Be started on a new page (use the page break feature); - Include conceptual discussion (definition/discussion of concepts, key issues/debates/dynamics); - Include empirical material (evidence to help support your response); - Cite AT LEAST ONE of the required readings listed on attachment; - Referencing should be Harvard style with page numbers where appropriate, with the full reference(s) given at the end of the answer. Direct quotations are not expected nor recommended.
Essay Sample Content Preview:

Terrorism
Name
Institution
Course
Date
Question 1: Why is it Difficult or Impossible to Profile Terrorist Behavior?
More often than not, the security agents in different locations such as air bases, ports and pubic places tend to look for certain behaviors in terrorists. According to Florence and Friedman (2010, p. 423), it is clear, that the most common form of profiling on terrorist behavior is what is termed as Screening Passengers by Observation Technique or SPOT. This strategy would employ looking at specific behaviors in such places. These behaviors could involve, appearing sweaty, carrying suspicious bundles and scurrying here and there looking over the shoulder. Later the security agents noticed that the terrorists had grown smarter. They do not appear as scared, lost and confused individuals. They have learnt to be more discrete and smart as well. However, knowing this is not all that it takes. Borum (2012, p. 5) indicates that the terrorists have learnt that in order to be effective, they have to be less predictable. As such, when the counter-terrorism agents are busy profiling the terrorist behavior, the terrorists get down to finding out ways of acting out of the expectations of these agencies. This means that the terrorist behavior keeps on evolving. The more the security agents try to profile the behaviors, the more the terrorists try to act contrary to that behavior. In the long run, it becomes virtually impossible to predict how a terrorist behaves. This, in turns, makes it hard to catch terorrists using the behavior profiling strategy.
Yun (2010, p. 111) gives another perspective from which terrorist profiling becomes an issue. He indicates that insurgency has become the new way for the terrorists. This implies that they have inside people within the security agencies, or they have ways of getting intelligence from the security agencies. What this implies is that the terrorists act on some kind of counter-intelligence. They understand what the security agencies are looking for, and they act in the exact opposite manner. In the long run, it becomes hard to predict who is a terrorist or a potential terrorist based on the manner in which they behave. Bell and Evens (2010, p. 370) also echo the same idea. They feel that in mapping the counter-terrorism terrain, it appears that the terrorists have learnt to act in a manner different from the way they are expected to. They attack the unexpected and most unlikely places; they dress and behave not like terrorists but like other civilians, until they reveal their true identity when it is too late for the security agents to do something about it. This makes it quiet tough for the profiling of terrorist behavior to be very effective.
Smith (2008) sheds even more light on this issue. He tries to look into the terrorist psychology; how they work and where they strike. Giving the examples of 9/11, Timothy McVeigh, and Eric Rudolph, Smith manages to bring out just how hard it is to profile the terrorist behaviors. In these cases, the terrorists chose targets which were miles from where they lived, places that were very unlikely to be attacked. The terrorists went ahead to use means of transport that are so obvious, but which could not be suspected to be ways through which terrorists could lay their siege. After the attacks happened, Smith (2008, p.1) observes that the police and security agents realize that they have nothing much to do than try and provide physical security in the high risk areas.
These examples explain why it is so hard to profile terrorist behavior. The current technologies and new modes of operation fro the terrorists mean that the security agents are left guessing on who can be a terrorist and who is not. There is no clear cut indication of a terrorist behavior. The bottom line is that profiling terrorist behavior is very difficult if not impossible.
Bibliography
Borum, R. 2012. Psychology of Terrorism: National Criminal Justice Reference Services. [Online] Available at /pdffiles1/nij/grants/208552.PDF [Accessed 1st 0ct. 2012]
Bell, C. & Evens, B., 2010. Terrorism to Insurgency: Mapping the Post-Intervention Security Terrain. Journal of Intervention and State Building, vol. 4(4), pp. 371-390.
Florence, J. & Friedman, R., 2010. Profiles in Terror: A Legal Framework for the Behavioral Profiling Paradigm. George Mason Law Review, 2009. [Online] Available at /doc/17-2_FlorenceandFriedman.pdf [Accessed 1st Oct. 2012]
Smith, B., 2008. A Look at Terrorist Behavior: How They Prepare, Where They Strike. National Institute of Justice, No. 260. [Online] Available at /journals/260/terrorist-behavior.htm [Accessed 1st Oct 2012]
Yun, M., 2010. Insurgency Warfare as an Emerging New Mode of Warfare and the New Enemy. The Korean Journal of Defence Analysis, Vol. 22(1), pp. 111-125.
Question 4: What are the Causes of Islamist Terrorism? Why does it Target the West?
According to Williams (2004, p. 54), there are various factors that propagate the occurrence of terrorist attacks. In looking at the facts about terrorists and terrorism, he indicates that the factors leading to terrorist activities can include ideological differences, religious differences or other secular motives. Whichever the case, the terrorists usually believe that they have a cause to fight for and they keep doing it.
Fine (2008, p. 59) indicates that the Islamist terrorism has been rising since the 1979 Islamic revolution in Iran. The terrorism is propelled by ideological differences as well as religious agendas. On the ideological differences, Moore (2012) observes that the Islam believe in very different ideologies as compared to other non-Islamist people. However, they believe that it is in the interest of the Islam community to clean the world of the wrong ideologies and introduce the new Islamic ideologies which are acceptable. Such groups is the Al-Qaeda, formed by Osama bin Laden back in 1990. The main aim of this organization was to make sure that the Muslim State was re-established throughout the world by overthrowing the corrupt systems. These corrupt systems included the Americans and the Israelis, which they aimed to remove from the Middle East through well coordinated mujahideen networks. The Armed Islamic Group (GIA) was also propelled by the same interests, where the terrorist activities in Algiers in 1992 resulted after the country refused a democratically elected Islamist government. Other Islamic terroris groups such as the Harakat ul-Mujahidin, Aden-Abyan Islamic Army, Lashkari-i-Taiba (Army of the Righteous), and Jaish-e-Mohammed 9Army of Mohammed) all came up since the Islamic followers in the areas of interest felt that their ideologies were being neglected. As such, they chose to assert themselves in the community, and this resulted to the terrorist activities. This indicates that Islamic terrorist activities are partially propelled by the ideological differences. The main reason as to why such activities target the west is mainly because these are the nations which seem to be totally corrupt in the eyes of the Islam. As such, to prevent the spread of the corrupt nature, the West and the U.S must be prevented from spreading their interests. In other words, the west is subject to the terrorist activities.
Religious extremism is another factor that is closely associated with Islamist terrorism. Williams (2004, p. 112) also observes that this is one of the factors that motivate the Islamic terrorists. They feel that anyone who does not ascribe to their religions is kaffir, or one who odes not believe in God. Furthermore, they believe in Jihad or the Holy War which makes them believe that thy have to fight for their faith. The activities that are defined as terrorism by the rest of the world are seen as religious wars by the Muslim. They are motivated to keep going and keep fighting the war. The names given to the Islamic terrorist groups also seem to agree with the fact that religious extremism has a hand in it. They have names with religious meanings such as party of God, Army of Mohammed and other names which are religious related.
The west and especially the U.S.A cannot escape this form of terrorism. The Islamist terrorists believe that these two are the major causes of corruption in the world. Some of the organizations, such as the Hizballah, believe that the US is very corrupt, la...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:
Sign In
Not register? Register Now!