Edudorm Facebook

9/11 Attack

Introduction

September 11 or simply the 9/11 is one of the most horrific and inhuman kinds of an attack to ever be performed in the American history. These attacks were coordinated and executed by the Islamic terrorist groups mainly the al-Qaeda in the early morning of September 2001. In this attack, there were more than 2,500 people who lost their lives and many others left with major injuries (Keniston and Jeanne, p65). This attack involved four aircrafts which departed from the Eastern part of United States destined for western part of the city, California, were practically taken over by terrorist. The first two aircraft specifically the United Airlines Flight 175 and the American Airline crashed into the south and north tower of the building which belonged to the world trade center respectively in the New York (Hall and Andrew, p860). After less than two hours both towers collapsed with the debris causing a serious fire which also leads to the collapse of the immediate buildings to the towers.

Within less than 2hours, another aircraft crashed into a building in Virginia and this impact lead to the collapse of the building. A fourth and final aircraft which had been focused towards Washington, D.C crashed into a military perimeter wall causing an explosion and the death of all the passengers onboard (Keniston and Jeanne, p87). Wall Street, United States, and Canada civilian airspace were closed until 13th September 2001.

How the 9/11 attacks affect American security policies

The 9/11 attack seriously changed the security policies in the United States forever. In the American history, there has never been any aggression at the borders of the country except during the attack on Pearl Harbor. The United States rose from the sleep on the 9/11 attack in 2001 to see and experience one of the well planned terrorist acts carried out on the American soil (Hall and Andrew, p856). The act was live and broadcasted on national television for the world to see. The security agents who were involved in inspecting the terrorist at the airport could never detect their intentions as they all looked like they were nothing but innocent travelers since they never carried any bombs or guns with them. After the attack, the United States assigned federal soldiers in all the airports and also improved the security system at the airports. Today there are many terrorists who have tried to gain access and do harm on innocent people by bombing the airplanes, on trains and public transport through explosives injected into their bodies or fitted on the bodies with no luck (Ciuk, p410). American security has secured their borders and even gone an extra mile of securing other parts of the world through flashing out any suspected terrorist groups.

Homeland security which was enacted after the 9/11 attack has taken chances through inflicting security measures on the daily aspects of an average citizen. Installation of metal detectors on every entrance space for the high schools and colleges has been a move by the government to have a tight security (Keniston and Jeanne, p45). Security agents have now been boarding every airliner without detection and they are highly trained mercenaries to act in case an incident similar to that of 2001 will ever happen. Globally there are troops who are crossing borders to look for any unknown enemies who do not reside in particular places but stay briefly to commit murder or a terrorist act. Homeland security act was developed in November 2002 as a strong force which combined more than 20 federal agencies in the United States to bring up a force that would act independently in case of danger or a threat on the American soil. All the agencies together were provided with the power to act in and amongst them as a single entity in ensuring that the security is up and that every civilian is safe at all times (Holland and Ty, p270). Surveillance of every moment and the activities every common citizen was doing now became the government’s daily job as stipulated in the United States Patriotic Act. There were no longer any private conversations in the United States as an aim to ensure that the security agents are alerted in case of any suspicious activities (Woodward, p35). Records in the library, applications in colleges, ethnic origin of every person, colors favorite to every person are analyzed and recorded and in case there is a suspicious behavior the security is alerted and immediately acted upon. 

Today there are terrorist gangs which are willing to give up their lives and kill people as an act of suicide bombing. This is a serious issue which is affecting the United States and the world in general. The United States has enhanced the security measures by requiring the passengers to arrive at least 2 hours prior to boarding an aircraft (Cameron, p9). Cockpit doors have been hardened and there are thousands of security personnel who are always in the air to ensure that the air is safe. At the inspection point, passengers are required to remove their shoes, belts, jackets, empty the pockets and even screen their bodies.

How 9/11 impacted U.S. foreign policy

The foreign policies in the United States changed in an open way immediately after the attack of September 2001. After Bush assumed office in the beginning of 2001 the major foreign policy initiative was to have a missile shield over Europe (Woodward, p24). The main idea behind such acts was to ensure that the United States was safe when North Korea and Iran launched any missile. In the same month of September, the president changed the focus of the speech that was directed to making certain policies known to the world. Nations use the preemptive method to ensure that the enemy and his actions are very eminent. After the United States did an invasion of Iraq in 2003, the policy was broadened in order to give room for the preventive warfare (Woodward, p56). Saddam Hussein who was the leader in Iraq was now accused of being the supplier of weapons to the terrorist and therefore the reason as to why the United States attacked Iraq. This attack was done in order to prevent Iraq from ever funding or assisting the terrorist groups accordingly. Humanitarian assistance in the United States has now transformed into the subject of foreign policies demands and in most cases has militarized their efforts. Nongovernmental organizations which are working under the USAID have provided a worldwide aid without the consent of the United States foreign aid (Cameron, p12). The government requires that the NGOs should also follow the anti-terrorism policies in order to reduce the chances of terrorist groups hiding under the NGOs.

How 9/11 impact American views of Islam

After the horrific attack, the Americans changed their perception towards the Muslim Americans and viewing all of them as a terrorist in their midst. There has been an increased discrimination towards the Muslims, Arabs, Middle Eastern persons mainly from the Americans and other cultures as they see them as threats to their lives. Racism in America and especially to the Muslims has increased over time and hostility has dominated amongst the communities (Khan, p580). Despite the actions done against the Muslim Americans, there are a number of efforts which have been carried out to ensure that they are safe and viewed as fellow members of the community. In Europe and the United Kingdom, there has been an increased level of hatred and discrimination with many people opting to dismiss or suck any Muslim American person working at any organization in those countries.

Discrimination against the Muslims has increased worldwide with not only after the attack but also before the attack where some countries have determined the Muslims as the main causes of violence. This kind of hatred towards the Muslim community can now be determined as the main cause of the Islam being viewed mostly by the media as a threat to the survivability of human race (Khan and Kathryn, p70). In America, there are two types of Muslims, the Muslim religion and Muslim people as recognized by many in the communities especially the Americans. In order to have a difference between the two and in a way try to avoid being prejudiced in expressing dislike, they use an abstract of an idea to discriminate both the religion and the people. Physical abuse and also verbal terms have been focused on the Muslim community causing a lot of mayhem to the Muslims be it in school or on the streets of the cities. In 2010, there was an event where an American pastor planned for the burning of the Quran book which is the bible used by the Muslims (Khan, p580). This display shows how far the Muslim community is disregarded and hated in America. In a country like Norway, there has been a series of events where the Muslims have been killed innocently in a bid to stop any Muslim invasion in the country.

Conclusion

9/11 is one of the saddest memories that still ring in the minds of Americans and the general world. Attackers were mostly from the Islamic religion who came from Saudi Arabia and others who came from the Arabic nations in the Middle East (Ciuk, p413). The attack that claimed at least 3,000 lives in 2001 and over 250,000 more than a decade and a half later was funded by an Islamic terrorist group, al-Qaeda lead by a fugitive from Saudi Osama bin Laden. The al-Qaeda claimed to have done such an attack since America had involved itself in the Persian Gulf war and supported Israel in the event. Some of the attackers had been in America for over a year and even attended commercial flights lessons as a way to sharpen their skills on flying an airplane (Woodward, p56). All the four attacks caused a serious damage to the American people and the economy in the world. After the attack, the perception of Americans towards the Muslims changed drastically. Many Muslims were discriminated and also killed in some parts. Other parts of the world joined America in the fight against terrorism and in the year 2011, a decade later, the leader of the al-Qaeda group was killed in Pakistan following years of manhunt through a military action.

 

 

 

 

 

 

 

 

 

 

Works cited

Cameron, Robin. "Introduction." Subjects of Security. Palgrave Macmillan UK, 2013. 1-12.

Holland, Jack, and Ty Solomon. "Affect is what states make of it: articulating everyday experiences of 9/11." Critical Studies on Security 2.3 (2014): 262-277.

Keniston, Ann, and Jeanne Follansbee Quinn, eds. Literature After 9/11. Vol. 1. Routledge, 2013.

Khan, Mussarat, and Kathryn Ecklund. "Attitudes Toward Muslim Americans Post-9/11." Journal of Muslim Mental Health 7.1 (2013).

Woodward, Peter. US foreign policy and the Horn of Africa. Routledge, 2016.

Ciuk, David J. "Americans’ value preferences pre‐and post‐9/11." Social Science Quarterly 97.2 (2016): 407-417.

Hall, Todd H., and Andrew AG Ross. "Affective politics after 9/11." International Organization 69.4 (2015): 847-879.

Khan, Saera R. "Post 9/11: The impact of stigma for Muslim Americans." Peace and Conflict: Journal of Peace Psychology 20.4 (2014): 580.

