Open Access Publisher and Free Library
TERRORISM.jpeg

TERRORISM

Terrorism-Domestic-International-Radicalization-War-Weapons-Trafficking-Crime-Mass Shootings

Posts in Prevention
Saving France

By Graeme Newman (Author), Frank Simonds (Author)

What does it mean to “win” a war that consumes a generation?

Saving France brings together two of the most vivid contemporary accounts of the First World War—Frank H. Simonds’s They Shall Not Pass (1916) and The Great War (1915)—and reframes them through a powerful new introduction by Graeme R. Newman. Written in the shadow of Verdun, when the fate of France and the outcome of the war still hung in the balance, Simonds’s works capture the immediacy, uncertainty, and human cost of modern industrial conflict.

At the center of this volume stands the Battle of Verdun—one of the most brutal and निर्णative struggles in military history. Through eyewitness reporting and sharp geopolitical analysis, Simonds reveals not only how France held the line, but what that endurance required: the sacrifice of a nation’s youth, the transformation of war into machinery, and the emergence of total war as a defining feature of the modern age.

Newman’s penetrating introduction places these texts in a broader analytical frame, confronting the enduring questions of the war:
Who really won? Who saved France? Could the catastrophe have been avoided? And what lessons—if any—were learned?

This edition goes further, drawing connections between the First World War and the conflicts of the twenty-first century—where questions of war economics, alliance systems, national endurance, and civilian cost remain as urgent as ever.

Saving France is not simply a historical reprint. It is a critical re-examination of war itself—its causes, its consequences, and its troubling continuity into the present.

For readers of military history, international relations, and the sociology of war, this volume offers both a gripping contemporary narrative and a sobering reflection on the true price of “victory.”

Read-Me.Org Inc. New York-Philadelphia-Australia. 2026. p.218.

The Great War- "According to Darwin"

by Graeme Newman (Author), David Jordan (Author) Format: Kindle Edition

The Great War – “According to Darwin”
Reprinting War and the Breed by David Starr Jordan
Edited with a new introduction by Graeme R. Newman

What if the devastation of modern war could be understood—not just politically or morally—but biologically?

Written in the midst of the First World War, War and the Breed is a provocative and deeply controversial attempt to interpret global conflict through the lens of Charles Darwin’s theory of evolution. Jordan argues that war does not strengthen nations, as often claimed, but instead weakens them at their very roots—systematically eliminating the strongest and most capable individuals while leaving the least fit to shape future generations.

This Read-Me.Org edition, newly introduced by Graeme R. Newman, situates Jordan’s argument within both its historical moment and our own. The introduction critically examines Jordan’s interpretation of Darwin, the rise of eugenic thinking, and the troubling assumptions about race and heredity that underpin much early twentieth-century social science. It also draws powerful connections to modern warfare—where the technologies, actors, and consequences of conflict have changed, but its human costs remain enduring.

This volume invites readers to grapple with urgent and unsettling questions:
How have scientific ideas been used to justify—or critique—war?
What are the long-term human consequences of mass conflict?
And what does the Great War still teach us about violence, power, and the fate of nations today?

A compelling blend of historical text and contemporary analysis, The Great War – “According to Darwin” is essential reading for anyone interested in war studies, political thought, and the complex relationship between science and society.

Read-Me.Org Inc. New York-Philadelphia-Australia. 2026. p.185..

What is War?

by Graeme Newman (Author), Will Irwin (Author), K. A. Bratt (Author)

What is war? Is it a contest of armies, a failure of diplomacy, or something far more pervasive—a condition that engulfs entire societies, economies, and ways of life?

This provocative volume brings together two of the most penetrating early twentieth-century explorations of modern conflict: The Next War and That Next War?. Written in the aftermath of the First World War—when the scale and nature of warfare had changed irrevocably—these works confront a world struggling to understand what had just occurred, and what might come next.

