SlideShare a Scribd company logo
250 word discussion response james wk 7
Fully utilize the materials that have been provided to you in order to support your response.
Responses should be a minimum of 250 words and include direct questions. You may
challenge, support or supplement another student’s answer using the terms, concepts
and theories from the required readings. Also, do not be afraid to respectfully disagree
where you feel appropriate; as this should be part of your analysis process at this academic
level.Forum posts are graded on timeliness, relevance, knowledge of the weekly readings,
and the quality of original ideas. Sources utilized to support answers are to be cited in
accordance with the APA writing style by providing a general parenthetical citation
(reference the author, year and page number) within your post, as well as an adjoining
reference list. Refer to grading rubric for additional details concerning grading
criteria.Respond to James:Unlike the terrorist of the past, where terrorists needed to have
in person interactions with others with the same mind set, but in the current age of
technology, that is a thing of the past. The internet has brought information to the finger
tips of the potential terrorists, along with being able to communicate to like minded people
with terrorist intent. Because of this, there can be long distance encouragement to become
radicalized into Lone wolves’ terrorists may become radicalized within an Internet
chatroom group that offers the emotional support and security that human beings often
seek. and even commit acts of terror on the suspecting public. (Dr. Mouras, 2015).
Furthermore, the internet has become the tool of choice for how to advice on acts of
terrorism, while being able to mask the identities of all persons, who access the information.
“However, even with the prevalence of online forums where hate-speech and pro-
terrorist sentiment flourishes, distinguishing between the thousands of individuals
accessing and posting content on these websites and the handful who may at some point act
on their feelings is nearly impossible― (Connor & Flynn, 2018). It basically turns the
situation into a needle in a hay stack, with really no way to tell who would commit an act or
terror versus someone venting and complaining about parts of society and or the
government. Moreover, social media has become more aggressive in removing content
related to extremist views and possible in sighting of terrorism from their platforms. I even
thought this is in good intent but makes is harder for law enforcement and the Department
of Homeland Security to identify and track the persons involved with these postings
(Connor & Flynn, 2018). In these cases, intelligence is limited with lone wolves and once
these people go off the grid, there is almost no way to detect a lone wolf terrorist attack
until the attack is actually taking place. Terrorist have taken note of the degree of difficultly
and are calling for an increased effort of lone wolf attacks (Connor & Flynn, 2018).It is best
said “In light of the inevitable terrorism-related “public overreaction to highly
publicized, low-probability risks,” “[t]he best response is information and education
(Barnes, 2013). Information is key to everything on the planet. If you do not have the
needed information, something you are looking for could be in front of you and you would
never realize this. That is no different in law enforcement and the general public. As the
campaign from Department of Homeland Security says “See something, Say
Something―. Most law enforcement offices, unless they are New York Police officer
general receive limited information about terrorism in the police academy. Furthermore,
getting the public involved in reporting active goes a lot further than some may realize too.
Who knows the streets better than anyone in a city, the people who live by them, work near
them and so on. Community policing goes along way when the community has a good
relationship with their police departments, Moreover, the use of informants, surveillance,
requiring additional reporting of material that is hazardous or unstable when bought in
larger than average amounts, which could led to what is called a denial of means and police
departments conducting physical security assessments of location (Barnes, 2013). All of
these can help lower the chance of a lone wolf terrorist being able to carry out an attack at
the local police level of enforcement. Without chances as stated, it would further increase
the complexity and the degree of difficulty in attempting to locate and or discover a lone
wolf terrorist, which is why terrorists see this as the way of the future of terrorism and I
believe this will increase over the next decade. The public and the police departments
around the United States need to be prepared to share information that could possibly save
the lives of incent Americas.JamesConnor, J. C. & Flynn, C. R. (2018) What To Do About Lone
Wolf Terrorism? Examining Current Trends and Prevention Strategies. Foreign Policy
Research Institute. Retrieved from https://www.fpri.org/article/2018/11/what-to-do-
about-lone-wolf-terrorism-examining-current-trends-and-prevention-strategies/Barnes, B.
D. (2013) Confronting The One-Man Wolf Pack: Adapting Law Enforcement and Prosecution
Responses to the Threat of Lone Wolf Terrorism. Boston University School of Law.
Retrieved from https://www.bu.edu/law/journals-
archive/bulr/volume92n4/documents/BARNES.pdfDr. Mouras, T. (2015) Lone Wolves: Are
They Really Alone in the Radicalization Process? In Public Safety. Retrieved from
https://inpublicsafety.com/2015/02/lone-wolves-are-they-really-alone-in-the-
radicalization-process/