 

 

1869 Words  6 Pages

Global Management

The two BRIC countries: India and China

India

Different historical, institutional and cultural factors in emerging markets in India and the impacts of those factors in the company’s success

            India has been such an interesting country in trade throughout its long history. A number of factors have always influenced its emerging markets and these factors are historical, institutional and cultural. Historically, India started as Indus valley civilization and it significantly depended on trade (Ghosh, 1996). Private ownership of land in India is one of the motivating factors to enhance agriculture production. Cultural factors have also influenced Indian entrepreneurial activities. India is one of the countries with vast population with a variety of cultures that contribute differently as far trade is concerned.

China

Different historical, institutional and cultural factors in emerging markets in china and the impacts of those factors in the company's success

            China’s growth globally has always been based on its history. The history of china is reflected in three attitudes; national pride being one of the aspects along with a strong fear of chaos. This has always helped them to guard the security of the country. Secondly, an image of peace and defensive polity along with a well-built central government with which china has been able to defend its territory for internal development. Lastly, a unique view of interstate relations and this has always enhanced china’s relation with its neighbors (Karam, 2016). China’s growth has also been influenced by institutional factors for instance land was converted from agricultural production an urban industrial development. This as a significant factor has developed economies experiencing industrialization and globalization. Some of the cultural factors have also influenced company growth in china for instance family size and social behavior (Dumon, 2017). Chinese resolved to small families and always affect decision to be made. China also consists of a high rate of literacy implying that most of its population is educated.

How management models need to be adapted to keep companies successful in different markets.

            Due to increased globalization, companies need to adapt new management models to suit the developed level of business globally to be able to compete in the market. Companies need to restructure the environment of the organization, strengthen the mission their mission and focus on the core competencies necessary for accomplishment of the organizational mission (Tarun, Krishna & Jayant, 2005). This will help a great deal.

Implications and success factors in china and India as compared to the US markets

            However, Chinese and Indian markets are regarded as emerging economies. They normally form a collection needed for investors across the globe. These markets vary in a huge compared to the developed markets in the US. Thus, any fundamental variation of the developed market influences the emerging markets. Therefore, the US is fully a developed market as compared to the two (Beise, 2001).

References

Sobrino, S. M. (2011). What is the medium-term impact of the BRIC countries?: An investigation into the macro-economic future prospects and evaluation of trends for the BRIC economies from 2011-2050. Münich, Germany: GRIN Verlag.

Ghosh, E. S. (1996). Factors influencing the urban real estate market in India.

Karam, A. (2016). The China factor: Leveraging emerging business strategies to compete, grow, and win in the new global economy.

Beise, M. (2001). Lead Markets: Country-Specific Success Factors of the Global Diffusion of Innovations. Heidelberg: Physica-Verlag HD.

Dumon, Marvin. (2017). Top 6 Factors That Drive Investment in China.

Tarun, K. Krishna, G. &Jayant, S. (2005).Strategies that Fit Emerging Markets

 

 

 

582 Words  2 Pages

Open Door Policy

Introduction

The open door policy is basically a statement which contains principles which were initiated by the US, for the safety of equal civil liberties among the countries which were trading with China. On the other hand, the Boxer Rebellion was a movement in the year 1900, which supported peasant’s uprising, which aimed at driving all foreigners out of China. Boxers, was a word which was consequently used by the Chinese when referring to foreigners. The Boxers group participated in boxing rituals, which they believed made them stronger, hence preventing them from being vulnerable.

John Hay was US secretary of state, and he was the first person to articulate the concept of Open Door in China, in the 1899-1900 period (Schultz, 2010). The Open Door Notes consequently aimed at securing international agreement to the United States guiding principle which promoted equal chance for international trade and commerce in China. The notes also advocated for the respect to China’s executive and regional integrity. The American and British policies on China had been in the past operated using the same set of rules. This was however changed after Hay decided to record them in writing, making the Open Door to become the US formal policy in the Far East, during the first half of 20th century (Burt & Añorve, 2013).

The Open Door Notes were influenced by British and American experts living in China, who believed that their commercial welfares in China would be best safeguarded by a formal agreement. This was one of the possible ways of making sure the trade between the two countries in China remained peaceful without any problems at all (Burt & Añorve, 2013). Hay therefore without any hesitation, sent the notes to the great powers which were France, China, Germany, Russia, Great Britain and Japan, the notes contained information concerning the trade policies. The great nations, had special interests in China, since it had a very wide market for manufactured goods, moreover, it also provided cheap labor (Schultz, 2010). The provision of cheap labor consequently made most countries to see the need of trading in China, hence making the country attract most countries.

This is consequently an example of US empirical desire, in the sense that the US was looking for a means of coming up with a policy which would safeguard its interest in China (Schultz, 2010). In addition, this policy would allow the US to be able to dominate in China, thus being able to benefit fully from the country. The US, was not in any way trying protect the sovereignty of China, but it was looking forward to exploring its interests without being affected in any way by the Chinese government. On the other hand, foreign countries were mostly attracted to Asian countries, since they were among the civilized nations of the world, which had a lot of unexplored resource, they also provided cheap labor, thus making them to attract foreign countries (Burt & Añorve, 2013).

Conclusion

The open door policy was mainly aimed at fulfilling the interests of the US in China. In addition, the US was able to execute different tasks in the country, which were not allowed by the policy. In other words, the policy was a form of trap, which made it easy for the US to lure China into signing the agreement, hence rendering the country toothless, since the US could be able to conduct trade in the country without being limited by Chinese authorities.

Reference

Burt, S., & Añorve, D. (2013). Global Perspectives on US Foreign Policy: From the Outside In. New York: Palgrave Macmillan.

Schultz, K. M. (2010). Hist. Boston: Wadsworth, Cengage Learning.

610 Words  2 Pages

Identifications

Question 1

Peter Mel participated in a surfing big wave Maverick’s contest that was held in 1999. In the contest, he was accompanied by three others namely Virostko Darryl, Schmidt Richard, and Clarke-Jones Ross and Peter Mel took the fourth position. The following year he also participated and acquired a fourth position which led to his participation in the 204 big wave competition. Peter Mel is an expertise surfer as well as 2012/13 Maverick surfing invitational champion (Schad & Washburn, 1998).

Peter Mel is depicted as a remarkable surfer the Son of John Mel. He has been established as the rider of big waves within California. He has been involved in in Mavericks chases and has dared to challenge the increasing, rapid and strong waves. The practices have been accompanied by the narrowest survival but successful surfs (Schad & Washburn, 1998). From the book and the film peter Mel is depicted as a never giving surfer who utilizes his skills in overcoming the challenges that are subjected to big and larger waves.

Question 2

Sean Collins was the Surf line founder and is a popular and significant figure in the field of surfing forecasting and surfing areas. Being the son of Navigator he began his Surfing in the 60s and he was raised in the long beach. He was highly interested similarly to all the serious surfers in the forecasting of weather as well as waves. Despite being a drop out in college which left him without any formal Meteorological training, he, however, earned a domestic reputation as the predictor of wave genius and joined Surf-line by 1984 (Surfline, 2013). Collins transformed the surfing industry for good and without his presence, the contemporary surf forecast would not have been where it has reached as thousands of the surfers would not have understood how their surfing skills would be utilized.

Cortes Bank is a well-known underwater mountain that is located at 100 miles off the San Diego coast. Since it is characterized by three feet water surface there is a big wave that normally breaks there as a bathymetric peculiarity it creates the largest as well as the strongest waves globally. Collins worked with Moore in figuring out the exact swelling type that was needed in ridding the giants (Surfline, 2013). Through their investigation, four surfers in 2001 19th January rode in a boat via the winter night. He played a role in the understanding and forecasting of Cortes Bank waves. Collins Sean the forecasting expertise died on 26th of December in the year 2011 (Geographic, 2014).

Question 3

An emotional bookmark can best be described as a short path that usually overrides reason. In addition, it permits individuals to make rapid decisions without the necessity of thinking about it which can possess emotional bookmarking of the extensive future. From Deep survival, it is evident that emotions perform at a faster rate as compared to logic due to impulsiveness. In order to survive emotions are significant and human is a necessity since individuals usually have a challenging time when forced to perform under stress pressures.

Emotions can be characterized as an essential survival part that accords with the cognitive procedures. A set of physical changes occurs in the primary reaction to the surrounding which is set by memorable images that are generated by the memory. Thus emotions are essential in the production of authoritative physical reactions. Primary emotions are natural ones that an individual is born with while the secondary ones are acquired based on the relations and life experiences. The book answers the queries of who lives, dies as well as why which are demonstrated as simple and logical queries in digging issues deeply (Gonzales, 2003).

 

 

 

 

 

 

 

References

Geographic, National. (2014). Greg Long: Big Wave Rider Nat Geo Live. Retrieved from https://www.youtube.com/watch?v=iPxfCYlWVWw

Gonzales, L. (2003). Deep survival: Who lives, who dies, and why: true stories of miraculous endurance and sudden death. New York: W.W. Norton & Co.

