How The Processes Of Radicalization Can Transform Persons Into Extremists And Terrorists
[ad_1]
Module 3: Overview & Outcomes
Overview
In this module you will study the concept and process of radicalization. You will explore some of the factors contributing to the significant growth of radicalized American citizens or residents choosing to undertake terrorist activities within the United States of America. You will analyze the evidence presented in the current debate over the public’s perception that the defining characteristic of most homegrown terrorists is that they are Muslim-Americans. Finally, you will consider the impact that globalization and the Internet have had on both the radicalization of homegrown and transnational terrorists, and what implications these trends may have for American law enforcement officials, as well as counterterrorism policymakers.
Module 3: Learning & Assessment Activities
During this module you will:
Read:
- Required
- Module Notes One: Radicalization and the Emergence of Homegrown Terrorists
- Module Notes Two: The Internet, Radicalization, Globalization, and Their Implications of Law Enforcement
- Beutel, A.J. (2009). Building bridges to strengthened America: Forging an effective counterterrorism enterprise between Muslim Americans and law enforcement. [pp. 16–22] [PDF, File Size, 144KB].
- Brooks, R. A. (2011). Muslim “homegrown” terrorism in the United States.(Links to an external site.) International Security, 36(2), [pp.1–6; 36–41].
- Bjelopera, J.P. (2013). The domestic terrorist threat: Background and issues for Congress.(Links to an external site.) [pp.54–69]. [PDF, File Size 730 KB] Retrieved from https://www.fas.org/sgp/crs/terror/R42536.pdf
- Committee on Homeland Security (2015). Terror threat snapshot[PDF, File Size 714KB].
- Institute for Strategic Dialogue (2011). Radicalization: The role of the internet: A working paper of the PPN. [pp.1–4][PDF, File Size 253KB].
- Stekelenburg, J. (2014). Going All the Way: Politicizing, Polarizing, and Radicalizing Identity Offline and Online.(Links to an external site.)Sociology Compass, 8(5), [pp. 1–16],540.
- United States Senate Committee on Homeland Security and Governmental Affairs: Majority and Minority Staff Report. (2008). Violent Islamist Extremism, The Internet, and the Homegrown Terrorist Threat.[pp. 1–16][PDF, Files Size 253KB].
- Blumenfeld, T. (2013). Problems in the FBI(Links to an external site.). Middle East Quarterly, 20(2):13–18.
- Optional
- Allison, G. (2015, November 18). ISIS Uses Apple, Google Encryption To ‘Go Dark:’ FBI.(Links to an external site.) Investor’s Business Daily. [p.1].
- Mueller, R.S. (2006) “Speeches: The Threat of Homegrown Terrorism”(Links to an external site.) Federal Bureau of Investigation. Retrieved from https://www.fbi.gov/news/speeches/the-threat-of-homegrown-terrorism
- New America. (2015). Homegrown extremism – 2001–2015(Links to an external site.). Retrieved from http://securitydata.newamerica.net/extremists/analysis.html
- Sacirbey, O. (2012). Homegrown Muslim terror threat ‘tiny,’ report says.(Links to an external site.) Christian Century, 129(5), [pp.18–19].
- Vidino, L. (2009). Homegrown Jihadist Terrorism in the United States: A New and Occasional Phenomenon?(Links to an external site.)Studies in Conflict & Terrorism, 32(1), [pp.1–17.]
- Von Behr, I., Reding, A., Edwards, C., & Gribbon, L. (2013). Radicalization in the digital era: The use of the internet in 15 cases of terrorism and extremism.(Links to an external site.)[pp.xi–xiii]. [PDF File size, 1.23 MB] Retrieved from http://www.rand.org/content/dam/rand/pubs/research_reports/RR400/RR453/RAND_RR453.pdf
View:
- Required
- Kopping, W. (Director). (2012). “The third jihad” film attacked by terror-linked CAIR(Links to an external site.) [Video File, 06:48 mins]. Clarion Project. Retrieved from https://www.youtube.com/watch?v=fdBTuUH5AAA#t=107
- Text transcript of Video(Links to an external site.)
