Umuc Biology 102/103 Lab 1: Introduction to Science

Topics: Al-Qaeda, Terrorism, Osama bin Laden Pages: 9 (3150 words) Published: August 25, 2013
2 Moderately Unfamiliar Assumptions About Al-Qaeda

Introduction to Homeland Security
Research Paper
August 17, 2013
Mr. William R Di Lorio

2 moderately unfamiliar assumptions about al-Qaeda

From intellectuals to policy-makers alike. All of the extraordinary output on the subject of al-Qaeda, has recently led to a number of far-reaching theories about the group which remain startlingly unexplored. The two assumptions, this paper examines and reveals each one's foundational role in assertions as well as debates about al-Qaeda, despite the relatively unexplored status of each. These 2 assumptions relate to: (1) the role of the internet in actual terrorist activity; and (2) the association between combating a global “Al-Qaeda and combating al-Qaeda in Iraq”.

Mueller's ever-burgeoning bookish literature which anyone familiar with terrorism would recognize, quickly titled the 'Six rather unusual propositions about terrorism'. Is what my research paper plays off. In 2005, Mueller's astute and incisive piece brought to the forefront six unfamiliar assumptions about terrorism that should already have spawned discussion among intellectuals in the field, but had not, until his work provocatively presented those propositions. In a similar stratum, this research paper focuses on 2 rather unfamiliar theories about al-Qaeda which I think demand far greater research, attention, and debate than Mueller's had received thus far. It is my intention to focus these reflections on some insufficiently explored theories regarding particularly al-Qaeda. However, most of the theories relate more broadly to terrorism concerning issues in general. What is meant here by the phrase ' moderately unfamiliar assumptions '? By ' unfamiliar ', this dialogue proposes that the thinking explored here prowl beneath many of the affirmations made by intellectuals on al-Qaeda. This coupled with getting beneath many of the affirmations frequently put forward by political types (politicians and policy-makers). Humbly, this is not to imply that these particular assumptions are shared universally: in fact, many of the theories are really opposing pairs of, dichotomous conjectures, with those partisan to one side of a certain debate embracing that conjecture while their opponents reciprocate the other. Centrally the point is that these outright and crucial foundational notions concerning al-Qaeda, are for many assertions made by those addressing key issues and debating in the field.

By ' assumptions ', these reflections suggest that Mueller's six assumptions have been given inadequate attention in terrorism scholarship and dialogue. Not saying that these assumptions have been converted into the bases for other claims because they have been considered so obviously true and were taken for granted, or so indispensable research as to be automatically accepted for any scholarship whatsoever to continue. Contrarily, these assumptions engross some complex, consequential matters. This being said too often they have been accepted and neglected in favor of important research in other directions. What I hope to achieve with this paper is to draw attention to them, and in doing so, persuade their investigation through due diligent research and in depth analyses. Far too often these assumptions have not been totally ignored, but they have been left moderately unexplored. In addition, they also have been taken as the basis for other claims and assertions. For this reason, this research paper investigates 2 of the six assumptions, in an attempt to reveal what is habitually taken for granted in many conversations about al-Qaeda. This coupled with the consequent penalty for assertions made about counterterrorism and terrorism. In addition, proposals for how each assumption could be explored more completely and systematically are offered. This research paper then concludes by making a note of social science, and that it may...

References: 1. Bergen, P. (2002) Holy War, Inc.: inside the secret world of Osama bin Laden revd., Phoenix , London
* 2
3. Atwan, A. (2006) The secret history of al Qaeda University of California Press , Berkeley, CA
* 4
* 5. Friedman, B. (2004) Leap before you look: the failure of homeland security. Breakthroughs 13:1 , pp. 29-40.
* 6. Bunt, G. (2003) Islam in the digital age: e-jihad, online fatwas and cyber Islamic environments Pluto , Sterling
* 7
* 8. — Bush, G., 2002. National strategy for homeland security. Available from
* 9
* 12.∼tsandler/substitution2ms.pdf — Enders, W. and Sandler, T., 2002. What do we know about the substitution effect in transnational terrorism? Available from
* 13
* 14. Frum, D. and Perle, R. (2004) An end to evil: how to win the war on terror Ballantine , New York, NY
* 15
* 16. Hoffman, B. (2006) Inside terrorism Revd., Columbia University Press , New York, NY
* 17
* 18. Husain, E. (2007) The Islamist: why I joined radical Islam in Britain, what I saw inside and why I left Penguin , London
* 19
* 20. Lim, M. (2005) Islamic radicalism and anti-Americanism in Indonesia: the role of the internet. Policy Studies 18
* 21
* 22. McDermott, T. (2005) Perfect soldiers: the hijackers: who they were, why they did it HarperCollins , New York, NY
* 23
* 24. Mohamedou, M. (2007) Understanding al Qaeda: the transformation of war Pluto , London
* 25
* 26. Weimann, G. Forest, J. (ed) (2006a) Virtual training camps: terrorists ' use of the internet. Teaching terror: strategic and tactical learning in the terrorist world pp. 110-132. Rowman & Littlefield , Lanham,
* 27
* 28. Sageman, M. (2004) Understanding terror networks University of Pennsylvania Press , Philadelphia, PA
* 29
* 30. Sageman, M. and Hoffman, B. (2008) Does Osama still call the shots?. Foreign Affairs 87:4 , pp. 163-166.
* 31. Scheuer, M. (2006) Through our enemies ' eyes: Osama bin Laden, radical Islam, and the future of America p. Potomac. Washington, DC — Revd
* 32
* 33. 34. Simon, S. McMillan, J. (Ed) (2006) Muslim perceptions of America: the sources of hostility.  'In the same light as slavery ': building a global antiterrorist consensus pp. 35-69. National Defense University Press , Washington, DC
* 35
* 36. MDMueller, J. (2006) Overblown: how politicians and the terrorism industry inflate national security threats, and why we believe them Free Press , New York, NY
* 37
* 38. Wright, L. (2006) The looming tower: al-Qaeda and the road to 9/11 Alfred A. Knopf , New York, NY
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Biology 102, 103 Cell Structure and Function Lab Essay
  • Lab 1 Introduction to Science Essay
  • Lab 1: Introduction to Science Essay
  • Lab 1: Introduction to Science Essay
  • Science Lab ph 1 IP Essay
  • science lab Essay
  • Essay about Science Lab 1
  • unit 1 lab- science Essay

Become a StudyMode Member

Sign Up - It's Free