Analyze the techniques utilized by the extremist group for the purposes of recruitment and indoctrination of potential new members. Analyze the various ways law enforcement can detect and prevent recruitment and indoctrination attempts by extremist groups such as the one chosen as they utilize cyberspace to further their purposes. Examine the methods of retrieving and analyzing data from the various sites utilized by the chosen extremist organization as they disseminate information pertaining to their causes.
Extremist Indoctrination via Cyberspace
Prior to beginning work on this assignment, read Chapter 10 in Holt (2018), as well as the Soriano (2012) and Halverson (2012) articles. Review the instructions below and research a minimum of three additional scholarly or professional resources to support your statements. (Access the MSCJ Professional Sources guide for assistance with finding appropriate resources.)
In the modern era of the Internet, it has become an increasingly simple task to broadcast messages of intolerance, hate, and/or extremism. Terror groups, nationalistic extremist groups, and assorted other extremist organizations have developed into savvy cyberspace users for purposes of disseminating information and recruiting members. Extremist groups (including domestic terrorists, cyberbullies, fundamentalist organizations, and politically motivated organizations, etc.) now have the ability to easily manipulate images and video using cheap, readily available software that they can then upload to a multitude of social media sites and user groups. These images and propaganda are used to inflame tensions and recruit new members to the various groups’ causes. For this paper choose one domestic extremist group as the focus for your paper.
Your paper you must
Analyze the techniques utilized by the extremist group for the purposes of recruitment and indoctrination of potential new members.
Analyze the various ways law enforcement can detect and prevent recruitment and indoctrination attempts by extremist groups such as the one chosen as they utilize cyberspace to further their purposes.
Examine the methods of retrieving and analyzing data from the various sites utilized by the chosen extremist organization as they disseminate information pertaining to their causes.
Evaluate the various legal issues that arise as a result of law enforcement efforts to curb attempts at indoctrination and recruitment by extremist organizations.