SlideShare a Scribd company logo
1 of 2
250 word discussion response james wk 7
Fully utilize the materials that have been provided to you in order to support your response.
Responses should be a minimum of 250 words and include direct questions. You may
challenge, support or supplement another student’s answer using the terms, concepts
and theories from the required readings. Also, do not be afraid to respectfully disagree
where you feel appropriate; as this should be part of your analysis process at this academic
level.Forum posts are graded on timeliness, relevance, knowledge of the weekly readings,
and the quality of original ideas. Sources utilized to support answers are to be cited in
accordance with the APA writing style by providing a general parenthetical citation
(reference the author, year and page number) within your post, as well as an adjoining
reference list. Refer to grading rubric for additional details concerning grading
criteria.Respond to James:Unlike the terrorist of the past, where terrorists needed to have
in person interactions with others with the same mind set, but in the current age of
technology, that is a thing of the past. The internet has brought information to the finger
tips of the potential terrorists, along with being able to communicate to like minded people
with terrorist intent. Because of this, there can be long distance encouragement to become
radicalized into Lone wolves’ terrorists may become radicalized within an Internet
chatroom group that offers the emotional support and security that human beings often
seek. and even commit acts of terror on the suspecting public. (Dr. Mouras, 2015).
Furthermore, the internet has become the tool of choice for how to advice on acts of
terrorism, while being able to mask the identities of all persons, who access the information.
“However, even with the prevalence of online forums where hate-speech and pro-
terrorist sentiment flourishes, distinguishing between the thousands of individuals
accessing and posting content on these websites and the handful who may at some point act
on their feelings is nearly impossible― (Connor & Flynn, 2018). It basically turns the
situation into a needle in a hay stack, with really no way to tell who would commit an act or
terror versus someone venting and complaining about parts of society and or the
government. Moreover, social media has become more aggressive in removing content
related to extremist views and possible in sighting of terrorism from their platforms. I even
thought this is in good intent but makes is harder for law enforcement and the Department
of Homeland Security to identify and track the persons involved with these postings
(Connor & Flynn, 2018). In these cases, intelligence is limited with lone wolves and once
these people go off the grid, there is almost no way to detect a lone wolf terrorist attack
until the attack is actually taking place. Terrorist have taken note of the degree of difficultly
and are calling for an increased effort of lone wolf attacks (Connor & Flynn, 2018).It is best
said “In light of the inevitable terrorism-related “public overreaction to highly
publicized, low-probability risks,” “[t]he best response is information and education
(Barnes, 2013). Information is key to everything on the planet. If you do not have the
needed information, something you are looking for could be in front of you and you would
never realize this. That is no different in law enforcement and the general public. As the
campaign from Department of Homeland Security says “See something, Say
Something―. Most law enforcement offices, unless they are New York Police officer
general receive limited information about terrorism in the police academy. Furthermore,
getting the public involved in reporting active goes a lot further than some may realize too.
Who knows the streets better than anyone in a city, the people who live by them, work near
them and so on. Community policing goes along way when the community has a good
relationship with their police departments, Moreover, the use of informants, surveillance,
requiring additional reporting of material that is hazardous or unstable when bought in
larger than average amounts, which could led to what is called a denial of means and police
departments conducting physical security assessments of location (Barnes, 2013). All of
these can help lower the chance of a lone wolf terrorist being able to carry out an attack at
the local police level of enforcement. Without chances as stated, it would further increase
the complexity and the degree of difficulty in attempting to locate and or discover a lone
wolf terrorist, which is why terrorists see this as the way of the future of terrorism and I
believe this will increase over the next decade. The public and the police departments
around the United States need to be prepared to share information that could possibly save
the lives of incent Americas.JamesConnor, J. C. & Flynn, C. R. (2018) What To Do About Lone
Wolf Terrorism? Examining Current Trends and Prevention Strategies. Foreign Policy
Research Institute. Retrieved from https://www.fpri.org/article/2018/11/what-to-do-
about-lone-wolf-terrorism-examining-current-trends-and-prevention-strategies/Barnes, B.
D. (2013) Confronting The One-Man Wolf Pack: Adapting Law Enforcement and Prosecution
Responses to the Threat of Lone Wolf Terrorism. Boston University School of Law.
Retrieved from https://www.bu.edu/law/journals-
archive/bulr/volume92n4/documents/BARNES.pdfDr. Mouras, T. (2015) Lone Wolves: Are
They Really Alone in the Radicalization Process? In Public Safety. Retrieved from
https://inpublicsafety.com/2015/02/lone-wolves-are-they-really-alone-in-the-
radicalization-process/