Schad, L., & Washburn, G. (1998). Maverick's: A Documentary film. Retrieved from http://www.imdb.com/title/tt0164096/

Surfline. (2013). the Story of Surf-line's Founder Sean Collins. Retrieved from https://www.youtube.com/watch?v=9PiDdxwvoLI

689 Words  2 Pages

Voter turnout

 The research design adopted by the students has to satisfactorily show the relationship between the economic status of a person and their decision to vote.  It has to show the truth of the notion that people experiencing economic problems are not much interested in taking part in election or that they are less their communities.  The design will bring forth valid results considering that a trend of correlation between the voter turnout and his or her economic status will determine whether they will take part in the voting process or not.  Since a trend can be established among the various states on the average family income, home ownership and voter turnout, and the analysis can be generalized to families in different regions the research design meets the standards.  The validity of the results will stem from the fact that a causal relationship is established, in that the effects of one’s income on their interest in voting can be indicated by the differences in voter turnout and this can be repeated in various states. In addition, little bias can be expected for this design since the student uses secondary data that are free from pre-conceptions of voters and /or the student as the researcher. The research is not about the beliefs of the students about voters turnout but actual past data among low income families and higher incomes families and the differences in their voting behavior.

 The research will yield  more accurate results given that biases are limited by the absence of voters in the  study ; their lack of participation means that dependent variable – voter turnout –  is measure against the independent variable – income level - without allowing other factors to come into play . However, the accuracy of the results may be altered by the possibility of other factors not included in the research hypothesis such as the level of education that can determine whether people are aware of their civic rights.  Many of the biases that could be attributed to attitudes, feelings and behavior are eliminated in this research and hence more accurate results will be obtained by the student.  However, the research may present problems when it comes to the reliability of the results, since consistency of the data may not be guaranteed information to be analyzed is obtained from one year of voting.   For consistency to be observed on whether voter turnout is dependent on economic status, the research design should consider using data on different election years.

To improve on the research design, the student should ensure that reliability is enhanced through testing and retesting during the analysis of the collected data.  Retesting will ensure that there is consistency of the results obtained from the research so that if similar results are obtained about the relationship between voter turnout and the families economic status.  The researcher will be able to assess whether similar results are obtained if the method is used more than once, and this will also improve the validity of the research.

 Even though retesting can be costly or lengthy it ensures that reliability is improved for the research design.  The various variables in an improved design will remain the same only that they will have to be undertaken different testing. More over the students should use data for more than one period.

552 Words  2 Pages

 

The Central Intelligence Agency (CIA)

Introduction

The primary objective of this analysis is to determine whether a conflict of interest emerges when Central Intelligence Agency (CIA) is given the responsibility to conduct covert action. The analysis will thus evaluate the probable effects that may emerge when National Clandestine service (NCS) is mandated to perform tasks of both Covert Action (CA) and collecting information on behalf of CIA’s Directorate of Intelligence (DI) for the analysis of strategic intelligence. For the benefit of determining the likelihood of cross-conflict, the analysis at first breaks up NCS into its units in order to make clear the major purposes of each unit. In addition, the analysis in turn discusses reasons behind the incompatibility of activities tasked to CIA and so, prospecting a conflict of interest.

CIA uses the National Clandestine Service (NCS) as an underground channel of gathering secret information in various backgrounds.  NCS’s major tasks include management of counterintelligence activities and other intrigued practices under jurisdictions of the president (Phillips 2015, 36). Intelligence operations underline two major operations; covert actions and HUMINT operations which define differing interests in the intelligence community. The role of HUMINT operations includes production of intelligence in response to a nation’s need to determine its enemies. It is as well responsible for the determination of capabilities of the rivals and aptitude of rival’s intentions towards the conformity of our nation. On the contrary, covert actions encompass investigation of manipulative information and other politically motivated activities guided to cause unpredictable impacts to the regime (Clark 2016, 58).  This brings up a perception that HUMINT and covert operations should not be aligned together in spite of their concurring objectives.

As opposed to the desired worthiness of the two operations, CIA includes objectives of both CA and HUMINT together and so, enhancing existence of contradicting interests in due course. This came as a result of rearrangement of CIA caused by Eisenhower’s administration that highly compromised covert operations in comparison to prior alignment which operated covert and HUMINT operations from different settings (Ibp Inc, 2013, 110). Inclusion of both covert and HUMINT operations under same management and from same offices causes affluent contradictions which hinders accomplishment of one action and at the same time enhancing success of concurrent operation. For instance, the two departments encompass significant challenges in the allocation of resources including money as well as manpower. The needed efficacy of covert efficacy over HUMINT operations leads to the deterioration of human intelligence since most occurrences resources are focused to success covert desires. Nevertheless, the alignment insinuates that CIA recruits more officers into covert missions due to its efficacy in relation to HUMINT Intelligence which in most cases is considered less influential.

Enclosure of both operations documents that a failure in one operation supposes a failure to the other hence contradicting all operations. Covert failure for example commonly triggers unavoidable consequences capable to facilitate severe impacts and in due course hindering success of HUMINT investigations. For example, Smith (2009, 1) exemplifies that United States has in the past encompassed a lot of negative publicity especially from other nations such as Iran due to failures in operations of covert action which brings up a perception that pessimistic publicity is likely to deter CIA’s efficacy to conduct clandestine intelligence in such nations. It is logical to situate that the CA and HUMINT should not be assigned as components with similar objectives since in practicality they define differing intelligence level (Green 1993, 7). Nevertheless, governance of the nation is reliant to itemized information of both CA and HUMINT thus it insubstantial to settle the mandate of handling delicate operations of both to one managing body. It is contradictory for example to manage HUMINT collection and to direct CA’s programs under the governance of CIA without supposing inefficacies.

The merger of covert action and human intelligence as per the guidelines of Eisenhower administration continues to cause operations unpredictability and also induces psychological uneasiness. Suggestible, it is absurd to predict practical success of comprehensive information gathering especially in various political realms internationally under one management. The two actions demands planned, organized and well prepared methodologies and frequently CA’s objectives may include different operational ideologies from those required by HUMINT thus deterring decision making (Green 1993, 7). Difference between operational requirements is true to form a conflict of interest. On the other hand, psychological differences enhance the unworthiness of the merger. For instance, psychological objectives of covert action at times encompass recurrent procedures for accomplishment which a lot fluctuate from psychological objectives of HUMINT which give emphasis to lengthy preparation to success its outcomes.

Covert action is majorly responsible for very partial operations which by all accounts are prone to propagandas and other political inconsistencies (Bruneau & Boraz 2009, 80). This insinuates that covert actions should always intermediate strategically modified techniques of collecting intelligence to purposely cope with propagandas particularly from political inconsistencies. For this reason, CIA agents oriented to conduct activities of covert are expected to focus in accordance to their original plan since CA in most occurrences characterizes aspects of inflexibility. On the contrary, HUMINT specializes in the collection of counterespionage, counterintelligence and positive intelligence. This illustrates that HUMINT exemplify notions such as fluency, delicacy and flexibility in order to element operational quality. It is thus important to clarify combination of both operations is prone to acquirement absurd information due to differences in interests and equipped principles.  

Conclusion

The primary purpose of CIA’s operations is to gather and deliver relevant information to the Directorate of Intelligence in order to alleviate policy making. It is important to note that contradiction of CIA’s operations fronts affluent threats to the nation at large. The foregoing analysis has potentially enumerated the supposed irrelevancy of information that CIA lends to DI. For instance, CIA has up to date dealt with considerable challenges as a result of gradual evolution in its structure. The supposed evolution has reorganized CIA’s operational structure and so, facilitated the incompatibility of the combination between HUMINT and CA. Inaptness of the two consequently obstructs formulation, compilation and presentation of national intelligence. Evidently, the merger of CA and HUMNINT enhances emergence of a conflict of interest as a result of purpose incompatibility between the two units.

 

 

 

 

 

 

 

 

 

 

 

Work Cited

Bruneau, Thomas C & Boraz, Steven C. Reforming Intelligence: Obstacles to Democratic            Control and Effectiveness. University of Texas Press, 2009

Clark, Robert M. The Five Disciplines of Intelligence Collection. , 2015. Print.

Green, John C. Secret Intelligence and Covert Action: Consensus in an Open Society. Army War             Coll Carlisle Barracks Pa, 1993.

Ibp Inc. US Central Intelligence Agency (CIA) Handbook - Strategic Information, Activities and Regulations. Int'l Business Publications, 2013

Phillips, Hart H. O. W. A. R. D. Life for a Life: A Memoir. S.l.: Lulu Publishing Services, 2015. Print.

