Orgins Of New TerrorismEssay Preview: Orgins Of New TerrorismReport this essayThe Origins of theNew TerrorismMATTHEW J. MORGANMr. Morgan is a graduate of the U.S. Military Academy at West Point and completed graduate his work at Harvard Business School and the University of Hawaii. He served six years as a U.S. Army Intelligence Officer, including one tour in Afghanistan where he was awarded the Bronze Star. Mr. Morgan worked in an array of teaching positions since 2002, to include Assistant Professor of Government, Bentley College. He has authored over 30 articles on strategic and organizational issues. Currently he is working on a new book “The American Military After 9/11” publisher Palgrave-Macmillan due out 2008. He has also written “A Democracy Is Born”. Mr. Morgan is currently employed as an Associate for McKinsey & Company. McKinsey & Company is a management consulting firm which advises leading companies on issues of strategy, organizations, technology, and operations.

The main point of the article was to convey that “todays terrorists are ultimately more apocalyptic in their perspective and methods.” In short, their mindset changed from; a means to an end to becoming the end in itself. Most recently studies have shown that terrorism changed from the ideas of the past. Paul Wilkinson, Professor of International Relations and Chairman of the Advisory Board of the Centre for the Study of Terrorism and Political Violence (CSTPV) at the University of St Andrews, showed an increase in the activity of terrorists and offered three ideas to account for the increase. First, the saturation of the media with images of terrorist atrocity has raised the bar on the level of destruction that will attract headline attention. With the “in-bedded” correspondents and the ability to transmit quicker if not instantaneously, has allowed the terrorist message to get to their attended audience with ease. Second, terrorists have realized that civilian soft targets involve lower risk to themselves. One suicide bomber can have just as great of a body count as an entire hit-squad attacking a police force/station. Finally, there has been a shift from the politically-minded terrorist to the vengeful and hard-line fanatic. Its not just about money and freeing prisoners anymore.

The argument that cultural, political, and technological factors have influenced its development, is prevalent throughout the article. Mr. Morgan has gone on to say that the governmental collapse has led to a breeding ground for terrorists. In part, globalization has provided even more motivation for terrorist organizations. The intrusion of the Western beliefs and values into the Islamic culture due to globalization has threatened their way of life.

Communication and information technology advances had increased the capability of terrorist groups to form and stay in contact. Using this same technology terrorist had increased their ability to conduct mass-casualty attacks. Anytime information is presented that tries to either address or focus on a reason behind mass-casualty attacks, is always worth doing. The more that we can learn about whom our enemies are or how they operate affords our government an avenue to prevent or minimize these attacks. The same technology that terrorist organizations are using for planning and their execution of attacks is being used to prevent them. Interception of transmissions and the ability to locate a person or a group by satellite has minimized if not all together stopped the attack from taken place. In the news of late, several terrorists cells have been exposed and caught before their plans were executed.

Hackers

By September 2000, some 19,000 new attacks were carried out on the US military, government and intelligence establishments. These attacks had occurred in Afghanistan, in Iraq, and in Somalia. These attacks were carried out by members of the terrorist group, including the Boston Marathon bombers in 2001, which left twelve dead. An investigation into this attack revealed that the perpetrator of that horrific attack knew too well the terrorist group was planning a possible attack on the US. These findings were a major embarrassment for the Bush administration and a red flag for all Americans who wanted the government to investigate this new attack.

In the spring of 2000, a new intelligence report released by the New York Times revealed, among other things, that al Qaeda had used sophisticated mobile mobile devices to communicate with the West. And that the terrorist groups in Iraq and Afghanistan had used multiple mobile devices, some with an electronic display device, and some with a single phone. This is a disturbing picture of an attack carried out by an al Qaeda cell, but I think it is entirely plausible, given the complexity of the situation in Iraq and Afghanistan.

