Nobody downloaded yet

Haqqani Network - Research Paper Example

Comments (0) Cite this document
This lethal network has been fighting against the government of Afghanistan and US-led NATO-International Security Assitance Force (ISAF)…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER95% of users find it useful
Haqqani Network
Read TextPreview

Extract of sample "Haqqani Network"

Download file to see previous pages The Haqqani Network operates under the supervision of Maulvi Jalaluddin Haqqani, a highly dangerous fighter and anti-soviet resistance commander, and his son Sirajudin Haqqani, who now handles the important affairs of this enemy network. This group has been existing in Pakistan since Soviet era and is spread across Kabul (Clarke, R, 2011, p.105). The Haqqani Network is claimed to have been in alliance with many intelligence groups such as Central Intelligence Agency (CIA), Osama Bin Laden and Saudi Arabia’s Spy Service (Takashi, 2012, para.2).
The Haqqani Network runs under the leadership of Haqqani family. Jalaluddin Haqqani and his sons now lead this insurgent group. Acording to Mazzetti, Shane & Rubin (2011) the Haqqani family is the Sopranos of the Afghanistan war, a family that made out its earnings and rose from the bottom through exercise of all kinds of illegal activities like trafficking, kidnapping, extortion, and so forth (para. 1). That being said, they are also reported to acquire protection money from the American reconstruction funding that was particularly aimed at construction of schools and roads in Afghanistan. With increasing network horizon and an enormously vast web of connections, this group has many top-tier leaders that operate different parts of the group secretly. That being said, the pioneer of the group, Jalaluddin Haqqani is considered a chief figure in the leadership of this network. Jalaluddin acted as a mujahedin leader in his fight against Soviet forces where he received significant help from the ISI and CIA (Bowman, 2009, p.26). The leader himself focused more upon his hometown Zadran, which is a central territory that connects nine tribally linked districts at the border of Paktika, Khost and Paktia province. Since the leader Jalaluddin has turned old and weak due to illnesses, most of the network’s responsibilities and activities have been transferred upon ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Haqqani Network Research Paper Example | Topics and Well Written Essays - 2000 words”, n.d.)
Haqqani Network Research Paper Example | Topics and Well Written Essays - 2000 words. Retrieved from
(Haqqani Network Research Paper Example | Topics and Well Written Essays - 2000 Words)
Haqqani Network Research Paper Example | Topics and Well Written Essays - 2000 Words.
“Haqqani Network Research Paper Example | Topics and Well Written Essays - 2000 Words”, n.d.
  • Cited: 1 times
Comments (0)
Click to create a comment or rate a document


Network Security

...?Introduction Although there are batch of definition available on the Internet related to security. The definition available on ‘’ covers the basics and states it as: “Prevention of and protection against assault, damage, fire, fraud, invasion of privacy, theft, unlawful entry, and other such occurrences caused by deliberate action”. In the context of network security definition, it consists of concerns linked to network communication privacy, confidentiality of data over the network, accessing unauthorised classified data, access to prohibited network domains and utilising Internet for concealed communication (Network Security. 2007). It is the twentieth century where improved communication technologies... are...
24 Pages(6000 words)Essay

Social network

...?Dangers in Social Networking Sites Social networking sites paved way in connecting individual with one another via the internet, making the collective connections a virtual community – thus the term “social network” indeed. The interesting nature of the social networking site is that it is able to provide the users the freedom to express themselves and this makes social network sites very addicting. Facebook, My Space, Friendster, Twitter are among of the popular social networking sites to date, with Facebook as the most famous with the list and followed by Twitter – also known as micro-blogging site. A report stated that there are some...
3 Pages(750 words)Research Paper

Network Security

...ID # Network Security Introduction During the last few decades several technologies have been emerged throughout the whole globe and networking technology is certainly the most amazing achievement in this era. Additionally, the innovations in computer and networking fields have open new ways for the businesses to boost their performance. New systems are being developed to effectively handle and administer corporate working and activities. However, security has become a complex assignment for current network administration. Normally, attackers enter into a network by making use of different tools and technologies. In this regard, network...
13 Pages(3250 words)Research Paper