More Related Content

Similar to 250 word discussion response james wk 7.docx

Digital Breadcrumbs- Investigating Internet Crime with Open Source Intellige...
Digital Breadcrumbs-  Investigating Internet Crime with Open Source Intellige...Digital Breadcrumbs-  Investigating Internet Crime with Open Source Intellige...
Digital Breadcrumbs- Investigating Internet Crime with Open Source Intellige...Nicholas Tancredi
 
Digital Breadcrums: Investigating Internet Crime with Open Source Intelligenc...
Digital Breadcrums: Investigating Internet Crime with Open Source Intelligenc...Digital Breadcrums: Investigating Internet Crime with Open Source Intelligenc...
Digital Breadcrums: Investigating Internet Crime with Open Source Intelligenc...Nicholas Tancredi
 
Respond to 2 students and professor. 150 words each student no word
Respond to 2 students and professor. 150 words each student no word Respond to 2 students and professor. 150 words each student no word
Respond to 2 students and professor. 150 words each student no word mickietanger
 
The Patriot Act Title Vii Section 814 And 816
The Patriot Act Title Vii Section 814 And 816The Patriot Act Title Vii Section 814 And 816
The Patriot Act Title Vii Section 814 And 816Nicole Fields
 
Hacking CT Hacking for Diplomacy week 8
Hacking CT Hacking for Diplomacy week 8Hacking CT Hacking for Diplomacy week 8
Hacking CT Hacking for Diplomacy week 8Stanford University
 
CyberTerrorismACaseOfAliceInWonderland
CyberTerrorismACaseOfAliceInWonderlandCyberTerrorismACaseOfAliceInWonderland
CyberTerrorismACaseOfAliceInWonderlandEnrique J Cordero
 
250 words agree or disagree Wow! We are on our 7th week! One m.docx
250 words agree or disagree Wow! We are on our 7th week! One m.docx250 words agree or disagree Wow! We are on our 7th week! One m.docx
250 words agree or disagree Wow! We are on our 7th week! One m.docxvickeryr87
 
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...Alireza Ghahrood
 
WHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docx
WHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docxWHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docx
WHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docxphilipnelson29183
 
Social network analysis and audience segmentation, presented by Jason Baldridge
Social network analysis and audience segmentation, presented by Jason BaldridgeSocial network analysis and audience segmentation, presented by Jason Baldridge
Social network analysis and audience segmentation, presented by Jason BaldridgeSocialMedia.org
 
HomegrownViolentExtremismAwarenessBrief
HomegrownViolentExtremismAwarenessBriefHomegrownViolentExtremismAwarenessBrief
HomegrownViolentExtremismAwarenessBriefBenjamin James Davila
 

Similar to 250 word discussion response james wk 7.docx (12)

Digital Breadcrumbs- Investigating Internet Crime with Open Source Intellige...
Digital Breadcrumbs-  Investigating Internet Crime with Open Source Intellige...Digital Breadcrumbs-  Investigating Internet Crime with Open Source Intellige...
Digital Breadcrumbs- Investigating Internet Crime with Open Source Intellige...
 
Digital Breadcrums: Investigating Internet Crime with Open Source Intelligenc...
Digital Breadcrums: Investigating Internet Crime with Open Source Intelligenc...Digital Breadcrums: Investigating Internet Crime with Open Source Intelligenc...
Digital Breadcrums: Investigating Internet Crime with Open Source Intelligenc...
 