More Related Content

Similar to 250 word discussion response james wk 7.docx

Digital Breadcrumbs- Investigating Internet Crime with Open Source Intellige...
Digital Breadcrumbs-  Investigating Internet Crime with Open Source Intellige...Digital Breadcrumbs-  Investigating Internet Crime with Open Source Intellige...
Digital Breadcrumbs- Investigating Internet Crime with Open Source Intellige...
Nicholas Tancredi
 
Digital Breadcrums: Investigating Internet Crime with Open Source Intelligenc...
Digital Breadcrums: Investigating Internet Crime with Open Source Intelligenc...Digital Breadcrums: Investigating Internet Crime with Open Source Intelligenc...
Digital Breadcrums: Investigating Internet Crime with Open Source Intelligenc...
Nicholas Tancredi
 
Essay On Terrorism
Essay On TerrorismEssay On Terrorism
Essay On Terrorism
Custom Paper Writing Service
 
Respond to 2 students and professor. 150 words each student no word
Respond to 2 students and professor. 150 words each student no word Respond to 2 students and professor. 150 words each student no word
Respond to 2 students and professor. 150 words each student no word
mickietanger
 
The Patriot Act Title Vii Section 814 And 816
The Patriot Act Title Vii Section 814 And 816The Patriot Act Title Vii Section 814 And 816
The Patriot Act Title Vii Section 814 And 816
Nicole Fields
 
Hacking CT Hacking for Diplomacy week 8
Hacking CT Hacking for Diplomacy week 8Hacking CT Hacking for Diplomacy week 8
Hacking CT Hacking for Diplomacy week 8
Stanford University
 
CyberTerrorismACaseOfAliceInWonderland
CyberTerrorismACaseOfAliceInWonderlandCyberTerrorismACaseOfAliceInWonderland
CyberTerrorismACaseOfAliceInWonderland
Enrique J Cordero
 
250 words agree or disagree Wow! We are on our 7th week! One m.docx
250 words agree or disagree Wow! We are on our 7th week! One m.docx250 words agree or disagree Wow! We are on our 7th week! One m.docx
250 words agree or disagree Wow! We are on our 7th week! One m.docx
vickeryr87
 
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
Alireza Ghahrood
 
WHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docx
WHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docxWHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docx
WHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docx
philipnelson29183
 
Social network analysis and audience segmentation, presented by Jason Baldridge
Social network analysis and audience segmentation, presented by Jason BaldridgeSocial network analysis and audience segmentation, presented by Jason Baldridge
Social network analysis and audience segmentation, presented by Jason Baldridge
SocialMedia.org
 
HomegrownViolentExtremismAwarenessBrief
HomegrownViolentExtremismAwarenessBriefHomegrownViolentExtremismAwarenessBrief
HomegrownViolentExtremismAwarenessBrief
Benjamin James Davila
 

Similar to 250 word discussion response james wk 7.docx (12)

Digital Breadcrumbs- Investigating Internet Crime with Open Source Intellige...
Digital Breadcrumbs-  Investigating Internet Crime with Open Source Intellige...Digital Breadcrumbs-  Investigating Internet Crime with Open Source Intellige...
Digital Breadcrumbs- Investigating Internet Crime with Open Source Intellige...
 
Digital Breadcrums: Investigating Internet Crime with Open Source Intelligenc...
Digital Breadcrums: Investigating Internet Crime with Open Source Intelligenc...Digital Breadcrums: Investigating Internet Crime with Open Source Intelligenc...
Digital Breadcrums: Investigating Internet Crime with Open Source Intelligenc...
 