- ABC News (2016) Exclusive: Apple CEO Tim Cook Sits Down With David Muir(Links to an external site.) (Extended Interview) [Video File, 29:40 mins]. Transcript of Video (Links to an external site.). Retrieved from http://abcnews.go.com/WNT/video/exclusive-apple-ceo-tim-cook-sits-david-muir-37174976
- Kopping, W. (Director). (2012). “The third jihad” film attacked by terror-linked CAIR(Links to an external site.) [Video File, 06:48 mins]. Clarion Project. Retrieved from https://www.youtube.com/watch?v=fdBTuUH5AAA#t=107
Module 3: Module Notes One: Radicalization and the Emergence of Homegrown Terrorists
Since September 11, 2001, according to the Committee on Homeland Security (2015), there have been 118 terror plots in the United States. From 2000 to 2015 the number of homeland terror plots have tripled. The Committee on Homeland Security reports that “Homegrown terror has reached unprecedented levels as extremists groups work to infiltrate the United States and remotely recruit and radicalize Americans” (p.4).
The concept of radicalization is often used to describe the phenomenon of American citizens or permanent resident aliens choosing to undertake terrorist activity within the jurisdiction of the United States of America. The term “radicalization,” in the context of terrorism, can be interpreted as a transformative process and experience causing both behavioral and ideological changes that can foreshadow an individual’s commitment to violent extremism. Recently, however, public perception of homegrown terrorism has become more and more synonymous with terrorist activity perpetrated exclusively by Muslim-American citizens. (Brooks, 2011).
Key Learning Point:
Radicalization – A process where individuals or groups come to intellectually approve of the use of violence against civilians for political aims. Radicalization differs from violent extremism in that violent extremists explicitly encourage or commit acts of violence or provide material support to those who do. Radicals engage in lawful, constitutionally protected free speech and other non-violent and legal activities, but may adhere to an extremist ideology.
Violent Extremism – A criminal act inspired, at least in part, by political ideology that seeks to employ violence against unarmed civilians (as defined by the Geneva Conventions). Violent extremism differs from radicalization in that violent extremists explicitly commit acts of politically-motivated violence, incite people to politically-motivated violence, or provide material support to those who do. It moves from the realm of constitutionally protected activities into criminal behavior. (Beutel, 2009).
Although there is little empirical evidence to support these Muslim-American terrorist perceptions, it remains a defining characteristic of a homegrown terrorist. Interestingly, despite the efforts and actions of Muslim leaders and institutions denouncing violent Islamists and jihadists the strong misperception persists. In part, the public’s misconceptions are perpetuated mostly by the media, some of whom have even voiced doubt regarding the loyalty of Muslim-Americans, and contended that they constitute a domestic security threat. (Beutel, 2009).
A leading antiterrorism expert, Charles Kurzman (2012), claims that the threat of homegrown Islamic terrorism is often exaggerated by government officials. In a report entitled “Muslim-American Terrorism in the Decade Since 9/11” Kurzman found that:
Only 20 Muslim-Americans were indicted for violent terrorist plots last year, down from 26 in 2010. Kurzman states that compared to the 14,000 murders in the U.S. in 2011, the potential for Muslim Americans to take up terrorism is “tiny.” In the 10 years since the 9/11 terrorist attacks, Kurzman found that 193 Muslim Americans have been indicted in terrorist plots, or fewer than 20 per year. Just one of those indicted last year was charged with carrying out an attack—Yonathan Melaku, who fired shots at military buildings in northern Virginia—compared to six Muslim-Americans who carried out attacks in 2010, including Faisal Shahzad, the failed Times Square bomber. Since 9/11, Muslims have reported terrorism suspects to officials in 52 of 140 cases. The report also found that terrorists do not fit any single ethnic profile. In 2011, 30 percent of terror suspects were Arab; 25 percent were White; and 15 percent were African-American. Other significant report findings revealed that two suspects in 2011 received terrorist training abroad, down from eight in 2010, and 28 in 2009. Also, about one-third (35 percent) of terror suspects since 9/11 have been converts to Islam. The report makes clear that since a spike in 2009, when 49 Muslim Americans were charged with terrorist plots or attacks, an expected wave of terrorism that prompted frequent terror alerts, has not materialized. While terrorism alerts are an understandable precaution, Kurzman said they also create “a sense of heightened tension that is out of proportion to the actual number of terrorist attacks in the United States since 9/11 (Sacirbey, 2012, p.1).
