Discuss the below:
Response below in a 350 words each:
Terrorist leaders and "managers," just like legitimate organizational leaders and managers face operational problems, plus some very special problems.
1. What are these operational "problems"? Which of these vulnerabilities can be exploited by counter-terrorism efforts? How would you allocate resources (law enforcement, intelligence, etc) at the local, state, or national level (your choice) to exploit these vulnerabilities?
2. Discuss how various forms of media can be and are used as a weapon by terrorist groups, including a description of the contagion effect. Include discussions on ideological dissemination, recruitment, retention, financial networking, etc. Be specific. Use case study examples.
Assess pros and cons, strengths, and weaknesses. Are these terrorist tactics effective? Can the U.S. defend itself against this non-traditional security threat? Can this terrorism trend even be considered a security threat in the eyes of the U.S.?
Answer the questions below. Each answer must be double spaced in APA format and be more than 400 words in length using Arial 11 or Times New Roman 12 point font. One inch margins all the way around. Sources must be cited.
Q1. Describe the three models of terrorism and summarize each. Explain how they embody the philosophy behind particular types of terrorist movements.
Q2. Describe the effects of growing international media and the Internet on terrorism, and how the media can be used as a weapon for and against terrorism.