Introduction to Homeland Security
Research Paper
August 17, 2013
Mr. William R Di Lorio
2 moderately unfamiliar assumptions about al-Qaeda
Abstract
From intellectuals to policy-makers alike. All of the extraordinary output on the subject of al-Qaeda, has recently led to a number of far-reaching theories about the group which remain startlingly unexplored. The two assumptions, this paper examines and reveals each one 's foundational role in assertions as well as debates about al-Qaeda, despite the relatively unexplored status of each. These 2 assumptions relate to: (1) the role of the internet in actual terrorist activity; and (2) the association between combating a global “Al-Qaeda and combating al-Qaeda in Iraq”. |
Introduction
Mueller 's ever-burgeoning bookish literature which anyone familiar with terrorism would recognize, quickly titled the 'Six rather unusual propositions about terrorism '. Is what my research paper plays off. In 2005, Mueller 's astute and incisive piece brought to the forefront six unfamiliar assumptions about terrorism that should already have spawned discussion among intellectuals in the field, but had not, until his work provocatively presented those propositions. In a similar stratum, this research paper focuses on 2 rather unfamiliar theories about al-Qaeda which I think demand far greater research, attention, and debate than Mueller 's had received thus far. It is my intention to focus these reflections on some insufficiently explored theories regarding particularly al-Qaeda. However, most of the theories relate more broadly to terrorism concerning issues in general.
What is meant here by the phrase ' moderately unfamiliar assumptions '? By ' unfamiliar ', this dialogue proposes that the thinking explored here prowl beneath many of the affirmations made by intellectuals on al-Qaeda. This coupled with getting beneath many of the affirmations
References: 1. Bergen, P. (2002) Holy War, Inc.: inside the secret world of Osama bin Laden revd., Phoenix , London * 2 3. Atwan, A. (2006) The secret history of al Qaeda University of California Press , Berkeley, CA * 4 * 5. Friedman, B. (2004) Leap before you look: the failure of homeland security. Breakthroughs 13:1 , pp. 29-40. * 6. Bunt, G. (2003) Islam in the digital age: e-jihad, online fatwas and cyber Islamic environments Pluto , Sterling * 7 * 8. http://www.dhs.gov/xlibrary/assets/nat_strat_hls.pdf — Bush, G., 2002. National strategy for homeland security. Available from * 9 * 12. http://www.cf.usc.edu/∼tsandler/substitution2ms.pdf — Enders, W. and Sandler, T., 2002. What do we know about the substitution effect in transnational terrorism? Available from * 13 * 14. Frum, D. and Perle, R. (2004) An end to evil: how to win the war on terror Ballantine , New York, NY * 15 * 16. Hoffman, B. (2006) Inside terrorism Revd., Columbia University Press , New York, NY * 17 * 18. Husain, E. (2007) The Islamist: why I joined radical Islam in Britain, what I saw inside and why I left Penguin , London * 19 * 20. Lim, M. (2005) Islamic radicalism and anti-Americanism in Indonesia: the role of the internet. Policy Studies 18 * 21 * 22. McDermott, T. (2005) Perfect soldiers: the hijackers: who they were, why they did it HarperCollins , New York, NY * 23 * 24. Mohamedou, M. (2007) Understanding al Qaeda: the transformation of war Pluto , London * 25 * 26. Weimann, G. Forest, J. (ed) (2006a) Virtual training camps: terrorists ' use of the internet. Teaching terror: strategic and tactical learning in the terrorist world pp. 110-132. Rowman & Littlefield , Lanham, * 27 * 28. Sageman, M. (2004) Understanding terror networks University of Pennsylvania Press , Philadelphia, PA * 29 * 30. Sageman, M. and Hoffman, B. (2008) Does Osama still call the shots?. Foreign Affairs 87:4 , pp. 163-166. * 31. Scheuer, M. (2006) Through our enemies ' eyes: Osama bin Laden, radical Islam, and the future of America p. Potomac. Washington, DC — Revd * 32 * 33. 34. Simon, S. McMillan, J. (Ed) (2006) Muslim perceptions of America: the sources of hostility. 'In the same light as slavery ': building a global antiterrorist consensus pp. 35-69. National Defense University Press , Washington, DC * 35 * 36. MDMueller, J. (2006) Overblown: how politicians and the terrorism industry inflate national security threats, and why we believe them Free Press , New York, NY * 37 * 38. Wright, L. (2006) The looming tower: al-Qaeda and the road to 9/11 Alfred A. Knopf , New York, NY