Essay On Terrorism
Essay On TerrorismEssay On Terrorism
Essay On Terrorism
 
Respond to 2 students and professor. 150 words each student no word
Respond to 2 students and professor. 150 words each student no word Respond to 2 students and professor. 150 words each student no word
Respond to 2 students and professor. 150 words each student no word
 
The Patriot Act Title Vii Section 814 And 816
The Patriot Act Title Vii Section 814 And 816The Patriot Act Title Vii Section 814 And 816
The Patriot Act Title Vii Section 814 And 816
 
Hacking CT Hacking for Diplomacy week 8
Hacking CT Hacking for Diplomacy week 8Hacking CT Hacking for Diplomacy week 8
Hacking CT Hacking for Diplomacy week 8
 
CyberTerrorismACaseOfAliceInWonderland
CyberTerrorismACaseOfAliceInWonderlandCyberTerrorismACaseOfAliceInWonderland
CyberTerrorismACaseOfAliceInWonderland
 
250 words agree or disagree Wow! We are on our 7th week! One m.docx
250 words agree or disagree Wow! We are on our 7th week! One m.docx250 words agree or disagree Wow! We are on our 7th week! One m.docx
250 words agree or disagree Wow! We are on our 7th week! One m.docx
 
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
 
WHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docx
WHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docxWHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docx
WHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docx
 
Social network analysis and audience segmentation, presented by Jason Baldridge
Social network analysis and audience segmentation, presented by Jason BaldridgeSocial network analysis and audience segmentation, presented by Jason Baldridge
Social network analysis and audience segmentation, presented by Jason Baldridge
 
HomegrownViolentExtremismAwarenessBrief
HomegrownViolentExtremismAwarenessBriefHomegrownViolentExtremismAwarenessBrief
HomegrownViolentExtremismAwarenessBrief
 

More from write12

Social What directed your interest to this.docx
Social What directed your interest to this.docxSocial What directed your interest to this.docx
Social What directed your interest to this.docx
write12
 
Soap notes will be uploaded to Moodle and put through.docx
Soap notes will be uploaded to Moodle and put through.docxSoap notes will be uploaded to Moodle and put through.docx
Soap notes will be uploaded to Moodle and put through.docx
write12
 
Social Poverty.docx
Social Poverty.docxSocial Poverty.docx
Social Poverty.docx
write12
 
Soap Note Diabetes Mellitus.docx
Soap Note Diabetes Mellitus.docxSoap Note Diabetes Mellitus.docx
Soap Note Diabetes Mellitus.docx
write12
 
Social Disorganization.docx
Social Disorganization.docxSocial Disorganization.docx
Social Disorganization.docx
write12
 
SOC101 Assignment Sheet Interview.docx
SOC101 Assignment Sheet Interview.docxSOC101 Assignment Sheet Interview.docx
SOC101 Assignment Sheet Interview.docx
write12
 
Slide 1 Title Page Slide 2 3.docx
Slide 1 Title Page Slide 2 3.docxSlide 1 Title Page Slide 2 3.docx
Slide 1 Title Page Slide 2 3.docx
write12
 
Social media sites have recently drew decision attention and influenced.docx
Social media sites have recently drew decision attention and influenced.docxSocial media sites have recently drew decision attention and influenced.docx
Social media sites have recently drew decision attention and influenced.docx
write12
 
Smart Desk For Elderly.docx
Smart Desk For Elderly.docxSmart Desk For Elderly.docx
Smart Desk For Elderly.docx
write12
 
Social cognition is the mental activity relating to social.docx
Social cognition is the mental activity relating to social.docxSocial cognition is the mental activity relating to social.docx
Social cognition is the mental activity relating to social.docx
write12
 
Social Context Ethics Prior to beginning work on the.docx
Social Context Ethics Prior to beginning work on the.docxSocial Context Ethics Prior to beginning work on the.docx
Social Context Ethics Prior to beginning work on the.docx
write12
 
Sketching a Process flow diagram.docx
Sketching a Process flow diagram.docxSketching a Process flow diagram.docx
Sketching a Process flow diagram.docx
write12
 
Sixth Century Course SX3504.docx
Sixth Century Course SX3504.docxSixth Century Course SX3504.docx
Sixth Century Course SX3504.docx
write12
 
Social media and its data are both a challenge and.docx
Social media and its data are both a challenge and.docxSocial media and its data are both a challenge and.docx
Social media and its data are both a challenge and.docx
write12
 
Social Media and.docx
Social Media and.docxSocial Media and.docx
Social Media and.docx
write12
 
Social Psychology of Prosocial.docx
Social Psychology of Prosocial.docxSocial Psychology of Prosocial.docx
Social Psychology of Prosocial.docx
write12
 
Social media for.docx
Social media for.docxSocial media for.docx
Social media for.docx
write12
 
Sleep report.docx
Sleep report.docxSleep report.docx
Sleep report.docx
write12
 
Social Media and Consumer Behavior.docx
Social Media and Consumer Behavior.docxSocial Media and Consumer Behavior.docx
Social Media and Consumer Behavior.docx
write12
 
social media.docx
social media.docxsocial media.docx
social media.docx
write12
 

More from write12 (20)

