Paper two is a continuation of the work you did on your first paper of this course. As always, pay close attention to the following guidelines. Keep in mind, college-level research and writing is a process that takes time, and you will likely need to write multiple drafts of your work to create a quality paper. Allow yourself ample time to complete this assignment to the best of your ability.
- Of the five articles you used for your Paper 1 assignment during Week 2, select three that share a common theme discussed in the first nine chapters of our textbook.
- In a well-written paper, provide the following for EACH article:
- A description of the theme as our textbook discusses it.
- What the articles you have selected say about the theme. Where do they agree? Where do they disagree?
- Now that you have reviewed at least four sources on this theme (our textbook and the three articles), what is your perspective?
- Papers must adhere to the following guidelines PRIOR to submission on or before the last day of Week 4:
- The first page of your paper will be a cover sheet correctly formatted according to APA guidelines.
- This paper will use 1-inch margins, Times New Roman 12-point font, and double spacing.
- The citations for each article MUST be correctly formatted according to APA guidelines. Do NOT use an automated citation manager to perform this function. Do it manually for this assignment and check your formatting against available APA resources.
- Excluding the cover page and references, this paper must EXCEED 5 pages of written text.
- Only COMPLETE paragraphs consisting of an introductory sentence, a full explanation of key points supported with properly cited sources, and a concluding sentence may be used.
- Only use published articles from academic texts, such as those found at scholar.google.com or accessed through your Grantham University EBSCO host account.g. The entire paper must be your original work. It may not include quotes, and at no time should text be copied and pasted.
- This paper DOES require an introductory paragraph, explicit thesis statement, concluding paragraph, and references page.
FIRST PAPER FOR REFERENCE
British Islamic Extremist Terrorism
Harrington addresses the problem of the spread of
the Al Qaeda terror group all over the globe. In this article the author
focuses on the major target of the terror group as British citizens in the past
one decade. The article describes the way the terror group has rooted itself in
the United Kingdom through vigorous training of people in European countries
especially in the United Kingdom. UK terror groups were financed, trained and
directed by this terror group. This has promoted the spread of this terror
group tremendously causing grave security issues in the world today. Herrington
used research data to indicate the way this terror group has rooted itself in
different parts of the world. The author in this case concludes that the rate
at which this terror group is spreading is alarming (Herrington, 2015).
Shifting The Battleground
Agbiboa describes the way Al Qaeda transformed the
Somalian Nationalist organization to a global terror group known as Al Shabaab.
It was transformed from a country based group to a global terror group using
symbolic violence. The group has significantly terrorized the East African
region (Agbiboa, 2015). For example, it made an attack in the Kenyan capital as
a way to force the African Union Mission out of Somali land. Agbiboa has used a
number of sample cases to prove to the audience on the issues affecting the
community around the constituents of Al Shabaab. He also describes the case
that links the operations of Al Qaeda and Al Shabaab. The conclusion Agbiboa
makes in this article is that development of Al Shabaab is one of the goals of
Al Qaeda to spread to global level.
Qaeda’s Media Warfare Strategy
Kamolnick describes the communication strategies
used by Al Qaeda to its constituent groups such as Al Shabaab ISIS and TTP
among others. According to the Kamolnick, there is a clear and concise communication
made by Al Qaeda to the groups. The operations of these groups are guided and
monitored by Al Qaeda. This is a method used in making the operations by Al
Qaeda to be global. This is proving to the world it has a deep terror issue
that is managed and operated by the Al Qaeda terror group (Kamolnick, 2015).
The methods used in this case are the use of examples of different attacks made
in different parts of the world and the contribution of Al Qaeda. In
conclusion, the article has made it clear that Al Qaeda is a global problem and
is recruiting many small terror groups, communicate and guide them in making
their operation better, making them global.
article tries to describe how Al Qaeda came to be and how hard it has worked
for the world leading terror group today. According to Maddy-Weitzman, Al Quada
is just a mere group whose philosophies were not accepted by the Muslim world.
Its aggressiveness has made the group the way it is today trying to prove a
point to the entire world that is it a Muslim based group. However, the group
came from an outcast family in the Islamic community that thought it would rule
over and they were given no chance to do so. This therefore made them to be
aggressive and turn against others. Then it became a terror group. The group
seems to be growing very fast. With the demise of Osama, the group leader, the
author says that the group is not a threat to the world anymore. The author
uses a lot of explanation in driving his point home
(Maddy-Weitzman, 2015). According to, Maddy, the group is no longer a
threat to the world and that the governments should stop bothering about it.
article basically describes how governments are responding to the terror attacks
that are launched by the terror groups among them Al Qaeda. According to this
article, USA has invested heavily in developing technology that is ready to
detect and protect terror attack from happening. It says that terror groups
have improved their weapons, making them hard to be detected by the use of
ordinary technology. Therefore, advanced technology is needed for that. Turk
has used a thorough description and explanation to drive the point to the
audience. Sample cases of complex technology in both terror technology devices
and counter terror technology are also explained. In conclusion, Turk states
that there is a need to invest in technology as a method of counter terror
attack (Turk, 2015).
conclusion, Al Qaeda is a terror group that has laid its strategies for
spreading its terror attacks to the global level. It is recruiting different
groups in different locations, finance them and use them for their global
attacks. They have invested significantly in technology to facilitate attacks,
even in the most advanced countries. Soon Al Qaeda will be a global problem.
D. (2015). The Transformation of Al-Shabab and the Growing Influence of
Al-Qaeda in East Africa and the Horn. Shifting The Battleground, 42(2), 177-194.
L. (2015). The declining significance of Al-Qaeda and Pakistan. British Islamic Extremist Terrorism, 91(1), 17 – 35.
P. (2015). Adam Gadahn’s Critique of the “Jihadist” Subversion of Al Qaeda’s Media Warfare Strategy. How Muslim Defenders Became “Blood Spilling”
B. (2015). Toward New Paradigms. The
Raise and Fall of Al-Qaeda, 20(4),
418 – 419.
Turk, A. T. (2015)
Terrorism and Counterterrorism, in The Handbook of Deviance (ed E. Goode), John Wiley & Sons, Inc, Hoboken,
NJ. doi: 10.1002/9781118701386.ch30