Essay On Terrorism
Essay On TerrorismEssay On Terrorism
Essay On Terrorism
 
Respond to 2 students and professor. 150 words each student no word
Respond to 2 students and professor. 150 words each student no word Respond to 2 students and professor. 150 words each student no word
Respond to 2 students and professor. 150 words each student no word
 
The Patriot Act Title Vii Section 814 And 816
The Patriot Act Title Vii Section 814 And 816The Patriot Act Title Vii Section 814 And 816
The Patriot Act Title Vii Section 814 And 816
 
Hacking CT Hacking for Diplomacy week 8
Hacking CT Hacking for Diplomacy week 8Hacking CT Hacking for Diplomacy week 8
Hacking CT Hacking for Diplomacy week 8
 
CyberTerrorismACaseOfAliceInWonderland
CyberTerrorismACaseOfAliceInWonderlandCyberTerrorismACaseOfAliceInWonderland
CyberTerrorismACaseOfAliceInWonderland
 
250 words agree or disagree Wow! We are on our 7th week! One m.docx
250 words agree or disagree Wow! We are on our 7th week! One m.docx250 words agree or disagree Wow! We are on our 7th week! One m.docx
250 words agree or disagree Wow! We are on our 7th week! One m.docx
 
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
 
WHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docx
WHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docxWHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docx
WHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docx
 
Social network analysis and audience segmentation, presented by Jason Baldridge
Social network analysis and audience segmentation, presented by Jason BaldridgeSocial network analysis and audience segmentation, presented by Jason Baldridge
Social network analysis and audience segmentation, presented by Jason Baldridge
 
HomegrownViolentExtremismAwarenessBrief
HomegrownViolentExtremismAwarenessBriefHomegrownViolentExtremismAwarenessBrief
HomegrownViolentExtremismAwarenessBrief
 

More from write12

Social What directed your interest to this.docx
Social What directed your interest to this.docxSocial What directed your interest to this.docx
Social What directed your interest to this.docxwrite12
 
Soap notes will be uploaded to Moodle and put through.docx
Soap notes will be uploaded to Moodle and put through.docxSoap notes will be uploaded to Moodle and put through.docx
Soap notes will be uploaded to Moodle and put through.docxwrite12
 
Social Poverty.docx
Social Poverty.docxSocial Poverty.docx
Social Poverty.docxwrite12
 
Soap Note Diabetes Mellitus.docx
Soap Note Diabetes Mellitus.docxSoap Note Diabetes Mellitus.docx
Soap Note Diabetes Mellitus.docxwrite12
 
Social Disorganization.docx
Social Disorganization.docxSocial Disorganization.docx
Social Disorganization.docxwrite12
 
SOC101 Assignment Sheet Interview.docx
SOC101 Assignment Sheet Interview.docxSOC101 Assignment Sheet Interview.docx
SOC101 Assignment Sheet Interview.docxwrite12
 
Slide 1 Title Page Slide 2 3.docx
Slide 1 Title Page Slide 2 3.docxSlide 1 Title Page Slide 2 3.docx
Slide 1 Title Page Slide 2 3.docxwrite12
 
Social media sites have recently drew decision attention and influenced.docx
Social media sites have recently drew decision attention and influenced.docxSocial media sites have recently drew decision attention and influenced.docx
Social media sites have recently drew decision attention and influenced.docxwrite12
 
Smart Desk For Elderly.docx
Smart Desk For Elderly.docxSmart Desk For Elderly.docx
Smart Desk For Elderly.docxwrite12
 
Social cognition is the mental activity relating to social.docx
Social cognition is the mental activity relating to social.docxSocial cognition is the mental activity relating to social.docx
Social cognition is the mental activity relating to social.docxwrite12
 
Social Context Ethics Prior to beginning work on the.docx
Social Context Ethics Prior to beginning work on the.docxSocial Context Ethics Prior to beginning work on the.docx
Social Context Ethics Prior to beginning work on the.docxwrite12
 
Sketching a Process flow diagram.docx
Sketching a Process flow diagram.docxSketching a Process flow diagram.docx
Sketching a Process flow diagram.docxwrite12
 
Sixth Century Course SX3504.docx
Sixth Century Course SX3504.docxSixth Century Course SX3504.docx
Sixth Century Course SX3504.docxwrite12
 
Social media and its data are both a challenge and.docx
Social media and its data are both a challenge and.docxSocial media and its data are both a challenge and.docx
Social media and its data are both a challenge and.docxwrite12
 
Social Media and.docx
Social Media and.docxSocial Media and.docx
Social Media and.docxwrite12
 
