Anlytic Approaches

Read Complete Research Material

ANLYTIC APPROACHES

Analytic Approaches in Jihad

Analytic Approaches of Jihad

Introduction

9/11 came as a shock to the people of United States because it was considered a failure of intelligence as nothing could be done to prevent or forestall the attacks on Twin Towers. However, there are different levels of intelligence available. Some intelligence reports just allude to the dangers ahead but are not conclusive enough to take actions. On a tactical level the intelligence was totally ineffective in case of 9/11 but as investigations. The event of September 11 has turned the world upside down and the way in which policies used to be devised in Pentagon. That event not only changed the Whitehouse decision making and policy devising process but it also caused a great impact on other side of the world that is the world of Arabs and Islamists. The phenomenon of jihad became more common and Muslims became to use this factor in an unsuitable way. This also increases the terror and possibilities of more future attacks. In order to address this issue it is important to analyze the phenomenon of jihad from variegated aspects. For that purpose scholars and researchers use different approaches. The aim and objective of this paper is to talk about the jihad from different analytic approaches.

Three Different Analytical Approaches

In this paper, the phenomenon of jihad is explored from the perspective of three different analytic approaches. These three different approaches are systematic approach, investigative approach and intelligence approach.

Systematic Approach

The use of technology by the United States in intelligence is also crucial. US also have an edge over other countries in terms of use of different technologies. Though US maintains liaison relationships with other countries in the developed world but stops short of disclosing the methods of information gathering or providing information that might abrogate current advantages in technology. Now modern and high tech gadgets are being used to protect the citizens from any unforeseen violent jihadists act. These gadgets are meant to detect any weapons or other terror tool but at the same time they give out personal information belonging to people. Jihadist today not just hijacks planes but they also hijack or hack the websites. They retaliate using computer viruses, "worms" and "logic bombs" that can destroy hard drives. They can use radio signal and computers to explode a bomb anywhere in the world because cyberspace has virtually shrunk the borders. Computer viruses are another way to target government, business or private parties. Besides, availability of fast emails and direct video or audio connectivity through computers has also helped terrorist networks in spreading fear and panic. Different websites propagate the agenda of different terrorist organizations. In today's world with the help of technological advent and internet terrorist groups and jihadist can get important intelligence information. Moreover this also allows them to easily operate and conduct various activities all over the globe. According to research terrorists and violent jihadists, with the help of the usage of internet get their control, command and conduct the communication process ...
Related Ads