Open Access Publisher and Free Library
TERRORISM.jpeg

TERRORISM

Terrorism-Domestic-International-Radicalization-War-Weapons-Trafficking-Crime-Mass Shootings

Posts in Politics
Rational Choice on a Hacker Forum: The Effect of Risk and Reward Cues on Target Selection for Account Hijacking

By Stibbe, D., Ruiter, S., Steenbeek, W., & Moneva, A.

This online field experiment tested how risk and reward cues in (fake) account credential ads on a hacker forum influence target selection for account hijacking. High-risk posts, warning of account monitoring, received fewer views, while high-reward posts, promising benefits, attracted more. An unexpected law enforcement operation targeting an illicit marketplace created a natural experiment, triggering increased removals of high-risk posts by forum administrators, which slowed over time. These findings suggest hacker forum users respond rationally to risk and reward cues in target selection, and forum administrators adapt their moderation efforts in response to external threats to reduce perceived risk.

DEVIANT BEHAVIOR 2025, VOL. 46, NO. 9, 1172–1193

Becoming a hacktivist. Examining the motivations and the processes that prompt an individual to engage in hacktivism

By Marco Romagna & Rutger E. Leukfeldt

Hacktivism is a rising phenomenon in the cyber landscape combining elements of the hacking subculture with ideologically motivated agendas inspired both by traditional activism and by new elements of the digital culture. Despite several studies on the topic, it is still not completely clear what motivates an individual to engage in this type of collective action and if the reasons can be compared to what is already known for more traditional forms of social protests. Taking a socio-psychological approach, this study uses the social identity model of collective action (SIMCA) as a theoretical lens to analyze hacktivists’ motives and engagement process. The analysis is based on 28 semi-structured interviews, and it considers the four main elements of the model, naming: morality, social identity, perceived injustice and perceived efficacy. The violation of moral values seems to be the main trigger to participate in the action, while social identity plays an important role both as the second step in the engagement process and as a bridge with the other elements of the model. The results seem to be in line with what is already known for other forms of social protests, although some elements of the model provide new means of interpretation.

JOURNAL OF CRIME AND JUSTICE 2024, VOL. 47, NO. 4, 511–529

Hacktivism: From Loners to Formal Organizations? Assessing the Social Organization of Hacktivist Networks

By Marco Romagna & Eric Rutger Leukfeldt

The organizational aspects of hacktivist networks are seldom studied, with research mainly focused on exploratory and descriptive case studies. To narrow the gap, we have used the sociological model for the social organization of deviants developed by Best and Luckenbill (1994). Said model illustrates how hacktivist networks are organized and contributes to a clear-cut categorization useful when dealing with hacktivism. Our study uses a rich dataset obtained from 32 semi-structured qualitative interviews conducted within 23 different networks. By expanding on past research on cybercriminal and hacktivist networks, the results show that hacktivists operate at varying levels of sophistication, favoring small, well-organized teams where roles and tasks are clearly divided. While there are differences among networks, our analysis reveals the importance of individual actions within larger operations: being affiliated with like-minded people, the existence of internal rules, and the importance of hacking skills to determine, if not hierarchies, then who is the most influential. Most of the networks analyzed were classified as “peers” or “teams,” although the landscape shows considerable heterogeneity. Compared to other cybercriminal networks, hacktivists seem to have lower level of sophistication, while embracing the hacking subculture that places importance on the role of the individual within the network.
DEVIANT BEHAVIOR 2025, VOL. 46, NO. 9, 1104–1124

2025 Assessment of Money Laundering and Terrorist Financing Risks in Canada

By Canada. Minister of Finance and National Revenue,

Canada has a robust Anti-Money Laundering and Anti-Terrorist Financing (AML/ATF) Regime that contributes to its efforts to combat transnational organized crime and is a key element of its counter-terrorism strategy. It comprises 13 federal departments and agencies with policy, regulatory, intelligence, and enforcement mandates. The federal Regime works with provincial and municipal counterparts and over 38,000 Canadian businesses with reporting obligations under the Proceeds of Crime (Money Laundering) and Terrorist Financing Act (PCMLTFA), known as reporting entities, to prevent, detect, and disrupt financial crime.

