Open Access Publisher and Free Library
04-terrorism.jpg

TERRORISM

TERRORISM-DOMESTIC-INTERNATIONAL-RADICALIZATION-WAR

The Rise of Radicalism in Bangladesh: What Needs to Be Done

By Iftekharul Bashar

In 2024, Bangladesh faces a growing threat of radicalism fuelled by political instability, security vacuums, and weakened counterterrorism infrastructure. Unless the interim government adopts a zero-tolerance policy and strengthens law enforcement and intelligence efforts, extremist groups may gain further ground, leading to long-term instability. COMMENTARY Bangladesh is facing an increasing threat of radicalism and terrorism. The political violence and instability of 2024 have worsened the situation, with extremist elements exploiting the security vacuum created by the regime change. Weakened law enforcement and intelligence agencies, along with the rise of armed groups and radical ideologies, pose a serious threat to the country’s stability. Bangladesh risks long-term insecurity with broader regional implications without swift and decisive action.

Singapore: S. Rajaratnam School of International Studies (RSIS), NTU , 2024. 4p.

Coping with Complexity: Dealing with Non-State Armed Actors

By Yannick Deepen and Sabine Kurtenbach

Non-state armed actors (NSAAs) come in a variety of shapes and sizes, including warlordled groups, insurgencies, militias, and organised-crime syndicates to name just the most prominent examples hereof. In war or lower-level armed conflict, as well as violence-prone contexts, these groups pose acute problems for peacebuilding, democratic governance, and sustainable development. They control resources and territories, as well as compete, cooperate, or align with political and economic elites both within and beyond the state to promote the unstable status quo that serves their interests. Various challenges arise when dealing with NSAAs. Prevailing strategies vary between repression, co-optation, and submission to the rule of law. This analysis maps cross-regional trends regarding NSAAs based on available datasets. On this basis we develop a typology for NSAAs and a conceptual frame for their transformation. We then apply this to three paradigmatic case studies – Colombia, Mali, the Philippines – and formulate recommendations for the designing of improved strategies vis-à-vis development cooperation and other external actors.

GIGA Working Papers, No. 337,

How ISIS Fights: Military Tactics in Iraq, Syria, Libya and Egypt

By Omar Ashour

How did ISIS – a widely hated, massively outnumbered and ludicrously outgunned organisation – manage to occupy over 120 cities, towns and villages from the Southern Philippines to Western Libya? Seeking to understand ISIS’s combat effectiveness, Omar Ashour analyses the military and tactical innovations of ISIS and their predecessors in Iraq, Syria, Libya and Egypt. He shows how their capacity to mix conventional military tactics with innovative guerrilla warfare and urban terrorism strategies allowed ISIS to expand and endure beyond expectations.

Edinburgh: Edinburgh University Press, 2021.

Staunching The Rise of Terrorist Fighters

By Rohan Gunaratna

The conflicts in Israel, Gaza, Lebanon, Yemen and Syria will have a generational impact. The 7 October 2023 attack against Israel in Gaza and its consequences have set back the prospects of a two-state solution to the Palestinian issue and may attract a new wave of foreign fighters to embark on terrorist activities like what was seen following the military debacles in Afghanistan, Iraq and Syria. What can be done to stem another rise of the terrorist fighters?

S. Rajaratnam School of International Studies, NTU Singapore, 2025. 3p.

Urban Terrorism in Contemporary Europe: Remembering, Imagining and Anticipating Violence

Edited by Katharina Karcher, Yordanka Dimcheva ,· Mireya Toribio Medina. Mia Parkes

This open access book sheds light on collective practices of remembering, imagining and anticipating in relation to recent acts of urban terrorism in Europe. Analysing a range of personal and collective responses to urban terrorism in contemporary Europe, this book shows that current debates on this issue are shaped by multiple co-existing and intersecting memories of political violence in the past. Moreover, despite public declarations of unity and solidarity, collective memories of urban terror in contemporary Europe are far from consensual - memory can be both a catalyst for and an impediment to social and political change. Drawing on case studies from a range of European countries and creative responses by survivors, artists, and poets, this interdisciplinary volume introduces readers to key methods (e.g. discourse analysis and (auto-)ethnography) and concepts (e.g. Lieux de Mémoire and ‘grassroots memorials’) for the study of the memorialization of terror attacks.

Cham: Palgrave Macmillan, 2024. 317p.

