"This post is written by Prabhu Manickam to understand how the Stealth Technology is used." Picture1 Osama Bin Laden BIO DATA : NAME: Osama bin Laden D.O.B: March 10, 1957 FOUNDED: Al-Qaeda ATTACK: 1 World Trade Center (the North Tower) and 2 World Trade Center (the South Tower), known collectively as the Twin Towers in September 11, 2001.
The arrest of Richard Colvin Reid on December, 22nd, 2001 by U.S. federal Authorities defines the ideological context in which a terrorist can be defined as a covert military agent for Al Qaeda. Cowell’s (2001) article defines evidence of the arrest of Reid as a” man accused of trying to ignite explosives-packed sneakers on American Airlines flight 63 from Paris to Miami” (para.2). This unusual method in the weaponization of Reid’s shoes provides important insight into the covert style of warfare being used by a terrorist. In contrast to outward methods of warfare in the use of a gun, or other standard weapon of war, Reid chose to use a “shoe-bomb” in order to destroy a civilian passenger plane. In this manner, Reid had used a covert weapons through the guidance of a terrorist network, such as Al Qaeda, to plan a suicide bombing to destroy the lives of American citizens and an American commercial airliner.
In the fall of 2010,Osama Bin Laden was captured and killed by American soldiers. It was quickly assumed that the Pakistani goverment helped with this mission but the Americans made it clear that they completed this task alone and with their intelliengence and stratgic ways were able to follow one of his couriers,who wife was from Swat. The killing of Osama Bin Laden was a major event for American history. Finally the man who murdered thousands of Americans in 9/11 was punished. After Bin Laden’s death, Pakistan intelligence was questioned.
On July 27, 1996, in Atlanta, Georgia a bomb was detonated at the 1996 Atlanta Olympics. One person was killed from the blast, and nearly 100 people were injured. However, the blast was believed to have had the ability to kill many more if it was not for one man. Richard Jewell was a former deputy sheriff and security guard for a college. Jewell was working a temporary job as a security guard at the 1996 Atlanta Olympics when he found a suspicious backpack (Sack, 2013).
Title: Surveillance and the Killing of Osama Bin Laden Thesis: Despite all efforts to live off the grid and leave no electronic trace behind, Osama Bin Laden, the most wanted terrorist on the planet, was located and assassinated at the hands of U.S. Navy Seals. Controversial Technologies played a crucial role in bringing justice to the most wanted terrorist in U.S. history. I. Osama Bin Laden was the founder of Al-Qaeda, the organization that is responsible for the September 11 attacks on the United States, along with other terrorist attacks against civilian and military targets directed to send a message to the U.S. and anyone else that disagreed with Al-Qaeda through any means necessary. A. Osama Bin Laden was born in 1957 to a wealthy
The understanding of the Terrorist Theory and biological/psychological contributing factors is essential in understanding the Politically driven motive of Rudolph’s lone-wolf attacks. As stated above, Rudolph viewed the government as hypocritical and immoral in its’ approach and handling of such issues as abortion. As a trained military member Rudolph saw himself as a protector of liberties and basic rights. Yet, those very liberties and rights he fought for were not afforded to the most pure of those it is sworn to protect the “unborn.”
This book “Inside Al Qaeda- Global network of Terror” depicts the rise of “Al Qaeda”, the extreme terrorist organization, as well as its influence on the modern world by the foremost leader- Osama bin Laden. Rohan Gunaratna, the author of the book, used comprehensive and knowledgeable approach to study this notorious multinational organization. His works almost involved in armed conflict. In this book, he specified how Osama bin Laden influenced by Azzam, his abecedarian, to join the jihad and why he formed this organization in the boundary between the Pakistan and Afghanistan, as well as what his ultimate purpose is.
In the article titled “Journey from Class Clown to Suspect in Chelsea Bombing”, the authors explain the life and the circumstances that led Ahmad Rahami to become involved in the recent bombings that occurred in Manhattan and along the Jersey shore on September 17. In the article, the author’s intent is to provide some background on the life of the perpetrator of the bombings that occurred in New Jersey and New York. The authors of this article wanted to give the readers of the New York Times some insight and information on the Ahmad Rahami’s life. All three elements , appeal to authority, appeal to emotions, and providing evidence are used in the article called “Journey from Class Clown to Suspect in Chelsea Bombing”, in order to inform and teach the reader regarding the Chelsea bomber’s life. One main writing elements used in this article is appeal to emotions.
