Within several units of this course, you have prepared for your course project, which is due in this unit. For your course project, you will be writing a research paper on a domestic terrorist inciden

Do you need academic writing help with your homework? Let us write your papers.


Order a Similar Paper Order a Different Paper

Within several units of this course, you have prepared for your course project, which is due in this unit. For your course project, you will be writing a research paper on a domestic terrorist incident that has occurred in the United States. Utilizing the topic you selected in Unit II and the Unit V Annotated Bibliography, write your final research paper.

  • Discuss the recruitment and radicalization process of lone wolf terrorists in the domestic United States and abroad using the Internet and social media platforms.
  • Explain why terrorists focus on soft targets.
  • Analyze the sociological and psychological impacts that these attacks have had on society.
  • Include three to five recent topics of domestic or global lone wolf terrorist attacks that have occurred. Provide a full synopsis on these incidents to include the sequence of events and the resiliency and reactionary methods used to respond to the incidents. What lessons were learned after each of these events?
  • Offer strategies that can be used to further strengthen the Internet and social media platforms from being used to recruit members, promote propaganda, and radicalize terrorists.

Your final research paper must be a minimum of four pages in length, not counting the title and reference pages. You are required to use a minimum of three outside sources, one of which must be from the CSU Online Library. All sources used, including the textbook, must be cited and referenced according to APA standards.

Within several units of this course, you have prepared for your course project, which is due in this unit. For your course project, you will be writing a research paper on a domestic terrorist inciden
UNIT V ANNOTATED BIBLIOGRAPHY 4 Unit V Annotated Bibliography Yolanda Beck Columbia Southern University Global Terrorism June 29, 2021 ANNOTATED BIBLIOGRAPHY Bergengruen, Vera, Hennigan, W. J., Zorthian, Julia. 2021. On the Hunt for Hate. Time Magazine. Vol. 197 Issue 9/10, p40-45. 6p. 3 Color Photographs. , Database: Academic Search Ultimate. According to the article, the United States President Joe Biden has pursued the help of the Anti-Defamation League (ADL) as part of the government-inclusive effort to battle far-right extremism. The article covers topics such as the decision of Biden to restructure the security network of the US of agencies to help battle domestic radicalism following the siege experienced at the Capitol on January 6, 2021. Furthermore, Biden talks about the challenge of confronting far-right extremism without inciting political crisis or trespassing on the civil liberties of the Americans. The article is connected to my research topic as it focuses on how the US government and leadership can control political terrorism. The report also talks about the terrorist attack experienced in the White House Capitol in January 2021, which is my main area of focus. The article is meant to inform the public on the measures taken by President Joe Biden to address the issue of political. Grant, Melissa Gira. (2021). The Ever-Gathering Storm. The New Republic. 2021, Vol. 252 Issue 3, p12-19. 8p. 3 Color Photographs. , Database: Academic Search Ultimate This article mirrors the rise of the QAnon conspiracy theorists in the US. Different topics are covered, including how the US president Donald Trump augmented and empowered QAnon, the role of QAnon and its Republican supporters in the Capitol riots and the reason why QAnon will still be there even after the Trump era ends. The article sets the record straight regarding the QAnon and how it is linked to the former president, Donald Trump. A lot has been said on how QAnon is linked to terrorism, and this article aims at addressing this issue and implementing a long-term solution. The report is connected to my research topic as some people have linked the January 6, 2021, terrorist attack a Capitol to QAnon. Some people have also been quoted saying that Donald Trump might be connected to the Capitol invasion of January 6, 2021. The article proposes strategies that can be implemented to address terrorism and controversies linked to QAnon. Hughes, Brian; Miller-Idriss, Cynthia. (2021) Uniting for Total Collapse: The January 6 Boost to Accelerationism. CTC Sentinel. Vol. 14 Issue 4, p12, 7 p. Combating Terrorism Center. Language: English, Database: Gale General OneFile The article discusses how crowds fumed the US Capitol on January 6, 2021, which represents an upcoming trend in US far-right extremism. Many other disagreements have continued to emerge since people stormed the Capitol. The authors of this article note that the storming of the Capitol on January 6, 2021, indicates that the US should take the initiative of strengthening security systems. Furthermore, there are also differences in ideologies and political beliefs in the US that have led to clashes and disagreements following the 2020 Presidential elections. People have to understand and respect their differences as they are the source of unity. No race should feel superior over the other as everyone is a US citizen. The article will enable me to explain the cause of the domestic terrorist attack on the White House Capitol on January 6, 2021, and the ways such experiences can be avoided in future. Leon, Luis Feliz. (2021). The Armies of the Right. Vol. 85 Issue 2, p27-30. 4p. 3 Color Photographs. , Database: Academic Search Ultimate Like other previous articles discussed, this one is also connected to the terror attack in the US Capital on January 6, 2021. The article discusses various topics such as how the former president is connected oath keeper, the insurrection in the US, the 2009 Capitol insurrection and other security matters. The article notes that President Joe Biden should take more security measures to ensure that the US citizens are safeguarded from terror attacks. Furthermore, the national government has the role of educating all citizens on domestic and political terrorism, which have become very common in the US. The article serves as a reasonable basis for evaluating the recruitment and radicalization process for terrorists. It covers the terrorism experience of January 6, 2021, similar experiences and the measures taken by the US government to ensure that such scenarios are not experienced again. The selected incidence will provide the guidelines on what course of actions have been taken and whether they are adequate to address terrorism. Shuster, Simon. (2021). The Cost of Terror Hits Home. Time Magazine. Vol. 197 Issue 3/4, p52-55. 4p. 4 Color Photographs, Database: Academic Search Ultimate Shuster and Simon discuss domestic terrorism in the United States following the riot organized by Trump’s supporters. The supporters are unwilling to accept the 2020 presidential elections results where Joe Biden was announced as the winner. There were riots at the Capitol in January 2021 that resulted in injuries and the destruction of property. The authors also call for the application of counterterrorism measures to deal with rioters. Furthermore, further research by the authors and a report by the US Government Accountability Office indicate that deadly revolutionary assaults were by far-right ideologist, precisely white supremacy movements and civil rights matters regarding terrorist clampdowns. The article is significantly linked to my research as it addresses domestic terrorism, its impacts, and how it can be controlled. The source will inform US citizens and the world about the negativities linked with political terrorism and why they should learn to accept election results without any feeling of supremacy. The Guardian (London, England), (2021). White House unveils first national strategy to fight domestic terrorism; Guardian Newspapers. Language: English, Database: Business Insights Global This article talks about the measures taken by the White House to counter domestic terrorism. The White House has printed its first-ever national strategy for addressing domestic terrorism five months after a ferocious mob overmastered the United States Capitol in Washington. There is some opposition connected to the belief that Joe Biden can use counterterrorism implements to persecute Trumps’ supporters. However, the strategy is purely meant to safeguard US citizens from political terrorism and other insecurities. The article is linked to my topic on the domestic terrorist attack on the White House Capitol on January 6, 2021. It addresses the measures taken by the White House to address such issues and ensure that they don’t occur again in the future. Furthermore, the article discusses the steps that have been taken to ensure that all citizens are sensitized and protected from any form of terrorism.
Within several units of this course, you have prepared for your course project, which is due in this unit. For your course project, you will be writing a research paper on a domestic terrorist inciden
Sept. 3, 2016 The Nation (Karachi, Pakistan) (Vol. 30, Issue 182) Knowledge Bylanes Article 815 words (Level 5)Full Text: Byline: Said Alam KhanPESHAWAR — It was a terrible day in Khyber Pakhtunkhwa, as terrorists once again carried out two separate attacks on Friday. Inthe very first happening, all the four militants, who attempted to storm in a Christian colony in Peshawar, were killed after securityforces reacted well in time.Sadly, in the second incident, at least 14 people including four lawyers, policemen and others lost their lives when a suicide bomberyet again hit a district court in Mardan.In less than a month, it was the second consecutive attack on lawyers’ community. In the first attack, a total of 73 people, of whom, atleast 60 were lawyers had been martyred in Quetta suicide blast on August 8 last. It deeply shocked legal fraternity.Unfortunately, lawyers were again silenced, but this time in Mardan district court in a suicide attack. It reflected that terrorists continuetargeting the best brains. A faction of the TTP Jamaat-ul-Ahrar has claimed responsibility for the attacks on a Christian colony inPeshawar and Mardan district court.Moreover, Ahrar has also said that it was follow up of the attack on lawyers in Quetta as well as the Lahore Easter bombing in whichsome 75 people had been killed in March 2016. It means that Ahrar is mainly targeting Christian and lawyers’ community.There are different opinions; some people say that carrying out of such horrific attack by militants is the reaction of Zarb-e-Azboperation, which Pakistan Army has been conducting against terrorists in FATA and other parts of the country since June 2014.Due to which, acts of terrorism are on decline to a great extent. Another view is that killing of Pakhtuns either from Quetta or Mardan,is actually their genocide, who have already suffered a lot in the ongoing war-on-terror.Till filing of the story, no representative of federal government visited either Mardan or Peshawar. And that’s why people raisedquestions particularly about federal government saying that perhaps issuing condemnation statements is the sole responsibility of thefederal government, which start pouring in from every political party soon after happening of any terrorist act.People salute to Army, FC and police for sacrificing their lives in protecting people and averted a possible major militant incidents bykilling all the four terrorists at Christian colony in Peshawar and stopping the suicide bomber well before making his entry into theMardan court.In his statement, PM Nawaz Sharif has not only condemned both the attacks but also said that militants are on the back foot, whichaccording to him shows militant’s frustration by attacking soft targets.115 KILLED IN AUGUST HITS: PICSSIslamabad adds: At least 115 people, including 89 civilians mostly lawyers, 17 security personnel and nine militants, were killed inmilitant activities in August, says the Pakistan Institute for Conflict and Security Studies (PICSS). The report shows that 174 others,including 157 civilians, 16 troops and one militant, sustained injuries in the same duration.The month witnessed 73 security forces’ actions in which 68 suspected militants were killed and 16 others injured while one soldierlost his life and four others injured during these operations. The PICSS militancy database shows that 50 per cent of the attacks were reported from Balochistan where a low-level insurgency isgoing on for quite sometime and political as well as military leadership believes that this upward trend in militant attacks inBalochistan is externally sponsored aimed at sabotaging China-Pakistan Economic Corridor. Increase in violence in Balochistan alsocoincided with Independence Day celebrations when public in great numbers increasingly show signs of celebrating national days.It shows that highest number of deaths and injuries were reported from Balochistan where 98 people were killed and 153 othersinjured in 15 militant attacks followed by KP where six people were killed and 14 others injured in nine militant attacks during August.FATA witnessed five militant attacks in which six people were killed and seven others injured. One militant attack each was reportedfrom Punjab and Sindh where three and two people were killed, respectively. No militant attack was reported from AJ and K, Gilgit-Baltistan and Islamabad Capital Territory.According to PICSS monthly report, while security forces continued their focus on urban areas with intelligence-based and combingoperations during the month of August, their main attention remained apprehension of militants in Balochistan, KP and FATA whilemilitary operation in Khyber Agency (Operation Khyber-3) was also initiated to clear high mountains and secure passes that militantsuse for their movement across Afghanistan-Pakistan border. Total of 41 alleged militants were killed in FATA, 16 in Balochistan, six inKP and four in Sindh while 51 suspects were apprehended in Balochistan, 39 in Sindh, 34 in KP and 17 in Punjab in 73 securityforces operations. This indicates the extensive engagement of security forces in settled and urban areas of almost all conflict zones.Said Alam Khan COPYRIGHT 2016 Knowledge Bylanes http://www.nation.com.pk/ (MLA 8th Edition)    “Terrorists continue hitting soft targets.” [Karachi, Pakistan], 3 Sept. 2016. , link.gale.com/apps/doc/A462333140/GIC?u=oran95108&sid=ebsco&xid=8c0a4441 . Accessed 6 July 2021. GALE|A462333140
Within several units of this course, you have prepared for your course project, which is due in this unit. For your course project, you will be writing a research paper on a domestic terrorist inciden
MCJ 6453, Global Terrorism 1 Cou rse Learning Outcomes for Unit VII Upon completion of this unit, students should be able to: 5. Analyze global threats posed by terrorism. 5.1 Analyze the significance and recruitment of lone wolf terrorism. 8. Assess the future threats relating to global terrorist activity. 8.1 Recommend strategies to decrease social media lone wolf recruitment. Course/Unit Learning Outcomes Learning Activity 5.1 Unit Lesson Chapter 6 Unit VII Course Project 8.1 Unit Lesson Chapter 6 Unit VII Course Project Reading Assignment Chapter 6 : Long -Term Separatist Terrorism Unit Lesson Introducti on: Future Threats of Domestic and Global Terrorism In this unit, you will learn about the terrorist events that can occur in the domestic United States and abroad. There are many terrorist attacks that may occur globally such as increased lone wolf terrorist attack s, incidents focused on critical infrastructures, cyber terrorism, cybercrimes, personnel targeting, attacks on political figures/infrastructures, and others. It is imperative that the United States and its allies prepare and respond to terrorist incidents through effective and efficient resiliency and reactionary -based planning. One of the most important steps after a terrorist incident is the recovery process. This unit will emphasize the efforts required to carry out the recovery process at the local, st ate, federal, and international levels. It will also discuss the importance of assessing and analyzing the lessons learned after an attack and how to formulate new resiliency -based actions as a result of the incident. Further, this unit will address the to p terrorist organizations that pose the largest threat to the global community includ ing Ansar al -Sharia. UNIT VII STUDY GUIDE Global Terrorist Group and Types of Global Terrorism MCJ 6453, Global Terrorism 2 UNIT x STUDY GUIDE Title The Future of Global Lone Wolf Terrorism Threats and the Recovery Process The tactics and modus opera ndi (MO) of lon e wolf terrorists are becoming more and more sophisticated as time moves forward. The future threat of lone wolf terrorism is unpredictable in many ways, as the motivations of lone wolf terrorists continue to evolve. However, the United States and the glob al community can learn to develop antiterrorism and counterterrorism tactics and strategies based on recent and past attacks that have occurred around the globe. This context was covered extensively in Units V and VI of this course. In addition to develop ing antiterrorism and counterterrorism strategies, government officials and first responders must assess and analyze the sophistication behind certain lone wolf attacks. It is no surprise that lone wolf terrorist attacks are on the rise. Additionally, many of these attacks catch their soft targets by surprise , and the initial action is to respond. After responding, it is important for these parties to review the impact of the lone wolf terrorist attack. In the emergency preparedness cycle from the Federal E mergency Management Agency (FEMA) , evaluating and improvement are key elements in rebuilding after a terrorist incident or a domestic/global emergency. Many emergency personnel and first responders also refer to this stage as the recovery process. The image below depicts the emergency preparedness cycle which can be applied and adapted to most emergencies to include terrorist attacks. This cycle demonstrates the actions that take place by first responders ; local , state , and federal governm ent agencies ; the private sector ; and other stakeholders who have an active role in an emergency. The first step is to plan , followed by organize/equip , then train , then exercise , then evaluate and improve . This emergency cycle is a combination of resilien cy and reactionary -based planning. Reflection A lone wolf terrorist attack has been carried out by a suicide bomber at a local festival where more than 10,000 people are gathered. The bomber detonates his or her suicide vest and kills dozens instantly, and hundreds more are injured. Mass hysteria and panic are underway. What are the initial response steps taken? What agencies are involved with the immediate and prolonged response? After the terrorist e vent and after the scene is secured, what are the recovery steps that need to take place? Counterterrorism (Toh, n.d.) Preparedness cycle (adapted from Williams, 2016) MCJ 6453, Global Terrorism 3 UNIT x STUDY GUIDE Title The Recovery Process Below are some common questions posed during the recovery process of a lone wolf terrorist attack.  What lessons were learned ( immediate and p ost attack)?  Were there warning signs? If so, what were they? If not, why were there no warning signs?  What were the motivations leading to the event?  Were there previous security incidents that occurred?  Was there a clear indication that an event or incid ent was going to take place?  Were the proper communication protocols in place?  How can the National Incident Management System (NIMS) and the incident command system (ICS) be enhanced to address the response in this specific type of incident?  What was the sequence of events that led to the incident?  What can be done to prevent this incident in the future?  How can the response tactics be improved?  How can resiliency tactics be improved?  How did this incident impact society?  What psychological and sociologi cal impacts does this incident leave behind?  What can be done to reinst itute faith and trust in the community after an incident?  How does the public information officer communicate with the public and media outlets? It is imperative to understand that during the recovery phase there is always a clear set of lessons that are learned immediately and in the future . Although at times it can be difficult to admit that mistakes were made, the United States and our allies must reflect on these events to develo p new resiliency and reactionary -based planning approaches in the fight against terrorism and lone wolf attacks. As time has progressed, the United States and its allies have learned that lone wolf terrorist attacks can be small and large. Even the small est of incidents can leave the largest impact. Take , for example , the 2012 Benghazi , Libya attack that claime d the lives of four Americans includ ing U.S. Ambassador Christopher Stevens (Ryan, 2012). Although this event was not a lone wolf terrorist attack, it proves that even claiming the lives of four innocent individuals can leave a global impact. The 2012 attack was a coordinated attac k by the international terrorist organization Ansar al -Sharia. Initially , the attack was said to be in response to a newl y released film and was orchestrated by rioters and residents in the area. Future investigations into the incident proved that this attack was pre -mediated and planned for quite some time. There were several security incidents that took place before the 2012 attack. Ambassador Christopher Stevens requested additional security from the U.S. Department of State on more than one occasion in response to the previous security incidents that had taken place. As a response to this attack, the United States and i ts allies worked together with the United Nations to further update security protocols at U .S. embassies and other critical infrastructures around the globe : specifically, in the Middle East. As a result of the 2012 Benghazi attack, the U .S. Department of State designated Ansar al -Sharia a foreign terrorist organization in 2014 (U.S. Department of State, Bureau of Counterterrorism and Countering Violent Extremism, 2014). In ad dition to these attacks, this foreign terrorist organization has also attacked civilians and civilian infrastructures, assassinat ed government and political officials, and conducted many other events. Future Threats of Global Cyber Terrorism Cybercrimes and cyber terrorism are evolving on a daily, monthly, and annual basis. The di fferent types of cyber threats that exist from global terrorist groups are vast and diverse. The intent and motivations of cyber criminals and terrorist s are also very diverse and are often difficult to determine until after an event takes place. It is imp erative that the United States and its allies have best practices and systems in place to protect against possible cyber terrorist attacks against critical infrastructures, military installations, personnel, and other systems that control access to weapons of mass destruction (WMDs) . In addition to having anti – cyberterrorism and counter -cyberterrorism tactics in place, organizations also need to be aware of specific tactics used by cyber terrorists. It is important to understand that cyber criminals and ter rorists often use multiple tactics and strategies to infiltrate computer systems, networks, mainframes, and other information technology systems to cause harm and to gather intelligence. MCJ 6453, Global Terrorism 4 UNIT x STUDY GUIDE Title Virus : A virus is typically an executable program (.exe) that roots itself into the registry or other secure area of a computer system and deletes or corrupts data. Most viruses require the end user to prompt its origination in a computer system. Worm : A worm i s very similar to a virus, but it often duplicates itself as it moves through secure network connections. Its primary purpose is to crash computer applications, retrieve data, shut down core hardware systems, etc. Most worms offer remote accessibility for the cyber terrorists or criminal. Worms typically do not require end user activation. Trojan : A Trojan often disguises itself as an innocent software application, but it contains code that permits it to run in the background of a computer system. Most Tr ojans go undetected unless an antivirus program such as MacAfee, Forticlient, or Norton is running to detect and quarantine threats. Most Trojans do not duplicate , and their primary purpose is to damage files and permit unauthorized remote access to crimin als and cyber terrorists. Spyware : Spyware is very similar to an executable virus, but its primary purpose is to gather personal information from individual computer systems. It typically gathers intelligence such as emails, user names, passwords, Intern et browsing history, cached credit card information, and secure local files . Botnet : A botnet is a series of computers that have access to the Internet and are often controlled by a malicious remote user to send denial -of-servic e attacks to one or more computer systems . Botnets are also used to obtain intelligence, data, and secure information. Botnets are one of the most difficult tactics to counter because of the complexity of the threat. Zero -day attack: One of the most malicious threats that exists for computer systems and network s today is the zero – day attack. A zero -day attack and vulnerability are a software -based application that is designed to cause as much damage as possible. It is also a computer vulnerability that is new and has gone undetected by antivirus software applications. It is a threat that leaves zero opportunity for detection. In Unit VIII , this course will discuss how terrorists can use the tactics outlined above to launch attacks with WMDs against secure critical infrastructures in the domestic United States and globally. Conclusion In this unit, you learned about the importance of the recovery process in lone wolf terrorist attacks and domestic/international terrorist attacks. Wh en properly assessing the lessons learned after a terrorist incident, it permits agencies and first responders to revamp existing emergency operations plans to address future threats that could occur from a resiliency and reactionary -based perspective. Las tly, you were introduced to the tactics and strategies used by cyber criminals and cyber terrorist s to infiltrate computer systems and networks. References Borgers, M. (n.d.). Single bot in the circular center of platforms connected to laptops, ID 1092 7549 0 [Graphic]. Retrieved from https://www.dreamstime.com/single -bot -circular -center -platforms -connected -to-lapt – single -bot -circular -center -platforms -connected -to-image109275490 Ryan, E. (2012 , November 30 ). Chronology: The Benghazi attack and the fallout. Retrieved from https://www.npr.org/2012/11/30/166243318/chronology -the -benghazi -attack -and -the -fallout Botnet (Borgers, n.d.) MCJ 6453, Global Terrorism 5 UNIT x STUDY GUIDE Title Toh, K. G. (n.d.). Terrorism counterterrorism, ID 11113390 [Image]. Retrieved from https://www.dreamstime.com/stock -photo -terrorism -counterterr orism -image11113390 U.S. Department of State , Bureau of Counterterrorism and Countering Violent Extremism . (2014 , January 10 ). Terrorist designations of three Ansar al -Shari’a organizations and leaders [Press release] . Retrieved from https://www.state.gov /j/ct/rls/other/des/266560.htm Williams, S. (2016). Preparedness cycle [Image] . Retrieved from https://www.fema.gov/media – library/assets/images/114295 Suggested Reading Although not required, the following textbook chapter on nationalistic terrorism and issues in China and Nigeria will provide you with additional support and resources that may be helpful to you . Chapter 7: Nationalistic and Endemic Terrorism Although not required, the following textbook reading will provide you with explanations on terrorism issues in Israel and Palestine as well as some of the religious groups on the rise . Chapter 9 : Terrorism in Israel and Palestine Learning Activities (Nong raded) Nongraded Learning Activities are provided to aid students in their course of study. You do not have to submit them. If you have questions, contact your instructor for further guidance and information. Consider how you would critique the following testimony. Sales, N. A. (2017 , September 8 ). 9/11 to ISIS and beyond: The future of terrorism (and what we can do about it) . Testimony given at the meeting of the Bipartisan Policy Center Conference, Washington, DC. Retrieved from https://ww w.state.gov/j/ct/rls/rm/273894.htm