Profiles of Individual Radicalization in the United States (PIRUS)

By Michael Jensen, Sheehan Kane, and Elena Akers

Profiles of Individual Radicalization in the United States (PIRUS) is a database of 3,203 Islamist, far-left, far-right, and single-issue extremists who have radicalized to violent and non-violent extremism in the United States from 1948 through 2021. This update adds 955 subjects to the database who were charged with committing extremist crimes in the United States from 2019-2021.1 The database is freely available for download on START’s webpage at https://www.start.umd.edu/profiles-individual-radicalization-united-states-pirus-keshif. The analysis for this research brief draws on the full dataset and illustrates the important differences that exist across ideological groups and highlights recent trends in the data.

College Park, MD: START , 2023. 10p.

Profiles of Individual Radicalization in the United States (PIRUS): Mass Casualty Extremist Offenders

By Michael Jensen, Sheehan Kane, and Elena Akers

Included with the current update to the Profiles of Individual Radicalization in the United States (PIRUS) data are a suite of variables that allow users to investigate extremist offenders who plotted to commit, or committed, mass casualty attacks in the United States from 1990-2021. A mass casualty plot is defined as an event in which the perpetrator(s) intended to kill or injure four or more victims. Unlike other data resources on mass casualty events, PIRUS allows users to investigate successful mass casualty attacks as well as unsuccessful plots where the perpetrators clearly intended to kill or injure four or more people but failed. The inclusion of failed and foiled mass casualty plots in PIRUS gives users a more accurate estimate of how often extremists plan to cause significant harm. It also allows users to compare ideological groups and offenders on measures of plot success. This research brief provides an overview of the mass casualty crimes in PIRUS, including their frequency, links to ideological and sub-ideological groups, and a comparison of their perpetrators.

College Park, MD: START (March). 2023, 4p.

Global Terrorism Threat Forecast 2025

By Rohan Gunaratna

SYNOPSIS As we enter the new year, armed conflicts continue to rage across the globe, destabilising nations, regions, and even the global order. Terrorist attacks and state responses create ripple effects, which not only shape the battlefields but redefine states, fragment societies, and radicalise communities. What does the terrorism threat landscape look like in 2025?

COMMENTARY Global terrorism will remain a persistent and pervasive threat to the stability and peace of the world. The Islamic State, Al Qaeda, and Iran-sponsored Shiite and Sunni militia have exacerbated instability around the globe, while geopolitical competitions have polarised and fragmented the community of nations. Unless governments work together to mitigate common security challenges, threat actors will exploit the gaps, loopholes, and weaknesses in global security systems. All nations need to be steadfast in preventing and preempting threats from taking root and facing up to threats from state and non-state actors including lone wolf attackers. In addition to disinformation operations, threat actors will attack information infrastructure. Nations will need to secure the online domain as hostile states increase their cyberattacks, sabotage infrastructure, assassinate public officials, and engage in espionage.

S. Rajaratnam School of International Studies, NTU Singapore 2025. 5p.

Risk and Protective Factors Associated With Support of Violent Radicalization: Variations by Geographic Location

By Heidi Ellis , Alisa B. Miller , Georgios Sideridis , Rochelle Frounfelker , Diana Miconi , Saida Abdi , Farah Aw-Osman and Cecile Rousseau

Objectives: We examine the association between perceived discrimination, mental health, social support, and support for violent radicalization (VR) in young adults from three locations across two countries: Montréal and Toronto, Canada, and Boston, United States. A secondary goal is to test the moderating role of location. Methods: A total of 791 young adults between the ages of 18 and 30, drawn from the Somali Youth longitudinal study and a Canada-based study of college students, participated in the study. We used multivariate linear regression to assess the association between scores on the Radical Intentions Scale (RIS) with demographic characteristics, anxiety, depression, social support, and discrimination. Results: In the full sample, discrimination, age, and gender were associated with RIS scores. When we examined moderation effects by location, RIS scores were associated with depression only in Montréal, and with social support (negatively) and discrimination in Toronto. None of the variables were significant in Boston. Conclusion: These findings suggest that an understanding of risk and protective factors for support of VR may be context-dependent. Further research should take into consideration local/regional differences

International Journal of Public Health published: 29 March 2021, 10 p.