Social What directed your interest to this.docx
Social What directed your interest to this.docxSocial What directed your interest to this.docx
Social What directed your interest to this.docx
 
Soap notes will be uploaded to Moodle and put through.docx
Soap notes will be uploaded to Moodle and put through.docxSoap notes will be uploaded to Moodle and put through.docx
Soap notes will be uploaded to Moodle and put through.docx
 
Social Poverty.docx
Social Poverty.docxSocial Poverty.docx
Social Poverty.docx
 
Soap Note Diabetes Mellitus.docx
Soap Note Diabetes Mellitus.docxSoap Note Diabetes Mellitus.docx
Soap Note Diabetes Mellitus.docx
 
Social Disorganization.docx
Social Disorganization.docxSocial Disorganization.docx
Social Disorganization.docx
 
SOC101 Assignment Sheet Interview.docx
SOC101 Assignment Sheet Interview.docxSOC101 Assignment Sheet Interview.docx
SOC101 Assignment Sheet Interview.docx
 
Slide 1 Title Page Slide 2 3.docx
Slide 1 Title Page Slide 2 3.docxSlide 1 Title Page Slide 2 3.docx
Slide 1 Title Page Slide 2 3.docx
 
Social media sites have recently drew decision attention and influenced.docx
Social media sites have recently drew decision attention and influenced.docxSocial media sites have recently drew decision attention and influenced.docx
Social media sites have recently drew decision attention and influenced.docx
 
Smart Desk For Elderly.docx
Smart Desk For Elderly.docxSmart Desk For Elderly.docx
Smart Desk For Elderly.docx
 
Social cognition is the mental activity relating to social.docx
Social cognition is the mental activity relating to social.docxSocial cognition is the mental activity relating to social.docx
Social cognition is the mental activity relating to social.docx
 
Social Context Ethics Prior to beginning work on the.docx
Social Context Ethics Prior to beginning work on the.docxSocial Context Ethics Prior to beginning work on the.docx
Social Context Ethics Prior to beginning work on the.docx
 
Sketching a Process flow diagram.docx
Sketching a Process flow diagram.docxSketching a Process flow diagram.docx
Sketching a Process flow diagram.docx
 
Sixth Century Course SX3504.docx
Sixth Century Course SX3504.docxSixth Century Course SX3504.docx
Sixth Century Course SX3504.docx
 
Social media and its data are both a challenge and.docx
Social media and its data are both a challenge and.docxSocial media and its data are both a challenge and.docx
Social media and its data are both a challenge and.docx
 
Social Media and.docx
Social Media and.docxSocial Media and.docx
Social Media and.docx
 
Social Psychology of Prosocial.docx
Social Psychology of Prosocial.docxSocial Psychology of Prosocial.docx
Social Psychology of Prosocial.docx
 
Social media for.docx
Social media for.docxSocial media for.docx
Social media for.docx
 
Sleep report.docx
Sleep report.docxSleep report.docx
Sleep report.docx
 
Social Media and Consumer Behavior.docx
Social Media and Consumer Behavior.docxSocial Media and Consumer Behavior.docx
Social Media and Consumer Behavior.docx
 
social media.docx
social media.docxsocial media.docx
social media.docx
 

Recently uploaded

BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience
Wahiba Chair Training & Consulting
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
GeorgeMilliken2
 
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
สมใจ จันสุกสี
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
MJDuyan
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
Katrina Pritchard
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
Jyoti Chand
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
RAHUL
 
IGCSE Biology Chapter 14- Reproduction in Plants.pdf
IGCSE Biology Chapter 14- Reproduction in Plants.pdfIGCSE Biology Chapter 14- Reproduction in Plants.pdf
IGCSE Biology Chapter 14- Reproduction in Plants.pdf
Amin Marwan
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
TechSoup
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
TechSoup
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
EduSkills OECD
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 

Recently uploaded (20)

BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
 
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
 
IGCSE Biology Chapter 14- Reproduction in Plants.pdf
IGCSE Biology Chapter 14- Reproduction in Plants.pdfIGCSE Biology Chapter 14- Reproduction in Plants.pdf
IGCSE Biology Chapter 14- Reproduction in Plants.pdf
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 

