StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Threat Analysis - Essay Example

Cite this document
Summary
From the beginning, Al-Qaida had been formulated by its pioneer leadership so as to organize the all the Islamic Jihad factions. Indeed, al-Qaida accomplished this ambitious…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.9% of users find it useful
Threat Analysis
Read Text Preview

Extract of sample "Threat Analysis"

Al-Qaida (a non actor) surfaced about a year prior to the Soviet Union pull out from Afghanistan. From the beginning, Al-Qaida had been formulated by its pioneer leadership so as to organize the all the Islamic Jihad factions. Indeed, al-Qaida accomplished this ambitious objective by spearheading a variety of other non-state actors and two decades later executed the September 11th terror attacks in U.S. At that point in time, Al-Qaida’s major achievement was to incite other non-state actors as well as the wider Muslim community against the U.S.1 On the other hand, since 9/11 Al-Qaida is fading and with approximately 4,000 operatives it is operationally weak, but ideologically stronger.

This ideological rise prompts other non-state actors as well as local jihads. Moreover, the funding as well as training for such non-state actors is still wired through Al-Qaida. 1 While comparing the pre-9/11 propaganda propagated by other non-state actors, the current al-Qaida make of propaganda is awfully violent, openly urging Muslims to kill.2 Additionally, Al-Qaida’s ideological potency is evident in its ever changing operational targets i.e. whereas in the 1980’s the U.S. was the prime target, now al-Qaida has redirected the terror acts towards U.S. allies e.g. U.K., Spain, Turkey e.t.c.

2As a result of the counterterrorism measures by U.S. against al Qaeda since September11th terror attacks, as well as defensive operations abroad aimed at improving security, most of U.S. citizens now feel more secure now. Furthermore, now U.S. intelligence analysts appreciate that the adversary is not Islam; but a distortion of Islam is the foe. In fact, U.S. adversaries go beyond al-Qaida (a non-state actor) to accommodate the radical ideological factions, motivated to a certain extent by al Qaeda3; and the threat of Islamist extremism as well as terrorism will continue, but it will diminish significantly in future.

2 Bibliography1. International Security Forum, Anja H. Ebnöther, Ernst M. Felberbauer, and Theodor H. Winkler. Proceedings of the Conference. Bern [u.a.]: Peter Lang, 2005.2. Chaliand, Gérard, and Arnaud Blin. The History of Terrorism: From Antiquity to Al Qaeda. Berkeley: University of California Press, 2007.3. National Commission on Terrorist Attacks Upon the United States.http://www.9-11commission.gov/report/911Report_Exec.htm

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Threat Analysis Essay Example | Topics and Well Written Essays - 500 words”, n.d.)
Threat Analysis Essay Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/social-science/1647293-threat-analysis
(Threat Analysis Essay Example | Topics and Well Written Essays - 500 Words)
Threat Analysis Essay Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/social-science/1647293-threat-analysis.
“Threat Analysis Essay Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/social-science/1647293-threat-analysis.
  • Cited: 0 times

CHECK THESE SAMPLES OF Threat Analysis

Threat Analysis for IN-n-OUT bURGER

Therefore, they are all trying to be as innovative Heading: Threat Analysis for IN-n-OUT Burger Threat Analysis for IN-N-OUT Burger The first one is competition from other companies in the same industry.... In-N-Out Burger: Company Profile and SWOT analysis; Market Research; Retrieved from on September 10, 2012... This is a threat to the future performance of In-N-Out Burger.... he other threat is the issue of health consciousness....
1 Pages (250 words) Case Study

Terrorism Threats Analysis

In the current times, the world has been dealing with the problem of international… Through various researches that have been conducted on this subject, terrorism has been cited as not just being a mere accident, but rather, a series of decisions that Terrorism Threats analysis Introduction Terrorism comprises of all the activities that are done by illegal groups that have widely established networks for perpetuating death and destruction of human life and property (Donohoe, 2008)....
3 Pages (750 words) Essay

Operational Security

Threat Analysis entails research and comprehensive of intelligence, open source information and counterintelligence (Andress, 2011).... Information on the capability of the enemy's intelligence was determined during Threat Analysis.... Threat Analysis is very importance since it gives a law enforcement agency a chance to be proactive.... Second, an analysis of all the threats should be performed.... The third step in the operation security process is the analysis of vulnerabilities....
2 Pages (500 words) Assignment

Assignment in medicine

XERCISE 6The study analyzed data by following protocol criteria set under the per-protocol and intention-to-Threat Analysis frameworks.... The researchers use the word “evaluate” to simplify the entire procedure undertaken.... The inclusion of a control experiment further proves that the article is explorative....
2 Pages (500 words) Essay

Information Privacy, Physical Security, and Legal Compliance

They include Threat Analysis, areas affected, details on emergency and teams for recovery.... First it involves the use of doors most steels with huge padlocks that prevent penetration into the offices.... Sensitive regions, for instance, the server rooms… Stricter measures include the use of fireproof safes, fencing and use of more locks....
1 Pages (250 words) Essay

Risk Management and Security Threat

Risk Management and Security Threat Analysis Program risk can be defined as a measure of uncertainties that any aspect of a program will perform its required functions under the required schedule and performance constraints.... In the report, it is underlined that program risk can be defined as a measure of uncertainties that any aspect of a program will perform its required functions under the required schedule and performance constraints....
2 Pages (500 words) Essay

Company Diversification

Furthermore, it will help the company to do strength, weakness, opportunity and Threat Analysis of the business.... This essay analyses that diversification is a strategy used by the company to spread their risk across various industries in the market.... Economic depression and technological innovation are more likely to affect a single business organization than that one that has diversified....
2 Pages (500 words) Essay

A Threat Analysis to Enterprise Computer Networks and How to Mitigate Them

This research proposal "A Threat Analysis to Enterprise Computer Networks and How to Mitigate Them" focuses on Network security that encompasses areas pertaining to risks and threats and how to protect IT infrastructure from different types of malware.... nbsp;… The problem of IT security can be compared to a building that needs fast and effective service to serve its inhabitants....
5 Pages (1250 words) Research Proposal
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us