Unit 7 [140: Introduction to Management]
Page 1 of 2
Assignment Details and Rubric
This week's Assignment consists of reading a scenario about Sandwich Blitz, Inc. and writing about
how self-managed teams could be used at Sandwich Blitz to allow Dalman more time to devote to
growing the business.
Lately, Dalman has mostly been visiting the operating locations and addressing manager operations
concerns. Lei has concentrated on financial matters. Both Dalman and Lei are pleased with Sandwich
Blitz’s past performance but feel that they are each unable to devote their time and energy to take the
business to the next level. All of their time seems to be spent addressing small problems within the
existing operation. Dalman has heard that other businesses have successfully used a team approach
to managing with good results and wonders if this could help him as well as the location managers.
After reading the scenario above, the section on “Self-managed Teams” in your assigned textbook
readings and completing the practice Learning Activities, type a paper in which you explain the
difference between traditional and team work environments, how self-managed teams could be
successfully implemented at Sandwich Blitz, and how these teams could contribute to Sandwich
Blitz’s success.
This Assignment addresses the following unit outcomes:
● Distinguish between traditional versus team environments.
● Describe how teams contribute to an organization’s effectiveness.
● Explain how an effective team is built.
Submission Instructions:
Draft your Assignment paper at least 2 full double-spaced pages in length, using size 12 point font in
MS Word format. Be sure your paper is well written in paragraph form, with correct spelling, grammar,
and punctuation. Be sure to name your file according to the Kaplan file-naming convention. You may
use external sources in addition to the required unit readings. Cite any external sources used.
Unit 7 [140: Introduction to Management]
Page 2 of 2
Submit as an attachment to the Unit 7 Assignment Dropbox for grading before the close of the unit.
AB140 Unit 7 Grading Rubric Percentage Possible
Points
Content, Focus, Use of Text and
Research:Explain the difference
between traditional and team work
environments, how self-managed teams
could be successfully implemented at
Sandwich Blitz, and how these teams
could contribute to Sandwich Blitz’s
success.
50% 20
Analysis and Critical Thinking:
Responses demonstrated critical thinking
and analysis and exhibited application of
information.
30% 12
Spelling, Grammar, and Format:
Clear business writing. Spelling and
grammar are acceptable.
Formatting follows instructions.
20% 8
Total 100% 40
Boko Haram, White Paper:
INTL 434 Threat Analysis
Dr. Joe DiRenzo
September 04, 2016
5
Located in northeast Nigeria, Boko Haram is an Islamic terrorist group that has primarily foc ...
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
Unit 7 [140 Introduction to Management] Page 1 of 2 .docx
1. Unit 7 [140: Introduction to Management]
Page 1 of 2
Assignment Details and Rubric
This week's Assignment consists of reading a scenario about
Sandwich Blitz, Inc. and writing about
how self-managed teams could be used at Sandwich Blitz to
allow Dalman more time to devote to
growing the business.
Lately, Dalman has mostly been visiting the operating locations
and addressing manager operations
concerns. Lei has concentrated on financial matters. Both
Dalman and Lei are pleased with Sandwich
Blitz’s past performance but feel that they are each unable to
devote their time and energy to take the
business to the next level. All of their time seems to be spent
addressing small problems within the
existing operation. Dalman has heard that other businesses have
successfully used a team approach
to managing with good results and wonders if this could help
him as well as the location managers.
After reading the scenario above, the section on “Self-managed
Teams” in your assigned textbook
2. readings and completing the practice Learning Activities, type a
paper in which you explain the
difference between traditional and team work environments,
how self-managed teams could be
successfully implemented at Sandwich Blitz, and how these
teams could contribute to Sandwich
Blitz’s success.
This Assignment addresses the following unit outcomes:
● Distinguish between traditional versus team environments.
● Describe how teams contribute to an organization’s
effectiveness.
● Explain how an effective team is built.
Submission Instructions:
Draft your Assignment paper at least 2 full double-spaced pages
in length, using size 12 point font in
MS Word format. Be sure your paper is well written in
paragraph form, with correct spelling, grammar,
and punctuation. Be sure to name your file according to the
Kaplan file-naming convention. You may
use external sources in addition to the required unit readings.
Cite any external sources used.
Unit 7 [140: Introduction to Management]
3. Page 2 of 2
Submit as an attachment to the Unit 7 Assignment Dropbox for
grading before the close of the unit.