Homegrown terrorism also covers those persons involved in a broad spectrum of related activities such as training with, or joining, foreign terrorist networks or organizations, providing aid and material support to a foreign terrorist organization, and planning and executing terrorist attacks in America. Although prospectively enamored by global jihadist ideologies, these same persons often perform the logistical and strategic activities in addition to carrying out terrorist plots within leaderless terrorist organizations and networks. However, homegrown terrorism does not necessarily equate to terrorist attacks arranged and conducted by sophisticated foreign nationals and operatives of large transnational terrorist organizations. For example, there are the lone-wolf terrorists such Richard Reid, a British citizen, who attempted to detonate explosives, secreted in his sneakers, while aboard an airliner from France to Miami, Florida. Also, in the matter of the 2009 Christmas Day bomber, Abdul Farouk Abdulmutallab, a Nigerian citizen, who attempted to smuggle a bomb in his underwear aboard a flight from Amsterdam to Detroit, Michigan (Brooks, 2011).
Some of the most recent homegrown terrorist cases successfully foiled, according to the New America Foundation’s database are:
- On May 3, 2015, two Arizona roommates, Elton Simpson, a 30-year-old and Soofi Nadir, a 34-year-old, opened fire on an event organized by the American Freedom Defense Initiative involving a cartoon contest for drawing the Prophet Mohammed. Simpson and Nadir injured one security guard in the shooting and were killed by police. Simpson had previously been accused of seeking to join Al Shabaab, On June 10, 2015 the United States filed an indictment against a third man, Decarus Thomas AKA Abdul Kareem charging him with conspiracy, a firearms offense, and making false statements.
- On May 27, 2015 Leon Nathan Davis, a 37-year-old Georgia resident who served prison time on an earlier cocaine trafficking charge, pled guilty to an information charging him with attempting to provide material support to ISIS. According to the plea, Davis attempted to travel to Syria via Turkey to join the group. He was originally arrested in October 2014 on a parole violation. It is unclear how the investigation into Davis was initiated. On July 28, 2015 Davis was sentenced to 15 years in prison and a lifetime of supervised release.
- On June 13, 2015 the United States filed a criminal complaint charging Munther Saleh, a 20-year-old United States citizen and resident of Queens, New York with conspiracy to provide material support to ISIS. Saleh and a co-conspirator allegedly attempted to attack law enforcement officials who were conducting surveillance on them. The investigation into Saleh appears to have been initiated in March 2015 when a Port Authority police officer observed him on the George Washington Bridge two days in a row
- On June 18, 2015, Dylann Roof was arrested and charged with killing nine people in a shooting on at the historic black Emmanuel AME Church in Charleston, South Carolina on June 17, 2015. According to one of the victims, Roof said: “You rape our women, and you’re taking over our country. And you have to go,” during the shooting. Roof had posted a manifesto citing his radicalization after seeing the coverage of the Trayvon Martin case and laying out a racist worldview. He had also posted pictures on his website and Facebook featuring white supremacist imagery, including the Confederate battle flag, patches of the Apartheid South African flag, and a T-shirt featuring the number “88,” which is often used as a symbol for “Heil Hitler.” (New America, 2015, p.1)
Before continuing on with your reading, please pause to view the following video or refer to its text transcript.
Key Learning Point: The radicalization of one’s identity is one of the most important steps in the entire radicalization process. (Stekelenburg, 2014).
The progression from extremism to terrorism can occur anywhere: Schools and universities, mosques, prisons, and community centers, or the Internet. Academic settings are excellent environments because they possess the characteristics of being both open to the public, and at the same time being isolated for students to gather and study. Students are generally at an impressionable age and are seeking to establish their unique identities. Prisons are extremely fertile grounds for the conversion and radicalization process. Inmates are often attracted to an extreme form of Islam because it may provide justification for their violent tendencies. These persons represent a particular threat because of their past criminal histories, their predisposition for violence, and the revolutionary and violent subculture that exists in most prisons. For example, the four suspected terrorists arrested in 2005 in Torrance, California, charged with plotting to attack U.S. military recruiting facilities and synagogues in the Los Angeles area, were recruited by the founder of a violent extremist group from his cell in Folsom Prison in California. He successfully recruited and radicalized fellow inmates and others outside the prison to join his mission, which was to terrorize and exterminate those he saw as “infidels” (Mueller, 2006).
