12 Matching Annotations
  1. Jun 2023
  2. Nov 2022
  3. Mar 2018
    1. I took a detailed look at how ISIS functions online, breaking it down into a five-part template, which can be implemented in different ways depending on the target’s disposition:

      Rather than simply stating information, the author (Berger) explains his source and the way in which he broke his research down into smaller categories. This citation is also apart of crap detection with a reliable source.

    2. there are practical and ethical limits to how much we can interdict discovery.

      Though Rheinghold stresses the importance of crap detection and researching your sources, he accepts the fact that there a limits that we reach in terms of discernment of validity. This is shown as the ISIS busters reach ethical and practical limits of search. It is important in the way that one mustn't get overwhelmed with finding the true source origin because you can only go so far.

    3. How does ISIS acquire new recruits online and convince them to take action? J.M. Berger explains, arguing that efforts to counter terrorists’ online activity can be more effective if the mechanics are clearly understood.

      I begin critiquing this article based on Rheinghold's initial conversation with his daughter. In the text Rheinghold suggests using a free internet service - Whois , in order to search for validity in research. After plugging this domain name into the site, I find that the name of the registered owner is 'Educase'. Educase is a nonprofit core data service for research and analysis.