AB140 Unit 7 Grading Rubric Percentage Possible
Points
Content, Focus, Use of Text and
Research:Explain the difference
between traditional and team work
environments, how self-managed teams
could be successfully implemented at
Sandwich Blitz, and how these teams
could contribute to Sandwich Blitz’s
success.
50% 20
Analysis and Critical Thinking:
Responses demonstrated critical thinking
and analysis and exhibited application of
information.
30% 12
Spelling, Grammar, and Format:
Clear business writing. Spelling and
grammar are acceptable.
5. Located in northeast Nigeria, Boko Haram is an Islamic terrorist
group that has primarily focused on battling the Nigerian
government. During the year 2002 was when the group was
founded, since then they have been responsible for over five-
thousand murders to date. In addition to the acts of murder that
the group has committed, they have been responsible for the
displacement of close to two million citizens of Nigeria. Both
of these facts propel Boko Haram into the top list of terrorist
organizations in operation today as far as organization and sheer
brutalization. Much support has been given to the Nigerian
government in their fight against the organization, but the
citizens of Nigeria has been outspoken in their accusations that
the government has not been doing enough to combat the threat
(O.A, 2014).
Founded by Mohammed Yusuf, the organization began to
support poor Muslim Families. Their complex was located in
the capital of Borno. Denouncing the “Westernization” of
Nigerian culture and society, he routinely spoke out against the
Nigerian government and the path that Nigeria’s society was
following. There were significant differences in wealth due to
the influx of western policies. Many of the young Nigerian
citizens who were unable to find employment and wealth were
quickly attracted to the cause and rhetoric that Yusuf was
professing. The division of wealth not only lead the rallying
cries of the group, but the division of Christians into the
commonly Muslim society was a stark difference that the group
was able to capitalize on. Both of these differences gave the
group the cause and reason to support their cause and gain a
solid foothold in the Nigerian country.
From the outset, the group was a peaceful movement that found
acceptance in society and the Nigerian government. The focus
that Boko Haram practiced was called al-amr bi-l-ma`ruf was-l-
nahy `an al-munkar, which translated means; enjoining the good
and forbidding the evil (Cook, 2011). Aligning many of the
practices of the group such as rejection of drugs and alcohol,
6. many followers of Islam found it easy to fall into the same
beliefs and join the group thus swelling the members. As the
group grew the creation of a militant section took place. With
the group growing through the introduction of many Islamic
practitioners, the primary motivation of the group was and is
still the issues of government neglect and the inequalities
between the poor and the wealthy in the country.
The beginnings of Boko Haram’s terrorist activities against the
military and police began during the year of 2004 in Nigeria and
is considered the transition from non-violent to a violent group
(Cook, 2011). After the attacks had begun, many of the
members of Boko Haram were arrested and discovered to be
armed with bomb-making items and heavy weapons. Due to the
arrests there began a period of riots within the Nigeria country
to retaliate against the police including attacking the actual
police stations. In an attempt to suppress the control that Boko
Haram had demonstrated through the riots, the Nigerian
government attacked the headquarters of the group in the largest
use of force the country had ever seen displayed against
terrorists. Over seven-hundred members of Boko Haram were
killed during the assault on the headquarters including the
leader Mohammed Yusuf (Nossiter, 2009). This left control of
the Organization to Abubakar Shekau who was the second in
command of the organization.
The government of Nigeria believed that the threat of Boko
Haram had ended with the death of their leader. A year after
his death the group freed one-hundred and five members from a
prison. After releasing their members, they conducted a
purification agenda and murdered any member of the military or
police as well as any individual that did not share their
ideology. Their attacks remained constant for the next three
years targeting Nigerian government members and local
villages. The attacks spread out of the Nigerian state of Borno
forcing the other Nigerian states to declare a state of emergency
in the year 2013. This allowed the Nigerian military to expand
its attacks on the group; the group maintained control of
7. territory on the border of Cameroon; this allowed the group the
ability to fall back into the mountains of Cameroon and hide
from military air strikes.
Estimates have the group Boko Haram responsible for at least
ten-thousand people murdered across four states in Nigeria
since the demise of their founder. The funding that the group
receives is intricate and flows from several sources such as
groups with links to al-Qaeda. Many reports of black market
transactions and the mystery international benefactor are also
credited for their funding, but the act of Kidnapping is the most
recognized tool that the group uses to fund itself (McCoy,
2014).