Still, other scholars and researchers posit that the radicalization process is best explained as a complex and multi-faceted method involving various factors, conditions, and theories that cannot always be explained with simplistic analysis or one-dimensionality. Often several areas may overlap such as socio-economics, identity politics, social affiliations, psychosocial issues, or continuous exposure to radical ideology (Beutel, 2009).
After reading the various concepts and the processes of radicalization and some of the factors contributing to the exponential growth of radicalized American citizens or residents you will now move on to the lecture concerning the impact that globalization and the Internet have had on both the radicalization of homegrown and transnational terrorists and what implications these trends portend for American law enforcement officials, as well as, counterterrorism policymakers in Module Notes Two.
References:
Beutel, A.J. (2009). Building bridges to strengthened America: Forging an effective counterterrorism enterprise between Muslim Americans and law enforcement (Links to an external site.). [pp. 16–22] [PDF, File Size 392KB]. Retrieved from http://buildingbridgeswny.org/articles/MPAC-Counter-Radicalization-Paper.pdf
Brooks, R. A. (2011). Muslim “homegrown” terrorism in the United States. (Links to an external site.) International Security, 36(2), [pp.1–6; 36–41] Retrieved from http://vlib.excelsior.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=a9h&AN=66507589&site=eds-live&scope=site
Committee on Homeland Security (2015). Terror threat snapshot. Retrieved from file:///C:/Users/Administrator/Downloads/(U)%20-%20Committee%20on%20Homeland%20Security%20-%20Terror%20Threat%20Snapshot%20-%20July%202015%20(2)%20(1).pdf
Mueller, R.S. (2006) “Speeches: The Threat of Homegrown Terrorism” (Links to an external site.) Federal Bureau of Investigation. Retrieved from https://www.fbi.gov/news/speeches/the-threat-of-homegrown-terrorism
New America. (2015). Homegrown extremism – 2001–2015. (Links to an external site.) Retrieved from http://securitydata.newamerica.net/extremists/analysis.html
Sacirbey, O. (2012). Homegrown Muslim terror threat ‘tiny,’ (Links to an external site.) report says. Christian Century, 129(5), [pp.18–19]. Retrieved from http://vlib.excelsior.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=a9h&AN=72887577&site=eds-live&scope=site
Stekelenburg, J. (2014). Going All the Way: Politicizing, Polarizing, and Radicalizing Identity Offline and Online. (Links to an external site.) Sociology Compass, 8(5), [pp. 1–16], 540. Retrieved from http://vlib.excelsior.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=edb&AN=95662445&site=eds-live&scope=site
Module 3: Module Notes Two: The Internet, Radicalization, Globalization, and Their Implications of Law Enforcement
Although the media has intensified the amount attention given to the recent terrorist acts committed by homegrown jihadist (Islamists) in the United States of America, there has been a relatively lengthy history of homegrown terrorists and terrorist networks motivated and radicalized by extreme Islamists operating within America. For example, in March of 1977, armed African-Americans, radicalized converts to Islam, brutally attacked an Islamic Center, the headquarters of the B’nai B’rith, and the City Council in Washington, D.C., demanding certain things in the name of their terrorist organization – the Hanafi Muslims. (Vidino, 2009).
In 1980, another murder motivated by a radicalized Islamist convert shed more blood on the streets of the nation’s capital, described as follows:
On the morning of 22 July 1980, Ali Akbar Tabatabai, a former press attaché at the Iranian Embassy in Washington, was shot dead on the doorstep of his Bethesda home. Tabatabai’s killer was a Long Island native, and former Baptist named David Theodore Belfield. Belfield, an African-American convert to Sunni Islam, who also went by the name Dawud Salahuddin, had been hired by Iranian officials to conduct the assassination. Belfield left America a few hours after the murder, reportedly finding shelter in the Geneva home of Said Ramadan, the right-hand man of Muslim Brotherhood founder Hassan al-Banna and one of the movement’s most influential leaders of the last 50 years. Belfield eventually reached Iran, where he has been living ever since. “I was primed for violence, and I thought about cratering the White House a quarter century before Al Qaeda did,” said Belfield in a 2002 interview with The New Yorker. “It would be accurate to say that my biggest aspiration was to bring America to its knees, but I didn’t know how.” (Vidino, 2009, pp. 1–2).
