CJ 360 2-2 MOTIVES
docx
keyboard_arrow_up
School
Southern New Hampshire University *
*We aren’t endorsed by this school
Course
360
Subject
History
Date
Dec 6, 2023
Type
docx
Pages
4
Uploaded by ChiefRookPerson1004
1
2-2 Assignment: Motives
Laura Lira Fuentes
Southern New Hampshire University
CJ-360-R2005 Terrorism in the United States 23EW2
Professor Compton
November 5, 2023
2
2-2: Motives
Homegrown terrorists are individuals who typically don't get direct help from big
terrorist groups, but some of them do try to connect with those famous international terrorist
organizations. They share their ideas and information on the hidden part of the internet, and they
also get their extreme beliefs from websites that promote hate and violence. Homegrown terrorist
refers to extremists who are legal U.S. residents or even citizens, and who are linked to or
inspired by a specific, often intolerant ideology (Taylor & Swanson, 2018).
Initial Motives
On April 19, 1995, there was a truck bombing in Oklahoma City, Oklahoma. This was
done by domestic terrorists, Tim McVeigh and Terry Nichols, who were strongly against the
government. They bombed the Alfred P. Murrah Federal Building. They did this because they
were angry about the government's actions during events like the Ruby Ridge siege in 1992 and
the Waco siege in 1993. They believed the government was trying to take away people's rights,
especially the Second Amendment. So, they decided to attack a federal building, and McVeigh
said it was in retaliation for what happened in Waco, where more than 70 people died
(Jenkins,2023).
How The Motive Changed
As technology has gotten better and different, so have homegrown violent extremists.
They now use social media and the hidden part of the internet to talk about their plans. Also,
they've become more of a threat, not just committing regular crimes, but also using cyberwarfare.
Another problem is that social media makes it easier for people to become radicalized online, as
they don't have to meet in person with other homegrown violent extremists. end-to-end
encrypted messengers—like WhatsApp and Telegram—afford their users privacy by scrambling
3
data sent from the sending device, through the cell tower and server, to the receiving device. In
terrorist applications, these encrypted messaging services allow for unprecedented operational
security, limiting law enforcement's ability to view or disrupt these communiques (Harrison,
2018).
Factors
Radicalization to violence of domestic terrorists is increasingly taking place online, where
violent extremists can use social media for the distribution of propaganda, recruitment, target
selection, and incitement to violence (McGarrity, 2019). Thanks to technological advancements
like the internet, extremists now can easily connect with people worldwide who share their
beliefs. As time passed, McVeigh saw the federal government as a bully that committed terrible
acts both within the United States and in other countries. He thought the government had turned
against its own people. He believed that because the government was, in his view, in conflict
with its citizens, targeting a federal building was like hitting their headquarters.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
4
References
Taylor, R. W., & Swanson, C. R. (2018). Terrorism, Intelligence and Homeland Security (2nd
ed.). Pearson Education (US). https://mbsdirect.vitalsource.com/books/9780134818245
Jenkins, J. Philip (2023, October 9). Oklahoma City bombing. Encyclopedia Britannica.
https://www.britannica.com/event/Oklahoma-City-bombing
Harrison, S. (2018, March 22). Evolving Tech, evolving terror. CSIS.
https://www.csis.org/analysis/evolving-tech-evolving-terror
McGarrity, M. C. (2019, May 8). Confronting the rise of domestic terrorism in the homeland.
FBI. https://www.fbi.gov/news/testimony/confronting-the-rise-of-domestic-terrorism-in-
the-homeland