Cognitive and Behavioral Radicalization: A Systematic Review of the Putative Risk and Protective Factors

By Michael Wolfowicz, Yael Litmanovitz, David Weisburd, and Badi Hasisi

Abstract Background: Two of the most central questions in radicalization research are, (1)why do some individuals radicalize when most of those from the same groups or exposed to similar conditions do not? and (2) why do radicalized individuals turn to radical violence while the majority remain inert? It has been suggested that the answer to both questions lie in the cumulative and interactive effects of a range of risk factors. While risk assessment and counter‐radicalization take a risk‐protectivefactor approach, there is widespread debate as to what these factors are and which are most important.Objectives: This review has two primary objectives.1) To identify what the putative risk and protective factors for different radica-lization outcomes are, without any predeterminations.2) To synthesize the evidence and identify the relative magnitude of the effects of different factors.The review's secondary objectives are to:1) Identify consistencies in the estimates of factors across different radicalizationoutcomes.2) Identify whether any significant heterogeneity exists within factors between(a) geographic regions, and (b) strains of radicalizing ideologies.Search Methods: Over 20 databases were searched for both published and gray literature. In order to provide a more comprehensive review, supplementary sear-ches were conducted in two German and one Dutch database. Reference harvesting was conducted from previous reviews and contact was made with leading researchers to identify and acquire missing or unpublished studies.Selection Criteria: The review included observational studies assessing the out-comes of radical attitudes, intentions, and/or radical behaviors in OECD countries and which provided sufficient data to calculate effect sizes for individual‐level risk and protective factors.Data Collection and Analysis: One‐hundred and twenty‐seven studies, containing 206 samples met the inclusion criteria and provided 1302 effect sizes pertaining to over 100 different factors. Random effects meta‐analyses were carried out for each factor, and meta‐regression and moderator analysis were used to explore differ-ences across studies.Results: Studies were primarily cross‐sectional, with samples representing 20 OECD countries. Most studies examined no specific radicalizing ideology, while others focussed on specific ideologies (e.g., Islamist, right‐wing, and left‐wing ideologies). The studies generally demonstrated low risk of bias and utilized validated or widely acceptable measures for both indicators and outcomes.With some exceptions, sociodemographic factors tend to have the smallest estimates, with larger estimates for experiential and attitudinal factors, followed by traditional criminogenic and psychological factors.Authors' Conclusions: While sociodemographic factors are the most commonly examined factors (selective availability), they also tend to have the smallest es-timates. So too, attitudinal and even experiential factors, do not have effect sizes of the magnitude that could lead to significant reductions in risk through tar-geting by interventions. Conversely, traditional criminogenic factors, as well as psychological factors tend to display the largest estimates. These findings suggest the need to broaden the scope of factors considered in both risk assessment and intervention, and this review provides much needed evidence for guiding the selection of factors

Campbell Systematic Reviews: Volume 17, Issue 3 September 2021, 90 p.

European Union Terrorism Situation and Trend Report: 2024

By Europol

  The European Union Terrorism Situation and Trend Report (EU TE-SAT) 2024 is a situational overview, presenting figures, major developments and trends in the terrorism landscape in the EU in 2023. The report is based on qualitative and quantitative data provided by the Member States on terrorist attacks, arrests and convictions and penalties for terrorist offences. Additionally, Europol’s cooperation partners provided valuable qualitative information and assessments, to facilitate reflection on developments beyond the EU that affect the security of the Union and its citizens. Information on convictions and acquittals for terrorist offences, as well as on amendments to national legislation on terrorism provided by Eurojust and based on data shared by Member States, complements the report. According to EU Directive (EU) 2017/541 on combating terrorism , which Member States had an obligation to transpose into their national legislation by 8 September 2018, terrorist offences are criminal acts carried out with the aim of seriously intimidating a population, unduly compelling a government or international organisation to perform or abstain from performing any act, or seriously destabilising or destroying the fundamental political, constitutional, economic or social structures of a country or an international organisation. The EU TE-SAT identifies and elaborates on various forms of terrorism motivated by specific ideologies . These include jihadist terrorism, right-wing terrorism, left-wing and anarchist terrorism, ethno-nationalist and separatist terrorism, and other forms of terrorism. Notwithstanding the existence of different legislative frameworks at the national level, Directive (EU) 2017/541 establishes minimum EU rules concerning the definitions of offences and related sanctions in counter-terrorism and provides a harmonised definition of terrorist offences. On this basis, the EU TE-SAT provides statistical data on terrorist attacks, arrests and convictions in Member States. At a national level, the legislation pertaining to terrorism varies within the limits set by the aforementioned Directive, as Member States are afforded a certain degree of flexibility in their legislative processes. Consequently, the quantitative analysis presented in the EU TE-SAT reflects Member States’ definitions of terrorist offences according to their national legislation. It should be noted that these definitions may be broader in scope than the definitions set out in Directive (EU) 2017/541, although they cannot have a narrower scope. While the primary scope of the EU TE-SAT is to present the situational picture on terrorism, the report also presents specific violent extremist incidents, acts, activities and developments, reported by the Member States. While the quantitative overview of terrorist attacks, arrests, convictions and penalties does not include instances of violent extremism, the latter is included in the report for contextualisation purposes and to provide a more comprehensive picture of the security threats to the Union.   