Smith, Haviland. "Smith | Intelligence Collection and Covert Action: Time for a Divorce?" Smith | Intelligence Collection and Covert Action: Time for a Divorce? March 2009. Accessed September 21, 2016. http://www.unc.edu/depts/diplomat/item/2009/0103/comm/smith_intel.html.

1163 Words  4 Pages

Critical Thinking- Philosophy

Analysis of standardization

This is a critical review based on actual matters about social issues in Australia; Ban the Burqa.  In the exploration, critical thinking skills are applies where the legal and expression myth of the media release given by the imaginary situation criticized. The people in Australia have the following regiments following the issue on Banning the Burqa. 

Premise 1: Burqa has no position in our community

  1. 1. They argue that Burqa is an ancient practice and a diffident intellectual application. 
  2. 2. The country has turned to be a great and innovated state that does not need Burqa.
  3. 3. Burqa represents the oppression and control of women.

Premise 2: Burqa helps to stop assimilation and miscellany in our societies.

  1. 1. They argue that settlers should not move into the state and restore their ancient world and connect themselves away from the Australian culture. 
  2. 2. Settlers who move to Australia should engage and participate to the liberties and values that have constructed the Australian nation (Rane, Ewart & Abdalla, 2010).

Premise 3: Burqa is a real threat to the Australian society.

  1. 1. Burqa is the device that thieves, criminals and terrorists are currently using. 
  2. 2. The premise shows how a person wearing Burqa robbed a shop owner.  
  3. Some of the thieves were wearing Burqa while one of them had an inflection of Middle East. 
  4. 4. Police are unable to protect the civilized Australians from threats of Burqa. 

Premise 4: Thieves have Burqa and the accent of Middle East.

  1. 1.  Burqa promotes the safety of mystery and permits the unlawful actions to be unchecked.
  2. 2. Terrorists who practice bomb assassination use Burqa. 

The standardization of these premises shows that those Australians who think positively are against wearing Burqa. The recent research stresses that a large percentage of Australians are against wearing of Burqa in public. Australian community takes the ban of Burqa as the major solution to their society’s threat (Rane, Ewart & Abdalla, 2010). 

Analysis of strengths and weaknesses as standardized. 

Premise 1: Strengths and weaknesses

            The first premise concludes that the whole of the Australian community have tried to unsuitably appeal to innovation. The public did this by claiming that Burqa is an old-fashioned tradition and an ancient cultural practice. They say that the Australian community needs a great and innovative country such as Australia. This claim is inappropriate since a practice established earlier has no allegation on its function for the current culture. Burqa demonstrates the oppression control of women without any proof. This shows that the premise suffers flow-misleading notion, as it does not show any proof of that all Muslim women believe that wearing Burqa shows the oppression power.   However, many of the Muslim women wear Burqa on their own wish (Rane, Ewart & Abdalla, 2010). 

Premise 2:

            This premise has no proof of their claim. Sarcastically, the premise states that Burqa lessens assimilation and miscellany, while prohibition of Burqa will promote the decline in literary miscellany. The idea supposes that the country is a great state despite the offerings that its citizens with diverse traditions formulate. The principle accepts the fact that there is an actual Australian civilization that new settlers and diverse cultures has to engage in. Therefore, the weakness of the premise is that it suffers on the question about myth and wrong petition to the influence (Rane, Ewart & Abdalla, 2010).   

Premise 3:

            There is no proof from the police report that shows that the head cover that the thieves were wearing was Burqa. There is sarcasm in the premise about the Advance Australia approach on the report by the law that the robbers were two persons, while Muslim males do not dress in Burqa. The premise use correspondence in its argument but their reasoning is not strong. Based on a single robbery conducted by thieves with Middle Eastern inflection who had their faces covered, Burqa or Muslims are not actual threats to the country or the main support safety.  Police having less hopes in getting thieves and Burqa promoting the protection of secrecy, makes criminals to go unpunished.  The sub-premise here supposes that these claims are powerful and clear. This means that the analogies used in the premise do not have powerful similarities or negative disparity (Rane, Ewart & Abdalla, 2010).  

Premise 4:

            This premise shows a clear abuse and misapprehension of the research outcome. The survey result shows that 81% of the respondents concur on prohibition of wearing Burqa in courts.  However, despite the strength and approach of the survey outcomes, Advance Australia used these results and indiscriminate it unreliably to the claim that many positive thinking Australians are in opposition to putting on Burqa (Rane, Ewart & Abdalla, 2010).                

Investigation of speech and expression used in the “Ban the Burqa

            Australia in their operation has tried to stress that Burqa need prohibition in their society.  In giving their ideas, they have utilized many expressions and idiom apparatus as well as misleading speech sports.  In the initial two sections of the journalists debate, they used some expressions such as ‘Liberal do-gooders’ that can be classified in the debatable myth whereby they tried to harass the identity and the attitude of those that tried to have a diverse approach on Burqa. They have also pleaded with people by claiming that the fair minded Australian are now realizing that those who do not support their argument are disinterested citizens. In this approach, this argues that this destroys the positive myth (Behloul, Leuenberger & Tunger, 2013). 

            Based on the other section, the description starts with many terms as highlighted in the actual viewpoint of multi- educational Australia.  Some terms and expressions such as referring thieves as monsters and pressuring that they probably has the Middle Eastern inflection, also puts comparable myths and speech playoffs. By abusing the latest theft where the subjects covered their heads and faces, they unreliably claimed that Burqa is currently the device thieves and terrorists use.  Here, they were in trail of inducing readers’ feelings by showing that the thieves robbed a shop owner whose family had existed in the community since the alliance (Behloul, Leuenberger & Tunger, 2013). The description used in the third paragraph shows the myth of generalization.  They proposed that all Muslims who wear Burqa are forced, thus, wearing Burqa in class is a mode of oppression.

Report on Roy Morgan study

The section on the Morgan survey appears through the research on whether a huge percentage of the Australian polls do not propose that women should put on Burqa when witnessing in the courtyard. The size of the survey indicates that the poll accomplished only a few people while the country had more than 22 million people in 2010. This shows that the survey conducted on less than 0.002% of the Australian population. It does not show whether the 434 citizens were from all regions in Australia in pro statistics to the whole populace of the region that the selected citizens live (Behloul, Leuenberger & Tunger, 2013).  

The election happened through short message confirmation. The report does not give actual details of the way that the poll performed. The survey method raised some focus. It bounds the subjects to anyone with a cell phone and vigorously utilizes it. It is not confirmed how the chosen subjects were chosen in if they helped or accidentally chosen. They study does not distinguish among the subjects used in city regions where many Muslim inhabit and the other people in the countryside areas (Behloul, Leuenberger & Tunger, 2013). 

            The explore process used in the election information used examination inquiries and analogous response. People questioned responded on whether females could dress in Burqa in open areas; many about 52% said no while 48 of the respondents said yes. The percentage that had a yes answer answered on whether women could wear Burqa when witnessing in court.  Out of the 48%, 29 said no while the other 19% said yes. The report does not reveal whether the subjects asked if they were aware Burqa and its influences. It seems that the two questions contradict each other.  Having the knowledge that the Australian court is a public area, those who gave a no answer should answer whether women allowed to wear Burqa could witness in courts. This means that the issues are jointly elite and overlies the possible given answers. Therefore, those who gave a no answer to the first question should not merge with those who gave a no answer in the second question (Behloul, Leuenberger & Tunger, 2013). 

Recommendation Briefing

            While replying to the country’s supposition, she recommends the description of the state’s analysis and conclusions showing that the issue on Ban the Burqa is not sustained by actual evidences. She continues to state that the following results shows that Australia has no apprehension of Burqa and Muslim’s custom and society. As a result, they have misinterpreted the allegations of Burqa for Muslim females with what robbers use to conceal their personality. She recommends the Member of Parliament to research on the robbery cases as inappropriate. The MP should focus on the radical anti-settling and the non-Muslim suggestions as something contradictory with the cultural assortment with the Australian organization (Puddington, et.al, 2011).

            She gives a positive recommendation on the MP to perform military exercises in order to have moderate and other non-drastic approach on Burqa and Muslim custom and ethnicity. This is because there seems to have a great concern about wearing Burqa as a thief’s device and terrorists that is a major threat to the community society. Banning of Burqa will not force the terrorists to stop covering their heads once they are conducting their operations (Puddington, et.al, 201. 

 

 

 

 

 

 

 

 

 

 

 

 

References

Behloul, S.-M., Leuenberger, S., & Tunger-Zanetti, A. (2013). Debating Islam: Negotiating religion, Europe, and the self.

Puddington, A., Piano, A., Young, E., Roylance, T., & Freedom House (U.S.). (2011). Freedom in the world 2011: The annual survey of political rights & civil liberties. New York: Freedom House.           

Rane, H., Ewart, J., & Abdalla, M. (2010). Islam and the Australian news media.