Boko Haram has primarily functioned within the nation of
Nigeria, however with the United States and other countries
supporting efforts against the group with financial backing,
weapons, and training to the Nigerian government; the potential
for the group to strike against United States citizens and the
nation itself is high. Targets of opportunity could be diplomats
in the Nigerian State or neighboring countries. Boko Haram has
known financial links to the Al-Shabaab terrorist group. They
provide funding and training to the group in Somalia (Busari,
2016). Training on how to conduct suicide attacks and direction
on building various explosives is some of the training that the
group receives from Al Shabaab.
Within the past several years the Nigerian government has seen
some success in thwarting Boko Haram. The group has taken to
employing guerilla tactics as they conduct their operations from
the mountains. Some things that the country might be
successful in doing to better combat the group is to consider
some the complaints the group has concerning the methods by
which the country is run. Possibly demonstrating to the public
that the government is attempting to correct a perceived
problem would give them the sympathy over the group with the
citizens of the country.
.
8. Works Cited
Busari, S. "Boko Haram Training in Somalia: Security Chief
.com." CNN. Last modified February 25, 2016.
http://www.cnn.com/2016/02/25/africa/boko-haram-al-shabaab-
somalia/.
Cook, D. "Boko Haram: a new Islamic state in Nigeria." Last
modified 2014.
"The Economist Explains: Why Nigeria Has Not Yet Defeated
Boko Haram." The Economist. Last modified November 19,
2014. http://www.economist.com/blogs/economist-
explains/2014/11/economist-explains-10.
"Islamist Group With Possible Qaeda Links Upends Nigeria -
The New York Times." The New York Times - Breaking News,
World News & Multimedia. Last modified August 17, 2009.
http://www.nytimes.com/2011/08/18/world/africa/18nigeria.htm
l?_r=0.
Johnson, T. "Boko Haram Narrative." START.umd.edu. Last
modified April 13, 2011.
https://www.start.umd.edu/baad/narratives/boko-haram.
Logan, Keith Gregory. Homeland Security and Intelligence.
Westport, CT: Praeger Security International, 2010.
"This is How Boko Haram Funds Its Evil - The Washington
Post." Washington Post. Last modified June 6, 2014.
https://www.washingtonpost.com/news/morning-
mix/wp/2014/06/06/this-is-how-boko-haram-funds-its-evil/.
12
9. WHITE PAPER
MID-TERM ASSIGNMENT
APUS-AMU INTL 434 Threat Analysis
Dr. Christopher Merritt
November 15, 2016
Question 1: In what ways is a non-state actor different from a
nation-state? Please be specific and give examples of each to
support your argument.
State and non-state actors play a significant role in the
foreign policy and international relations of a country.
Understanding the differences between the two categories is
required to fully comprehend the importance of the role that
they serve. The reason for the separate and definitive
categorization of the two is because for a long period of time
state actors were considered the main actor when dealing with
foreign policy, while non-state actors (International
Governmental Organizations (IGO), International Non-
Governmental Organizations (INGO), Economic Agents and the
media) were until recently, considered less impactful regarding
10. foreign policy. The capabilities and flexibilities of non-states
lends to their ability to affect foreign policy and international
relations much more so than traditional states.
Article 1 of the Montevideo Convention of 1930 states that
“The state as a person of international law should possess the
following qualifications: a) a permanent population; b) a
defined territory; c) government; and d) capacity to enter into
relations with the other states.” (1934) There are a multitude of
definitions for state actors, but this particular statement that
was classified in the Montevideo Convention is often considered
the common accepted term. There are several internationally
disputed cases regarding recognition, but it is widely accepted
that a state achieves the status of full recognition after it is
recognized by a substantial number of others and is admitted to
the United Nations. (UN n.d.) Comment by Christopher: Good
While a state is fairly cut and dry, non-states are much
more extensive and as stated above, non-states include IGOs,
INGOs, economic agents and mainstream media organizations.
