Paper two is a continuation of the work you did on your first paper of this course. As always, pay close attention to the following guidelines. Keep in mind, college-level research and writing is a process that takes time, and you will likely need to write multiple drafts of your work to create a quality paper. Allow yourself ample time to complete this assignment to the best of your ability.
- Of the five articles you used for your Paper 1 assignment during Week 2, select three that share a common theme discussed in the first nine chapters of our textbook.
- In a well-written paper, provide the following for EACH article:
- A description of the theme as our textbook discusses it.
- What the articles you have selected say about the theme. Where do they agree? Where do they disagree?
- Now that you have reviewed at least four sources on this theme (our textbook and the three articles), what is your perspective?
- Papers must adhere to the following guidelines PRIOR to submission on or before the last day of Week 4:
- The first page of your paper will be a cover sheet correctly formatted according to APA guidelines.
- This paper will use 1-inch margins, Times New Roman 12-point font, and double spacing.
- The citations for each article MUST be correctly formatted according to APA guidelines. Do NOT use an automated citation manager to perform this function. Do it manually for this assignment and check your formatting against available APA resources.
- Excluding the cover page and references, this paper must EXCEED 5 pages of written text.
- Only COMPLETE paragraphs consisting of an introductory sentence, a full explanation of key points supported with properly cited sources, and a concluding sentence may be used.
- Only use published articles from academic texts, such as those found at scholar.google.com or accessed through your Grantham University EBSCO host account.g. The entire paper must be your original work. It may not include quotes, and at no time should text be copied and pasted.
- This paper DOES require an introductory paragraph, explicit thesis statement, concluding paragraph, and references page.
FIRST PAPER FOR REFERENCE
British Islamic Extremist Terrorism
Harrington addresses the problem of the spread of the Al Qaeda terror group all over the globe. In this article the author focuses on the major target of the terror group as British citizens in the past one decade. The article describes the way the terror group has rooted itself in the United Kingdom through vigorous training of people in European countries especially in the United Kingdom. UK terror groups were financed, trained and directed by this terror group. This has promoted the spread of this terror group tremendously causing grave security issues in the world today. Herrington used research data to indicate the way this terror group has rooted itself in different parts of the world. The author in this case concludes that the rate at which this terror group is spreading is alarming (Herrington, 2015).
Shifting The Battleground
Agbiboa describes the way Al Qaeda transformed the Somalian Nationalist organization to a global terror group known as Al Shabaab. It was transformed from a country based group to a global terror group using symbolic violence. The group has significantly terrorized the East African region (Agbiboa, 2015). For example, it made an attack in the Kenyan capital as a way to force the African Union Mission out of Somali land. Agbiboa has used a number of sample cases to prove to the audience on the issues affecting the community around the constituents of Al Shabaab. He also describes the case that links the operations of Al Qaeda and Al Shabaab. The conclusion Agbiboa makes in this article is that development of Al Shabaab is one of the goals of Al Qaeda to spread to global level.
Al Qaeda’s Media Warfare Strategy
Kamolnick describes the communication strategies used by Al Qaeda to its constituent groups such as Al Shabaab ISIS and TTP among others. According to the Kamolnick, there is a clear and concise communication made by Al Qaeda to the groups. The operations of these groups are guided and monitored by Al Qaeda. This is a method used in making the operations by Al Qaeda to be global. This is proving to the world it has a deep terror issue that is managed and operated by the Al Qaeda terror group (Kamolnick, 2015). The methods used in this case are the use of examples of different attacks made in different parts of the world and the contribution of Al Qaeda. In conclusion, the article has made it clear that Al Qaeda is a global problem and is recruiting many small terror groups, communicate and guide them in making their operation better, making them global.
Toward New Paradigms
This article tries to describe how Al Qaeda came to be and how hard it has worked for the world leading terror group today. According to Maddy-Weitzman, Al Quada is just a mere group whose philosophies were not accepted by the Muslim world. Its aggressiveness has made the group the way it is today trying to prove a point to the entire world that is it a Muslim based group. However, the group came from an outcast family in the Islamic community that thought it would rule over and they were given no chance to do so. This therefore made them to be aggressive and turn against others. Then it became a terror group. The group seems to be growing very fast. With the demise of Osama, the group leader, the author says that the group is not a threat to the world anymore. The author uses a lot of explanation in driving his point home (Maddy-Weitzman, 2015). According to, Maddy, the group is no longer a threat to the world and that the governments should stop bothering about it.
Terrorism and Counterterrorism
This article basically describes how governments are responding to the terror attacks that are launched by the terror groups among them Al Qaeda. According to this article, USA has invested heavily in developing technology that is ready to detect and protect terror attack from happening. It says that terror groups have improved their weapons, making them hard to be detected by the use of ordinary technology. Therefore, advanced technology is needed for that. Turk has used a thorough description and explanation to drive the point to the audience. Sample cases of complex technology in both terror technology devices and counter terror technology are also explained. In conclusion, Turk states that there is a need to invest in technology as a method of counter terror attack (Turk, 2015).
In conclusion, Al Qaeda is a terror group that has laid its strategies for spreading its terror attacks to the global level. It is recruiting different groups in different locations, finance them and use them for their global attacks. They have invested significantly in technology to facilitate attacks, even in the most advanced countries. Soon Al Qaeda will be a global problem.
Agbiboa, D. (2015). The Transformation of Al-Shabab and the Growing Influence of Al-Qaeda in East Africa and the Horn. Shifting The Battleground, 42(2), 177-194.
Herrington, L. (2015). The declining significance of Al-Qaeda and Pakistan. British Islamic Extremist Terrorism, 91(1), 17 – 35.
Kamolnick, P. (2015). Adam Gadahn’s Critique of the “Jihadist” Subversion of Al Qaeda’s Media Warfare Strategy. How Muslim Defenders Became “Blood Spilling” Crusaders:, 1(1).
Maddy-Weitzman, B. (2015). Toward New Paradigms. The Raise and Fall of Al-Qaeda, 20(4), 418 – 419.
Turk, A. T. (2015) Terrorism and Counterterrorism, in The Handbook of Deviance (ed E. Goode), John Wiley & Sons, Inc, Hoboken, NJ. doi: 10.1002/9781118701386.ch30