Beginning in the 1990s’ more radicalized extremists’ violence started with the 1993 World Trade Center bombing (Links to an external site.) that killed six people and injured more than a thousand. The seven culprits in that terrorist incident were transnational radicalized Islamist terrorists residing in America. This event was then followed by one of the worst acts of domestic terrorism with the 1995 bombing of the federal building in Oklahoma City, by Timothy McVeigh. (Links to an external site.) Then, more cases of radicalized domestic terrorism occurred starting with the Fort Hood shootings in 2009 (Links to an external site.), followed in 2015 with the San Bernardino, California killings. The fact that a history of radicalized homegrown and transnational terrorism continues daily is a grim a reminder of the effects that the Internet, especially social media, has had on the radicalization and globalization of worldviews.
Thought must be given to the realization that the Internet and social media will have an increasingly important role in the recruitment, coordination, and radicalization of future domestic terrorists. The Internet has changed the playing field for the radicalization of Americans citizens and residents, particularly for the lone wolf types who work purely from leaderless terrorist cells, using the Internet to convert people into potential mass murderers. The Internet can offer the viewer information that confirms their beliefs in that it acts as an ‘echo chamber’ amplifying their preexisting extremist ideologies and violent tendencies. Most notably, the Internet provides a medium that “normalizes” abnormal behaviors, thus making extreme violence seem to be an accepted form of redress concerning a perceived grievance, and possibly revenge. Particularly crucial in this part of the radicalization process are the videos showing graphic and horrific images that reinforce a particular violent mindset. The Internet allows viewers to affiliate with like-minded persons they would not otherwise find offline – creating an online community of “believers” (Institute for Strategic Dialogue, 2011, pp. 1–4).
Other scholars, such as Von Behr, Reding, Edwards, & Gribbon (2013), researched five hypotheses regarding the use of the Internet and radicalization:
- The internet creates more opportunities to become radicalized.
- The internet acts as an ‘echo chamber’.
- The internet accelerates the process of radicalization.
- The internet allows radicalization to occur without physical contact.
- The internet increases opportunities for self-radicalization (pp.xi).
Interestingly, Von Behr, Reding, Edwards, & Gribbon (2013), found that the Internet alone does not necessarily accelerate or increase radicalization. They conclude that, “the Internet does not replace the need for individuals to meet in person, particularly leaders of the organization, during their radicalization process; and that the internet is not a substitute for in-person meetings but, rather, complements in-person communication” (p.xii). However, they also conclude that self-radicalization, “…will not necessarily reflect the way in which all violent extremists and terrorists use the Internet” (p.xii).