IGOs are bodies that are founded by formal political agreements
between its members through treaties. IGOs are unique because
they are fully recognized by international law by their
member/host nations but are not treated as resident institutional
entities of the nations where they reside. (Michigan 2008) IGOs
include such organizations as the United Nations Organization
(UNO), European Union (EU), League of Arab States (LAS),
World Trade Organization (WTO), and the North Atlantic
Treaty Organization (NATO). INGOs are often defined as
private, inter-state, non-profit organizations that are comprised
of individuals that are other than representatives of
states/governments. (UIA n.d.) INGOs are often, although not
exclusively, viewed as non-peaceful, non-settled groups that
include terrorist organizations, and religious or ethical groups.
INGOs function as actors in foreign policy predominantly
through their capacity to influence other actors. The capacity
and ability of INGOs to influence international settings and
agendas is widely recognized. INGOs are capable of putting
11. articles on the agenda, through their actions, of high-power
decision makers. Through their influence in the public view,
they are quite able to provide or disallow legitimacy to plans
and actions agreed upon by international decision makers. Also,
they are advantageous and often imperative for helping
implement the plans/actions agreed to by global decision
makers. (Commonwealth n.d.) Several prominent INGOs
include Amnesty International, Greenpeace, and Doctors
Without Boarders.
Next, economic agents play a significant role as non-state
actors. Although they have ever-expanding international reach
and influence, multinational companies do not enjoy
unregulated and unsupervised power that is often claimed by
critics. The alleged transfer of power from a government to
large corporations is drastically exaggerated and misunderstood.
The fact is that long-term investments combined with new
techniques that allow for transparency and investors to monitor
the performance of companies projects the illusion of
corporations gaining governmental control. However,
companies are involved with international relationships and
actually rely on them perhaps more than ever before. Global
trades and investments have grown more quickly than what has
been yielded. Political barriers have been removed in critical
areas that have opened new avenues for investment, and this has
in-turn created a much higher level of scrutiny and a new
political agenda around issues such as the environment and
human rights violations. As a reply, large international
companies have become much more involved with change,
expansion, and actors of the international system. The most
important thing that must be monitored and ensured is that the
presence and influence of large international companies in these
agendas is for positive change and not political gain or
corporate greed. (Werker, Ahmed 2007)
Lastly, the role of media has become fundamental in
shaping national and international public opinions. The
coverage or lack thereof of certain events transforms the
12. mindfulness and attitude of public opinion throughout the globe,
which has great potential to influence international actors. The
recent U.S. Presidential Election is a great example. Many
people believe that the coverage by broadcasters such as Fox
News and CNN had a substantial impact on the outcome. It is
important to remember that traditional media outlets are
becoming antiquated and more so replaced by social media type
platforms such as Facebook and Twitter. (Stratton 2008)
Reference
"About UN Membership | United Nations." UN News Center.
Accessed November 13, 2016.
http://www.un.org/en/sections/member-states/about-un-
membership/index.html.
"International Non-governmental Organisations in the
Commonwealth and beyond." International NGOs. Accessed
November 13, 2016.
http://www.commonwealthofnations.org/sectors/civil_society/in
ternational_ngos/.
"LibGuides: International Governmental Organizations (IGOs):
Guide by Organization: Introduction." Introduction. Accessed
November 13, 2016.
http://libguides.lib.msu.edu/internationalgovernmentorganizatio
ns.
"Montevideo Convention on the Rights and Duties of States."
Council on Foreign Relations. Accessed November 13, 2016.
http://www.cfr.org/sovereignty/montevideo-convention-rights-
duties-states/p15897.
Stratton, Trevin. Power Failure: The Diffusion of State Power in
International Relations. PDF. INFINITY JOURNAL,
November/December 2008.
http://graduateinstitute.ch/files/live/sites/iheid/files/sites/intern
ational_history_politics/shared/student_profiles/Publications/Co
13. pies/Stratton-Power_Failure.pdf
"Union of International Associations." What Is an International
Non-governmental Organization (INGO)? Accessed November
13, 2016. http://www.uia.org/faq/yb4.
Reference Cont’d
Werker, Eric D., and Faisal Z. Ahmed. What Do Non-
Governmental Organizations Do? PDF. Journal of Economic
Perspectives, 2007. http://www.hbs.edu/faculty/Publication
Files/08-041.pdf
Question 2: Why has the Intelligence Community had to adapt
with the end of the Cold War and the emergence of more and
more non-traditional threats to our national security? Please
discuss the differences between how the Intelligence
Community addressed traditional threats and how we have to
approach the problem today with the addition of the non-
traditional threat problem set. Are there any similarities?