 

          

 

 

1682 Words  6 Pages

The American gun industry: Designing and marketing increasingly lethal weapons

Introduction

            The marketing skills utilized in the gun industry are unknown by the public than those used in the automotive industry. Based on the same necessities as in the automotive industry, the gun industry has practiced innovation and exploited the designs to make customers. Acknowledging the skills is important for reviewing the argument about the accountability for gun violence. The argument has focused on the declarations that certain gun designs established through innovation and marketing skills developed to utilize them, cause high rates of gun violence consequential to death and injury (Fjestad,2014).

            In the era of the 19th century, the American firearm company influenced the requirements of the innovating nation’s army flown by the support of the government. This developed a scheme of huge production and similar non-changeable parts.  The mechanical artisan increased the system that influenced the American production through the production of such machinery equipments.  These skills in mass marketing of firearms were the main features of firearm production (Fjestad, 2014).   

Summary of what the entrepreneurship theory does

            The organization of gun industry is simple. Domestic and distant investors make the guns.  In some cases such as Glock pistols, the gun parts are overseas made, imported, put in American plants (Fjestad,2014). Producers supply internally made firearms through wholesale or directly sell to retail dealers. The sequence is not uniform as some producers sell the firearms only through suppliers while others sell to vendors. As the vendors, do not have a lot of capital for them to bargain the cost, the alternative of supply chains base on the manufacturers. In this way, the producer decides the financial, competence and the contractual benefit. Guns made overseas such as the military stock spares disqualifies through the American law for resident possession and introduced to the country through importers and then gain the same business channels (Fjestad,2014).

            The internal firearms producers, importers and manufacturers need to have the National Firearms Licenses. Firearms manufacturers and importers are able to utilize their guns at their licensed areas without having different firearm dealers’ license.  Innovated and imported firearms ship through legal business through at least a nationally licensed seller at the point of the initial retail trade. One way to look at the entrepreneurship theory of firearms is through the way the product is common.  Guns are the main part of the American existence since its start but people does not know the exact number of firearms in the state. The national government estimates about 215 million guns, which are in the hands of the residents since 1999. This survey derives from the increase of internal manufacturing, export and import level for a period of 4 years.  Given the confines of the data sources, the organization has minimal tax connected data that the government finds as an accurate data (Fjestad, 2014).   

           

Summary of the entrepreneurship theory

            All the firearms are proficient in murdering and this is the reason of their manufacture.  Not all firearms are able to kill with equal competence (Bice & Hemley, 2002). Some design characteristics affect lethality.  The dissimilarity in bullet capacity and cover aptitude between firearms change into greater likelihood that a gun will be present and a greater aptitude will supply the lethal force based on the number of injury and their significance. This means that the design of the firearms influences its lethality (Bice & Hemley, 2002).

            The merge of guns sold in America domestic market has adjusted in the last many years.  The growth of firearm industries has drenched and experienced declining markets in the last few years (Wellford et al., 2004). The firearm industry is using design alternation top inspire its markets and these adjustments have increased lethality. Without these new designs, that have major technical changes, the firearms business become complicated, thus the innovation of the firearms has motivated the pistol market. The purposeful use of lethality contributed directly to the terrorist use of firearms to death violation coming from firearm use. Those who support the industry argue that attracting lethality of firearms develops a tool that has been harsh. Thus, the accountability of the usage of the gun depends on the user and not the company (Bice & Hemley, 2002)

            The most appealing change in the American domestic market has been due to the increase of the pistol power. Long guns controlled the domestic market in the whole of twentieth century.  Since America was a main supplier of residential guns, handguns were in a little percentage of the available guns for sale (Wellford et al., 2004). Another rising issue has been the appearance of partially automatic pistols over the revolvers in American residential market. Some forces had flown this market.  One was mainly the appearance of the companies at the low end of the market concentrating in easily concealable pistols. Second was the appearance at the higher finale of the market where new handguns barrel mixed with higher aptitude guns. As a result, two trimmings of the market moved closer to each other. Those who made cheap guns increased the barrel of their guns while the quality makers helped in the new development of material such as materialization of plastics, which produced smaller and inexpensive guns (Cook, Molliconi, & Cole, 1995)           

Another approach in the pistol market has been the increase in the production of pistols in the upper level of business firearm barrels. As the pistol barrel has been increasing, the size of the pistols had decreased (Cook, Molliconi, & Cole, 1995). New materials have eased the designing of smaller pistols in higher barrels that would be hard to produce or risky to use if made. The corporation of technology and change in law has resulted in the extension of marketing of subcompact pistols.  The final approach shows that these adjustments in the merge of firearms available in the residential market has increased the lethality of armed meeting in America by improving the design factors described as increasing the probability of death by firearm availability and barrel (Koper, 2005). 

            While many of the arms industry are residential, it serves, as the home country was the significant firearm use serving in the military of the other countries. The difference between the global arms industry is base on two concepts (Brooks, 2003).  Much of the residential arm companies look for distant customers if they have a product they can sell abroad.  Overseas sales can lessen the arm cost of the product, which helped connect the foreign customers to the host countries, thus, it serves as the interior interest.  Many of the international arm industry base on the domestic arm industry (Webster, Vernick, & Bulzacchelli, 2009).

Summary of the policy theory

            Based on the policy theory on the introduction of the military weapons, law empowering officials have noted that criminals are using heavier arms as the attack rifle types in the world.  The idea of the conscious production through the firearm industry of the civilian market did not exist in the early years.  Legal access of the firearms increases corrupt vendors and force fraud trafficking of the weapons.   The source of the illegally sold firearms was the gun shows in which private citizens and the licensed vendors sell firearms and connected equipments. The national and regional laws control most movement of guns between the private persons. The national law defines the freedom of persons to sell guns out of their own will that in use, many unlicensed people who sell guns show that they are not involved from firearm sellers (Webster, Vernick & Hepburn, 2001)

 

Politics and coalitions

            The topic reviews the complaints against the gun industry based on two approaches of the federal political scheme, gun control and tort improvement. These approaches raise the questions on gun control, in whether control of firearms companies can reduce gun aggression. Secondly is the argument on the functions of the tort reform and on whether courts can play a role in producing public policies like the gun control (Wintemute, 2002). 

            Among the two, tort reform is the best approach. These are the projected changes in the civil justice system objected to lessen the capability of the victims to bring tort or lessen the damages.   According to the tort principle, one may be a question to liability for negligence if one does not practice quality care and cause injuries. This issue on political matters on gun industry argues that gun producers are careless in failing to take preventive measures that would prevent people from using their guns for terrorist purposes. These policies include many market restrictions such as neglect of supplying firearms to retail vendors who sell the many guns used in crime.  Producers of the firearms argue that these measures are not helpful since those subjected on having guns for criminal use can easily run from sale limitations or buy guns in opaque markets (Wintemute, Cook & Wright, 2005).

            NRA is a brandy coalition based on gun claims. In reaction to these claims, the gun industry with the aid of NRA coalition has turned to the national government and the congress for safety.  They have together established policies looking for constitutional protection bills that argue that plaintiffs are misusing the tort scheme.  The scheme seeks through legal action gun control measures that they are unable to gain through the government thus filing cases in order to make defensive measures that will make the industry reconcile despite the legal virtues or the claims against it (Brooks, 2003).    

Beliefs

            If the charges against NRA corruption in the governmental body were true, tort lawsuit would not be a possible solution.  When coalitions fight governmental battles in courts, they are eager to use the judicial process with the similar political features in which they subject in the national process. While in the governmental process, these political forces can play different coalition functions in politicizing the courts in ways that are self-conquering and bad for the court as a coalition (Kennedy et.al, 1998).                

            In the present gun firms guns are the same to the way that the automotive industry market their cars. The modernization of the gun industry relies on the generated supply in its markets that has resulted to the increase in the lethality of its producers. These consequences are from the special design characteristics the industry has used in making its products. These features and the skills that the company uses to advance them, get a direct connection to increased death and critical injuries from firearms (Singh, 1998).     

Brokers

            Given the national Firearms License, the change of firearms to the illegal opaque market happens at the distributor/broker level. Outflow from lawful channels of trade to unlawful gun trafficking happens at the broker and the supply level through certain ways such as theft and corrupt gun sellers who use their license illegally supplying criminals with firearms (Wintemute, 2002).  

 

 

 

 

 

 

 

 

 

 

 

 

References

Bice, D. C., & Hemley, D. D. (2002). The Market for New Handguns: An Empirical Investigation. The Journal of Law and Economics, 45(1), 251-265.

Brooks, R. R. (2003). Gun manufacturers in the crossfire between litigating liability and legislating immunity. Journal of Policy Analysis and Management, 22(3), 467-472.

Cook, P. J., Molliconi, S., & Cole, T. B. (1995). Regulating gun markets. The Journal of Criminal Law and Criminology (1973-), 86(1), 59-92.

