Analyze the various ways law enforcement can detect


Assignment:

Extremist Indoctrination via Cyberspace

Prior to beginning work on this assignment, read Holt (2018), as well as the Soriano (2012) and Halverson (2012) articles. Review the instructions below and research a minimum of three additional scholarly or professional resources to support your statements. (Access the MSCJ Professional Sources guide for assistance with finding appropriate resources.)

In the modern era of the Internet, it has become an increasingly simple task to broadcast messages of intolerance, hate, and/or extremism. Terror groups, nationalistic extremist groups, and assorted other extremist organizations have developed into savvy cyberspace users for purposes of disseminating information and recruiting members. Extremist groups (including domestic terrorists, cyberbullies, fundamentalist organizations, and politically motivated organizations, etc.) now have the ability to easily manipulate images and video using cheap, readily available software that they can then upload to a multitude of social media sites and user groups. These images and propaganda are used to inflame tensions and recruit new members to the various groups' causes. For this paper choose one domestic extremist group as the focus for your paper.

Your paper you must

1. Analyze the techniques utilized by the extremist group for the purposes of recruitment and indoctrination of potential new members.

2. Analyze the various ways law enforcement can detect and prevent recruitment and indoctrination attempts by extremist groups such as the one chosen as they utilize cyberspace to further their purposes.

3. Examine the methods of retrieving and analyzing data from the various sites utilized by the chosen extremist organization as they disseminate information pertaining to their causes.

4. Evaluate the various legal issues that arise as a result of law enforcement efforts to curb attempts at indoctrination and recruitment by extremist organizations.

The Extremist Indoctrination via Cyberspace paper

Must be three to five double-spaced pages (750 to 1,250 words) in length (not including title and references pages) and formatted according to APA style as outlined in the Writing Center.

Required Resources

Text

Holt, T. J., Bossler, A. M., & Seigfried-Spellar, K. C. (2018). Cybercrime and digital forensics: An introduction (2nd ed.).

Chapter: Cyberbullying, On-Line Harassment, and Cyber stalking

Chapter: Online Extremism, Cyber terror, and Cyber Warfare

Article

Halverson, J. R., & Way, A. K. (2012). The curious case of Colleen LaRose: Social margins, new media, and online radicalization. Media, War & Conflict, 5(2), 139-153.

The full-text version of this article is available through the EBSCOhost database in the University of Arizona Global Campus Library. It provides an overview of the Megan Meier bullying legislation and the various ways the policy failed. It will assist you in the development of discussion post.

Kravets, D. (2009, September 30). Cyberbullying bill gets chilly reception. Wired.

This online article provides an overview of the Megan Meier bullying legislation and the various ways the policy failed. It will assist you in the development of discussion post.

Morphy, E. (2008, December 9). The computer fraud act: Bending a law to fit a notorious case.

This online article provides detailed information on the prosecution of Lori Drew in the Megan Meier cyberbullying case. It will assist you in the development of discussion post.

Torres Soriano, M. R. (2012). The vulnerabilities of online terrorism. Studies in Conflict & Terrorism, 35(4), 263-277.

The full-text version of this article is available through the EBSCOhost database in the University of Arizona Global Campus Library. This article examines the use of online technology in the process of radicalization. It will assist you in the development of your discussion post for this week.

Recommended Resources

Article

Giammona, C. (2013, April 14). California case another three-part tragedy of rape, cyber bullying and suicide.

This website depicts the suicide of a California teenager after repeated instances of cyber bullying and may assist you in the development of discussion post.

The Village Celebration. (2012, December 18). The Village founder, Vickie Newton, targeted by internet stalker.

This website details the cyberstalking of Vickie Newton. It may assist you in the development of discussion post.

Websites

The Cybersmile Foundation. (www.cybersmile.org)

This website provides additional information on cyberstalking and may offer assistance developing discussion post.

MSCJ Professional Sources

This resource site will provide assistance in researching additional sources for the assessments within this course.

WHO@: Working to Halt Online Abuse

This website provides additional information on online abuse and may assist in the development of discussion post.

Solution Preview :

Prepared by a verified Expert
Business Law and Ethics: Analyze the various ways law enforcement can detect
Reference No:- TGS03205453

Now Priced at $50 (50% Discount)

Recommended (91%)

Rated (4.3/5)