Publications Office of the European Union, Luxembourg. 2024. 72p.

30 Years of Trends in Terrorist and Extremist Games

By Emily Thompson and Galen Lamphere-Englund

Violent extremist, terrorist, and targeted hate actors have been actively exploiting video games to propagandise, recruit and fundraise for more than 30 years. This report presents an analysis of that history using a unique dataset, the Extremist and Terrorist Games Database (ETGD), developed by the authors. It contains 155 reviewed entries of standalone games, modifications for existing games (mods) and browser‑based games dating from 1982 to 2024. The titles analysed appear across the ideological spectrum: far right (101 titles), jihadist (24), far left (1) and other forms of extremism and targeted hate (29), including school‑massacre ideation (12). They span platforms ranging from simple standalone games for Atari in the 1980s to sophisticated mods for some of today’s most popular games. The number of titles has increased year on year – in line with global conflict and extremist ideological trends, and revealing a continued push by malicious actors to exploit gaming. Meanwhile, the means of distribution have shifted from violent extremist organisations and marketplaces – such as white supremacist, neo‑Nazi and jihadist organisations – to distributed repositories of extremist games hosted on internet archives, Ethereum‑hosted file‑sharing, Telegram and with subtly coded titles on mainstream platforms like Steam. While most of the titles in the ETGD are available for free, several that have been sold (often at symbolic prices like $14.88 or $17.76) appear to have generated revenue for groups ranging from Hezbollah to the National Alliance, an American neo‑Nazi group. Through new analysis of Steam data, we also show that a small number of extremist and targeted hate titles have generated almost an estimated $600,000 in revenue for small publishers on the platform. Far from being a comprehensive analysis of the ETGD, we intend this preliminary launch report to form a basis for future research of the dataset and a framework for continued contributions to the ETGD from Extremism and Gaming Research Network (EGRN) members. Above all, we seek to contribute to sensible policymaking to prevent violent extremism that situates games as part of a wider contested and exploited information space, which deserves far more attention from those working towards peaceful ends.

Complete recommendations are provided in the conclusion section of this report, but include the following: 1. Prohibit and prevent violent extremist exploitation: Gaming platforms should explicitly prohibit violent extremist and terrorist behaviours and content. Leadership exists here from Twitch, Discord, Microsoft/Xbox and the affiliated Activision‑Blizzard. a. Audio and video platforms, such as Spotify, Apple Music and YouTube should seek to identify extremist gaming content currently available under misleading titles and tags. b. Flag and remove extremist titles across platforms: Hashing and preventing outlinking to ETGD games and links should be a priority across platforms. 2. Improve reporting mechanisms: Platforms must improve reporting mechanisms to make it easier for players to report violative content found in games and in‑game conduct. 3. Understand and take down distributed repositories: Larger repositories of extremist gaming content readily available on the surface web accelerate user exposure. 4. Collaborate across sectors: Addressing the spread of extremist games requires a collaborative effort between tech companies, government agencies and civil society organisations. 5. Educate across sectors: Programmes supporting educators and frontline community moderators should be developed. 6. Support research and innovation: Including cross‑sector initiatives like the Global Network on Extremism and Technology (GNET) and EGRN, which produced this database. 7. Enhance regulatory frameworks: Governments should update regulatory frameworks applying to digital platforms, recognising the nuances of gaming platforms and complying with human rights. 8. Encourage positive community engagement: Thoughtful, well designed community guidelines, moderation policies and reporting mechanisms can support community‑building.

London: The Global Network on Extremism and Technology (GNET). 2024. 40p.

