Technology Terrorism and Crime Apa Technology Terrorism  Essay

  • Length: 4 pages
  • Sources: 4
  • Subject: Terrorism
  • Type: Essay
  • Paper: #28094078

Excerpt from Essay :

Technology, Terrorism, and Crime (APA).

Technology, Terrorism, and Crime

One of the most heinous terrorist groups currently operating in the U.S. In called the "Aryan Nations." This group openly states on their website that they have been "Fighting Jewish Takeover for over 35 years." (aryan-nation.org) This group of domestic terrorists post articles on their website with grammatically incorrect titles like "The menace of Multiculturalism," and "Jews that control Hollywood: Meet the filthy Kikes are behind that industry." (aryan-nation.org) There is no doubt that his group is one that is dedicated to ideals of Adolph Hitler and the supremacy of the Aryan race. This group has also used the latest technology to spread their message of hate.

The Aryan Nations is a far right white supremacist religious organization based on the teachings of Wesley Swift, who founded a church based on anti-Semitism in California in the 1940's. In the 1970's, Richard Girnt Butler founded the Aryan Nations as part of Swift's church, renamed the Church of Jesus Christ-Christian. The Federal Bureau of Investigation has determined that the Aryan Nations is a terrorist threat, and others have called it the "first truly nationwide terrorist network in the U.S." ("Extremism in America")

Along with Butler, other leaders of this organization were Neuman Britton, elected leader in 1998. However, Butler dismissed him and brought in Harold Ray Redfeairn to replace him. Redfeairn then made the mistake of allowing an FBI informant into the group, who later exposed much of the groups activities. The distrusted Redfeairn allied with August Kries to form a splinter group, but returned a few months later. The group is currently split into three main factions, one led by August Kries in Pennsylvania. A second faction is called the Phineas Priesthood, and is based in New York State, while the third faction is based in Idaho and Texas and headed by Pastors Jay Farber and Jerald O'Brien.

The Aryan Nations has used technology to spread it's message of hate and intolerance. As mentioned before, the Aryan Nation maintains a website which allows the most vile and heinous posts. "Jew Jokes," and other such insultingly intolerant pages display the crudeness and lack of general tact on the part of these terrorists. The website displays pages which openly call for murder, terrorism, and acts of cruelty aimed at Jews, African-Americans, and other minorities. Worse than the vile website, which must be actively search for to gain access, was their weekly radio program called "The Aryan Nations Broadcast." The openness of the airwaves allows for anyone, of any age to be subject to the hate espoused by these racist terrorists. Children, who could not understand that those they're hearing on the radio were bad people, might have been influenced by the seduction of evil.

Luckily for the people of the United States, the broadcast, which ran from 1999 to 2009, was shutdown when the host, Hal Turner, was arrested for threatening federal judges. ("Extremism in America") But shutting this group down for good has proven to be somewhat difficult. Even after the Southern Poverty Law Center won a $6 million judgment against the group for beating a woman and her son, the group still remains a threat. Associates of this group have created splinter groups with the idea of bringing about a race war. Robert Jay Matthews, along with Dan Bauer, Randy Duey, Denver Parmenter, and Bruce Pierce formed a group called "The Order," and embarked on a series of violent crimes. Matthews was later killed in a shootout with the police, but some of his followers still remain active.

But it is not only terrorist who use technology to accomplish their evil goals, criminals also do so, and with a greater frequency. Criminals steal the identities of innocent people, and then use that identity to commit a number of types of fraud. There are a number of cases of this type of crime including the case of an unidentified woman who posted her story online for everyone to learn from.

In this case of identity theft, the person's "SSN, DOB, Mother maiden name, Discover Card number and security check were compromised." ("Identity Theft") The thieves changed address information at the Discover Card's website, but the victim was only informed when Discover called them to ask about some questionable purchases. There were…

Online Sources Used in Document:

Cite This Essay:

"Technology Terrorism And Crime Apa Technology Terrorism " (2011, June 07) Retrieved February 7, 2017, from
http://www.paperdue.com/essay/technology-terrorism-and-crime-apa-84498

"Technology Terrorism And Crime Apa Technology Terrorism " 07 June 2011. Web.7 February. 2017. <
http://www.paperdue.com/essay/technology-terrorism-and-crime-apa-84498>

"Technology Terrorism And Crime Apa Technology Terrorism ", 07 June 2011, Accessed.7 February. 2017,
http://www.paperdue.com/essay/technology-terrorism-and-crime-apa-84498