While I’ve tried to keep most of the supplemental readings current, this module only uses reports from this year. We begin with the FBI’s assessment of the current domestic terrorism threat landscape. It helps us understand what it is federal law enforcement worries about and how they allocate resources to counter threats. But please keep in mind that just because something comes from the government, that it is the last word on the subject. Government reports tend to be group projects. As such, notions that might seem controversial or run counter to the official narrative are often weeded out. This is why I’ve supplemented the report with a brief analysis of the report itself.Next, we have a case study of recent right-wing terrorist attack here in the US. To this point, we’ve mostly used historical case studies as narrated by McCann. The various case studies were presented within the context of that week’s module, but you were left to your own devices to infer what a single case had to say about the broader theme. This one is different for two reasons. First, it’s recent. Second, it’s an academic work that explicitly uses the Buffalo attack as a way to illustrate broader points about the evolution of right-wing violence. The last two readings are hot topics, but ones which aren’t tied to a particular type of terrorism: women in terrorism and cyber-terrorism. The former is rare, while the latter is so rare that … it might not actually exist! I’ll let you decide whether or not cyber-terrorism will ever actually become a real problem.As you go through the material this week, it might be useful to ask whether these recent events establish a pattern for what to expect in the near future? Or whether these are illusory patterns that could be broken with just the slightest uptick or downtick?Your choice, either:A) Might we expect more women to become involved in domestic terrorism in the near future? (By “more” I mean as a percentage of terrorist altogether)B) What are the prospects for cyber-terrorism to go from more than a potential threat to actual wide-spread phenomenon?You should address the topic in 3 – 4 pages (at least 9 paragraphs) in which you cite two things from the lecture, two from the assigned readings, and three from outside sources.#1 – Cite two (2) things from the lecture: These citations must be conceptual or theoretical, not factual – eg, you cite ways in which common law differs from civil law; you do not quote Hammurabi’s code. I mean, you can quote Hammurabi or maybe a written definition from the slides, but that would be in addition to the two concepts or theories discussed. Just show me you understand at least two concepts from the lecture.#2 – Cite two (3) from the assigned readings: These citations from the assigned readings are found in the current module. Like the lecture, this is to show me you understand the readings and are able to apply them. Like the above, these citations must be conceptual or theoretical. McCann, Joseph is a required assigned reading requirement.#3 – Cite three (2) from outside sources: These citations from outside readings printed in peer-reviewed journals, academic presses, or executive level publications. Law journals do not count. At this point, you should know what a peer-reviewed journal is. By academic presses I mean white papers, books, or chapters in books published by universities or university presses intended for other academics (ie, not for general consumption). By executive-level publications I mean government or other reports meant for executive-level practitioners in the field, and not for general consumption.- Must document any information used from sources in APA Style as outlined in the Writing Center’s APA: Citing Within Your Paper (Links to an external site.)- Must utilize transition words throughout and ensure the paper flows smoothly- Must include an Introduction and conclusion paragraph- Follow the above and below instructions, and elaborate with detailed examplesAssigned Reading:• McCann, Joseph (any edition). Terrorism on American Soil: A Concise History of Plots and Perpetrators from the Famous to the Forgotten. ISBN 13 : 9781591810490• The Changing Threat Landscape of Terrorism and Violent Extremism, NIJ 2022(Video) https://www.youtube.com/watch?v=VZXhEdqpANIDescription: This is an online panel of experts on domestic terrorism invited by the National Institute of Justice in January, 20201. It’s really an overview of the current terrorist threat landscape, how it has changed in the last five to ten years, and gives recommendations on how to best address this threat at the local and national levels. • FBI Domestic Terrorism Assessment Oct 2022(PDF)Description: This is the Congressionally mandated FBI intelligence assessment of domestic terrorism. It was released in October, 2022.• An Assessment of the Second U.S. Government Domestic Terrorism Assessment(LINK) http:// www.lawfareblog.com/assessment-second-us-government-domestic-terrorism-assessmentDescription: A summary of the FBI intelligence domestic terrorism assessment. Pay attention to what’s not mentioned in the official report and the changes noted by the FBI in this report from their last domestic terrorism assessment.• Buffalo Attack – the cumulative momentum of far-right terror CTC July 2022(PDF)Description: A case study that examine the May 2022 extreme far-right live-streamed terrorist attack at a grocery store in Buffalo, New York, in which 10 Black Americans were murdered in one of the deadliest racist massacres in recent American history.• Women in American Violent Extremism (Daymon and Margolin, 2022)(PDF)Description: Men vastly outnumber women in the ranks of convicted criminals. The same is true in terrorism. This report compares women’s participation in far-right and salafi-jihadist movements in the United States through the examination of four case studies: the Proud Boys, the Oath Keepers, Al-Qaeda, and the Islamic State. To do so, the authors apply a unique analytical framework that examines three key aspects of women’s participation tocompare similarities and differences.• Cyberterrorism-Four Reasons for Its Absence by Jeppe Jacobsen 2022(PDF)Description: We hear a lot about cyber-terrorism. This article explains why there are still zero cases of it happening, despite two decades of warnings about it.