Kennedy, B. P., Kawachi, I., Prothrow-Stith, D., Lochner, K., & Gupta, V. (1998). Social capital, income inequality, and firearm violent crime. Social science & medicine, 47(1), 7-17.

Koper, C. S. (2005). Purchase of Multiple Firearms as a Risk Factor for Criminal Gun Use: Implications for Gun Policy and Enforcemcent. Criminology & Pub. Pol'y, 4, 749.

Singh, R. (1998). Gun control in America. The Political Quarterly, 69(3), 288-296.

Webster, D. W., Vernick, J. S., & Bulzacchelli, M. T. (2009). Effects of state-level firearm seller accountability policies on firearm trafficking. Journal of Urban Health, 86(4), 525-537.

Webster, D. W., Vernick, J. S., & Hepburn, L. M. (2001). Relationship between licensing, registration, and other gun sales laws and the source state of crime guns. Injury Prevention, 7(3), 184-189.

Wintemute, G. J. (2002). Where the guns come from: The gun industry and gun commerce. The Future of Children, 55-71.

Wintemute, G. J., Cook, P. J., & Wright, M. A. (2005). Risk factors among handgun retailers for frequent and disproportionate sales of guns used in violent and firearm related crimes. Injury Prevention, 11(6), 357-363.

 

 

 

2059 Words  7 Pages

The Making of Chapter 4

Northeast Asia comprises of countries such as Japan, China, North Korea, and South Korea. Japanese head of states made a visit to China to discuss issues regarding the two countries in an interest of making both countries benefit from the good relationship shared between them. Bilateral problems between the two countries are the main issue which needed to be addressed for the continued relationship in China and Japan. Coming into agreement over the disputed gas and oil exploration and the issue in Taiwan was never going to be easy (Calder, & Ye, 2010). The United States government tried to intervene by dictating some rules over China but their idea of China could not be embraced. Earlier in the year 2006, China did not act against North Korea for the continued test of nuclear weapons since it maintains a policy of stability between North Korea and China. North Korea on its part has leverage on China and this might seem as a possible reason as to why China was silent about the issue which forces China to stay away from any issue regarding North Korea.

Relationship between China and Japan is mostly viewed as hostile from the outside but when economically, both countries have an interest in each other (Calder, & Ye, 2010). Japan however has been viewed as a threat to the Chinese since lately the country prime minister has been bidding for permanency as a member state in the United Nations Security council. During the year 2005, bilateral trade between the two countries had reached US$227.1 and this happened when china overtook the US market in Japan. China has also expressed interest in solving the major issues facing the East Asia region. China heading the peace talks in regards to the nuclear development in the East Asia. Security concerns is the main point of view that Japan is concerned about since the threat through nuclear weapons is still fresh in their minds. 

Business wise, China is committed to improve its relationship with Japan since the lack of a common ground could see China lose market in Japan (Calder, & Ye, 2010).  According to an agreement on the development of a new understanding of each other in 2006, Japan drafted a blueprint to help create harmony between the two countries. Earlier in 2005, Chinas president had also drafted a proposal to the Japanese prime minister requesting him to forge a friendly relationship with China for continued correlations but this presented another major obstacle to both. Some of the messages in the proposal to Japan, China required Japan to take position for the aggressiveness against China and should be a concrete position. On their part, the Japanese had tried to work out the issue by making several visits to China but with no luck. China seemed like one country that did not want to create harmony between the two. At this point, both leaders had now transferred the communications to be between their ministers and not through the heads of states. Later on, the Chinese government decided to revive the peace talks by explaining to Japan the need for good neighbor relationship. China agreed to abide by the three main political documents between China and Japan (Calder, & Ye, 2010). These agreements were never going to see the light of day as the Japanese prime minister expressed discontented since enclosed were messages regarding his visits to the Yasukuni shrine in China. Most of the messages in the context were actually aiming at the next leader in Japan and not the sitting prime minister.

However, the concerned ministers in both countries came onto a mutual ground which involved a dialogue with drafted points which would heal the political heat between Japan and China.

Security concerns in China now engaged the United States since terrorism was now an international issue in their hands. Chinese military had begun a modernization strategy due to the rapidly growing economy in China. In a conference meeting held in Singapore, the US defense secretary expressed discontent on the ballooning military expenses in China and how transparent was the military (Calder, & Ye, 2010). The US expressed dissatisfaction on the reason China had missiles that had the capability to aim any country in the world and not just within the pacific length. In a report dated February 2006, the US reviewed US-China policy and wanted the Chinese to refrain from its military activity. In the following encounter, the US never mentioned the issues again and instead requested China to join forces and destroy the enemy.

In a series of events, China and the US carried out joint missions in the aim of finding peace. After the peace meetings and doing several missions together, China felt the urge to continue with its military affairs namely the (RMA) which is now worldwide. In its quest to expand the military actions, China sort help from other countries through partnership (Calder, & Ye, 2010). The RMA is an international affair that has seen many countries join its military to get training. According to reports, China military and the defense forces are all very far from the truth. Modernizing the military, continued improvement of its defense forces is a questionable act even though its defense is it is ranked after the US and other major advanced countries.

 

 

 

 

 

 

 

Reference

Calder, K. E., & Ye, M. (2010). The making of Northeast Asia. Stanford, Calif: Stanford University Press.

907 Words  3 Pages

 

REVOLUTIONARY AND COUNTER-REVOLUTIONARY TERRORISM 4

Abstract

This paper has looked into the causes of revolutionary and counter-revolutionary terrorism, its effects on the political, social and economic spheres. It has also looked at the impacts of revolutionary and counter-revolutionary terrorism.

Introduction

To bring social change, enhance implementation of ideologies and ethnic identification is some of the reasons for revolutionary terrorism. In the late 19th century and early 20th-century terrorism existed so that it can overthrow governments and gain political power and bring about change in the society. Revolutionary terrorism is usually seen from the bottom to up perspective. It is sometimes sponsored by foreign countries.an example of revolutionary terrorism is the first-century war which the Jewish Sicarii started against the Roman Empire due to Judea. Revolutionary terrorism occurs when other common options of law fail and the military is not capable of victory. In revolutionary terrorism, if one cannot defeat a superior enemy, one turns to guerilla warfare until results yields. Guerilla warfare tack ticks usually cause harm to civilians. This brings fear which can then be used to push for the desired change () On the other hand counter-revolutionary terrorism tends to reverse the works of another previous revolution. Counter-revolution terrorism can be either positive or negative which entirely depends on who they are against and the outcome of their revolution. In summary, counter revolution's purpose is to disseminate the revolution together with its ideologies (Aishankar, 2009).

When the people in power fail to bring about change in the manner in which property is distributed it causes tension which brings about revolutionary and counter-revolutionary terrorism. One of the main causes of revolutionary terrorism and counter-revolutionary terrorism is the desire to achieve freedom and liberty by any means possible even if it means violence to the civilians. A good example is a struggle for freedom from the British by the Indians. Revolution was violent and a lot of lives were lost. Another cause of revolutionary terrorism is due to social inequality. The poor work hard and pay taxes and have little or no money left to fend for themselves. This causes them to incur debt thus increasing poverty. Meanwhile, the leaders and the nobles are exempted from paying taxes. The government keeps on imposing heavy taxes on the poor and normal wage earners. Thus making their situation to worsen. A good example of this is seen in France in the 1780s where the peasants were angry with the nobles and the government, this caused revolutionary terrorism due to the resentment .another factor that can cause revolutionary terrorism and counter terrorism is the difference in ideas which may cause a group of individuals to demand for their rights hence leading to revolutionary terrorism. Examples of such revolutionary terrorism are the Germany Red Army faction and the Italian Red brigades. The economy can be a cause of an uprising of the revolutionary terrorism and the counter-revolutionary terrorism. When market prices of essential goods such as food are not regulated (Draper,1977).

The impacts of revolutionary and counter-revolutionary terrorism can be felt politically, socially and economically. One of the effects is that different styles leadership are put to test. The one which will suite the people best will be retained. For example during the French revolution, the aristocracy was overthrown and people chose a new democratic leadership style. In the society, more freedom can be experienced when a dictatorial regime is toppled. This enhances peoples' rights to opinion and other human rights. Also, revolutionary and counter-revolutionary terrorism can bring about equality of human rights to both men and women. In America, women were able to get an education and a right to vote. Both revolutionary and counter-revolutionary terrorism have been recorded to have used extreme violence which leads to loss of life and property. It also breeds a dismal performing economy. It affects the tourism sector as they both destabilize the country. Instability negatively affects manufacturing and production of goods. These consequentially bring about high rates of unemployment and a slow economic growth. The effects are famine, inflation, and starvation due to the political environment created by the revolutionary and counter-revolutionary terrorism. This is best exemplified by Egypt's revolutionary terrorism in the year 2011 where tourism was adversely affected. The other effect of revolutionary and counter-revolutionary terrorism is that it exiles dictatorial leaders who take refuge in other countries for fear of facing jail time or a death sentence. Loss of life is one of the effects of revolutionary and counter-revolutionary terrorism. Civilians are major victims who are usually caught in the crossfire and they end up losing their lives and properties. This leaves a lot of families without fathers or mothers. Children are forced to fend for themselves, in the long run, missing out on education which is a vital tool in the development of a country. Loss of lives also destroys the fabric upon which the country is built on as people are needed for labor and economic development of a country. Loss of lives usually inflicts fear to the survivors who watched the atrocities that were inflicted upon their fellow countrymen (Wahnich,2012).