In a 2007 National Intelligence Estimate, entitled The Terrorist Threat to the US Homeland, the following testimony was presented:
The spread of radical – especially Salafi – Internet sites, increasingly aggressive anti-US rhetoric and actions, and the growing number of radical, self-generating cells in Western countries indicate that the radical and violent segment of the West’s Muslim population is expanding, including in the United States. The arrest and prosecution by US law enforcement of a small number of violent Islamic extremists in the United States – who are becoming more connected ideologically, virtually, and/or in a physical sense to the global extremist movement – points to the possibility that others may become sufficiently radicalized that they will view the use of violence here as legitimate. In testimony before the U.S. House of Representatives, Dr. Thomas Fingar, the Deputy Director of National Intelligence for Analysis, further explained the potential link between a rise in homegrown terrorism and the Internet: [T]he growing use of the Internet to identify and connect with networks throughout the world offers opportunities to build relationships and gain expertise that previously were available only in overseas training camps. It is likely that such independent groups will use information on destructive tactics available on the Internet to boost their capabilities. In presenting the NYPD report on violent Islamist extremism to the Committee, Lawrence Sanchez, the Assistant Commissioner of NYPD’s Intelligence Division, testified that the Internet has become the most significant factor in the radicalization process in America today and can play a role in all four steps of that process. According to the NYPD report: As individuals progress through the various [radicalization] stages, their use of the Internet evolves as well. In the Self-Identification phase, the Internet serves chiefly as the person’s source of information about Islam and a venue to meet other seekers online. With the aggressive proliferation of the jihadi-Salafi ideology online, it is nearly impossible for someone to avoid this extreme interpretation of Islam. During the Indoctrination phase, those undergoing this self-imposed brainwashing devote their time in the cyber world to the extremist sites and chat rooms – tapping into virtual networks of like-minded individuals around the world who reinforce the individual’s beliefs and commitment and further legitimize them. At this stage, individuals or the groups they are in are likely to begin proliferating jihadi-Salafist ideology online along with consuming it. The Internet becomes a virtual “echo chamber” – acting as a radicalization accelerant while creating the path for the ultimate stage of Jihadization. In the Jihadization phase, people challenge and encourage each others’ move to action. The Internet is now a tactical resource for obtaining instructions on constructing weapons, gathering information on potential targets, and providing spiritual justification for an attack. (U.S. Senate Committee, pp.11–12).
Radicalization predicated on political, religious, social, or single-issue extremism will continue to challenge American law enforcement capabilities. Inherent in understanding radicalization and attempting to defeat its violent goals also requires having an understanding of the difference between an extremist, and a fully operational terrorist. That is, merely belonging to an extremist organization, or expressing extremist or radical ideologies does not necessarily lead one to actually commit an act of terrorism, however, once one commits to the operational terrorist stage an act of terrorism is imminent. Adding to this daunting challenge for law enforcement officials is the ever expanding and ubiquitous use of electronic information, encryption, and the vast social networks protected by the First Amendment to the U.S. Constitution (Links to an external site.) (Webster, 2009).
Some of the critical challenges that law enforcement and counter-terrorism policymakers must address in the future lie in three areas, according to Bjelopera (2013).
- First is the issue of definitions. It is difficult to assess the scope of domestic terrorism because federal agencies use varying terms to describe it. More so, there is no clear sense of how many domestic terrorist attacks have occurred or how many plots the government has foiled in recent years.
- Second, Congress may review the adequacy of domestic terrorism intelligence collection efforts. For intelligence gathering and program prioritization purposes, there is no standard set of intelligence collection priorities across federal agencies that can be applied to domestic terrorism cases.
- Finally, and most importantly, which particular groups are, and should be, considered domestic terrorist organizations? The U.S. government does not provide a public answer to this question. Rather, the federal government defines the issue regarding “threats,” not groups. While statutory and practical federal definitions exist for “domestic terrorism,” there is little clear sense of the scope of the domestic terrorist threat based on publicly available U.S. government information. Most broadly, it has been said that in much of the post-9/11 period, the federal courts and Department of Justice may have applied different parameters when sorting, counting, and categorizing all types of terrorist prosecutions—let alone domestic terrorism cases. A 2009 study (critiqued by DOJ) found that the U.S. Federal District Courts, DOJ’s National Security Division, and federal prosecutors rely on different criteria to determine whether or not specific cases involve terrorism at all (Bjelopera, 2013, p.3).
Another particular challenge to law enforcement is the radicalized “lone wolf.” Because they operate alone, now sometimes in pairs as the Boston Marathon bombers, and San Bernardino husband and wife term, it becomes more problematic for law enforcement to assess which radicalized individuals will turn their beliefs into terrorist activity. One former FBI counterterrorism official has said: “The lone wolf is arguably one of the biggest challenges to American law enforcement. How do you get into the mind of a terrorist?” (Bjelopera, 2013, p.60).
Finally, U.S. counterterrorism officials continue to grapple with the newest challenge – encryption. Law enforcement officials are asking companies such as Apple© and Google© to provide backdoor access to their locked platforms so law enforcement can more easily detect and find terrorists, as the war on Islamic State broadens in the aftermath of the 2015 Paris massacre. ISIS recruiters have used Twitter© and Facebook©; to find sympathizers according to the FBI cyber security specialists. However, Apple© claims that they have never worked with the government from any country on this issue (i.e., backdoor access), and insist that they never will (Allison, 2015).