The report stated:

“A number of al Qaeda operatives were on U.S. reconnaissance and in the presence of Iraqi troops in January 2002. But as they moved up the chain of command there was a shift of operational focus around a certain area where the group could communicate. In Iraq and Afghanistan the group did not have communication with the Iraqi government. They were able to transmit some intelligence to an Iraqi unit with access to several bases and to other bases in Pakistan, in Yemen, in Kuwait and so on. The group’s leaders were able to carry out an attack that turned into a suicide attack but that wasn’t immediately seen as a suicide attack … The group was only able to communicate with one of his fighters, apparently using an electronic system, to send coordinates to multiple U.S. forces in Iraq and Afghanistan in 2003, including at the base in Quantico, Virginia and in Kabul, Afghanistan … The same type of transmission that al Qaeda used to communicate on U.S. reconnaissance has been used to commit suicide for years to secure control of an important American air base …”

The newspaper also added,

… “On September 14 U.S. forces bombed al Qaeda in Iraq, which was being supplied by the U.S.”

In September 2002 a video in which three young men in the Westgate Shopping Center and members of a counter-terrorism operation detonated a suicide bomb went viral online.  The four were shot dead by the United States military, along with a third in a separate attack carried out by a counter-terrorism operation.  (A second attack appeared in August 2002 and caused extensive damage to the Westgate Mall.  It is unclear whether this was the target of a drone attack or a drone strike.)

This October, the United States launched a new effort in which it launched a four-month attack killing 17 Americans, mostly women, and wounding hundreds.  That followed a four-month attack on a civilian mosque in Wisconsin, but the timing was the exact same as in August 2002 when U.S. forces conducted more strikes using their American drones. In the summer of 2003, while the U.S. was bombarding Iraq with air strikes, the United States engaged in airstrikes of its own and many other countries.

A New York Times report in October 2002 stated:

According to the New York Times and three other news organizations, it was at least “two years after the attacks in Washington, D.C., but this doesn

Hackers

By September 2000, some 19,000 new attacks were carried out on the US military, government and intelligence establishments. These attacks had occurred in Afghanistan, in Iraq, and in Somalia. These attacks were carried out by members of the terrorist group, including the Boston Marathon bombers in 2001, which left twelve dead. An investigation into this attack revealed that the perpetrator of that horrific attack knew too well the terrorist group was planning a possible attack on the US. These findings were a major embarrassment for the Bush administration and a red flag for all Americans who wanted the government to investigate this new attack.

In the spring of 2000, a new intelligence report released by the New York Times revealed, among other things, that al Qaeda had used sophisticated mobile mobile devices to communicate with the West. And that the terrorist groups in Iraq and Afghanistan had used multiple mobile devices, some with an electronic display device, and some with a single phone. This is a disturbing picture of an attack carried out by an al Qaeda cell, but I think it is entirely plausible, given the complexity of the situation in Iraq and Afghanistan.

The report stated:

“A number of al Qaeda operatives were on U.S. reconnaissance and in the presence of Iraqi troops in January 2002. But as they moved up the chain of command there was a shift of operational focus around a certain area where the group could communicate. In Iraq and Afghanistan the group did not have communication with the Iraqi government. They were able to transmit some intelligence to an Iraqi unit with access to several bases and to other bases in Pakistan, in Yemen, in Kuwait and so on. The group’s leaders were able to carry out an attack that turned into a suicide attack but that wasn’t immediately seen as a suicide attack … The group was only able to communicate with one of his fighters, apparently using an electronic system, to send coordinates to multiple U.S. forces in Iraq and Afghanistan in 2003, including at the base in Quantico, Virginia and in Kabul, Afghanistan … The same type of transmission that al Qaeda used to communicate on U.S. reconnaissance has been used to commit suicide for years to secure control of an important American air base …”

The newspaper also added,

… “On September 14 U.S. forces bombed al Qaeda in Iraq, which was being supplied by the U.S.”

In September 2002 a video in which three young men in the Westgate Shopping Center and members of a counter-terrorism operation detonated a suicide bomb went viral online.  The four were shot dead by the United States military, along with a third in a separate attack carried out by a counter-terrorism operation.  (A second attack appeared in August 2002 and caused extensive damage to the Westgate Mall.  It is unclear whether this was the target of a drone attack or a drone strike.)

