case study 2 domestic terrorist attacks due week 8 and worth 75 points the united states has experienced several domestic terrorist attacks in the last few decades use the internet and strayer databases located at https research strayer edu to res

  • Case Study 2: Domestic Terrorist AttacksDue Week 8 and worth 75 pointsThe United States has experienced several domestic terrorist attacks in the last few decades. Use the Internet and Strayer databases (located at https://research.strayer.edu) to research one of the following domestic terrorist attacks:

    Write a 2-4-page paper in which you:

    1. Describe the persons or groups responsible for the attack.
    2. Assess the validity of the motivations/beliefs of the persons or groups responsible for the chosen attack. Indicate both the stated motivations/beliefs of the perpetrators and the statements about the motivations/beliefs of the perpetrators made by law enforcement or government sources.
    3. Describe any known planning for the attack, such as gathering supplies, surveillance of the target, or any outside support/assistance.
    4. Examine the planning activities of the persons or groups responsible for the chosen attack, and determine whether or not law enforcement should or could have been identified and prevented the activities in question.
    5. Summarize the actual attack. Assess the degree to which the attack achieved the intended goals of the perpetrators.
    6. Examine the repercussions of the attack, and identify whether or not any security/legislative changes were enacted as a result of the attack. Evaluate the effectiveness of the security/legislative changes that were made in attempts to prevent future attacks. If no security/legislative changes were enacted as a result of the attack, suggest at least three changes that should be made and provide a rationale for your response.
    7. Summarize the lessons that could be learned from the attack.
    8. Use at least three quality resources in this assignment. Note: Wikipedia and similar websites do not qualify as quality resources.

    Your assignment must follow these formatting requirements:

    • This course requires use of new Strayer Writing Standards (SWS). The format is different than that for other Strayer University courses. Please take a moment to review the SWS documentation for details.
    • Be typed, double-spaced, using Times New Roman font (size 12), with 1-inch margins on all sides; citations and references must follow SWS or school-specific format. Check with your professor for any additional instructions.
    • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

    The specific course learning outcome associated with this assignment is as follows:

    • Analyze terrorist network operations and motivations to examine terrorist attacks and threats.

    Grading for this assignment will be based on answer quality, logic / organization of the paper, and language and writing skills, using the following rubric found here.

  • By submitting this paper, you agree: (1) that you are submitting your paper to be used and stored as part of the SafeAssignâ„¢ services in accordance with the Blackboard Privacy Policy; (2) that your institution may use your paper in accordance with your institution’s policies; and (3) that your use of SafeAssign will be without recourse against Blackboard Inc. and its affiliates.