The years following the Cold War were times of change,
particularly for the intelligence community. Threats evolved
from large-scale, traditional state actors to non-traditional and
non-state and these new threats forced intelligence agencies to
adjust accordingly. The big, sluggish, easily visible targets of
the Cold War are no longer; rather targets have become much
smaller, fluid, hidden, and nearly shapeless. During the Cold
14. War enemies were quite easily located and observed, but proved
rather difficult to neutralize. In the new fight the intelligence
community faces, quite the opposite is true. Our new enemies
are difficult to find, even harder to observe, but once found, are
easily terminated. Smaller, non-traditional, non-state targets use
obscurity to their advantage. They demonstrate very low
signatures and signal/noise ratios, and indicators that are not
unique in any manner that is needed to effectively catch the
eyes of intelligence analysts. During the Cold War the majority
of intelligence consumers could be found near the top of the
national security decision-making totem. Nowadays consumers
are expanding to include state/local officials, infrastructure
managers, and at times, private citizens. A lowly security
officer or even a medical professional now may find themselves
with more of a need to know than the POTUS regarding a
particular threat because they may be in a more timely or
critical position to prevent it. (Treverton, 2009) Also,
intelligence during a conventional/traditional war has been
typically collected by higher-ranking intelligence officials and
sections, and then disseminated to subordinates for action.
Presently the militaries of western civilizations are combating
counterinsurgencies where intelligence is being collected and
acted upon by various unit sizes, from a single platoon to an
entire company or battalion. The flow of intelligence has been
reversed in a sense that it is now more of a bottom-up format, as
opposed to top-down, and this change has created a demand for
new ways of approaching information. For over fifty years
intelligence agencies spent their time and devoted their
resources to the development of complex systems of
classification and compartmentalization designed to minimize
Soviet espionage, however, these systems are now precluding
information from being adequately shared in order to tackle a
new breed of enemy, which has no respect for boundaries.
(Herman, 2003) The intelligence community now is forced to
balance its traditional requirements for exclusion with its need
for extended, horizontal networks of information and
15. knowledge. The linear problem solving methods of the past
simply will not work with today’s time sensitive and wide
spread targets. Today’s targets require continuous and circular
interaction among the collector, the analyst, and the consumer.
Comment by Christopher: Really? We barely caught the
establishment of nuclear missile bases in Cuba, just as one
example. Comment by Christopher: Are you referring to
terrorist organizations?
Intelligence agencies the world over have reformed their
procedures, some faster than others, in response to the new non-
state threat. Middle Eastern security and intelligence agencies
forced Islamist extremists and fundamentalists away from their
lands, thus causing them to realign their efforts to focus more
on the West, or so-called far enemy. (Gerges, 2005) Conversely,
the small and highly mysterious intelligence community of
Britain has learned to use an appropriate amount of force
against the Irish Republican Army (IRA) in a controlled and
reasonable fashion. Additionally, British intelligence agencies
learned just how critical inter-agency cooperation is, so much
so that it is rumored that throughout the entire United Kingdom,
three out of every four attempted terrorist attacks were thwarted
during the mid-1990s. (Security, 1994) The learning and
understanding that took place throughout the 1990s have paid
off substantially for the British intelligence community, and has
made tackling the threat of Islamist terrorists in recent years a
smooth and timely effort. According to several experts, the U.S.
intelligence community has been very slow at adapting to
current threats. Prior to the attacks of September 11, 2001, the
U.S. intelligence community opposed recommendations by
several commissions to overhaul its practices and procedures.
Following the events of Sept. 11, Congress passed legislation
that effectively closed the distanced between local and state law
enforcement agencies and full-scale intelligence agencies.