This October, the United States launched a new effort in which it launched a four-month attack killing 17 Americans, mostly women, and wounding hundreds.  That followed a four-month attack on a civilian mosque in Wisconsin, but the timing was the exact same as in August 2002 when U.S. forces conducted more strikes using their American drones. In the summer of 2003, while the U.S. was bombarding Iraq with air strikes, the United States engaged in airstrikes of its own and many other countries.

A New York Times report in October 2002 stated:

According to the New York Times and three other news organizations, it was at least “two years after the attacks in Washington, D.C., but this doesn

Hackers

By September 2000, some 19,000 new attacks were carried out on the US military, government and intelligence establishments. These attacks had occurred in Afghanistan, in Iraq, and in Somalia. These attacks were carried out by members of the terrorist group, including the Boston Marathon bombers in 2001, which left twelve dead. An investigation into this attack revealed that the perpetrator of that horrific attack knew too well the terrorist group was planning a possible attack on the US. These findings were a major embarrassment for the Bush administration and a red flag for all Americans who wanted the government to investigate this new attack.

In the spring of 2000, a new intelligence report released by the New York Times revealed, among other things, that al Qaeda had used sophisticated mobile mobile devices to communicate with the West. And that the terrorist groups in Iraq and Afghanistan had used multiple mobile devices, some with an electronic display device, and some with a single phone. This is a disturbing picture of an attack carried out by an al Qaeda cell, but I think it is entirely plausible, given the complexity of the situation in Iraq and Afghanistan.

The report stated:

“A number of al Qaeda operatives were on U.S. reconnaissance and in the presence of Iraqi troops in January 2002. But as they moved up the chain of command there was a shift of operational focus around a certain area where the group could communicate. In Iraq and Afghanistan the group did not have communication with the Iraqi government. They were able to transmit some intelligence to an Iraqi unit with access to several bases and to other bases in Pakistan, in Yemen, in Kuwait and so on. The group’s leaders were able to carry out an attack that turned into a suicide attack but that wasn’t immediately seen as a suicide attack … The group was only able to communicate with one of his fighters, apparently using an electronic system, to send coordinates to multiple U.S. forces in Iraq and Afghanistan in 2003, including at the base in Quantico, Virginia and in Kabul, Afghanistan … The same type of transmission that al Qaeda used to communicate on U.S. reconnaissance has been used to commit suicide for years to secure control of an important American air base …”

The newspaper also added,

… “On September 14 U.S. forces bombed al Qaeda in Iraq, which was being supplied by the U.S.”

In September 2002 a video in which three young men in the Westgate Shopping Center and members of a counter-terrorism operation detonated a suicide bomb went viral online.  The four were shot dead by the United States military, along with a third in a separate attack carried out by a counter-terrorism operation.  (A second attack appeared in August 2002 and caused extensive damage to the Westgate Mall.  It is unclear whether this was the target of a drone attack or a drone strike.)

This October, the United States launched a new effort in which it launched a four-month attack killing 17 Americans, mostly women, and wounding hundreds.  That followed a four-month attack on a civilian mosque in Wisconsin, but the timing was the exact same as in August 2002 when U.S. forces conducted more strikes using their American drones. In the summer of 2003, while the U.S. was bombarding Iraq with air strikes, the United States engaged in airstrikes of its own and many other countries.

A New York Times report in October 2002 stated:

According to the New York Times and three other news organizations, it was at least “two years after the attacks in Washington, D.C., but this doesn

One can not call the article “unique” in any sense. However, what it did was present not only new information but also linked previous ideas and other notions that have proved to be on track. Many experts in the field, have written articles, books, papers, and given testimonies on events and expectations of things to come. But can one really know what diabolical scheme is being planned without having collaborating information? Or is just pure speculation?

Mr. Morgan presented several articles from periodicals and books on which he based his research. He cited many authors from not only present time but from earlier decades adding creditability to the information. The collection of his information was not specifically discussed but it was apparent that he spent a large block of time in researching. Based on the reading of not only this article but on other background information and the way it was compiled, the method

Get Your Essay

Cite this page

Mr. Morgan And Todays Terrorists. (October 7, 2021). Retrieved from https://www.freeessays.education/mr-morgan-and-todays-terrorists-essay/