GHS/563 Funding Terrorism Worksheet.doc

University of Phoenix Material                                                                                                    
 

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Funding Terrorism Worksheet

 

Complete Parts I and II of this worksheet. 

 

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Part I

 

Watch the “Counterfeits: Funding Terrorism” video located on the student website.

 

Complete the table by including the following:

 

·        

Left column:
Identify
2 or
3
funding strategies used by terrorists
or terrorist organizations to fund their activities.

·         Middle column:
Identify the threat
the funding strategy
poses to
homeland
security and to legitimate businesses
.

·         Right column:
Identify strategies used in counterterrorism to combat
the funding strategy.

  

Using the stolen money is a means to fund terrorist activity within the American borders and businesses lose customers and may get a bad rep.Track terrorist activities though information sorting, coordinating intelligence, expanding surveillance/search tools and implementing interrogation techniques to gain more information.

Using the stolen money is a means to fund terrorist activity within the American borders and businesses lose customers and may get a bad rep.Track terrorist activities though information sorting, coordinating intelligence, expanding surveillance/search tools and implementing interrogation techniques to gain more information.

Funding Strategy

Threat

Counterterrorism Strategy

 

Cigarettes

Using the stolen money is a means to fund terrorist activity within the American borders and businesses lose customers and may get a bad rep.

Track terrorist activities though information sorting, coordinating intelligence, expanding surveillance/search tools and implementing interrogation techniques to gain more information.

 

Watches

 

Shoes

 

Part II

 

Write a 350- to 700-word summary, in the space below, about the funding and counterterrorism strategies listed in the table. Include the following in your summary:

 

·         Identify the threats
that
funding strategies pose to legitimate businesses
.

·         Describe counterterrorism actions taken that affect the terrorist funding strategy.

Still stressed from student homework?
Get quality assistance from academic writers!

Order your essay today and save 25% with the discount code LAVENDER