Download as pdf or txt
Download as pdf or txt
You are on page 1of 3

Sumner 1

Jared Sumner
University Writing 1103
Professor Raymond

i=r:

of Terrorist Groups." Terrorism-Research.com.

Terrorism-Research.com.

Web. 1

Nov. 2014.
j'categOries

of Terroris~~')'

This website source has information about different categories of terrorist groups. It talks

jbout

nine different categories. I will use this source when talking about the diverse terrorist

groups. One limitation of the source is that it does not go into extreme detail about the different
types. This is a strong source because it has good useful information.
/rhiS

source will be used to get information on different types of terrorist groups.

)"Counter-Terrorism."

Hltp:llglobalfocus.org.

Web. 1 Nov. 2014

/counter-TerrOrism")
This website source has information on the topic of counter terrorism. This source is used
~ain

information on policies and tactics that the United States uses. This is a good strong

/ source that has a lot of good information.


~s

\' 1'1'..~

'\
W\

source will be used to get information on counter terrorism.

Harding, David. "Strategies and Tactics to Counter Terrorist Attacks." Securitymanagement.com.


/

ASIS International, Inc, 1 Jan. 2014. Web. 1 Nov. 2014.

II

Sumner 2
~arding,

David)
This website source is on the topic of counter terrorism. It focuses on reconnaissance and

jrobing.

It talks about how terrorist groups will use a preliminary attack to test their enemy. This

source is used to find information on counter terrorism. This source is relatively strong with an
author but is just a short article.

I will use this source for some of the tactics that are in it. This source has different

information than my other counter terrorism source and I will be able to expand on that area
well.

himeline

of Terrorism." Timelineofterrorism.com.

Certified in Homeland Security. Web. 1 Nov.

2014.
) ("Timeline of Terrorism")

This website source is a timeline of terrorist acts throughout history. It goes all the way
back to 1700 BC and shows all ofthe major terrorist acts and groups. This source is mainly used
to understand how long terrorism has been around. It is a weak source but will work for what I
need it for.

\\ ",,\~\01\'" ') '\

I will use this source to show how long terrorism has been around.
"A History of Terrorism on U.S. Soil." Http://prospect.org.

)
Web. 1 Nov. 2014

\\

("A History of_")

The American Prospect, 1 Jan. 2014.

Sumner 3
This website source is a time1ine of terrorist attacks on United States soil. The use ofthis
ource is for dates of terrorist attacks. This source is not very strong and does not have a lot of
information.

'\\ I"'-i.~\-\~'"'\

) I probably will not use this source because it does not have a lot of information.

Weimann, Gabriel. "Cyberterrorism How Real Is the Threat?" Usip.org. United States Institute
of Peace, 1 Dec. 2004. Web. 1 Nov. 2014.

This website source is a report on cyber terrorism. It talks about if it is a credible threat to
.:

country or not. The use of this source is to inform people on cyber terrorism. It is a strong
source with a lot of information.

~e

/'International

\-\

1'1' ~ ~

\-.

'"

"\,

this source to gain information about cyber terrorism.

Elite Counter-Terrorism

Units." Worldissues.weebly.com.

Web. 1 Nov. 2014.

("International Elite Counter- Terrorism ~")

his website source is about different counter terrorism units. It talks about the different
units

the military and weapons used. This source is used to inform people on counter terrorism

units. It is not a very strong source and does not have a lot of information.

will use this source to get the different counter terrorism units.

\>~\-~\-',"I\

You might also like