 In conclusion, revolutionary and counter-revolutionary can be avoided through the leaders playing their role according to the law and delivering service to the people. The leadership should strike a balance and have equal representation of both poor and rich so that their respective needs can be understood and concerns marched.in summary, revolutionary and counter-revolutionary terrorism must be avoided at any cost as it leads to loss of lives and property. Differences in an idea can be heard in a peacefully tolerated manner (White,2017).

 

 

.

References

 

 

 

 

Aishankar, K. (2009). International perspectives on crime and justice. Newcastle: Cambridge Scholars.

Draper, H. (1977). Karl Marx's theory of revolution: 1, 2. New York u.a: Monthly Review Press.

Wahnich, S. (2012). In defense of the terror: Liberty or death in the French Revolution. London: Verso.

White, J. R. (2017). Terrorism and homeland security. Cengage Learning.

995 Words  3 Pages

Lincoln as Leader

There are those leaders who are considered to be leaders, due to the political influence that they have on the people. They may however not possess the traits which are required in order for one to be a good leader. Robert E. Lee is an example of a leader who is determined to stand by the truth, regardless of the situation at hand (Chapter 14). In addition, he was also determined to make sure that he does each and everything in order to make sure that the citizens are not in any way oppressed. Even though he was an opponent of secession, he made a choice, to resign from the U.S. army, in order to join the forces from his home state. He then became the commander of the Confederate army, and was therefore able to conquer very large Federal armies in the state of Virginia.

Ulysses S. Grant, was one of the leaders who would never give up regardless of the circumstances that he was in. Ulysses was also wise, and he therefore used different tactics in order to be able to win a war. He therefore defeated Lee, after Lee had outnumbered him, and had killed most of his men. Ulysses therefore came up with a trait whereby he outnumbered Lee’s forces hence bringing them together, thus making them to surrender. William T. Sharman, who is also a good strategist, a powerful leader was able to command the soldiers as they attacked the South. As determined as he was, Sharman was able to deal with the Confederates in the South, and made very massive destructions in the area. He was able to devise a strategy which would enable him in being able to deal with the Confederates, and make them to surrender (Chapter 14). As opposed to Lee, and Grant, Sharman was more of a strategist, who was therefore able to attack different areas with caution, or without being noticed by the confederates. This therefore made him to be able to effectively wage a war against the Confederates from the South, a war which has never been forgotten up to date.

Lincoln was not a military leader, he was therefore more of a political leader. During the civil war in the US, he was not able to stand out, since he did participate in the war. Lincoln therefore gave that task to his generals who did not disappoint him (Chapter 14). Even though he did not have any military experience, as compared to Jefferson Davis, he was able to learn military tactics, and he therefore became even better compared to his generals. Even though Lincoln was not a person who would stand by the truth as his generals would do, he was very much determined. He therefore knew what he was supposed to do in order to be able to win the war.

As a military strategist, Lincoln was therefore able to provide his generals with the best strategies in order to be able to deal with the Confederates (Chapter 14).  Even though he had a lot of advantages as compared to Davis, his courage and determination enabled him to be able to win the war. Lincoln was determined to win even though it took him a lot of time, he had to make sure he won the war. This therefore boosted the morale of his generals making them to work even harder hence winning the war.

Work Cited

Chapter 14. The War of the Union 1861-1865

 

 

583 Words  2 Pages

Module 3: Globalized Islam Paper

Al Qaeda

1.

            Al-Qaeda began as a logistical organization that supported the Muslims struggle in opposition to the Soviet amalgamation during the Afghan Combat where the associates joined through the Islamic society. They combined with many other militant Islamic organizations such as Islamic Jihad and their leaders declared a spiritual war against America. These people show their violent actions through the elucidation of the Quran and Hadith according to their personal intention. For many people in the Western, they live in life that seems to have the Islamic threat. These drastic Muslims are everywhere, mentioning the societies and changing the lifestyle of the existing politics. In a successful view of this article, Roy demonstrates a different approach; political Islam is a failure (Roy, 1994). Even if the Islamic fundamentalists take control in other countries, they will not be able to change the economics and politics in the given countries based on Islamic universalism. Roy shows how the present Islamism is still the Third glossary of the 1960’s. This increases the awareness of politics and the merged economies for the rich and subventions of the poor. In Roy’s explanation, those based on the Islamic grounds experience dim probabilities of success.  This description by Roy entails about Sociology of radical Islam about many ideas and assumptions of the subject (Roy, 1994).

2.

            We are aware that in Islamic, there is no clergy but there is a group of lettered men, doctors of law and the Ulamas. The Ulamas fulfill many functions but they do not have domination any house of worship.  The Mullahs who have increased religious preparations serve many Islamic mosques and not face any control from any power (Roy, 1994). The main need of the Ulamas and Mullahs is the engagement of the Sharia without basis of the political system. The ethical issues are at the main points of the Muslim political principles.  The fundamentalists’ clergy is that the law matches to the Sharia and demands the right to criticize and not to utilize power.  The ancient fundamentalism that is the main approach of the Ulamas is also the philosophy of many Mullahs (Roy, 1994).

            When doing a comparison between Islamism and Jihadism, there are also several similarities. Despite their resemblance used to show the difference between both approaches of activism, jihad fundamentalists reject the notion of using state groups and politics as a way to Islamize the society (Roy, 1994).  Unlike other political based Islam, they have increased their local strive to a global level as a result to the strategic approaches.  This is what differentiates the political Islam from the international jihadism. Islamists try to gain the global state with all its organizations through which political power implemented.  As Muslims have their say that Quran is their constitution, this illustrates their approach to politics, religion and state (Roy, 1994).           

            Two approaches differentiate within this fundamentalism, traditionalist and reformist.  The ancient recognizes the progression between the rooting texts and other documentaries and takes its basic standard simulation (Roy, 1994). This shows the rejection to innovate which admitting to what said before. Its vision according to Sharia is fundamentally legalistic and it relates to the accepted appearances of Sufism. Reformist fundamentalism condemns the ancient beliefs, known religious faiths and false notions. The approach to fundamentalism developed due to the reaction to an outer threat. In sustaining the reformist line according to fundamentalist, it marked a difference between fundamentalism and Islamism (Roy, 1994). 

            In Contextualizing the Al Qaeda group, Roy uses the argument of political Islam arguing that the vision of the Muslim world is combating with the west is a dream.  She continues to argue that there is no Muslim domain and the different Muslim organizations connect to the west in different approaches.  Roy stated that their aim is to contextualize the violence of the Middle East while reviewing their connection to matters of egalitarianism and multiculturalism within the Western culture. Roy’s viewpoint is to show that the violence cannot explain the geostrategy of Islam or any united Islamic group. Roy in the article explains why it is also important for the West to acknowledge the nature of Islamic politics for them to have effective politics between them (Roy, 1994). 

            Roy goes on board on an analysis of the current Western rules towards the Middle East and the Muslim domain.  Her analysis is scorching and targets the third world that was against the Iraq combat but fell on anti-imperialism that defended rebellions and moved to the European nations having unstable policies towards the Muslim settlers and their cultural involvement.  Roy claims that all these concepts towards policy are mystified as they grounds on false conflicts, on a cluttered understanding of the Middle East and on ideas of different political systems. In her article, Roy suggests that it is not possible to plot war on Al Qaeda because these conflicts trenches Muslims against Muslims and their unstable relation of ideological and ethnic differences increase because of Shia-Sunni variations that are oppressed by rival nations. Roy still identifies different political approaches and organizations in the current Middle East and the Muslim domain.  She argues that patriotisms such as the Islamic patriots have more power that the pan-Islamism (Roy, 1994).               

3.

            In the context of the Western Europe Muslim communities, the approach on whether Muslim faith and practices are changing or not in historically new approach has raised (Maitra, 2009). In a highly politicized region where changes continue to be reviewed by the approach of compatibility with the European values, this focuses on the structure of the religious life in the Europe’s Muslim community.  This raises other questions on whether the Muslims are turning to Europeans through identity and whether ideas suggested by Islamic groups need to be considered by the public actors (Maitra, 2009). 