These missed chances allowed Abu Musab al-Zarqawi’s terrorist activities to continue persistently. The three basic components of the military Counterintelligence analysis available namely, C-HUMINT, C-SIGINT and C-IMINT would have been used and exploited to the fullest. [Imbus, (2002)]. Step 1: Determining Terrorist
Osama Bin Laden (OBL), an arch-terrorist and founder of the Al-Qaeda, was assassinated on May, 2011 in a covert US operation (Kitfield, 2013). By the time of his death, Osama had been linked to several terrorist activities including the September, 11 attacks that killed nearly 3000 people (Michaels, 2012). It was hoped that his death would dismantle or cripple the Al-Qaeda, a terrorist network formed and led by OBL. Three years down the line it is still not clear whether OBL’s death crippled, dismantled or strengthened the terror network. This essay intends to discuss the discourse and assessments that have evolved three years after his death to explain its impact on Al-Qaeda.
The Oklahoma City bombing investigation conducted by the FBI was one of the most extensive investigations ever performed by the agency, ultimately leading to the conviction and execution of Timothy McVeigh (FBI, n.d.). Eventually, at the completion of the investigation the FBI conducted over 28,000 interviews, followed some 43,000 investigative leads, and collected three-and-a-half tons of evidence, and reviewed nearly a billion pieces of information (FBI, n.d.). Consequently, one of the most incriminating pieces of evidence recovered from the ruble was the rear axle of the Ryder truck used to transport the explosives to the Alfred P. Murrah Federal Building (FBI, n.d.). Subsequently, the Ryder truck’s rear axle possessed a vehicle identification
Since 9/11, intelligence and security services have become particularly concerned about radical ideologies and have looked for ways on how to counter them. One of the strategies has been to develop a counter-narrative. Some authors, including those of this article, are concerned that, in the marketplace of ideas, the West is losing market-share.[1] Communication failures with the Muslim world were cited in a report by a U.S. Department of Defence Advisory Committee as early as 2004.[2] The puzzle this article explores is why, having recognized the problem early on, the data suggest that further ground has since been lost.
Successful international counter-terrorism efforts against terrorist organization like al-Qaeda have inflicted heavy casualties and decimated much of their senior leadership over the last decade (Sageman, 2008, p. 131). These efforts have forced many terrorist organizations to adopt a highly decentralized cellular model in order to survive. Starting in the mid 2000’s, al-Qaeda began to adopt this new concept of unorganized terrorist cells and leaderless jihad (also known as the lone wolf concept) (Spaaij, 2012, p. 26). This concept was further refined and formalized in a 1,604 page book written by Mustafa Setmariam Nasar, a high ranking al-Qaeda operative at the time, titled Call to Global Islamic Resistance which can be found in PDF format on many radical Islamists websites (Zackie, 2013, p. 1). This new strategy endorses smaller scale, less complicated attacks which are well suited for the lone wolf concept (Barnes, 2012, p. 1649).
US officials responsible for the CIA drone campaign, have committed war crimes and should stand trial, according to Jon Boone. To back up the accusations towards the officials, he explains that nine of many attacks are being investigated, one being the missile strike that ended the lives of eighteen laborers who had just gotten done picking scrap metal, and were waiting to eat in an area with a heavy concentration of Taliban. Another controversial strike that Boone explains was the case of a sixty-eight year old woman named Mamana Babi, who was picking okra with her grandchildren outside her home when a missile soared from the sky and struck her, killing her instantly; minutes later a second strike injured her family members who aided her. This strike shows how the accusations towards the CIA about double striking are indeed true. Also two al-Qaeda suspects were successfully killed in a strike on a truck, according to Boone, only thing was that there was 4 deaths instead of only the 2 that were planned.
Their deaths are a statement, then, as much as they are the final act of one’s faith; and as a statement they have been quite effective. They propagate future deaths, as terrorist organizers use a bomber’s martyrdom as propaganda for still more suicide terrorism.” The damage inflicted by suicide bombings is both physical and psychological, and to inflict maximum damage the bombers rely heavily on the element of surprise. Surprise is generated by turning the everyday into a weapon. For instance, suicide bombers often wear their explosives underneath their clothing, carry them in backpacks, or even hide them in bicycle