Network Security

...the use of specialized input devices tailor-made specifically to capture the elite smartphone user (BlackBerry support 2009). Features such as the track pad and most recently, the touch screen give the blackberry devices a unique design and places it a par above its closest rivals in the market. The BlackBerry Network Architecture Network architecture is the layout that includes the hardware, software components, the means of data transfer, and the communication protocols governing data transfer. BlackBerry devices are not merely standalone devices; they are integrated into a complex network that seeks to deliver remotely various services to users. This is convenient especially in an...
7 Pages(1750 words)Essay

Network Security

...? Case Study on Network Security Bryant Wiersema American Public Case Study on Network Security Introduction The Internet has become a staple of the business world today. It is because of this that a company should remain continually up to date with the latest and most efficient security measures. With the dramatic growth in network reliance also comes the opportunity for illegal and malicious activity. One of the major computing challenges in today’s economy is the task of adequately securing a network - ensuring sensitive data is not compromised. Vulnerabilities due to designs flaws, poor security management, incorrect implementation, and malicious intent can all...
3 Pages(750 words)Case Study

Network Design

...?SHFL ENTERTAINMENT LOCAL AREA NETWORK Design of the SMHL Network FIIRST FLOOR WAREHOUSE Warehouse offices RND compliance Sales and operations Showroom Figure 1: Design of SHFL Network Overview The network configuration has a reasonable design and pricing that satisfies most of the requirements of SHFL. It improves the efficiency of work and thus supports the businesses and all possible functions at SHFL Entertainment. It uses star network topology and its network cables are fiber optics as well as unshielded twisted pair network cabling. It recommends 5 APs (access points) to be able to generate and support wireless...
4 Pages(1000 words)Essay

3G Network the International Telecommunication Union or ITU. The standards for 3G are specifically known as the IMT-2000. This stands for International Mobile Telecommunications system finalized in the year 2000. After this establishment, the development of physical equipments may then proceed. In May of 2001, the first pre-commercial 3G network was launched in Japan branded FOMA. The company responsible for this is NTT DoCoMo. This same company then launched the first commercial 3G in Japan on October of the same year. Korea and Europe then followed. (Wikipedia) Mobile phones were originally just for voice data transmissions, much like its land line forefathers. This was considered the second generation or 2G. But with the...
7 Pages(1750 words)Essay

Network Technology and Network Administration

...--------------------------- --------------------------- --------------------------- --------------------------- Network Technology and Network Administration Introduction Computers and the Internet are a wonderful addition to our lives. In today's computer world almost every person is connected to computer and internet in a way or other. A person spends a large portion of his life, interacting and collaborating with people all over the world, through the use of and Internet. But that does not mean that every user know every thing about computer and internet. It can be generalized that about 80% of the knowledge is concentrated in about 20% of the people, while the other 80% of the people possess only...
5 Pages(1250 words)Essay


...ETHERNET/ 802.3 Table of Contents Introduction 2.Basic Design Issues of an Ethernet network 1 Using Hubs/Repeaters 1.2. Hubs/Repeaters Limitations 1 1.3. Using Bridges/Switches 3 1.4. Basic Bridges/Switches Operations 4 1.5. Using Routers 6 3. References 7 Technick n.d. Ethernet Tutorial Part I: Networking Basics, viewed 23 May 2011, 7 List of Figures Figure 1 Repeater and Hub with different topologies 2 Figure 2 Basic Switch Setup 3 Figure 3 Loop Removal Through STP 6 Figure 4 Typical Router Configuration 7 List of Tables Table 1 Node Limitation in Hubs 5 Till present, Ethernet maintains its position of being the most...
4 Pages(1000 words)Essay


...Network International Company profile Network international is an independent card solution involved in payment services and providing solutions in the Gulf and Middle East region. It has pledged to fulfill the needs of institutions dealing with finance, corporate business and retailers (Network International). Network international gives a variety of services such as credit and debit card payment. According to Jim Randel, credit cards are used to borrow money from banks, which is a loan without collateral. A debit card is used to access a customer’s own money, which is backed by his or her own account. Outsourcing is important to keep up with the competition in the...
2 Pages(500 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Research Paper on topic Haqqani Network for FREE!

Contact Us