Anti-State Terrorist Plots and Attacks in the United States

By Michael Jensen, Sheehan Kane, Sean Doody and Elena Akers

Recently, several studies have found that threats against state targets, including public officials, elections, and law enforcement, have been on the rise in the United States. In this brief, we take a closer look at terrorist plots and attacks in the United States that targeted government, police, and military entities over a thirty year period (1992-2022). This brief looks specifically at 460 premeditated plots and attacks against state targets in which the perpetrators either (1) successfully committed attacks, or (2) mobilized to violence but were interdicted by law enforcement before they could carry out attacks. For this brief, evidence of mobilization includes the acquisition of weapons or weapons-making materials, target surveillance, the recruitment of co-conspirators, raising funds for an attack, or engaging in military-style training. Using data from the Profiles of Individual Radicalization in the United States (PIRUS) project, this brief shows that anti-state terrorist plots and attacks have increased sharply, reaching all-time highs over the past five years.

College Park, MD: The National Consortium for the Study of Terrorism and Responses to Terrorism (START) , 2024. 6p.

Hostage to Violent Extremism: Kidnapping in Northern Benin

By Flore Berger, Lyes Tagziria and Aziz Mossi

As the infiltration of communities in northern Benin by violent extremist organisations (VEOs) has intensified since 2021, the number of kidnapping incidents has surged. This research identifies four main types of kidnapping by VEOs – forced recruitment, intelligence gathering, punishment and intimidation – all of which are closely linked to conflict dynamics and group expansion. Kidnapping is used as a strategic tool for infiltration into new territories. Key findings l An effective protection programme for defectors, key targets for abductions, should be developed. This would preserve an important source of intelligence while also incentivising further defections. l Explore amnesty programmes for individuals who have joined the ranks of the VEOs. Dialogue should be made an important feature in counterterrorism strategy. l Reinforce local infrastructure to bolster community resilience towards kidnapping and other forms of violence. This should include telephone network coverage and road infrastructure, among others. l Kidnapping incidents should be incorporated into ECOWAS and national early warning mechanisms. The pervasiveness of kidnapping can be used as a barometer of VEO entrenchment in a given area. l Rebuilding international cooperation structures with neighbouring countries is crucial. The Benin government should immediately seek a resolution to current diplomatic stand-offs.

Pretoria: South Africa: OCWAR-T: Organised Crime: West African Response to Trafficking , 2024. 34p.

Unpacking the Role of Prophecy in Extremist Narratives

By Noor Huda Ismail

The fall of Damascus to Syrian rebels has sparked a ripple effect in Southeast Asia, with figures like Indonesia’s Mas'ud Izzul Mujahid using apocalyptic prophecies to fuel extremism. However, the region's diverse Islamic practices, shaped by unique historical and socio-political contexts, show that a universal eschatological (end of the world) narrative does not resonate everywhere. Religious scholars can counter extremist ideologies and reclaim prophetic teachings for peace in Southeast Asia’s pluralistic society by offering inclusive interpretations of prophecy and addressing local grievances.

Singapore: S. Rajaratnam School of International Studies (RSIS), 2024. 4p.

Exposure to and Sharing of Fringe or Radical Content Online

By Timothy Cubitt and Anthony Morgan

Using a large, national survey of online Australians, we measured unintentional and intentional exposure to fringe or radical content and groups online.

Two in five respondents (40.6%) reported being exposed to material they described as fringe, unorthodox or radical. One-quarter of these respondents (23.2%) accessed the content intentionally. One-third (29.9%) said the content they had seen depicted violence.

Fringe or radical content was often accessed through messages, discussions and posts online. Mainstream social media and messaging platforms were the platforms most frequently used to share fringe or radical content. Being a member of a group promoting fringe or radical content was associated with increased sharing of that content with other internet users.

Efforts to restrict access to radical content and groups online, especially on mainstream platforms, may help reduce intentional and unintentional exposure to and sharing of that content.

Canberra: Australian Institute of Criminology. 2024. 17p.

