Extremist indoctrination via cyberspace | CRJ 626 Computer Forensics | Ashford University

 

Extremist Indoctrination via Cyberspace

Prior to beginning work on this assignment, read Chapter 10 in Holt (2018), as well as the Soriano (2012) and Halverson (2012) articles. Review the instructions below and research a minimum of three additional scholarly or professional resources to support your statements. (Access the MSCJ Professional Sources (Links to an external site.) guide for assistance with finding appropriate resources.)

In the modern era of the Internet, it has become an increasingly simple task to broadcast messages of intolerance, hate, and/or extremism. Terror groups, nationalistic extremist groups, and assorted other extremist organizations have developed into savvy cyberspace users for purposes of disseminating information and recruiting members. Extremist groups (including domestic terrorists, cyberbullies, fundamentalist organizations, and politically motivated organizations, etc.) now have the ability to easily manipulate images and video using cheap, readily available software that they can then upload to a multitude of social media sites and user groups. These images and propaganda are used to inflame tensions and recruit new members to the various groups’ causes. For this paper choose one domestic extremist group as the focus for your paper.

Your paper you must

  • Analyze the techniques utilized by the extremist group for the purposes of recruitment and indoctrination of potential new members.
  • Analyze the various ways law enforcement can detect and prevent recruitment and indoctrination attempts by extremist groups such as the one chosen as they utilize cyberspace to further their purposes.
  • Examine the methods of retrieving and analyzing data from the various sites utilized by the chosen extremist organization as they disseminate information pertaining to their causes.
  • Evaluate the various legal issues that arise as a result of law enforcement efforts to curb attempts at indoctrination and recruitment by extremist organizations.

The Extremist Indoctrination via Cyberspace paper

  • Must be three to five double-spaced pages (750-1,250 words) in length (not including title and references pages) and formatted according to APA style as outlined in the Writing Center (Links to an external site.).
  • Must include a separate title page with the following:
    • Title of paper
    • Student’s name
    • Course name and number
    • Instructor’s name
    • Date submitted
  • Must use at least three scholarly sources in addition to the course text.
  • Must document all sources in APA style as outlined in the Writing Center.

Must include a separate references page that is formatted according to APA style as outlined in the Writing Center. 

 

Required Resources

Text

Holt, T. J., Bossler, A. M., & Seigfried-Spellar, K. C. (2018). Cybercrime and digital forensics: An introduction (2nd ed.).  Retrieved from https://www.vitalsource.com/

  • Chapter 9: Cyberbullying, On-Line Harassment, and Cyber stalking
  • Chapter 10: Online Extremism, Cyber terror, and Cyber Warfare

Article

Halverson, J. R., & Way, A. K. (2012). The curious case of Colleen LaRose: Social margins, new media, and online radicalization (Links to an external site.). Media, War & Conflict, 5(2), 139-153. http://dx.doi.org/10.1177/1750635212440917

  • The full-text version of this article is available through the EBSCOhost database in the University of Arizona Global Campus Library. It provides an overview of the Megan Meier bullying legislation and the various ways the policy failed. It will assist you in the development of this week’s discussion post.

Kravets, D. (2009, September 30). Cyberbullying bill gets chilly reception (Links to an external site.). Wired. Retrieved from www.wired.com/threatlevel/2009/09/cyberbullyingbill/

  • This online article provides an overview of the Megan Meier bullying legislation and the various ways the policy failed. It will assist you in the development of this week’s discussion post.
    Accessibility Statement does not exist.
    Privacy Policy (Links to an external site.)

Morphy, E. (2008, December 9). The computer fraud act: Bending a law to fit a notorious case (Links to an external site.). Retrieved from www.ecommercetimes.com/story/65424.html

  • This online article provides detailed information on the prosecution of Lori Drew in the Megan Meier cyberbullying case. It will assist you in the development of this week’s discussion post.
    Accessibility Statement does not exist.
    Privacy Policy (Links to an external site.)

Torres Soriano, M. R. (2012). The vulnerabilities of online terrorism (Links to an external site.). Studies in Conflict & Terrorism, 35(4), 263-277. http://dx.doi.org/10.1080/1057610X.2012.656345

  • The full-text version of this article is available through the EBSCOhost database in the University of Arizona Global Campus Library. This article examines the use of online technology in the process of radicalization. It will assist you in the development of your discussion post for this week.

Recommended Resources

Article

Giammona, C. (2013, April 14). California case another three-part tragedy of rape, cyber bullying and suicide (Links to an external site.). Retrieved from http://usnews.nbcnews.com/_news/2013/04/14/17747411-california-case-another-three-part-tragedy-of-rape-cyber-bullying-and-suicide?lit

  • This website depicts the suicide of a California teenager after repeated instances of cyber bullying and may assist you in the development of this week’s discussion post.
    Accessibility Statement does not exist.
    Privacy Policy (Links to an external site.)

TheVillageCelebration. (2012, December 18). The Village founder, Vickie Newton, targeted by internet stalker (Links to an external site.). Retrieved from http://www.thevillagecelebration.com/thevillage-founder-vickie-newton-targeted-by-internet-stalker/

Websites

The Cybersmile Foundation (Links to an external site.). (www.cybersmile.org)

  • This website provides additional information on cyberstalking and may offer assistance developing this week’s discussion post.
    Accessibility Statement does not exist.
    Privacy Policy does not exist

MSCJ Professional Sources (Links to an external site.). (http://ashford-mscj.weebly.com)

  • This resource site will provide assistance in researching additional sources for the assessments within this course.
    Accessibility Statement does not exist.
    Privacy Policy does not exist.

[email protected]: Working to Halt Online Abuse (Links to an external site.). (www.haltabuse.org)

  • This website provides additional information on online abuse and may assist in the development of this week’s discussion post.
    Accessibility Statement does not exist.
    Privacy Policy does not exist.

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more

Order your essay today and save 20% with the discount code RESEARCH