            Many arguments have recognized individualization of the religious faiths as the major growth in the Europe Muslim communities.  Researchers consider the issue of religion authority in Islam and its inflection in the Western European approach. Al Qaeda group used religious violence movement to construct their religious authority (Maitra, 2009). The movement grounded as a moderate one forming new terrorism. Terrorist acts reflect the aspects of religions. Construction of the religious authorities by the terrorist groups highlights the role of religion in explaining religious violence showing the way religious philosophy causes violence. Roy argues that something inherent in the religious tradition lead to not only violence but also violence in a large level. Islamic terror violence grounds on religion nature and religious traditions. Religious violence therefore increases development to the contribution of the religious authority (Maitra, 2009). 

            Al Qaeda group takes the appearance of the violent religious ideas and reviews how they cause violence once formed.  This contribution by the terror group through the principles they make, makes them fight for their purpose with violence and thinks that this will be helpful.  While the terror groups fight for their religion say, they struggle to show and define the nature of their religious custom with a particular approach to the public (Maitra, 2009). The reason for the religious contribution and authority of the terror group, they demand to gain the resources to increase the public support and political supremacy. When a group is fighting for its religious ideology, they frames struggle as a violence and concentrates on convincing the public of their new strength (Maitra, 2009).

            The spread of Islam globally has declined the connection between the religion, a certain society and a domain.  A third of the global Muslims live as minority members.  As the significance of the article by Roy shows, the settlement of the Muslims in the Western societies has influenced the western culture and social custom. The awakening of the Islam between the Muslim communities approached wrongly as a reaction against westernization rather than having its results.  Neofundamentalism has been developing among young Muslim youths mainly on the second and third generations settlers in the West and this idea is causing new forms of social issues.  These issues were in support of Al Qaeda to the absolute neglect of connection into the western society.  Roy argues that the Islamic restoration results from their trials to put their uniqueness in a non- Muslim approach.  A split has happened between the majority of Islamic movements in the Muslim domain such as the Hamas and the displaced militants who are in struggle to develop an imaginary Ummah or a Muslim society that is not entrenched in any society or domain (Maitra, 2009).

 Roy shows how neofundamentalism concedes without reminiscence of the loss of the unspoiled customs.  This makes them construct a widespread religious personality that spreads the ideas of the culture. Therefore, the modern construction of religious authority within Al Qaeda and the Islamic fundamentalism is not an only reaction against the western culture but an invention of the global intricate forces. Through this argument, Roy gives a profound awareness of the personal Muslim groups and understanding of the connection between theology and politics based on the Al Qaeda group (Maitra, 2009).  

            Roy assesses the setting of typical al-Qaeda recruits, argues that the faction is a collection of deracinated refugees, and renovates that acts more as a bloodsucker on other people’s quarrels than a force competent of creating its own arena. Al Qaeda does not move alone in the global spread.  The symbol of Al Qaeda is the group that derives its members from the cynical Muslims irritated by the American support for Israel of the engagement in the Muslim World and enticed by the idea of a national religious successor to join the battle. Americans has noted much of the group’s growth in the last few years.  They convince the Americans that their struggle is a constituent of Al Qaeda widening the global schema (Dienel, 2010). 

            Unlike other groups, Al Qaeda recruits its members from the international community of the Muslim followers and not from any single country.  They focus their recruitment not on a specific society and seek to develop the Islamic society in all the domains. Their recruitment comes even from people who sacrifice their lives to what they believe to be the martyrs.  The level of Al Qaeda sets the terrorist group apart from other forms of religious terrorism.  As Jihadists, Al Qaeda believe to be taking their peace and struggle as faith defenders, they approach the dissension of the Muslims as the main cause of the Islamic weakness (Dienel, 2010).

 

 

 

 

 

 

 

References                                                                                                 

Dienel, H.-L. (2010). Terrorism and the Internet: Threats, target groups, deradicalisation strategies. Amsterdam: IOS Press.

Maitra, G. (2009). For whom the bell tolls: America or the jihadists? Victoria, BC, Canada: Trafford Publishing.

Roy, O. (1994). The failure of political Islam. Cambridge, Mass: Harvard University Press.

 

 

1788 Words  6 Pages

The Chapter is on Terrorism and Homeland Security

            Terrorism and Homeland security shows how the two bases on the modern era focusing on the Post Second World War time as the main prominence.  The topic reviews the nations, movements and people who engaged in the terrorist violence. It also reviews many types of terrorism that existed in the postwar era.  It approaches mainly on the causes of terrorism, for instant the essential philosophy, faiths and the disturbing scenes in the lives of the states and the inhabitants.  The context of Terrorism and Homeland security stimulates the critical thinking of the readers (Purpura, 2007).

            Terrorism is the act that disturbs the stability of societies and the peace of people living in them.  In the modern times, the outcomes of terrorism are that it threatens the regions where the terrorists invade.  In the current social media times, terrorists’ images and events broadcast into the minds of millions of people.  The terrorist groups understand the power of the symbols and spread them into their advantage as much as they can. Terrorists’ nations also understand the power of the immediate information and try to control the spread of reports and the events.  Many actions of political violence are acts of terrorism.  Most people note that politically aggravated intimidation of states and annihilation of enemy civilian’s use of torture are forms of terrorist attacks (Purpura, 2007).

            So that we completely understand the meaning of terrorism, we have to understand its sources. Behind every action of terrorist attack, some hidden belief approach causes their violence.  Such belief system includes the radical system featured by prejudice.   However, terrorism is a violent action expressing these kinds of beliefs; it is therefore the manifestation of radicalization.  Based on the terrorist behavior, radicalisms’ can involve in such violent expressions as outlining debates and publishing them on newspapers. They can also engage in destruction and disturbances of the normal working of their enemies (Purpura, 2007). 

            Radicalism is an essential feature mainly on political views.  Fanaticism attributes it towards the opposing wishes and different opinions as the main cause of motivation for the terrorist behavior. Radicals who engage in terrorism matters develop dignified arguments to reduce and justify their violence actions towards states, people, religions and other interests.  Radicalism is a radical phrase of political principles. It can be called the over reaction of the belief system that the terrorists use to rationalize their violent manners (Purpura, 2007).

            Radicals set themselves apart from the truth defenders or as the true inheritors of bequest. As it has ever been, religion is an original cause of radicalism activity. When radicals adopt a certain religious belief, their global view becomes as a struggle between the mystical forces of good and bad.  They take themselves as those living a moral life that fits in the God’s will.  Those who do not follow their belief system are as rejecters of one true belief.   The manifestation of their actions includes elements of the social and political status. These people have an efficient mission, aim and morality intelligence.  They make a worldview that discriminates them from the society.  Their attitudes and terrorists actions are judgmental to those who acknowledge the belief system unreasonably to those to reject it (Purpura, 2007).

            A natural apprehension would mean that terrorism is the illegal or unlawful use of force. This means that terrorism is violent actions based on political aims and motives of violence.  It is an action exploiting fear through violence in the search of change.  America defines terrorism as the illegal use of force against people or property to pressurize and threatening the administrations or the societies for them to gain social, political and religious belief purposes (White, 2017).   

            Many nations change their approaches to the national security and law enforcement depending on how they define terrorism.  This demonstrates through the current changes in American security and law regulation policies as a response to terrorism. When terrorism as a word outsourced in the Western History, the governments changed their policies based on the ways they defined the threats.  Terrorism did not start as nothing as many Americans were aware of the modern activist which was after the First global trade violence.  The current terrorism from the Western approach, developed from the French Revolution and not from a group of radicals.  Terrorism increased in the 19th century where it changed the philosophy systems.  Its meaning changed in the 20th and 21st centuries (White, 2017). 

            The meaning of terrorism has therefore changed according to the political changes in the Western History. It started as administration oppression in France but France adjusted its meaning to Spanish revolutionary policy in the Napoleonic Combats. The meaning spread when the followers of the Soviet organization used terror campaign to conquer the population. After the Second World War, terrorism emerged in opposing movements, political radicalism and beliefs.  All these varying forms of revolution and violence happened because of changing definitions and many rules (White, 2017).

Conclusion

            The origin of progression of the Western egalitarianisms developed to the relationship between social equality and terrorism. This explains that terrorist attacks happen more in egalitarianism governments than in the countries with other system of government.  According to the Terrorism psychiatrists, terrorists need egalitarianism nations for utility as these kinds of states makes it easier for them to act.  Terrorists are in need of liberty, they need freedom of speech, reflection and exploit. As a result, terrorism is a threat, but an overreaction that intimidates the government and the public.

 

 

 

Reference

Purpura, P. P. (2007). Terrorism and homeland security: An introduction with applications. Amsterdam: Butterworth-Heinemann.

White, J. R. (2017). Terrorism and homeland security.

941 Words  3 Pages
Get in Touch

If you have any questions or suggestions, please feel free to inform us and we will gladly take care of it.

Email us at support@edudorm.com Discounts

LOGIN
Busy loading action
  Working. Please Wait...