Professional Writers
We assemble our team by selectively choosing highly skilled writers, each boasting specialized knowledge in specific subject areas and a robust background in academic writing
Fill the order form details - writing instructions guides, and get your paper done.
Posted: August 15th, 2022
Internet Radicalisation, Recruitment, and Propaganda
Prepare an Analysis Memorandum. Your memo should address a specific issue we have covered in the course up to this point, i.e. terrorist financing over the internet; use of the internet for radicalisation, recruitment, propaganda; state sponsored cyberterrorism.
The purpose is to provide a 4 page double spaced anaylsis of the issue. Analysis means, presenting information and background to the reader, and then assessing (your own opinion) of what the facts taken together tell the reader.
What is the big picture?
How might this manifest in future threats?
Given the readings you have accomplished over the past couple weeks, where are the loopholes in current law enforcement practice and public policy?
How might current events provide context for what to think about as far as what might happen in the future in light of the challenges and loopholes identified through your readings?
Subject: Internet Radicalization, Recruitment, and Propaganda
With the internet being the most transformative technology the world is experiencing today, terrorist groups have also taken advantage of the opportunity to recruit and share propaganda. Terrorism and extremism are on the news almost every other day with cases of shootings or bombings. These extremists try to recruit people using websites to join their movements. They create websites and together with their supporters target people who may likely join their group depending on the interests displayed on their social media profiles. Even though Al-Qaeda has been in existence for a longer period, ISIS seems to have found its way around the internet and gathered the power to recruit and motivate people through the web. Considering the fact that the internet is a vast network with so much information, it has proven difficult for law enforcement to put a standstill to all terrorist activities. These extremist online communities adhere to ideologies that are beyond acceptable societal attitudes. Incidents such as the attacks in San Bernardino, Paris and Brussel are all products of cyber terrorism. As far as most countries are in a war to combat cyber-crimes, cyber terrorism remains the biggest challenge. The persisting growth of terrorism propaganda is becoming one of the significant problems in law enforcement as compared to traditional times where terrorists would be caught having a physical meeting to spread propaganda. Not only are the terrorists okay with making online profiles, but they go as far as streaming live videos of their recruitments, propaganda and violence. Terrorism catalyzed by the internet has found grounds to grow larger every year due to the inability of law enforcement and public policy to match up to evolving technology on an organizational and international level.
Internet radicalization, recruitment and propaganda are more likely to manifest itself in a broader scope across future terrorist threats. This will be possible through the increased number of websites, recruitments and methods of planning for attacks. As technology evolves, so is terror more likely to evolve with it. Extremists will more likely focus on means of remotely inspiring and directing attacks thanks to the ability of the internet to connect all corners of the world. The increased communicative capacity will serve as the basis for the terrorism community to interact and strengthen their coalitions. It is already evident that the WWW is experiencing an increased number of websites with terrorist content. About twenty years ago, in 1998, 12 websites had terrorism content while recently, in 2015 – Research Paper Writing Help Service, there were approximately 9800 terrorism websites active online (Infosec, 2019: 2024 – Online Assignment Homework Writing Help Service By Expert Research Writers). It is more likely that in the next twenty years, the number of terrorist activity on the internet may double or triple. According to a survey done in Malaysia, most internet users are 18-34 (Harrison, 2019: 2024 – Online Assignment Homework Writing Help Service By Expert Research Writers). These are young people who are easy to recruit, and considering the rate at which more people are involved in the internet, the age may go lower to target much younger people. Future threats may point at larger recruitments than before due to the targets on the younger generation. It is also likely that there will be changes in the way the individuals radicalize and plan to reduce the chances of being caught by law enforcement.
