Assignment Instructions
The Final Paper assesses the final two Course objectives:
CO-4 Analyze the current trends and manifestations of terrorism and consequent challenges they pose for U.S. national security policies.
CO-5 Apply contemporary theories and methods derived from anti- and counter-terrorism policies to US national security issues.
This 6- page policy paper is due at the end of week 8. Similar to the Midterm, you will rely on the course readings, but you may include current event examples from approved news sources (The Foreign Policy Magazine, Foreign Affairs, the Economist, CNN, BBC). You may also use official sites of the U.S. federal agencies (CIA.org, FBI.org, and so forth).
You are the National Security Adviser to the President. Your role is to determine the agenda for National Security Council, a principal foreign policy forum, ensuring that all national security papers are prepared according to the Council’s objectives and President’s decisions. One of your most critical tasks is to prepare a National Security Strategy, which is a comprehensive document, providing a clear set of directives to meet the U.S. most critical national security goals. While the Strategy document requires team work and input from different national security agencies, your initial task is to prepare a proposal, focused on terrorism.
The 2014 National-Strategy Proposal is a 6–page document that describes an overall plan on how to prevent and reduce terrorism. It must include the following elements:
Introductory part: Only about a page long. What is the goal of national-security policy? What have your learned about terrorism, and how has it evolved?
Analytical Section: 4 pages long. In this section, you will describe current terrorist trends, threats and focus areas. Then, you will apply anti and counter-terrorist policies. Because we did not include any past policy in our readings, you will use the last three week’s readings that have policy elements and suggestions, written by scholars with different views. You will need to review these policy ideas to formulate your own. Using previous National Security documents is not allowed.
Concluding section: Summary with a clearly stated path forward, about a page long.
Submit your finished paper as a 6-page double-spaced word document in 12 pt. font. Use the Turabian Reference Style with in-text citations to reference all sources, including the course readings. Don’t forget to write a Reference List at the end of your paper.
References:
Hoffman, Bruce. 2006. “Defining terrorism.” In Inside Terrorism by Bruce Hoffman, 22-63.
Krueger, Alan, and Jitka Maleckova. 2003. “Poverty and terrorism: is there a causal connection?” 119-144.
Jones, Frank L. 2009. “The strategic dimensions of terrorism: concepts, countermeasures, and conditions in the search for security.”
Hoffman, Bruce. 2006. “The End of Empire.” In Inside Terrorism by Bruce Hoffman, 64-83.
Byman, Daniel. 2005. “Passive sponsors of terrorism.” In Deadly Connections: States that Sponsor Terrorism by Daniel Byman, 219-258.
Byman, Daniel. 2005. “Why do states sponsor terrorism?” In Deadly Connections: States that Sponsor Terrorism by Daniel Byman, 21-52.
Hoffman, Bruce. 2006. “Religion and Terrorism.” In Inside Terrorism by Bruce Hoffman, 122-171
Hoffman, Bruce. 2002. “Rethinking terrorism and counterterrorism since 9/11.” Studies in Conflict & Terrorism 25, No 5: 303-316.
Pape, Robert A. 2006. “Suicide terrorism and democracy: what we have learned since 9/11.” CATO Institute. Policy Analysis 582 (November): 2-18
Phares, Walid (2005). “New Jihad.” In Future Jihad: Terrorist Strategies against America, by Walid Phares, 113-133
Cragin, Kim and Sara Daily. 2003. “Introduction.” In Dynamic Terrorist Threat: An Assessment of Group Motivations and Capabilities by Cragin Kim and Sara Daily, 22-27.
Cragin, Kim and Sara Daily. 2003. “Terrorist group capabilities.” In Dynamic Terrorist Threat: An Assessment of Group Motivations and Capabilities by Cragin Kim and Sara Daily, 46-81.
Jacobson, Michael. 2010. “Terrorist financing and the internet.” Studies in Conflict & Terrorism 33, No 4: 353-363.
Chu H.-C., Deng D.-J., Chao H.-C., Huang Y.-M. 2009. “Next generation of terrorism: ubiquitous cyber terrorism with the accumulations of all intangible fears. Journal of Universal Computer Science 15, No. 12: 2373-2386.
Kirby, Adam W. and Vera L. Zakem. 2009. “Jihad.com 2.0: the new social media and the changing dynamics of mass persuasion.” In Influence Warfare: How Terrorists and Governments Fight to Shape Perceptions in a War of Ideas.
Rabasa, Angel. (2009) “Radical Islam in East Africa.” 1:74. RAND Corporation.
Clarke, Ronald V, Graeme R. Newman. 2005. Outsmarting the Terrorists. Praeger Publishers, Wesport CT.
Geltzer, Joshua A. and James J.F. Forest. “Assessing the conceptual battlespace.” In Influence Warfare: How Terrorists and Governments Fight to Shape Perceptions in a War of Ideas, by James Fores
For a custom paper on the above topic, place your order now!
What We Offer:
• On-time delivery guarantee
• PhD-level writers
• Automatic plagiarism check
• 100% money-back guarantee
• 100% Privacy and Confidentiality
• High Quality custom-written paper