An accurate, nuanced, and up-to-date understanding of risks, informed by an assessment of money laundering and terrorist financing threats, vulnerabilities, and consequences, is the foundation for applying a risk-based approach to combatting these financial crimes in Canada. This includes balancing priorities of protecting the integrity of Canada's financial system and the safety and security of Canadians, respecting privacy and other rights of people in Canada, and mitigating regulatory burden and unintended consequences that may be faced by industry and the clients to whom they provide services.

The 2025 Assessment of Money Laundering and Terrorist Financing Risks in Canada is a comprehensive assessment of the most pressing money laundering and terrorist financing threats and vulnerabilities in Canada. It assesses inherent risks and discusses the mitigation measures put in place to respond to them. Findings are informed through consultations with federal government authorities and external stakeholders, including provincial and territorial governments, the private sector, non-profit organizations, and international partners.

The purpose of this report is to support evidence-based policymaking, resource allocation, and priority setting for public authorities, and to support private sector businesses and non-government organizations to apply focused and proportionate measures to mitigate risks.

Ottawa: Canada. Department of Finance 2025. 126p.

Undue Influence By Criminal and Extremist groups.

Attempts to influence elected officials and municipal administrations.

By David Andersson, Anna Horgby and Albin Östervall

This is a study of undue influence exerted by actors and groups constituting a systemic threat in Sweden, including undue influence against elected officials, political parties and decision-making bodies. The study also sheds light on what forms undue influence can take against municipalities. Particular focus is on actors and groups connected to organised crime.

English summary of Brå report 2025:4 Stockholm: The Swedish National Council for Crime Prevention (Brå) -2025. 14p.

Ordeal of a Diplomat

by C. Nabokoff (Author), Graeme Newman (Introduction)

The Ordeal of a Diplomat is a vivid and penetrating memoir by Constantin Nabokoff, a senior Russian diplomat who served in India and London during the final years of the Russian Empire and the First World War. Writing with candor and intellectual clarity, Nabokoff recounts his experiences at the heart of imperial diplomacy as long-established political structures gave way to revolution, war, and the collapse of old alliances. His narrative blends personal observation with acute political insight, illuminating the misunderstandings, rivalries, and illusions that shaped international relations on the eve of the modern world. At once a historical document and a timeless meditation on power, loyalty, and misjudgment, the book offers a rare insider’s view of diplomacy conducted amid global crisis and enduring relevance for readers interested in international affairs today.

Why We Went To War

By Newton D. Baker, Edited by Ciolin Heston

Newton Diehl Baker’s Why We Went to War, published in 1921, is one of the most important contemporary American explanations of the nation’s entry into the First World War. Baker, who served as Secretary of War from 1916 to 1921 under President Woodrow Wilson, occupied a unique position at the very center of America’s wartime transformation. Once known as a progressive mayor of Cleveland and a disciple of Wilsonian reform, Baker became, almost overnight, the chief administrator responsible for raising, training, and mobilizing an army that grew from a modest peacetime force into one of the most formidable fighting powers of the modern age. His book represents both a justification and a reflection—part political defense, part historical testimony—on why the United States took the fateful step of joining a conflict from which it had long sought to remain apart.

For modern readers, Why We Went to War should be approached both as a primary document and as an act of persuasion. Baker was not an impartial historian; he was a participant and advocate, a defender of Wilsonian ideals at a moment when those ideals were under attack. His words reveal not only the official reasoning of the Wilson administration but also the mindset of a generation of progressives who believed that the United States, through sacrifice and leadership, could help reorder the world toward democracy and peace.

In the end, Baker’s book is as much about America’s identity as about the Great War. It reflects a moment when the nation stood at the crossroads between its traditional reluctance to become entangled in European affairs and its emerging role as a world power. To understand why the United States entered World War I is to understand not only the international provocations of the time but also the ideals, anxieties, and ambitions of a nation coming of age on the world stage.

Read-Me.Org Inc. New York-Philadelphia-Australia. 2025. p. 165.

