Harmonizing to Sun Tzu, to win a war we need to cognize the enemy, yet Hoffman clearly stated that terrorist act is frequently “ confused or equated with, or treated as synonymous with, guerilla warfare and insurgence ” . Not merely is his observation about prophetically right, but besides deeply declarative of the ground terrorist act is so hard to battle. Intelligibly baffled and frequently considered to be synonymous based on their similarities in tactics and their varying grade in condemnable activity engagement, the factors that set terrorist act apart from irregular warfare, insurgence, and offense is the motive behind the group and the ultimate end of their organisation.

Similar to Hoffman ‘s treatments, the Department of Defense ( DOD ) Directive 3000.07, Irregular Warfare ( 2008 ) portions cardinal points sing the differences between irregular warfare and terrorist act. The DOD defines irregular warfare as a violent battle among province and non-state histrions for legitimacy and influence over a population and defines terrorist act as “ the deliberate usage of improper force or menace of improper force to instill fright ; intended to hale or to intimidate authoritiess or societies in the chase of ends that are by and large political, spiritual, or ideological. While irregular warfare and terrorist act could be easy confused, and frequently are, the major differences between the two are that irregular warfare is a tactic consisting of many different techniques, while terrorist act is a motion that utilizes the tactic and techniques consistent with irregular warfare in its effort to accomplish its ultimate end.

Much like irregular warfare, insurgence is frequently confused with terrorist act and is normally used in the media interchangeably with the term terrorist act. Hoffman points out the major difference between the two when he relates that while an insurgence portions the usage of guerilla tactics, they besides coordinate “ informational and psychological warfare attempts designed to mobilise popular support ” and that “ Terrorists, nevertheless, do non work in the unfastened as armed units, by and large do non try to prehend or keep district, intentionally avoid prosecuting enemy military forces in combat, are constrained both numerically and logistically organize project conjunct mass political mobilisation attempts, and exercising no direct control or administration over a public ” . ( pg. 29 )

Hoffman sums up the major difference between felons and terrorist in that while a condemnable pursues “ egoistic ends ” , or personal addition, the terrorist is “ basically an philanthropist: he believes that he is functioning a `good ‘ cause designed to accomplish a greater good for a wider constituency — whether existent or imagined — which the terrorist and his organisation intent to stand for ” . ( Pg. 31 ) It is true that felons may utilize terroristic tactics in committee of their condemnable activity, so is it true that terrorist are frequently back uping their organisations with condemnable activities. While it is impossible to cognize for certain, some have estimated that Al Qaeda gets between 40 and 50 % of their support from illegal drugs and other common condemnable activity. Even more open condemnable activity is being used by some terrorist organisations. Harmonizing to Navias ( as cited by White, 2009 ) “ research workers have found legal concerns washing 1000000s of dollars for terrorist organisations ” ( p. 56 ) .

2. The station 9/11 environment is more robust from a security position, and this has caused Al Qaeda to alter its aiming scheme toward less dramatic and theatrical onslaughts. Intelligibly so, due to three really specific factors as listed in the article by Rohan Gunartna.

The first of these grounds would be the unprecedented degree of heightened human watchfulness. The high province of watchfulness by both public and authorities bureaus has resulted in the sensing or licking of legion attempted panic onslaughts.

Second is the extraordinary cooperation and information sharing by jurisprudence enforcement, security and intelligence bureaus from the local, province and federal spheres. Gunartna reports that “ As a direct consequence of inter and intra bureau cooperation a big figure of suspects have been detained and arrested and over 100 onslaughts by Al Qaeda and its associated groups have been interdicted, prevented or abandoned since 9-11 ( pg. . This is particularly of import in visible radiation of the multinational nature of Al Qaeda and other terrorist organisations.

The 3rd, and last ground trades with the nature Al Qaeda ‘s current state of affairs. Bing on the tally does non let for equal clip to decently carry on the needed pre program surveillance, test tallies, etc before executing. Al Qaeda and its attached groups are in a defensive manner where they are worried more about endurance of their cause than a dramatic onslaught. While still a deathly and capable group, Al Qaeda will, at least for now, program and put to death smaller graduated table onslaughts as marks arise and show themselves to be an easy grade.

One point to observe is that he says “ Al Qaeda ‘s capacity to carry on dramatic or theatrical onslaughts has diminished. While it is true that the chance of onslaught has decreased every bit good as the likeliness of the onslaughts being dramatic in nature, their capacity has non decreased. They are being more selective, and possibly be aftering their following onslaught now. While they plan, they continue to turn, and spread their extremist position of Islam. Make no error, Al Qaeda is still really capable, really lifelessly, and are still engaging their jehad.

3. What does Howard see to be indexs of success in battling today ‘s terrorist act?

Pg 110?