In The Next War, Will Irwin delivers a gripping and urgent analysis of how industrialization, science, and total mobilization transformed war from a clash of armies into a devastating force directed at entire populations. His warnings about chemical weapons, aerial bombardment, and the erosion of moral restraint read today with startling clarity and foresight.

Nearly a decade later, Major K. A. Bratt’s That Next War? expands the inquiry, examining the strategic, and psychological dimensions of future conflict. Moving beyond immediate aftermath, Bratt explores the rise of air power, ideological struggle, global tensions, and the uneasy balance between democracy and militarism in a rapidly changing world.

Together, these two works form a powerful intellectual dialogue—one grounded in lived experience, the other in strategic foresight. Framed by a substantial new introduction by Graeme R. Newman, this edition situates both texts within the longer history of modern warfare and draws out their enduring relevance to the twenty-first century.

At a time when war continues to evolve—through technology, geopolitics, and new forms of power—this volume asks a question that remains as urgent as ever: not simply when the next war will come, but what war has become.

A Read-Me.Org Classic Reprint. Carefully prepared for contemporary readers, this edition preserves the original texts while offering new insight into their historical significance and modern implications.

Read-Me.Org Inc. New York-Philadelphia-Australia. 2026. p.237.

World War Three?

by Graeme Newman (Author), S. Eardley Wilmot (Author), Robert Borden (Author)

What if the next world war does not look like the last two?

At the turn of the twentieth century, military thinkers struggled to imagine the wars that were coming. On the eve of catastrophe, some warned that new technologies, global commerce, and fragile political systems were making large‑scale conflict more likely—and more devastating—than ever before. Few listened. Fewer understood.

World War Three? revisits those moments of foresight and failure to ask a question that now confronts the twenty‑first century: have we once again misunderstood the nature of the next war?

Drawing on two remarkable but often overlooked works—Captain S. Eardley‑Wilmot’s The Next Naval War (1894) and Sir Robert Borden’s The War and the Future (1917)—this volume examines how earlier generations anticipated, experienced, and struggled to comprehend the transformation of warfare. One book speculates before disaster strikes; the other reflects from within it. Together, they offer a framework for understanding modern conflict in an age of global interdependence, precision weapons, cyber operations, and contested sea lanes.

Edited and introduced by Graeme R. Newman, World War Three? places these historical perspectives in direct conversation with contemporary dilemmas:

  • Can a major war be fought—or even won—without large armies on the ground?

  • What happens when commerce, communications, energy supplies, and undersea infrastructure become primary battlefields?

  • Do missiles, drones, and digital networks change the meaning of “war,” or merely its appearance?

  • Are today’s geopolitical crises isolated events, or symptoms of a changing world order?

From maritime chokepoints and missile warfare to economic coercion and the limits of international institutions, this book offers guided speculation grounded in history. It does not predict dates or battlefields. Instead, it explores how wars begin, how they expand, and how societies repeatedly fail to recognize their early forms.

Written for readers interested in history, strategy, international relations, and contemporary global risk, World War Three? is both a warning and an invitation—to think more clearly about the conflicts of the past before they reappear, transformed, in the future.

Is the next world war inevitable—or has it already begun under other names?

Read-Me.Org Inc. New York-Philadelphia-Australia. 2026. p.152.

The Making of War - Then and Now

Edited and Introduced by Graeme R. Newman. The Immediate Causes of the Great War by Oliver Perry Chitwood

What if the real story of World War I is not the past—but the present?

This boldly reimagined edition places a powerful new introductory essay by Graeme R. Newman at the center of the book, transforming a classic documentary history into a searching inquiry into how wars are made—then and now. Drawing on Oliver Perry Chitwood’s original 1918 compilation of diplomatic correspondence, ultimatums, and state papers, this volume reconstructs the fatal chain of decisions that led Europe into catastrophe. But it does more: it asks what those decisions reveal about the world we inhabit today.