Social Psychology of Prosocial.docx
Social Psychology of Prosocial.docxSocial Psychology of Prosocial.docx
Social Psychology of Prosocial.docxwrite12
 
Social media for.docx
Social media for.docxSocial media for.docx
Social media for.docxwrite12
 
Sleep report.docx
Sleep report.docxSleep report.docx
Sleep report.docxwrite12
 
Social Media and Consumer Behavior.docx
Social Media and Consumer Behavior.docxSocial Media and Consumer Behavior.docx
Social Media and Consumer Behavior.docxwrite12
 
social media.docx
social media.docxsocial media.docx
social media.docxwrite12
 

More from write12 (20)

Social What directed your interest to this.docx
Social What directed your interest to this.docxSocial What directed your interest to this.docx
Social What directed your interest to this.docx
 
Soap notes will be uploaded to Moodle and put through.docx
Soap notes will be uploaded to Moodle and put through.docxSoap notes will be uploaded to Moodle and put through.docx
Soap notes will be uploaded to Moodle and put through.docx
 
Social Poverty.docx
Social Poverty.docxSocial Poverty.docx
Social Poverty.docx
 
Soap Note Diabetes Mellitus.docx
Soap Note Diabetes Mellitus.docxSoap Note Diabetes Mellitus.docx
Soap Note Diabetes Mellitus.docx
 
Social Disorganization.docx
Social Disorganization.docxSocial Disorganization.docx
Social Disorganization.docx
 
SOC101 Assignment Sheet Interview.docx
SOC101 Assignment Sheet Interview.docxSOC101 Assignment Sheet Interview.docx
SOC101 Assignment Sheet Interview.docx
 
Slide 1 Title Page Slide 2 3.docx
Slide 1 Title Page Slide 2 3.docxSlide 1 Title Page Slide 2 3.docx
Slide 1 Title Page Slide 2 3.docx
 
Social media sites have recently drew decision attention and influenced.docx
Social media sites have recently drew decision attention and influenced.docxSocial media sites have recently drew decision attention and influenced.docx
Social media sites have recently drew decision attention and influenced.docx
 
Smart Desk For Elderly.docx
Smart Desk For Elderly.docxSmart Desk For Elderly.docx
Smart Desk For Elderly.docx
 
Social cognition is the mental activity relating to social.docx
Social cognition is the mental activity relating to social.docxSocial cognition is the mental activity relating to social.docx
Social cognition is the mental activity relating to social.docx
 
Social Context Ethics Prior to beginning work on the.docx
Social Context Ethics Prior to beginning work on the.docxSocial Context Ethics Prior to beginning work on the.docx
Social Context Ethics Prior to beginning work on the.docx
 
Sketching a Process flow diagram.docx
Sketching a Process flow diagram.docxSketching a Process flow diagram.docx
Sketching a Process flow diagram.docx
 
Sixth Century Course SX3504.docx
Sixth Century Course SX3504.docxSixth Century Course SX3504.docx
Sixth Century Course SX3504.docx
 
Social media and its data are both a challenge and.docx
Social media and its data are both a challenge and.docxSocial media and its data are both a challenge and.docx
Social media and its data are both a challenge and.docx
 
Social Media and.docx
Social Media and.docxSocial Media and.docx
Social Media and.docx
 
Social Psychology of Prosocial.docx
Social Psychology of Prosocial.docxSocial Psychology of Prosocial.docx
Social Psychology of Prosocial.docx
 
Social media for.docx
Social media for.docxSocial media for.docx
Social media for.docx
 
Sleep report.docx
Sleep report.docxSleep report.docx
Sleep report.docx
 
Social Media and Consumer Behavior.docx
Social Media and Consumer Behavior.docxSocial Media and Consumer Behavior.docx
Social Media and Consumer Behavior.docx
 
social media.docx
social media.docxsocial media.docx
social media.docx
 

Recently uploaded

CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 

Recently uploaded (20)

CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 

250 word discussion response james wk 7.docx

  • 1. 250 word discussion response james wk 7 Fully utilize the materials that have been provided to you in order to support your response. Responses should be a minimum of 250 words and include direct questions. You may challenge, support or supplement another student’s answer using the terms, concepts and theories from the required readings. Also, do not be afraid to respectfully disagree where you feel appropriate; as this should be part of your analysis process at this academic level.Forum posts are graded on timeliness, relevance, knowledge of the weekly readings, and the quality of original ideas. Sources utilized to support answers are to be cited in accordance with the APA writing style by providing a general parenthetical citation (reference the author, year and page number) within your post, as well as an adjoining reference list. Refer to grading rubric for additional details concerning grading criteria.Respond to James:Unlike the terrorist of the past, where terrorists needed to have in person interactions with others with the same mind set, but in the current age of technology, that is a thing of the past. The internet has brought information to the finger tips of the potential terrorists, along with being able to communicate to like minded people with terrorist intent. Because of this, there can be long distance encouragement to become radicalized into Lone wolves’ terrorists may become radicalized within an Internet chatroom group that offers the emotional support and security that human beings often seek. and even commit acts of terror on the suspecting public. (Dr. Mouras, 2015). Furthermore, the internet has become the tool of choice for how to advice on acts of terrorism, while being able to mask the identities of all persons, who access the information. “However, even with the prevalence of online forums where hate-speech and pro- terrorist sentiment flourishes, distinguishing between the thousands of individuals accessing and posting content on these websites and the handful who may at some point act on their feelings is nearly impossible― (Connor & Flynn, 2018). It basically turns the situation into a needle in a hay stack, with really no way to tell who would commit an act or terror versus someone venting and complaining about parts of society and or the government. Moreover, social media has become more aggressive in removing content related to extremist views and possible in sighting of terrorism from their platforms. I even thought this is in good intent but makes is harder for law enforcement and the Department of Homeland Security to identify and track the persons involved with these postings (Connor & Flynn, 2018). In these cases, intelligence is limited with lone wolves and once these people go off the grid, there is almost no way to detect a lone wolf terrorist attack until the attack is actually taking place. Terrorist have taken note of the degree of difficultly
  • 2. and are calling for an increased effort of lone wolf attacks (Connor & Flynn, 2018).It is best said “In light of the inevitable terrorism-related “public overreaction to highly publicized, low-probability risks,” “[t]he best response is information and education (Barnes, 2013). Information is key to everything on the planet. If you do not have the needed information, something you are looking for could be in front of you and you would never realize this. That is no different in law enforcement and the general public. As the campaign from Department of Homeland Security says “See something, Say Something―. Most law enforcement offices, unless they are New York Police officer general receive limited information about terrorism in the police academy. Furthermore, getting the public involved in reporting active goes a lot further than some may realize too. Who knows the streets better than anyone in a city, the people who live by them, work near them and so on. Community policing goes along way when the community has a good relationship with their police departments, Moreover, the use of informants, surveillance, requiring additional reporting of material that is hazardous or unstable when bought in larger than average amounts, which could led to what is called a denial of means and police departments conducting physical security assessments of location (Barnes, 2013). All of these can help lower the chance of a lone wolf terrorist being able to carry out an attack at the local police level of enforcement. Without chances as stated, it would further increase the complexity and the degree of difficulty in attempting to locate and or discover a lone wolf terrorist, which is why terrorists see this as the way of the future of terrorism and I believe this will increase over the next decade. The public and the police departments around the United States need to be prepared to share information that could possibly save the lives of incent Americas.JamesConnor, J. C. & Flynn, C. R. (2018) What To Do About Lone Wolf Terrorism? Examining Current Trends and Prevention Strategies. Foreign Policy Research Institute. Retrieved from https://www.fpri.org/article/2018/11/what-to-do- about-lone-wolf-terrorism-examining-current-trends-and-prevention-strategies/Barnes, B. D. (2013) Confronting The One-Man Wolf Pack: Adapting Law Enforcement and Prosecution Responses to the Threat of Lone Wolf Terrorism. Boston University School of Law. Retrieved from https://www.bu.edu/law/journals- archive/bulr/volume92n4/documents/BARNES.pdfDr. Mouras, T. (2015) Lone Wolves: Are They Really Alone in the Radicalization Process? In Public Safety. Retrieved from https://inpublicsafety.com/2015/02/lone-wolves-are-they-really-alone-in-the- radicalization-process/