• Home
  • Blog
  • Strayer University Business US Counterterrorism Course Summary Discussion

Strayer University Business US Counterterrorism Course Summary Discussion

0 comments

Note: There are 2 parts

Part 1

U.S. counterterrorism (CT) strategy is not predicated on technology solutions. The ultimate goal of U.S. CT strategy is to eliminate the root motivations for terrorism. Post your answers to the following questions:

  • Identify what you think are at least 3 root causes of terrorism.
  • Can these root causes be eliminated? Why or why not?
  • Do you think technology should play a lesser or greater role in U.S. CT strategy? Explain your reasoning.

Part 2

Review and reflect on the knowledge that you gained during the course, and provide a summary. Post your answers to the following questions:

  • How did this course affect your views on technology?
  • Do you feel more or less optimistic about your personal security?
  • How will the knowledge gained affect your personal behavior?

Responses to Other Students: Respond to at least 2 of your fellow classmates with at least a 100-word reply about their Primary Task Response regarding items you found to be compelling and enlightening. To help you with your discussion, please consider the following questions:

  • What did you learn from your classmate’s posting?
  • What additional questions do you have after reading the posting?
  • What clarification do you need regarding the posting?
  • What differences or similarities do you see between your posting and other classmates’ postings?
  •  MY PEER  CLASS MATEPart1:
  • I think some of the root causes of terrorism are political factors, poverty, power, and control. Political factors to me is a main reason because The United States and other countries have differences about how they run their country, the way they run their country, and their views of the way things should be organized within their country. According to the Borgen Project website ” Iraq, India, Pakistan, Afghanistan and Nigeria are in the top10 most dangerous countries, and they continually experience poverty.”  Iraq, India, Pakistan, Afghanistan and Nigeria also feels like The United States are privileged which I feel like is the reason why they want to power and control over the United States to get what they want from them, to take over the U.S., and to defeat the U.S. That is where the hijacking planes, bombings, hacking The United States data, and wars comes from. To me in my personal opinion I do not think these root causes can be eliminated because this is over years and years feud and problems that has never been able to be solved between The Untied States and them. These particular foreign countries raise their kids and the kids that they have with hate and to take their place or join them to finish out or carry out what they did not and continue the ongoing feud. They also teach them to be loyal to them, their nation, and to the cause because they really believe that The united States is their natural born enemy so I do not believe it can be eliminated it would be nice but I do not think it will ever happen though. I think technology should play a greater role in the United Stated CT Strategy because it helps protect citizens to safely travel when their trading and doing business with foreign businesses which helps keep our country with money flowing in to make sure we do not end up in poverty. Part2This course helped me realized how much I depend on technology today then I did when I was younger. When I was younger I played outside, made up games without the use o technology, played with toys, played with board games, and had a house phone (which i do not have in 2021). Today I watch television all the time, I use my cellphones to play games on my phone, I check the weather and news on my phone, and I use the internet to help me research stuff when I use to have to use the textbook to find my answers. I do feel less optimistic about my personal security and privacy because everything is saved on phones and into computers and once something is out on the internet it is forever out there which makes me be every careful with everything I share on social media. The knowledge I gained helped me get in touch with the way I did things before technology was apart of my everyday life. I think I will start to have a game night with my family and out all technology away and play good ole fashion boards games and actually talk and enjoy each other company. I think technology made me forget how much spending quality time without technology is important. I loved this course it really helped me reevaluate how much I do not need technology for everything. 
  • Peer 2:
  • Part #1 A study by the University of Alabama states that the most common root cause of terrorism is due to “social identity theory”. This theory says, “a person is more likely to commit violence against out-groups when they are part of a large group that feels threatened by other larger groups.” The study goes on to say, “This process can create intergroup hostility because the in-group will see the other group as being different”. Another main cause of terrorism is culture (Brooks, 1986). For example, the Middle East has a different culture than Western countries and this makes it hard for people to understand each other. America is less likely to understand why certain things are done in the Middle East because of their cultural difference. The third main factor that causes terrorism is religious factors. Many people find it difficult to live with people of different religious beliefs.I think it is impossible to eliminate these root causes. For instance, sectarianism as a religious factor has been a leading cause of conflict in societies throughout history. Eliminating this religious cause of conflict among people would mean eliminating the various religious affiliations. Unfortunately, it is impossible to eliminate religion. Therefore, it is impossible to eliminate these root causes.I think that technology should play a lesser role in U.S. CT strategy than it does now because the current level of involvement is leading to unintended consequences and these could undermine our long-term goals if left unaddressed. First, the positives: I do believe high-tech tools can be used to aid CT efforts under certain circumstances. For example, the U.S. uses drones for surveillance of foreign targets with the knowledge that these images can be used to track patterns and activities meeting both intelligence and law enforcement needs. This information could also be helpful in planning missions; hence, technological advancement is beneficial for this purpose (Brooks, 1986). These tools are not without problems; they are criticized for being immoral because of high rates of collateral damage. These unmanned aerial vehicles are unmanned impersonal killing machines that do not allow operators to know whether they are aiming at the target. This lack of human concern has been linked to psychological problems for those who are remotely controlling these drones, particularly when missions fail.Part #2The conceptualization of the Department of Homeland Security Technological solutions triggers a mixed reaction towards technology in me. First, I appreciate that DHS deploys these tools to enhance national safety. I would encourage the use of such technology to ensure my safety as a citizen (Bureau of Alcohol, Tobacco, Firearms, and Explosives, n.d). On the contrary, I feel that collateral damage from technology solutions shows that these tools harbor considerable shortcomings. In this sense, I feel DHS should abandon some of its technologies.Despite the various concerns, I feel more optimistic about my security. The knowledge that DHS agencies can use various technologies to track most terrorists is encouraging. The rationale is that through technology solutions, DHS can thwart most terrorist activities before they occur. However, I do not feel completely safe due to some of the recognized flaws in these technology tools.The knowledge gained about DHS technology solutions will significantly affect my behavior. These insights have discouraged me from indulging in illegal practices since I am aware a DHS agency could be watching my actions through one of its innovations. Consequently, I strive to abide by the laws to avoid problems with law enforcement. In conclusion, technology solutions trigger mixed feelings. In some sense, these tools are desirable. On the other hand, they can be intrusive and destructive.

About the Author

Follow me


{"email":"Email address invalid","url":"Website address invalid","required":"Required field missing"}