Before continuing on with your reading, please pause to view the following video or refer to its text transcript.
Now you will now have an opportunity to discuss some of these concepts and ideas you have read in the lectures and readings as you move to the Discussion Board.
References:
Allison, G. (2015, November 18). ISIS Uses Apple, Google Encryption To ‘Go Dark:’ FBI. (Links to an external site.) Investor’s Business Daily. [p.1]. Retrieved from http://vlib.excelsior.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=111014639&site=eds-live&scope=site
Bjelopera, J.P. (2013). The domestic terrorist threat: Background and issues for Congress. (Links to an external site.) [PDF, File Size 732KB] [pp.54–69]. Retrieved from https://www.fas.org/sgp/crs/terror/R42536.pdf (Links to an external site.)
Hickey, E. W. (2003). Encyclopedia of Murder and Violent Crime. Thousand Oaks, Clif: SAGE Publications, Inc. http://vlib.excelsior.edu/login?url=https://search.ebscohost.com/login.aspx?direct=true&db=e000xna&AN=474289&scope=site&ebv=EB&ppid=pp_302 (Links to an external site.)
Institute for Strategic Dialogue (2011). Radicalization: The role of the internet: A working paper of the PPN. [pp.1–4]. Retrieved from http://www.strategicdialogue.org/allnewmats/idandsc2011/StockholmPPN2011_BackgroundPaper_FINAL.pdf
Vidino, L. (2009). Homegrown Jihadist Terrorism in the United States: A New and Occasional Phenomenon? (Links to an external site.) Studies in Conflict & Terrorism, 32(1), [pp.1–17.] Retrieved from http://vlib.excelsior.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=sih&AN=36161131&site=eds-live&scope=site
Von Behr, I., Reding, A., Edwards, C., & Gribbon, L. (2013). Radicalization in the digital era: The use of the internet in 15 cases of terrorism and extremism. (Links to an external site.) [PDF, File Size 1.23MB] [pp.xi–xiii]. Retrieved from http://www.rand.org/content/dam/rand/pubs/research_reports/RR400/RR453/RAND_RR453.pdf
United States Senate Committee on Homeland Security and Governmental Affairs: Majority and Minority Staff Report. (2008). Violent Islamist Extremism, The Internet, and the Homegrown Terrorist Threat. [PDF, File Size 1.66MB] [pp. 1–16].Retrieved from http://www.strategicdialogue.org/allnewmats/idandsc2011/StockholmPPN2011_BackgroundPaper_FINAL.pdf
Webster, W. (2009). The Federal Bureau of Investigation, counterterrorism intelligence, and the events at Fort Hood, Texas, on November 5, 2009. [pp.11–15].
M3D2: The Enemy Within
Module 3
The process of radicalization often begins with persons who are disaffected with their lives, lonely, frustrated, or angry with the politics of the American government. However, in the case of Major Nidal Malik Hasan, he was a board certified psychiatrist, with 15 years of military service. He was a religious person, with no known foreign travel. He was a member of two professional mental health associations, whose missions were to promote non-violent behavior. Without warning, he killed and wounded numerous unarmed soldiers at Fort Hood, Texas.
Upon completion of this activity, you will be able to:
- Explain the stages involved in the radicalization processes of homegrown terrorists.
- Discuss the effects of the media and Internet on the radicalization of Americans.
After reviewing the assignments, module notes, and videos in the Learning & Assessment Activities page, you will have a better understanding of the many issues surrounding defining the term terrorism. Respond to the following:
- Discuss how the processes of radicalization can transform persons into extremists and terrorists. To what extent does the Internet alone contribute to the radicalization violent extremism
Post must be 250 words in APA format including in-text citations and references pertaining to module readings, and/or additional outside resources. Please reference and cite your readings and viewings in support of your responses.
Did you know that effective analysis of concepts requires professionalism in handling academic research Papers? Do no compromise on your grade choose professional Research writers at homeworkcrew.com
[ad_2]
Source link
"96% of our customers have reported a 90% and above score. You might want to place an order with us."
