Extremist Indoctrination via Cyberspace
Prior to beginning work on this assignment, read Chapter 10 in Holt (2018), as well as the Soriano (2012) and Halverson (2012) articles. Review the instructions below and research a minimum of three additional scholarly or professional resources to support your statements. (Access the MSCJ Professional Sources (Links to an external site.) guide for assistance with finding appropriate resources.)
In the modern era of the Internet, it has become an increasingly simple task to broadcast messages of intolerance, hate, and/or extremism. Terror groups, nationalistic extremist groups, and assorted other extremist organizations have developed into savvy cyberspace users for purposes of disseminating information and recruiting members. Extremist groups (including domestic terrorists, cyberbullies, fundamentalist organizations, and politically motivated organizations, etc.) now have the ability to easily manipulate images and video using cheap, readily available software that they can then upload to a multitude of social media sites and user groups. These images and propaganda are used to inflame tensions and recruit new members to the various groups’ causes. For this paper choose one domestic extremist group as the focus for your paper.
Your paper you must
- Analyze the techniques utilized by the extremist group for the purposes of recruitment and indoctrination of potential new members.
- Analyze the various ways law enforcement can detect and prevent recruitment and indoctrination attempts by extremist groups such as the one chosen as they utilize cyberspace to further their purposes.
- Examine the methods of retrieving and analyzing data from the various sites utilized by the chosen extremist organization as they disseminate information pertaining to their causes.
- Evaluate the various legal issues that arise as a result of law enforcement efforts to curb attempts at indoctrination and recruitment by extremist organizations.
The Extremist Indoctrination via Cyberspace paper
- Must be three to five double-spaced pages (750-1,250 words) in length (not including title and references pages) and formatted according to APA style as outlined in the Writing Center (Links to an external site.).
- Must include a separate title page with the following:
- Title of paper
- Student’s name
- Course name and number
- Instructor’s name
- Date submitted
- Must use at least three scholarly sources in addition to the course text.
- The Scholarly, Peer Reviewed, and Other Credible Sources (Links to an external site.) table offers additional guidance on appropriate source types. If you have questions about whether a specific source is appropriate for this assignment, please contact your instructor. Your instructor has the final say about the appropriateness of a specific source for a particular assignment.
- Must document all sources in APA style as outlined in the Writing Center.
Must include a separate references page that is formatted according to APA style as outlined in the Writing Center.
Required Resources
Text
Holt, T. J., Bossler, A. M., & Seigfried-Spellar, K. C. (2018). Cybercrime and digital forensics: An introduction (2nd ed.). Retrieved from https://www.vitalsource.com/
- Chapter 9: Cyberbullying, On-Line Harassment, and Cyber stalking
- Chapter 10: Online Extremism, Cyber terror, and Cyber Warfare
Article
Halverson, J. R., & Way, A. K. (2012). The curious case of Colleen LaRose: Social margins, new media, and online radicalization (Links to an external site.). Media, War & Conflict, 5(2), 139-153. http://dx.doi.org/10.1177/1750635212440917
- The full-text version of this article is available through the EBSCOhost database in the University of Arizona Global Campus Library. It provides an overview of the Megan Meier bullying legislation and the various ways the policy failed. It will assist you in the development of this week’s discussion post.
Kravets, D. (2009, September 30). Cyberbullying bill gets chilly reception (Links to an external site.). Wired. Retrieved from www.wired.com/threatlevel/2009/09/cyberbullyingbill/
- This online article provides an overview of the Megan Meier bullying legislation and the various ways the policy failed. It will assist you in the development of this week’s discussion post.
Accessibility Statement does not exist.
Privacy Policy (Links to an external site.)
Morphy, E. (2008, December 9). The computer fraud act: Bending a law to fit a notorious case (Links to an external site.). Retrieved from www.ecommercetimes.com/story/65424.html
- This online article provides detailed information on the prosecution of Lori Drew in the Megan Meier cyberbullying case. It will assist you in the development of this week’s discussion post.
Accessibility Statement does not exist.
Privacy Policy (Links to an external site.)
Torres Soriano, M. R. (2012). The vulnerabilities of online terrorism (Links to an external site.). Studies in Conflict & Terrorism, 35(4), 263-277. http://dx.doi.org/10.1080/1057610X.2012.656345
- The full-text version of this article is available through the EBSCOhost database in the University of Arizona Global Campus Library. This article examines the use of online technology in the process of radicalization. It will assist you in the development of your discussion post for this week.
Recommended Resources
Article
Giammona, C. (2013, April 14). California case another three-part tragedy of rape, cyber bullying and suicide (Links to an external site.). Retrieved from http://usnews.nbcnews.com/_news/2013/04/14/17747411-california-case-another-three-part-tragedy-of-rape-cyber-bullying-and-suicide?lit
- This website depicts the suicide of a California teenager after repeated instances of cyber bullying and may assist you in the development of this week’s discussion post.
Accessibility Statement does not exist.
Privacy Policy (Links to an external site.)
TheVillageCelebration. (2012, December 18). The Village founder, Vickie Newton, targeted by internet stalker (Links to an external site.). Retrieved from http://www.thevillagecelebration.com/thevillage-founder-vickie-newton-targeted-by-internet-stalker/
- This website details the cyberstalking of Vickie Newton. It may assist you in the development of this week’s discussion post.
Accessibility Statement does not exist.
Privacy Policy (Links to an external site.)
Websites
The Cybersmile Foundation (Links to an external site.). (www.cybersmile.org)
- This website provides additional information on cyberstalking and may offer assistance developing this week’s discussion post.
Accessibility Statement does not exist.
Privacy Policy does not exist
MSCJ Professional Sources (Links to an external site.). (http://ashford-mscj.weebly.com)
- This resource site will provide assistance in researching additional sources for the assessments within this course.
Accessibility Statement does not exist.
Privacy Policy does not exist.
WHO@: Working to Halt Online Abuse (Links to an external site.). (www.haltabuse.org)
- This website provides additional information on online abuse and may assist in the development of this week’s discussion post.
Accessibility Statement does not exist.
Privacy Policy does not exist.