The Chronicle Of The Discovery And Conquest Of Guinea: Volumes 1 & 2

By Gomes Eannes De Azurara (Author), Colin Heston (Editor), Raymond Beazley (Translator)

The Chronicle of the Discovery and Conquest of Guinea is one of the most important early historical sources on the European Age of Discovery. Written in the mid-fifteenth century by Gomes Eannes de Zurara, the royal chronicler of Portugal, the work offers a detailed and vivid narrative of Prince Henry the Navigator’s sponsorship of voyages along the West African coast. Zurara’s chronicle records the systematic exploration of the Atlantic islands and the African shoreline, the capture and enslavement of Africans, and the establishment of the Portuguese presence south of Cape Bojador — a turning point that opened the way for European maritime expansion.

This English edition, translated and edited by historian Charles Raymond Beazley and lusitanist Edgar Prestage for the Hakluyt Society (published 1896–1899), makes Zurara’s text accessible to a modern audience. Their careful translation preserves the rich detail of the original, while their scholarly introduction and notes provide historical context about fifteenth-century Portugal, Prince Henry’s motives, and the wider significance of these early voyages.

Part narrative history, part celebration of Portuguese royal ambition, the chronicle reveals both the triumphs and moral ambiguities of the early encounters between Europe and Africa. It remains an essential source for historians of maritime exploration, Atlantic slavery, and global contact in the late Middle Ages.
This version has been carefully edited, removing unnecessary endnotes, footnotes and other distracting content that distract from a pleasant reading experience.

Read-Me.Org Inc. New York-Philadelphia-Australia. 2025. 267p.

Justice in War-Time

By Bertrand Russell . Introduction by Colin Heston.

This collection of essays is not merely a pacifist manifesto; it is a profound philosophical inquiry into the nature of justice, the psychology of conflict, and the responsibilities of individuals—especially thinkers and educators—in times of national crisis. Russell, a mathematician and philosopher by training, brings to bear his analytical precision and moral clarity in dissecting the arguments used to legitimize war. His opposition to World War I was not rooted in naïve idealism but in a deep conviction that war, particularly modern industrial war, represents a failure of reason and humanity.

The book opens with an appeal to the intellectuals of Europe, urging them to resist the tide of militarism and to uphold the values of truth and justice even when doing so is unpopular or dangerous. Russell believed that intellectuals had a duty to question the narratives presented by their governments and to advocate for peace, not as a passive withdrawal but as an active moral stance. This appeal is followed by essays such as “The Ethics of War,” “War and Non-Resistance,” and “Why Nations Love War,” each of which explores different dimensions of the war impulse—from philosophical arguments to psychological and sociological observations.

One of the most striking aspects of Justice in War-time is Russell’s willingness to confront uncomfortable truths. He examines the role of imperialism, economic interests, and historical rivalries in fueling conflict, and he critiques the Entente policy and the diplomatic maneuvers that led to war. His essay “The Danger to Civilization” warns of the long-term consequences of war on democratic institutions, civil liberties, and the moral fabric of society.

In the broader context of Russell’s life and work, Justice in War-time marks a pivotal moment. It reflects his transition from a primarily academic philosopher to a public intellectual deeply engaged with the political and ethical issues of his time. The book also foreshadows themes that would recur in his later writings on peace, nuclear disarmament, and civil liberties.

Today, Justice in War-time remains a powerful reminder of the importance of moral courage and intellectual integrity. In an age where war continues to be justified through appeals to patriotism, security, and national interest, Russell’s essays challenge us to ask deeper questions: What is justice? Who benefits from war? And what is the role of the individual in resisting injustice?

Read-Me.Org Inc. New York-Philadelphia-Australia. 2025. 191p.

After Action Report Washington Navy Yard September 16, 2013 Internal Review Of The Metropolitan Police Department Washington, D.C.

Metropolitan Police Department, Washington D.C.

On the morning of Monday, September 16, 2013, Aaron Alexis entered Building 197 at the Washington Navy Yard, where he served as an independent contractor, and carried out the most deadly workplace mass shooting in the Nation’s Capital in recent memory.