Domestic Terrorism: How the US Legal System is Falling Short

By Camden Carmichael, Brooke Buxton, Seamus Hughes, and Clara Braun

Despite a rapid increase in domestic terrorism investigations in the United States, the threat that domestic terrorism poses to the homeland remains unclear. This is due to a lack of a comprehensive domestic terrorism legal framework that fully encompasses the variety of ideological groups present in the US. Using a sample of twenty-six QAnon and eighteen incel cases that have been federally prosecuted, our team examined how the US prosecutorial system utilises non-terrorism-related charges in addressing domestic violent extremism (DVE) cases. We propose a more inclusive DVE legal framework that expands the categorisation of VE ideologies, identifies specific DVE charges, and requires the engagement of the prosecutorial and probationary offices. By recognising Misogyny Motivated Violent Extremists (MMVEs) and Conspiracy Theory Motivated Violent Extremists (CTMVEs) as their own threat categories, it would allow researchers and practitioners to gain a deeper understanding of how pervasive the threat posed by these ideologies is.

The Hague: The International Centre for Counter-Terrorism (ICCT) , 2024. 21p.

Selling Violent Extremism

By Danny Klinenberg

Why do people join domestic violent extremist organizations? This paper from Danny Klinenberg, an IGCC nonresident fellow, examines an understudied reason: organizational outreach. Klinenberg studies how the inflow of new members to the Oath Keepers, America’s largest paramilitary organization, is affected when the group’s leadership employs three tactics: showcasing their ideological zeal through armed standoffs with the government, membership discounts, and sports sponsorships. Using a variant of the synthetic control method, he finds that standoffs increase new memberships by 150 percent, discounts increase new memberships by over 60 percent, and sports sponsorships decrease new memberships. Membership is less responsive in counties with higher income inequality, but is more responsive in politically conservative counties. The findings provide new insights into ways extremist groups attract potential recruits.

La Jolla, CA: UC Institute on Global Conflict and Cooperation, WORKING PAPER NO. 10, 2024. 42p.

Nuclear Terrorism: Assessment of U.S. Strategies To Prevent, Counter, and Respond to Weapons of Mass Destruction

By The National Academies of Sciences, Engineering, and Medicine

For nearly eight decades, the world has been navigating the dangers of the nuclear age. Despite Cold War tensions and the rise of global terrorism, nuclear weapons have not been used in conflict since Hiroshima and Nagasaki in 1945. Efforts such as strategic deterrence, arms control and non-proliferation agreements, and the U.S.-led global counterterrorism have helped to keep nuclear incidents at bay. However, the nation's success to date in countering nuclear terrorism does not come with a guarantee, success often carries the risk that other challenges will siphon away attention and resources and can lead to the perception that the threat no longer exists.

This report found that U.S. efforts to counter nuclear or radiological terrorism are not keeping pace with the evolving threat landscape. The U.S. government should maintain a strategic focus and effort on combatting terrorism across the national security community in coordination with international partners, State, Local, Tribal and Territorial authorities, the National Laboratories, universities and colleges, and civil society. Developing and sustaining adequate nuclear incident response and recovery capabilities at the local and state levels will likely require significant new investments in resources and empowerment of local response from Federal Emergency Management Agency (FEMA), working with the Centers for Disease Control and Prevention, Environmental Protection Agency, Department of Energy, and National Institutes of Health

Washington, DC: The National Academies Press. 2024. 158p.

After Action Report Washington Navy Yard September 16, 2013 Internal Review Of The Metropolitan Police Department Washington, D.C.

Metropolitan Police Department, Washington D.C.

On the morning of Monday, September 16, 2013, Aaron Alexis entered Building 197 at the Washington Navy Yard, where he served as an independent contractor, and carried out the most deadly workplace mass shooting in the Nation’s Capital in recent memory.

Over the course of 69 minutes, Alexis terrorized thousands of employees of Naval Sea Systems Command, firing indiscriminately from a shotgun he had legally purchased two days earlier and a handgun he had taken from a security guard after mortally wounding the guard. He would also get into multiple shooting engagements with responding law enforcement officers, seriously injuring a Metropolitan Police Department (MPD) officer. In his final confrontation with police, Alexis ambushed and fired upon another MPD officer. Fortunately, the officer was saved by his protective vest and was able to return fire, killing Alexis and ending his rampage. When it was over, Alexis had shot and killed twelve people and injured several others.

*****

In the aftermath of the incident, the members of MPD first and foremost want to remember and honor the twelve people who lost their lives. Twelve people went to work that Monday, but did not return home to their loved ones. It is truly a senseless tragedy beyond comprehension, and there are no words adequate enough to express our condolences. Our thoughts remain with the victims’ families and friends.

Metropolitan Police Department, Washington D.C. 2014.. 84p.