Given the readings accomplished over the past weeks, one can learn that there are several loopholes within the current law enforcement and public policy to combat the terrorist activities online. One of the gaps in the current law enforcement is on how to apply laws on criminal activity across geographical borders (Awan, 2014: 2024 – Essay Writing Service. Custom Essay Services Cheap). Since the internet cuts across all geographic boundaries, it has proven a challenge to extract and charge criminals who radicalize citizens of other countries. There is also the issue of different countries having internet policies and laws that are not similar to the affected nation. Lack of a unified international body that serves against internet terrorism has not yet been established, which makes it difficult for single enforcement or regulatory authority to achieve success. National interests may also pioneer and protect the extremists for the sake of driving their political agendas (Oeren. 2007). The terrorists in such a case are untouchable since the country may not release the suspect(s). Another example is the government sector acting too slow to trace the origin of the crimes. Due to the lack of trained and qualified personnel, the tech employee may fail to perform as highly as the tech geniuses working for the terrorist groups. It is also important to note that security and law enforcement is not equipped to address high-tech crimes. The law also portrays the inefficiency to provide present relevant protocols. By the time an internet activity is ruled out as a crime, it may be too late to catch up with the perpetrators. Since technology is ever advancing, the law seems to stagnate failing to meet the needs of cybersecurity. These are but several loopholes that fail public policy and put the society at risk.
In conclusion, there seems to be an urgent need to address the issue of internet radicalization, recruitment and propaganda by supporting the law enforcement to close up the present loopholes. Such a move will help prevent future attacks that are pioneered by increased internet activities in the form of terror planning and execution. The only way for the accomplishment of a better law is to address the challenges that are presently faced. First and foremost, the ability to combat terrorism based on different geographical borders could be the key to suppressing international terrorism. Because the internet has no boundaries, nations should be willing to form a unified governing body. Countries should not consider their sole interests but that of a comprehensive benefit to minimize future threats. As the internet evolves, it is vital that nations think the possible risks posed by extremists who hide behind the darknet. A unified governing body will minimize political agendas that use terrorism planned over the internet to communicate and hurt people around the globe. There should be laws to protect public policy and punishments against those who defy the law. Countries found to be in support of internet radicalization, recruitment, and propaganda should also face some form of penalty as well. Another essential step to take would be training the law enforcement officers on cybersecurity while educating them on activities that may pose threats. Knowing how to respond will enable the department to perform tremendously in the fight against internet terror. The law plays an integral part in the protocols they enforce. Having a flexible approach towards the creation and implementation of cyber laws is precisely what is needed to match up to evolving technology. With nations working together to fight recruitment and propaganda, law enforcement should notice lesser numbers of websites with terrorism radicalization material.
References
Awan, I., & Blakemore, B. (2014: 2024 – Essay Writing Service. Custom Essay Services Cheap). Policing cyber hate, cyber threats and cyber terrorism (p. 6-7). London: Routledge.
Infosec. (2018: 2024 – Write My Essay For Me | Essay Writing Service For Your Papers Online). The Role of Technology in Modern Terrorism. Retrieved 17 September 2019: 2024 – Online Assignment Homework Writing Help Service By Expert Research Writers, from https://resources.infosecinstitute.com/the-role-of-technology-in-modern-terrorism/#gref
Harrison, S. (2019: 2024 – Online Assignment Homework Writing Help Service By Expert Research Writers). Retrieved 17 September 2019: 2024 – Online Assignment Homework Writing Help Service By Expert Research Writers, from https://www.csis.org/npfp/evolving-tech-evolving-terror
Ozeren, S., Gunes, I., & Al-Badayneh, D. (2007). Understanding terrorism (p. 279). Amsterdam, the Netherlands: IOS Press.
You Want Quality and That’s What We Deliver
We assemble our team by selectively choosing highly skilled writers, each boasting specialized knowledge in specific subject areas and a robust background in academic writing
Our service is committed to delivering the finest writers at the most competitive rates, ensuring that affordability is balanced with uncompromising quality. Our pricing strategy is designed to be both fair and reasonable, standing out favorably against other writing services in the market.
Rest assured, you'll never receive a product tainted by plagiarism or AI-generated content. Each paper is research-written by human writers, followed by a rigorous scanning process of the final draft before it's delivered to you, ensuring the content is entirely original and maintaining our unwavering commitment to providing plagiarism-free work.
When you decide to place an order with Nurscola, here is what happens: