Sie sind auf Seite 1von 9

Juarez 1

Lauren Juarez
Comp II
27 July 2016
Prof. McGriff
Annotated Bibliography
Barrett, Devlin, and Dan Frosch. Orlando Shooter Fits FBIs Homegrown-Terror Worry. The
Wall Street Journal 14 June 2016: A7. Print.
The gunman responsible for the massacre that ended 49 peoples lives had previously shown
coworkers websites and links to several extremist websites. The attack was exactly what the
FBI had been worried about, claiming that US self-radicalization is hard to find. The FBI is
now going through the gunmans life to see if theres anything theyve missed from their
previous investigations on those theyve found to have expressed interest in radicalism. FBI
also believe the shooter used mainstream websites like Facebook and YouTube to learn
about the terrorist groups.
The lengthy article provides great knowledge on how the FBI is handling the situation of
homegrown terrorist. It also gives a good understanding that the FBI is fully aware that ISIS
has been attracting US citizens through mainstream websites. However, after reading the
article, it gives the impression that the FBI is having a hard time tracking down these selfradicalized individuals. The gunman has now become the FBIs main source for trying to
understand and learn about how self-radicalization happens.
I will pull quotes from this article to follow the article about Time Magazine Isis Will Strike
America. This article from The Wall Street Journal will also be brought up in my
introductory paragraph. This will be used to transition into talking about how internet has
become ISISs main weapon for spreading throughout the world. After this article is cited,
and Ive discussed how ISIS has enjoyed free reign over the internet, I will state my thesis
about internet regulation.
Bertrand, Natasha. ISIS is taking full advantage of the darkest corners of the internet. Business
Insider. Business Insider, 11 July. 2015. Web. 6 Jul. 2015.
With the FBI closely monitoring the surface web for any signs of Islamic extremist, ISIS
has taken their online presence to the deepest corners of the internet. Theyve found
another alternative towards online communication called the Dark Web. The Dark Web has
become a safe haven for terrorists to communication anonymously because the Dark Web is
far less indexed than the surface web like Google or Yahoo. Access to the Dark Web can be
done through Tor, a web browser that encrypts the users location.
The author is very descriptive when it comes to explain how ISIS is able to anonymously
recruit members. She demonstrates great knowledge on the process of how the Tor browser
encrypts IP address. The article also discusses Bitcoins, a form of online currency similar to

Juarez 2

PayPal, which can be used to fund the Islamic state anonymously. Although the article
brings up the Islamic State, it is more focused on how online anonymity works and how
jihadists have taken full advantage of it.
This gave helped me to better understand how the Tor browser allows for anonymity with
email, messaging and web browsing. It also brings up a good point about how the Deep
Web is not as properly indexed as the surface web. This lack of index and categorizing is
what allows crime to flourish. If the internet was regulated, the Deep web could be better
categorized and crime would be found more efficiently and at a faster rate. I will use this
article to discuss how the deep web gives safe haven to ISIS.
Breguet, Teri. Frequently asked questions about: Cyberbullying. New York, The Rosen
Publishing Group, Inc, 2007. Print.
Cyberbullying occurs through cell phones, digital pictures, videos, email, internet and
through various other methods. The book is aimed at young adults and how to spot signs of
cyberbullying. Sometimes, cyberbullying cannot be easily identifiable, but can lead to sever
stress, physical ailments or suicide. Cyberbullies are identifiable and can be traced by their
specific Internet Protocol (IP) address, which is unique to every computer. There are
controversies as to whether cyberbullying should be classified as illegal activity because of
the First Amendment, which grands U.S. citizens freedom of speech.
This book is aimed towards children and young adults. The author describes cyberbullying
as being the umbrella term for two main forms of online harassment: cyberthreat and
cyberstalking. He further breaks down cyberthreat as having two different forms: indirect
threat, and direct threat. The one Im most interested in is indirect threat, which is a form of
harassment that requires a bit of reading between the lines. This book is does a fine job at
breaking down cyberbullying into its other forms of harassment.
ISIS will not directly go online and start threatening the lives of individuals through social
media sites. They do it strategically. This book defines cyberbullying as being the umbrella
term for other forms of online harassment. I will reference this book when discussing
cyberbullying. Like technology, cyberbullying has drastically evolved from just a simple
threatening email. This source will be used to help introduce the different branches of
cyberbullying and how it has evolved to create a much new horrendous term:
cyberterrorism.
Cohen, Jared. How to Marginalize the Islamic State Online. Foreign Affairs. Council on
Foreign Relations., Dec. 2015. Web. 17 Jul. 2016.
ISIS has become the first terrorist organization to hold digital territory to expand its
control. The battle with ISIS has become a top priority and the importance of the front
lines of the digital world must not be underestimated, as it has become a poisonous market
for terroristic ideology. Online propaganda has inspired many followers to commit
terrorist attacks throughout the world without having to travel to the Middle East. The
digital fight against ISIS has become as important as the physical one.

Juarez 3

Foreign Affairs is a reputable magazine that focuses on American foreign policy along
with global affairs and historical and economical topics. Jared Cohen, the author of the
article published in the magazine is an Adjunct Senior Fellow at the Council on Foreign
Relations. His article does not sound opinionated and he sites other sources to prove his
argument. One of his sources in the article is from the International Center for the Study of
Radicalization and Political Violence.
This article can go along with Anne Erelles personal account of being contacted of the
terrorist organization and with the book ISIS: The State of Terror. This article further
supports the argument that in order to properly fight ISIS, Internet must be taken as
seriously as boots on the ground. Internet has become a vital role for recruiting Islamic
extremist. It can also go with the article on The Wall Street Journal about the worries of
Homegrown terrorists like the Orlandos Pulse nightclub shooter.
Engel, Pamela. Heres the manual that Al Qaeda and now ISIS use to brainwash people
online. Business Insider. Business Insider Inc. 2 Jul. 2015. Web. 18 Jul 2016.
The United States and several Western European countries have seen a rise in young
adults joining ISIS to become foreign fighters. ISIS has turned to social media to lure
teenagers to join in their ranks through a series of textbook protocols. ISIS is very open
with speaking to westerners online and they try to search for ideal candidates who are nonreligious. ISIS seeks to educated those who are not familiar with Islam because its much
easier to groom and manipulate the vulnerable than the young adults who are already
religious. Once they find potential recruits, they begin their next stage of manipulation by
bombarding them with propaganda in a gentle way so as to seem friendly.
Pamela Engel is a senior reporter of the political section for the Business Insider. The
Business Insider reports world news with several international editions. Pamelas article
goes into detail on the steps ISIS takes to insure they are manipulating their potential
recruit. She cites people whove been contacted by ISIS and shares their stories in her
article. She also shows pictures of propaganda that members of the terrorist group have
sent to those theyve contacted in the United States.This article goes great the book
Frequently asked questions about: Cyberbullying.
The article describes how ISIS uses a form of cyberluring and manipulation to attract
young adults into committing crimes. Internet luring is also prevalent in cyberbullying and
cyberthreat. When talking about cyberbullying, I will bring up Pamelas article about how
ISIS uses manipulation and false claims to lure their subjects. ISIS uses strategic mental
games to make the potential recruit really believe they must carry out the plans given to
them by ISIS.
Epstein, Zach. How to find the Invisible Internet. BGR. BGR Media, 20 Jan. 2014. Web. 18
Jul. 2016.

Juarez 4

The World Wide Web is 96% larger than what most people can access through search
engines like Google. This is sometimes called the Invisible Web or Deep Web and it is
500 times larger than the World Wide Web. Accessible through web browsers like Tor, the
deep web is home to most of the illegal activity that takes place such as selling drugs,
child pornography, weapons trading, hit men for hire and sex trafficking. The bitcoin is the
currently used in the deep web that allows people to browse and purchase services
illegally.
Zack Epstein is currently the Executive Editor at BGR, the online news outlet for
technology and mobile news. His article is accompanied with illustration to show how
Google indexes the web pages as oppose to the Tor browser. He shows great knowledge
with the ever changing technology and also discuss the bitcoin. He also does a great job at
explain how criminals online use bitcoins for their transactions because it anonymous and
untraceable.
This website will be used when discussing internet regulation. Most people think of
internet regulation and censorship as a violation of freedom of speech. This pairs well with
the book on Cyberbullying and why its difficult to consider cyberbullying illegal because
of the Constitution. However, as stated in the article, what most people dont know is that
they are only accessing 4% of the internet. The other 96% is unindexed and anonymous,
where criminals like ISIS go for safe haven and roam free using bitcoins to exchange
untraceable currency.
Erelle, Anna. In the Skin of a Jihadist: A young journalist enters the ISIS recruitment network.
New York: Harper College Publishers, 2015. Print.
Anna Erelle, a journalist investigating how ISIS infiltrates social media finds out first hand
when she is contacted by a high ranking member of the terrorist group. As Anna and the
ISIS member begin to carry out daily conversation, he speaks to her with a soothing and
comforting tone, insuring her that life in Syria is not like what western media portrays. He
begins to relentlessly pursue her and eventually declares his love for her. He uses
manipulation and cunning words to try to convince Anna that she must travel to Syria.
Quickly, his words turn cruel as he begins to use intimidation and fear until he ultimately
releases death threats to her.
This is a primary source of how ISIS uses manipulation to attract younger adults. He does
not begin his conversation with cruel and harsh words. Instead, he tries to entice her into
thinking Syria is the paradise shes been dreaming of. He assures her she will be well fed,
well protected and no one will harm her. Annas detailed account on the events, is vital to
understanding how ISIS has become so successful in luring so many westerners into
committing horrible atrocities.
Although ISIS did not use the deep web, this is a great account on how successful ISIS is
with using mainstream media to contact people on American soil to fight for their cause.
This source would go great when paired with the book, ISIS: A State of Terror. These two
sources help support each other. ISIS: A State of Terror, discusses how terrorists use

Juarez 5

Facebook to contact people from all over the world. Anna is the primary source and her
book is proof of ISISs deception.
Kowalski, Robin, Susan Limber, and Patricia Agatston. What is Cyberbullying.
Cyberbullying: Bullying in the Digital Age. Oxford: Wiley-Blackwell, 2012. 56-88. Print.
There is no clear cut definition for cyberbullying. Some say it is social terror by
technology and others refer to it as emotional wilding. Generally, cyberbullying occurs
amongst minors and other not able to defend themselves. However, once it travels into the
adult realm, it takes on a different form called cyber harassment and cyberstalking.
Cyberbullying and other forms of cyber terror is done through emails, chatrooms, blogs
and social networking sites like Facebook or Twitter. Cyberbullying takes on new forms as
technology continues change.
The each of the three authors who contributed to the book hold a Ph.D. in psychological
studies. The book discusses the different types of forms that cyberbullying can take. It also
details the different types of harassments that occur online. Cyberbullying is not as simple
as just making fun of someone online. It carries serious consequences and, as the authors
have stated in the book, there is no clear cut definition to describe cyberbullying. The
book is more aimed towards parents and educators, rather than for children.
This book pairs well with Pamela Engels article, Heres the manual that Al Qaeda and
now ISIS use to brainwash people. The two sources help support each other on how
harassment and intimidation is done to brainwash people into thinking they are not wanted
by their communities. I can use this source when describing the effects of online
harassment and how cyberbullying ties in with how ISIS recruits vulnerable young adults
online. Also, this book helps to explain how cyberbullying works.
Levendosky, Charles. "Federal Regulation of Internet Pornography Is Unconstitutional."
Censorship. Ed. Tamara L. Roleff. San Diego: Greenhaven Press, 2002. Opposing
Viewpoints. Rpt. from "New Internet Censorship Law Will Fail." Casper Star-Tribune 17
Jan. 1999. Opposing Viewpoints in Context. Web. 25 July 2016.
Any internet censorship that prohibits people from viewing pornography is unconstitutional
based upon the amendment of free speech. Congress passed the bill that regulates who
watches pornography on the internet, by not allowing minors to view sexual material.
However, to a 14-year-old-boy, anything as simple as a bikini model can be considered
sexual material. As horrifying as it may be, even discussing the pleasures of rape or torture
is still considered freedom of speech and protected under the law. The government cannot
use the internet as a way to limit what is considered appropriate free speech and what is not.
The freedom of speech spans out to all ages, including minors and anything that censors
their right is unconstitutional.
Author of this article, Charles Levendosky argues that censoring the internet to not allow
children to watch pornography online is unconstitutional. He uses several court cases to
argue his point, along with quotes from the First Amendment. He also quoted from the

Juarez 6

acting Assistant Attorney General L. Anthony Sutin from the U.S. Department of Justice.
His credibility is very high, considering he article is published in one of the Opposing
Viewpoints Database. Along with writing for the database, Levendosky is also the editor of
the Casper (Wyoming) Star-Tribune.
This article is definitely one of the articles I will site in my paper. He discusses about how
regulating the internet to not allow children to view pornography is unconstitutional.
Although he makes a really good point with his examples, he only discusses the 4% of the
internet. He only discusses the surface web. When you type in Googles search bar for
pornography, youll surely get millions of hits. However, he doesnt take into account the
deep web, where the live rape and child pornography takes place. Is viewing child
pornography or live rape on the deep web also a freedom of speech that should be
protected? What makes the deep web so dangerous is that it is also anonymous, which gives
the criminals and the viewers free range without consequences due to lack of internet
regulation and censorship. I will use this article to show the reader the other side of the
argument.
McQuade, Samuel, James Colt, and Nancy Meyer. The New Reality of Bullying and Cyber
Bullying Cyber Bullying: Protecting kids and adults from online bullies. West Port:
Praeger Publishers, 2009. 2-3. Print.
In chapter 1 of the book, it discusses the growing threat of cyberbullying and the
thousands of youth who have been killed or committed suicide due to cyberbullying.
There are several memorial websites dedicated to victims of cyberbullying and other
websites dedicated to teaching about the effects of cyberbullying. Cyberbullying is
described as the harassment, intimidation and harm of another individual through online
resources. The chapter also gives several stories of people who have fallen victims to
cyberbullying. Cyberbullying has not boundaries and anyone can potentially fall victim
this increasing trend.
Samuel McQuade is a former National Institute of Justice Program Manager and has
written a textbook called Understanding and Managing Cybercrime. He seems to have
focused his study on cybercrime and will be a reliable source to site in my paper. James
Colt, one of the co-authors of the book is an active member of the Monroe County
Community Task Force on Bullying Prevention and Nancy Meyer is an activist for cyber
bullying. Each contributor to the book shows great knowledge in cyberbullying and
cybercrime and are very active in the fight against it.
This source is very similar to the book, Cyberbullying: Bullying in the Digital Age. Both
sources give different, yet similar, definitions on what cyberbullying is. Id like to have
multiple definitions of what cyberbullying is so as to get a better idea. Cyberbullying is
very hard to define because it is a very broad topic. This book, along with Cyberbullying:
Bullying in the Digital Age, aim more towards adult readers. However, unlike
Cyberbullying: Bullying in the Digital Age, which describes cyberbullying as a crime
amongst minors, this book defines it as a crime that has no boundaries. Both are vital
source to better understand how cyber harassment works.

Juarez 7

Morell, Michael. ISIS will strike America. Time 30 Nov. 2015: 60-61. Print.
The article in Time Magazine discuss the possible threat ISIS has on American soil. He
summarized the attacks that took place in Paris on November 13, 2015 and the
sophistication of the Russian passenger jet crash which ISIS took responsibility for. As a
revolutionary political movement, ISIS has gained affiliates among extremist groups from
all around the world, gaining them faster than al-Qaeda ever could. The author finishes his
article by stating that it is crystal clear that our ISIS strategy is not working.
The author uses several example from the terrorist attacks that have happened that same
year her wrote the article in order to defend his argument that ISIS will strike America. His
credibility comes in his job description; he is a former deputy director and two time acting
director of the CIA. His first-hand account on the real possibility of a homegrown terrorist
attack makes him an ideal source for the research paper.
I will definitely pull quotes from this article for the introductory paragraph. Of course, a
terrorist attack on American soil has already occurred in Orlandos Pulse Nightclub which
killed 49 individuals. However, before I bring up the shooting in Orlandos Pulse Nightclub,
I will first use this article. Although he does talk about a possibility of a homegrown ISIS
attack, he also states, While the sophistication of homegrown attacks is likely to be low, the
potential exists. This will lead into the nightclub shooting, proving how much we really
underestimated ISISs sophisticated use of the internet.
Neumann, Peter. Foreign fighter total in Syria/Iraq now exceeds 20,000; surpasses
Afghanistan conflict in the 1980s. The International Center for the Study of
Radicalization and Political Violence. ICSR, 26 Jan. 2015. Web. 17 Jul. 2016.
Foreigners who have taken up arms with the Islamic State of Iraq and Syria continues to
rise as it surpasses 20,000. Nearly 4,000 come from western European countries alone,
which is doubled from the 2013. In 2015, estimated that 100 foreign fighters have come
from the United States. The estimated foreign fighters for 2015 is 20,730. Although these
are not exact numbers, they are only estimates, and the exact number of foreign fighters
may be higher.
ICSR keeps statistics on the number for foreign fighters that have traveled to Iraq and
Syria to fight for the Islamic State. ICSR is a non-partisan and independent research
organization that partners with Georgetown University, University of Pennsylvania and
several other academic institutions. The ICSR is actively involved in de-radicalization and
rehabilitation programs and it is a great source to site. ICSR has also been cited Jared
Cohen in his article for the Foreign Affairs magazine.
This article will be great for showing the statistics of the foreign fighters that have traveled
to Iraq and Syria. It shows countries from all around the world including China, which I
didnt think would even be on the list. This statistic will go great with how the internet has
been recruiting foreign fighter to join in their ranks, and the severity of the issue.

Juarez 8

Thousands have traveled to Syria and Iraq in order to fight for the Islamic state and this
trend, as shown in the charts, is on a steep rise.
Shaw, C. Mitchell. "FCC argues to shackle Internet." The New American 8 June 2015: 17+.
General OneFile. Web. 24 July 2016.
Federal Communications Commission (FCC) Charmain, Tom Wheeler has been pushing for
government regulation of the Internet. Wheeler makes claims based on half-truths on how
this new form of regulations would not a form of intrusion. Wheelers claims of internet
regulation is considered to be misleading by some due to his anti-free market bias.
According to Wheeler, AOLs success is owed to government regulation. However, many
are starting to believe Tom Wheeler is pushing his agenda of a government regulated
internet by overlooking the potential of what the free market can do to net neutrality.
This source comes from the database link that was on schools websites, so I feel confident
about using it in my paper. C. Mitchell Shaw, author of the article, also has several other
argumentative papers published in the database. The author of the article pulls plenty of
quotes and explains each quotation in vivid detail. Michelle doesnt site any other person
other than FCC Chairman, Tom Wheeler. In his article, Shaw sounded like he was very
much against internet regulation by strongly criticizing Tom Wheeler throughout the entire
article.
This article is a rebuttal to why internet regulation should not be done. The article clearly
made a firm stance against government internet regulation. However, this article didnt
actually go into detail as to why internet regulation is bad. Instead, it took the approach of
criticizing FCC Chairman Tom Wheeler for his approach towards government regulations of
the internet. The article claims that Tom Wheeler is being manipulative when it comes to his
arguments for internet regulation and is only giving half-truths and being misleading. Since
I have to show both sides of the argument, I can definitely use this article to show the side
that is against internet regulation.
Solove, Daniel. Nothing to Hide: The False Tradeoff Between Privacy and Security. New Haven,
Yale University Press, 2011. Print.
The book discusses several topics about privacy and security. Topics include the definition
of privacy in terms of the Constitution and how the law should address matters of national
security, as seen from the events of 9/11 and the Patriot Act. The author gives a quick
summary of the patriot act and expands on whether it reduced privacy or expanded it in
terms of internet usage. The book also discusses how laws should cope with the ever
changing technology and gives a quick rundown on some computer knowledge like the
definition of what an IP address is.
This is the go-to book for understanding how privacy laws work and how the Constitution
defines privacy. Its also a great reference book for understanding the relationship between
the first and fourth amendment. Although the book is filled with a wealth of information

Juarez 9

about privacy in the modern age of technology. The author uses first and secondary sources
to state his argument with easy to read language that I can quickly asses.
Although this book has a wealth of information about privacy, Im more interested in the
security aspect of the book. One quote in particular stood out to me and Id like to add it to
my research paper. People have long looked to their government to keep them secure from
bandits, looters, and foreign invaders. They have also wanted to ensure social order by
protecting against robberies, rapes, murders, and other crimes. This quote ties in great with
the crimes that happen on the internet due to lack of regulation.
Stern, Jessica, and J.M. Berger. ISIS: The State of Terror. New York, Harper College Publisher,
2015. Print.
The overall book is about the Islamic State of Iraq and Syria and how the terrorist group
came to power. It discusses the origins of the group, their affiliates and how theyve come to
possess such enormous wealth, to ultimately became the wealthiest terrorist group in the
world. Through stealing artwork and taking full control of trade routes and oil rigs, ISIS has
been able to continue to gain wealth and stride. Along with wealth and power, ISIS
strategically uses the internet and social media accounts to recruit foreigners into their ranks.
Although the book goes into great detail about the history and rise of ISIS, Im much more
interested in how ISIS is using the internet to attract people into their ranks. Jessica Stern,
one of the authors of the books, is a Lecturer on Terrorism from Harvard University, so her
credibility on the topic is very high. The book gives great examples of accounts on
Facebook, Twitter, YouTube and Instagram that have been created by ISIS in an attempt to
reach out to the western and European world.
I could definitely pull out some direct quotes on the section regarding ISIS and the internet.
Id like to pull out examples to show how the internet has become ISISs go-to domain for
publishing their propaganda. The book also contains numerous accounts of ISIS fighters that
have taken videos of their campaign and shared them on Instagram. When talking about how
ISIS uses mainstream media, I can cite these stories in my paper.

Das könnte Ihnen auch gefallen