4. Arquilla, et Al, have identified three doctrinal paradigms that are the footing for terrorist organisation end scene and defining. Those paradigms are The Coercive-Diplomacy Paradigm, The War Paradigm, and The New-World Paradigm. These general paradigms go exponentially more critical when they apply to arms of mass devastation ( WMD ) .

The Coercive-Diplomacy Paradigm could be considered the “ authoritative ” terrorist modus operandi. They desired a authorities to make certain things, or let go of certain “ political captives ” in return for non go oning their panic run. While this is still a MO it seems to hold taken a back place to the War Paradigm. WMD would be utile to a terrorist organisation under this paradigm, nevertheless the hazard versus wages of utilizing WMD as opposed to other tactics might forestall their usage.

The War Paradigm is the MO most frequently seen today. Al Qaeda is the theoretical account by which most other groups are gauged, and truly so as they can mostly be considered the accelerator for the huge bulk over the past 10 plus old ages. The War Paradigm takes up where the Coercive-Diplomacy Paradigm lets off. Using terrorist tactics to contend a larger ( or stronger ) antagonist when simple coercion is non the coveted terminal province, but instead devastation of their enemy ‘s equipment, forces and morale. Under the War Paradigm it would be imaginable for terrorist organisations to utilize WMD to destruct equipment, forces and morale at comparatively low cost.

The last of the paradigms they detail is New-World Paradigm. This is where the possible usage of WMD has the most relevancy. Islam preaches the demand for a pure Muslim universe ; A universe free of Christians, Jews, and all other non-believers, or heathens. The possible loss of life after WMD onslaughts particularly if they were good coordinated and broad spread would be lay waste toing. The period after the onslaughts would let Al Qaeda the coveted chance to reconstruct the “ pure ” Muslim universe.

5. Harmonizing to Gabriel Weimann ‘s well-known work for the US Institute of Peace entitled www.terrorism.com: How Modern Terrorism Uses the Internet ( 2004 ) , enrolling is non the lone thing terrorists are utilizing the cyberspace for these yearss. Weimann reports that there are eight distinguishable ways in which modern-day terrorists use the Internet. He lists them as Psychological Warfare, Publicity and Propaganda, Data Mining, Fundraising, Recruitment and Mobilization, Networking, Sharing Information, and Planning and Coordination.

Psychological warfare is non ever every bit open as blasting Wagner ‘s Ride of the Valkyries like the scene in Apocalypse Now. It could be touting about past onslaughts, or even “ disinformation ” where it is let faux pas about the following pending onslaught. Anything that causes the populace to fear, or change their lives One first-class illustration of the usage of the cyberspace for psychological warfare would be the broadcast medium of decapitations including that of American journalist Daniel Pearl. Publicity and propaganda are besides closely related to psychological warfare and would include the broadcast medium of bin Laden ‘s messages, or claiming duty of onslaughts. With the cyberspace available 24 hours a twenty-four hours and bing really small it is a really popular beginning of terrorist promotion and propaganda attempts.

Fund-raising ( every bit good as about instantaneous fund transportations ) are now possible from the comfort of place. While there are still non electronic agencies of fund-raising such as false charities, organized offense, drugs, etc, the hazard versus wages of utilizing the cyberspace to raise financess it makes sense why terrorists would take this method.

Recruitment and Mobilization and Networking are besides enhanced greatly by the cyberspace. The cyberspace has enabled terrorist organisations to move in a decentralised manner ne’er experience before the World Wide Web. By leting different cells to stay widely separated and still pass on rapidly and organize efficaciously, the cyberspace enhances terrorists ‘ capablenesss to heighten their rank, and their organisation construction with comparative safety and minimum hazard.

Data Mining is best summed up as looking for information about marks. The US Military has a plan called Operational Security, OPSEC for short. It was found that by garnering all the unclassified information signifier certain Department of Defense web sites, it was possible to set together operational agendas ( when and where a unit would be deploying ) , rolls, and even some eventuality programs. All of this was pieced together from informations excavation of apparently harmless unclassified information. Likewise the sharing of that information gathered is in most instances instantaneous

Planing and Coordination by terrorist may possibly be the one usage that has the most deathly potency. Due to the universe broad coverage of the cyberspace, it is possible for geographically detached terrorists, even those of differing political orientations, to be connected via any one of the 1000s of “ Jihadist ” web sites. This allows them to portion information, thoughts, or even help in transporting out onslaughts that may hold antecedently been un-executable. Even with minimum preparation, they might easy happen the direction on how to build explosive devices or addition penetration into doing their ain run more effectual.

Undoubtedly, the terrorist organisations have become more technological than their predecessors. With the rise of the cyberspace and assorted societal networking sites such as Face Book and My Space, it was merely a affair of clip before panic groups would plunge into these emerging pools of engineering and possible campaigners to foster their groups cause and streamline their organisations.