Although Congress continued to resent the idea of a single,
domestic intelligence agency, it did however receive and accept
assurances from the Federal Bureau of Investigation (FBI) that
16. they would modify themselves to be able to predict and prevent
acts of terror as opposed to reacting to them as crime scenes
after the fact. Furthermore, Congress went on to create the
Department of Homeland Security (DHS) in 2002 and the
Director of National Intelligence (DNI) in 2004. (Creation,
2016) (History, 2016)e Through all this, U.S. military
intelligence agencies were among the quickest to adapt to
changing threats. The Department of Defense (DoD) found it
easy to work with other federal agencies to form multiple
National Intelligence Support Teams, since they were already
familiar with the concept of joint intelligence, which led to
Joint Intelligence Operations Centers after the turn of the
century. (DoD, 2006) Intelligence operations and aerial
campaigns have become increasingly synchronized; all while
Special Operations Forces have perfected the philosophy of
find, fix, finish, exploit, and analyze (F3EA). (Flynn, 2008) US
para-military forces became vital and truly grew into their roles
after 9/11. Covert teams from the Central Intelligence Agency
(CIA) worked side-by-side with special operations and
indigenous forces through the winter of 2001 and successfully
overthrew the Taliban in a few, short weeks. (War, n.d.) Shortly
thereafter the U.S. Special Operations Command (USSOCOM)
had become the tip-of-the-spear for global operations against
terrorist networks. Operation Neptune Spear, the operation took
down Usama bin Laden in May 2011, demonstrated that the
convert capabilities of the Pentagon since the days of rescuing
American hostages Teheran. (Rawlings, 2012) The exploitation
portion of the F3EA cycle was vital to launching additional
operations following UBL’s death, which created a pattern of
and pathway for success. While conducting sensitive site
exploitation (SSE) following raids during the post 9/11-
counterinsurgency efforts produced large amounts of valuable
intelligence, the majority of information was recovered from
detainees. This is in stark contrast to how defectors and POWs
would voluntarily release valuable information during the Cold
War. Now the challenge is acquiring information from subjects
17. that are extremely unwilling to speak, in a timely manner. The
find segment of the F3EA cycle is reliant on HUMINT, but
HUMINT from spies, that were recruited from Ivy League
Schools such as Oxford or Yale, and taught to linger around the
embassy crowds was of zero help in the war against terror.
Unlike the need to have few agents that were strategically
placed in high-ranking positions inside closed systems of the
Cold War, focus was put on having a multitude of agents that
are capable of directing their agencies to clandestine terror
cells. In the years following 9/11, the FBI, through cooperation
with state and local law enforcement via Joint Terrorism Task
Forces (JTTF), has prevented several domestic terror plots.
(Joint, n.d.)
Reference
"Creation of the Department of Homeland Security." Creation of
the Department of Homeland Security | Homeland Security.
Accessed November 15, 2016. https://www.dhs.gov/creation-
department-homeland-security.
"DoD to Set Up Joint Intelligence Operations Centers
Worldwide." April 12, 2006. Accessed November 15, 2016.
http://archive.defense.gov/news/newsarticle.aspx?id=15475.
Flynn, Michael T., Rich Juergens, and Thomas L. Cantrell.
Employing ISR: SOF Best Practices. PDF. NDU Press, 2008.
ndupress.ndu.edu.
Herman, Michael. "Counter-Terrorism, Information Technology
and Intelligence Change." Intelligence and National Security 18,
no. 4 (2003). August 4, 2006. Accessed November 15, 2016.
http://www.tandfonline.com/doi/abs/10.1080/026845203100016
93181?journalCode=fint20.
"History." History. Accessed November 15, 2016.
https://www.dni.gov/index.php/about/history.
"Joint Terrorism Task Forces." FBI. Accessed November 15,
18. 2016. https://www.fbi.gov/investigate/terrorism/joint-terrorism-
task-forces.
Miles, Jim. "Why Jihad Went Global." 2009. Accessed
November 15, 2016. http://www.palestinechronicle.com/why-
jihad-went-global-book-review/?print=pdf.
Reference Cont’d
"News And Speeches." Security and Democracy: Is There a
Conflict? | MI5 - The Security Service. June 12, 1994. Accessed
November 15, 2016. https://www.mi5.gov.uk/news/security-
and-democracy-is-there-a-conflict.
Rawlings, Nate. "Operation Neptune Spear: The New Textbook
for Special Operators." Time. May 2, 2012. Accessed November
15, 2016. http://nation.time.com/2012/05/02/operation-neptune-
spear-the-new-textbook-for-special-operators/.
Treverton, Gregory F. Intelligence for an Age of Terror. New
York, NY: Cambridge University Press, 2009. PDF.
"War in Afghanistan (2001-Present)." Accessed November 15,
2016. http://www.saylor.org/site/wp-
content/uploads/2011/06/War-in-Afghanistan-2001-Present.pdf.