Within several units of this course, you have prepared for your course project, which is due in this unit. For your course project, you will be writing a research paper on a domestic terrorist inciden
The White House Capitol Attack Part I: Topic The topic I have chosen is the domestic terrorist attack on the White House Capitol on January 6, 2021 Part II: Justification The topic of choice is how to end domestic terrorism based on politics. Due to the attack on Capitol, it became clear that politics can lead to fatal terrorist incidents. I have chosen this topic because the attack on the Capitol led to the loss of lives and many injured individual (Dalsheim & Starrett, 2021). Additionally, the FBI termed the attack as pure domestic terrorism. I also chose this topic to assist in ending the violence based on politics. Once a country becomes accustomed to terrorism based on politics it’s hard to end that type of culture. The FBI made some promising responses to the Capitol terrorist attacks by applying digital billboards to help with finding individuals that had not yet been identified. They received more than 200,000 tips, opened more than 500 investigations, and made 70 arrests tied to the Jan. 6 attack on the U.S. Capitol. These are some ways of showing how to end terrorist incidents based on politics (Weine and Eisenman, 2021) The topic is imperative to the sector of homeland security as it will act as a source of reference for important information. It will also provide the general public with data on how to reduce domestic terrorism based on politics. This will reduce acts of terrorism from the public and in turn ease the work of the department of homeland security (Byman, 2017). The topic meets the above criteria. References Byman, D. (2017). How to hunt a lone wolf: Countering terrorists who act on their own. Foreign Aff., 96, 96. Dalsheim, J., & Starrett, G. (2021). Everything Possible and Nothing True: Notes on the Capitol Insurrection. Anthropology Today, 37(2), 26-30. Weine, S. and Eisenman, D. (2021). To Prevent Domestic Terrorism, the US Needs Community Reporting That Protects Civil Liberties. Retrieved from https://www.justsecurity.org/74544/to-prevent-domestic-terrorism-the-us-needs-community-reporting-that-protects-civil-liberties/
Within several units of this course, you have prepared for your course project, which is due in this unit. For your course project, you will be writing a research paper on a domestic terrorist inciden
The White House Capitol Attack Part I: Topic The topic I have chosen is the domestic terrorist attack on the White House Capitol on January 6, 2021 Part II: Justification The topic of choice is how to end domestic terrorism based on politics. Due to the attack on Capitol, it became clear that politics can lead to fatal terrorist incidents. I have chosen this topic because the attack on the Capitol led to the loss of lives and many injured individual (Dalsheim & Starrett, 2021). Additionally, the FBI termed the attack as pure domestic terrorism. I also chose this topic to assist in ending the violence based on politics. Once a country becomes accustomed to terrorism based on politics it’s hard to end that type of culture. The FBI made some promising responses to the Capitol terrorist attacks by applying digital billboards to help with finding individuals that had not yet been identified. They received more than 200,000 tips, opened more than 500 investigations, and made 70 arrests tied to the Jan. 6 attack on the U.S. Capitol. These are some ways of showing how to end terrorist incidents based on politics (Weine and Eisenman, 2021) The topic is imperative to the sector of homeland security as it will act as a source of reference for important information. It will also provide the general public with data on how to reduce domestic terrorism based on politics. This will reduce acts of terrorism from the public and in turn ease the work of the department of homeland security (Byman, 2017). The topic meets the above criteria. References Byman, D. (2017). How to hunt a lone wolf: Countering terrorists who act on their own. Foreign Aff., 96, 96. Dalsheim, J., & Starrett, G. (2021). Everything Possible and Nothing True: Notes on the Capitol Insurrection. Anthropology Today, 37(2), 26-30. Weine, S. and Eisenman, D. (2021). To Prevent Domestic Terrorism, the US Needs Community Reporting That Protects Civil Liberties. Retrieved from https://www.justsecurity.org/74544/to-prevent-domestic-terrorism-the-us-needs-community-reporting-that-protects-civil-liberties/

Save your time - order a paper!

Get your paper written from scratch within the tight deadline. Our service is a reliable solution to all your troubles. Place an order on any task and we will take care of it. You won’t have to worry about the quality and deadlines

Order Paper Now

Our team of vetted writers in every subject is waiting to help you pass that class. With keen editors and a friendly customer support team, we guarantee custom-written, original, high-quality papers. Get top grades.


Order a Similar Paper Order a Different Paper