Over the course of 69 minutes, Alexis terrorized thousands of employees of Naval Sea Systems Command, firing indiscriminately from a shotgun he had legally purchased two days earlier and a handgun he had taken from a security guard after mortally wounding the guard. He would also get into multiple shooting engagements with responding law enforcement officers, seriously injuring a Metropolitan Police Department (MPD) officer. In his final confrontation with police, Alexis ambushed and fired upon another MPD officer. Fortunately, the officer was saved by his protective vest and was able to return fire, killing Alexis and ending his rampage. When it was over, Alexis had shot and killed twelve people and injured several others.

*****

In the aftermath of the incident, the members of MPD first and foremost want to remember and honor the twelve people who lost their lives. Twelve people went to work that Monday, but did not return home to their loved ones. It is truly a senseless tragedy beyond comprehension, and there are no words adequate enough to express our condolences. Our thoughts remain with the victims’ families and friends.

Metropolitan Police Department, Washington D.C. 2014.. 84p.

Lone Wolf Terrorism in America: Using Knowledge of Radicalization Pathways to Forge Prevention Strategies

Mark S. Hamm and Ramon Spaaij

This research offers the largest and most comprehensive database ever created on lone wolf terrorism, along with a theory-informed case study component based on direct contact with imprisoned lone wolf terrorists, and a comparative analysis distinguishing lone wolves from those who undergo radicalization in a group setting. Strictly in terms of lethality, the data indicate that lone wolf terrorism in America is not on the rise. Although lone wolf terrorism may not be increasing, it is undergoing two important changes in modus operandi. First, uniformed police and military personnel have become the primary target of lone wolf terrorists. Second, consistent with the relaxation of U.S. gun laws since the 1990s and the recent trend in mass shootings, the lone wolf’s preferred weaponry is now a staggering range of high-velocity firearms. While there is no standard profile of the lone wolf terrorist, most of them are unemployed, single white males with a criminal record. Compared to members of terrorist groups, lone wolves are older, less educated and more prone to mental illness.

The study validates a series of commonalities associated with pathways to radicalization for lone wolf terrorists. The radicalization model indicates that lone wolf terrorism begins with a combination of personal and political grievances which form the basis for an affinity with online sympathizers. This is followed by the identification of an enabler, followed by the broadcasting of terrorist intent. The final commonality is a triggering event, or the catalyst for terrorism. The ability of law enforcement and intelligence communities to detect and prevent lone wolf terrorism demands a clear understanding of these radicalization processes. Such insight may provide investigators with a sort of detection system, or “signatures”—as minimal as they may appear—that an individual with a terrorist intent will demonstrate in preparing for an attack. Crucial to this understanding is the broadcasting of intent. While lone wolves physically isolate from society, at the same time they seek recognition for their causes through spoken statements and threats, manifestos, e-mail messages, texting and videotaped proclamations. Focusing on this kind of immediate objective of radicalization among lone wolves, rather than on their underlying grievances, may sharpen our focus on the dangers posed by lone wolf terrorism.

U.S. Department of Justice.. February 2015. 28p.

Lessons From Fort Hood: Improving Our Ability To Connect The Dots

By Committee On Homeland Security House Of Representatives

The hearing focuses on improving information sharing across intelligence and law enforcement agencies following the Fort Hood attack.

• Major Nidal Hasan, the suspect, communicated with terrorist Anwar al-Awlaki, raising red flags that were missed by authorities.

• The FBI and the Department of Defense had pieces of information that, if combined, might have prevented the attack.

• The Webster Commission investigated the FBI’s handling of the case and found shortcomings in policy guidance and technology.

• Recommendations included enhancing data management, training, and policies for counterterrorism leads.

• The Commission emphasized the need for better information sharing and technology to prevent future attacks.

• The ISE works to improve information sharing while protecting privacy and civil liberties.

• The hearing highlighted the importance of addressing information-sharing gaps to enhance national security.

One Hundred Twelfth Congress Second Session, September 14, 2012. 54p.

Reducing Terrorism Through Situational Crime Prevention

May Contain Mark-Ups

By Joshua D. Freilich & Graeme R. Newman

The book “Reducing Terrorism Through Situational Crime Prevention,” edited by Joshua D.Freilich and Graeme R. Newman, explores how situational crime prevention (SCP) techniques can be applied to reduce terrorism. The central theme is that strategies proven effective in preventing conventional crimes can also mitigate terrorism by manipulating environmental factors to block opportunities for terrorist acts. The book includes various case studies and theoretical discussions that illustrate how SCP can be tailored to address specific types of terrorism, such as bioterrorism, hostage-taking, and insurgent attacks.Each chapter delves into different aspects of SCP, such as increasing the effort required to commit a terrorist act, increasing the risks for terrorists, reducing the rewards, and removing excuses for terrorism.One notable case study in the book is the analysis of the 23 Korean hostages inAfghanistan, which demonstrates how SCP measures can be applied in real-world scenarios to prevent terrorist kidnappings. The book also discusses the importance of understanding the terrorists decision-making processes and the situational factors that influence their actions. By integrating SCP with script theory, the authors provide a detailed procedural map of terrorist activities, which can help in developing targeted prevention strategies. Overall, the book emphasizes a practical, evidence-based approach to counter-terrorism, highlighting the need for continuous adaptation and learning to effectively combat evolving terrorist threats

Criminal Justice Press, 2009, 244 pages

God's Assassins: State Terrorism in Argentina in the 1970s

May Contain Mark-Ups

By Patricia Marchak

"God’s Assassins: State Terrorism in Argentina in the 1970s"by PatriciaMarchak, in collaboration with William Marchak, delves into the harrowing period of state terrorism in Argentina from 1976 to 1983[^1^][1]. During this time, an estimated 30,000 people disappeared under the military junta, with many being tortured and murdered[^2^][2]. The book provides a comprehensive analysis through interviews with a diverse range of participants, including military officers, priests, survivors, and journalists. These personal accounts, combined with historical documents and media reports,offer a multifaceted view of the causes and processes of state terrorism in Argentina.The narrative is structured to interweave historical context with personal stories, revealing the complex and often contradictory nature of the period.The book explores the roles of various institutions, such as the Catholic Church and the military, and their involvement in the repression. It also addresses the broader social and political dynamics, including the influence of Peronism, unionism, and guerrilla movements. Through these detailed interviews and analyses, Marchak uncovers the deep-seated ideologies and motivations behind the brutal regime, providing a nuanced understanding of this dark chapter in Argentine history.

McGill-Queen's Press, 1999, 393 pages

Domestic Terrorists' Contact with System Stakeholders Before Attacks

MCBRIDE, MEGAN K.; JENKINS, MONIQUE

From the document: "Within the public violence literature--that is, the literature on domestic terrorism, mass shootings, school shootings, and hate crimes, among others--leakage has been identified as a core warning behavior. Leakage occurs when a would be assailant communicates an intention to harm a target before committing an attack. This communication can vary in timing, level of detail, form, intentionality, and audience. Through such a communication, an individual might directly verbalize an intent to commit an act, make more subtle threats and innuendos, or share a plan via social media. Researchers have found relatively high levels of leakage associated with acts of public violence, including adolescent-perpetrated mass murders, mass shootings, political and public figure assassinations, and domestic terrorism. For this reason, leakage--which often occurs in interactions online or with loved ones--can be an important warning sign. But leakage to family, friends, or acquaintances is not the only way to detect when an individual is intending to commit an act of public violence, and over the last decade, researchers have started to examine preattack contact with system stakeholders, such as law enforcement, mental health, and education professionals. [...] We sought to advance understanding of what percentage of the violent extremist population could be 'catchable' in the sense that an individual had been in previous contact with a system stakeholder (e.g., law enforcement, mental health provider) or had been reported to a system stakeholder (e.g., by a friend or loved one to whom they had intentionally or unintentionally leaked information). To explore this issue, we leveraged a new dataset: the Domestic Terrorism Offender Level Database (DTOLD). The database includes detailed information on the 320 non-Islamist individuals who carried out terrorist attacks in the United States between January 1, 2001, and December 31, 2020. Specifically, we sought to understand what percentage of this population was known to system stakeholders at some point before they perpetrated their attacks." Further information for this document can be found here: www.cna.org/reports/2024/08/domestic-terrorists-contact-with-system-stakeholders-before-attacks

CNA CORPORATION. 2024. 4p.

REVOLUTIONARY RADICALISM: ITS HISTORY, PURPOSE AND TACTICS. Vol. 4.

Report Of The Joint Legislative Committee Investigating Seditious Activities, Filed April 24, 1920, In The Senate Of The State Of New York.

From the Introduction: “In the report here presented the Committee seeks to give a and clear, unbiased statement and history of the purposes objects, tactics and methods, of the various forces now at work in the United States, and particularly within the State of New York, are which seeking to undermine and destroy, not only the government under which we live, but also the very structure of American society ; it also seeks to analyze the various constructive forces which are at work throughout the country counteracting these evil influences and to present the many industrial and social problems that these constructive forces must meet and are meeting. The Great War has shaken the foundation of European civilization. …”

Albany. J. B.. Lyon Company, Printers. 1920. 1264p.

REVOLUTIONARY RADICALISM: ITS HISTORY, PURPOSE AND TACTICS. Vol. 3.

Report Of The Joint Legislative Committee Investigating Seditious Activities, Filed April 24, 1920, In The Senate Of The State Of New York.

From the Introduction: “In the report here presented the Committee seeks to give a and clear, unbiased statement and history of the purposes objects, tactics and methods, of the various forces now at work in the United States, and particularly within the State of New York, are which seeking to undermine and destroy, not only the government under which we live, but also the very structure of American society ; it also seeks to analyze the various constructive forces which are at work throughout the country counteracting these evil influences and to present the many industrial and social problems that these constructive forces must meet and are meeting. The Great War has shaken the foundation of European civilization. …”

Albany. J. B.. Lyon Company, Printers. 1920. 1264p.

REVOLUTIONARY RADICALISM: ITS HISTORY, PURPOSE AND TACTICS. Vol. 2.

Report Of The Joint Legislative Committee Investigating Seditious Activities, Filed April 24, 1920, In The Senate Of The State Of New York.

From the Introduction: “In the report here presented the Committee seeks to give a and clear, unbiased statement and history of the purposes objects, tactics and methods, of the various forces now at work in the United States, and particularly within the State of New York, are which seeking to undermine and destroy, not only the government under which we live, but also the very structure of American society ; it also seeks to analyze the various constructive forces which are at work throughout the country counteracting these evil influences and to present the many industrial and social problems that these constructive forces must meet and are meeting. The Great War has shaken the foundation of European civilization. …”

Albany. J. B.. Lyon Company, Printers. 1920. 1264p.

REVOLUTIONARY RADICALISM: ITS HISTORY, PURPOSE AND TACTICS. Vol. 1.

Report Of The Joint Legislative Committee Investigating Seditious Activities, Filed April 24, 1920, In The Senate Of The State Of New York.

From the Introduction: “In the report here presented the Committee seeks to give a and clear, unbiased statement and history of the purposes objects, tactics and methods, of the various forces now at work in the United States, and particularly within the State of New York, are which seeking to undermine and destroy, not only the government under which we live, but also the very structure of American society ; it also seeks to analyze the various constructive forces which are at work throughout the country counteracting these evil influences and to present the many industrial and social problems that these constructive forces must meet and are meeting. The Great War has shaken the foundation of European civilization. …”

Albany. J. B.. Lyon Company, Printers. 1920. 1264p.

An End to Evil : How to Win the War on Terror

By David Frum & Richard Perle

War on Terror: The authors argue that the war on terror is ongoing and emphasize the need for continued vigilance and action against groups like Al-Qaeda, Hezbollah, and Hamas.

Political Challenges: They highlight the political and media elite's wavering commitment to the war on terror, attributing it to political cycles, media bias, and fatigue.

Security Measures: The document discusses the importance of robust security measures, including national identity cards and enhanced surveillance techniques, to prevent terrorism.

International Relations: The authors critique the U.S. government's past complacency and advocate for a stronger stance against countries like Iran and North Korea, which are seen as threats due to their nuclear ambitions.

Random House Publishing Group, 2003 , 284 pages