250 word discussion response james wk 7.docx

  • 1. 250 word discussion response james wk 7 Fully utilize the materials that have been provided to you in order to support your response. Responses should be a minimum of 250 words and include direct questions. You may challenge, support or supplement another student’s answer using the terms, concepts and theories from the required readings. Also, do not be afraid to respectfully disagree where you feel appropriate; as this should be part of your analysis process at this academic level.Forum posts are graded on timeliness, relevance, knowledge of the weekly readings, and the quality of original ideas. Sources utilized to support answers are to be cited in accordance with the APA writing style by providing a general parenthetical citation (reference the author, year and page number) within your post, as well as an adjoining reference list. Refer to grading rubric for additional details concerning grading criteria.Respond to James:Unlike the terrorist of the past, where terrorists needed to have in person interactions with others with the same mind set, but in the current age of technology, that is a thing of the past. The internet has brought information to the finger tips of the potential terrorists, along with being able to communicate to like minded people with terrorist intent. Because of this, there can be long distance encouragement to become radicalized into Lone wolves’ terrorists may become radicalized within an Internet chatroom group that offers the emotional support and security that human beings often seek. and even commit acts of terror on the suspecting public. (Dr. Mouras, 2015). Furthermore, the internet has become the tool of choice for how to advice on acts of terrorism, while being able to mask the identities of all persons, who access the information. “However, even with the prevalence of online forums where hate-speech and pro- terrorist sentiment flourishes, distinguishing between the thousands of individuals accessing and posting content on these websites and the handful who may at some point act on their feelings is nearly impossible― (Connor & Flynn, 2018). It basically turns the situation into a needle in a hay stack, with really no way to tell who would commit an act or terror versus someone venting and complaining about parts of society and or the government. Moreover, social media has become more aggressive in removing content related to extremist views and possible in sighting of terrorism from their platforms. I even thought this is in good intent but makes is harder for law enforcement and the Department of Homeland Security to identify and track the persons involved with these postings (Connor & Flynn, 2018). In these cases, intelligence is limited with lone wolves and once these people go off the grid, there is almost no way to detect a lone wolf terrorist attack until the attack is actually taking place. Terrorist have taken note of the degree of difficultly
  • 2. and are calling for an increased effort of lone wolf attacks (Connor & Flynn, 2018).It is best said “In light of the inevitable terrorism-related “public overreaction to highly publicized, low-probability risks,” “[t]he best response is information and education (Barnes, 2013). Information is key to everything on the planet. If you do not have the needed information, something you are looking for could be in front of you and you would never realize this. That is no different in law enforcement and the general public. As the campaign from Department of Homeland Security says “See something, Say Something―. Most law enforcement offices, unless they are New York Police officer general receive limited information about terrorism in the police academy. Furthermore, getting the public involved in reporting active goes a lot further than some may realize too. Who knows the streets better than anyone in a city, the people who live by them, work near them and so on. Community policing goes along way when the community has a good relationship with their police departments, Moreover, the use of informants, surveillance, requiring additional reporting of material that is hazardous or unstable when bought in larger than average amounts, which could led to what is called a denial of means and police departments conducting physical security assessments of location (Barnes, 2013). All of these can help lower the chance of a lone wolf terrorist being able to carry out an attack at the local police level of enforcement. Without chances as stated, it would further increase the complexity and the degree of difficulty in attempting to locate and or discover a lone wolf terrorist, which is why terrorists see this as the way of the future of terrorism and I believe this will increase over the next decade. The public and the police departments around the United States need to be prepared to share information that could possibly save the lives of incent Americas.JamesConnor, J. C. & Flynn, C. R. (2018) What To Do About Lone Wolf Terrorism? Examining Current Trends and Prevention Strategies. Foreign Policy Research Institute. Retrieved from https://www.fpri.org/article/2018/11/what-to-do- about-lone-wolf-terrorism-examining-current-trends-and-prevention-strategies/Barnes, B. D. (2013) Confronting The One-Man Wolf Pack: Adapting Law Enforcement and Prosecution Responses to the Threat of Lone Wolf Terrorism. Boston University School of Law. Retrieved from https://www.bu.edu/law/journals- archive/bulr/volume92n4/documents/BARNES.pdfDr. Mouras, T. (2015) Lone Wolves: Are They Really Alone in the Radicalization Process? In Public Safety. Retrieved from https://inpublicsafety.com/2015/02/lone-wolves-are-they-really-alone-in-the- radicalization-process/