CJ 360 2-2 MOTIVES

docx

School

Southern New Hampshire University *

*We aren’t endorsed by this school

Course

360

Subject

History

Date

Dec 6, 2023

Type

docx

Pages

4

Uploaded by ChiefRookPerson1004

Report
1 2-2 Assignment: Motives Laura Lira Fuentes Southern New Hampshire University CJ-360-R2005 Terrorism in the United States 23EW2 Professor Compton November 5, 2023
2 2-2: Motives Homegrown terrorists are individuals who typically don't get direct help from big terrorist groups, but some of them do try to connect with those famous international terrorist organizations. They share their ideas and information on the hidden part of the internet, and they also get their extreme beliefs from websites that promote hate and violence. Homegrown terrorist refers to extremists who are legal U.S. residents or even citizens, and who are linked to or inspired by a specific, often intolerant ideology (Taylor & Swanson, 2018). Initial Motives On April 19, 1995, there was a truck bombing in Oklahoma City, Oklahoma. This was done by domestic terrorists, Tim McVeigh and Terry Nichols, who were strongly against the government. They bombed the Alfred P. Murrah Federal Building. They did this because they were angry about the government's actions during events like the Ruby Ridge siege in 1992 and the Waco siege in 1993. They believed the government was trying to take away people's rights, especially the Second Amendment. So, they decided to attack a federal building, and McVeigh said it was in retaliation for what happened in Waco, where more than 70 people died (Jenkins,2023). How The Motive Changed As technology has gotten better and different, so have homegrown violent extremists. They now use social media and the hidden part of the internet to talk about their plans. Also, they've become more of a threat, not just committing regular crimes, but also using cyberwarfare. Another problem is that social media makes it easier for people to become radicalized online, as they don't have to meet in person with other homegrown violent extremists. end-to-end encrypted messengers—like WhatsApp and Telegram—afford their users privacy by scrambling
3 data sent from the sending device, through the cell tower and server, to the receiving device. In terrorist applications, these encrypted messaging services allow for unprecedented operational security, limiting law enforcement's ability to view or disrupt these communiques (Harrison, 2018). Factors Radicalization to violence of domestic terrorists is increasingly taking place online, where violent extremists can use social media for the distribution of propaganda, recruitment, target selection, and incitement to violence (McGarrity, 2019). Thanks to technological advancements like the internet, extremists now can easily connect with people worldwide who share their beliefs. As time passed, McVeigh saw the federal government as a bully that committed terrible acts both within the United States and in other countries. He thought the government had turned against its own people. He believed that because the government was, in his view, in conflict with its citizens, targeting a federal building was like hitting their headquarters.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
4 References Taylor, R. W., & Swanson, C. R. (2018). Terrorism, Intelligence and Homeland Security (2nd ed.). Pearson Education (US). https://mbsdirect.vitalsource.com/books/9780134818245 Jenkins, J. Philip (2023, October 9). Oklahoma City bombing. Encyclopedia Britannica. https://www.britannica.com/event/Oklahoma-City-bombing Harrison, S. (2018, March 22). Evolving Tech, evolving terror. CSIS. https://www.csis.org/analysis/evolving-tech-evolving-terror McGarrity, M. C. (2019, May 8). Confronting the rise of domestic terrorism in the homeland. FBI. https://www.fbi.gov/news/testimony/confronting-the-rise-of-domestic-terrorism-in- the-homeland