Newman’s extended introduction reframes the Great War not as a closed historical episode, but as a recurring pattern of international behavior. Nationalism, alliance systems, economic rivalry, and the language of “defensive” war are examined not only in their early twentieth-century form, but in their modern equivalents—from the conflict in Ukraine to instability in the Middle East, and the global role of the United States. The essay confronts a central paradox: that leaders who claim to preserve peace may, under pressure, construct the very conditions that make war inevitable.

At the heart of the book remains Chitwood’s original method—letting the documents speak. Here are the voices of statesmen, ambassadors, and governments as they justify, accuse, negotiate, and ultimately fail. Read in light of Newman’s analysis, these documents become more than historical artifacts; they are case studies in escalation, miscalculation, and the limits of diplomacy.

Making War – Then and Now is both a primary source reader and a contemporary critique. It reveals how quickly order can unravel, how fragile peace can be, and how familiar the pathways to conflict remain. For readers seeking not only to understand the origins of World War I but to grasp the enduring mechanics of war itself, this edition offers an unsettling and necessary perspective.

Read-Me.Org Inc. New York-Philadelphia-Australia. 2026. p.189.

Social Opportunity Structures in Hacktivism: Exploring Online and Offline Social Ties and the Role of Offender Convergence Settings in Hacktivist Networks 

 By Marco Romagna & Rutger Erik Leukfeldt  

  Hacktivism represents the promotion in the cyber landscape of ideologically motivated agendas using hacking techniques. Despite research on the topic has provided some clues on how hacktivist networks develop, the processes behind their evolution remain mostly unknown. This gap in the literature prompted us to research the role of online/offline social relationships and of the offender convergence settings in the creation, recruitment process and development of hacktivist networks. This study is based on 30 interviews with hacktivists, and it uses the social opportunity structures framework to analyze the development of 21 hacktivist networks. The results show that said networks can be divided in sub-categories based on the type of connections used to create them. Online social relationships and online convergence settings (particularly social media platforms and IRC channels) seem to play a key role in the development of hacktivist networks, while offline contacts are limited. For the recruitment process, hacktivists use comparable strategies to any organization, but three different categories were identified when discussing

VICTIMS & OFFENDERS Published online: 01 Jul 2024

Hacktivism: From Loners to Formal Organizations? Assessing the Social Organization of Hacktivist Networks

By Marco Romagna & Eric Rutger Leukfeldt

The organizational aspects of hacktivist networks are seldom studied, with research mainly focused on exploratory and descriptive case studies. To narrow the gap, we have used the sociological model for the social organization of deviants developed by Best and Luckenbill (1994). Said model illustrates how hacktivist networks are organized and contributes to a clear-cut categorization useful when dealing with hacktivism. Our study uses a rich dataset obtained from 32 semi-structured qualitative interviews conducted within 23 different networks. By expanding on past research on cybercriminal and hacktivist networks, the results show that hacktivists operate at varying levels of sophistication, favoring small, well-organized teams where roles and tasks are clearly divided. While there are differences among networks, our analysis reveals the importance of individual actions within larger operations: being affiliated with like-minded people, the existence of internal rules, and the importance of hacking skills to determine, if not hierarchies, then who is the most influential. Most of the networks analyzed were classified as “peers” or “teams,” although the landscape shows considerable heterogeneity. Compared to other cybercriminal networks, hacktivists seem to have lower level of sophistication, while embracing the hacking subculture that places importance on the role of the individual within the network.
DEVIANT BEHAVIOR 2025, VOL. 46, NO. 9, 1104–1124

  Before Vegas: The “Red Hackers” Who Shaped China’s Cyber Ecosystem 

By   Eugenio Benincasa

Recent revelations of Chinese government-backed hacking show a recurring pattern: prominent hackers behind groups such as APT17, APT27, APT41, Flax Typhoon, and Red Hotel—monikers given by cybersecurity researchers for groups with similar tactics—trace their roots to a broader community of early elite hackers, known as “red hackers” or “Honkers” (红客, Hong Ke). Active in online forums during the mid-1990s and 2000s, these hackers operated independently but often aligned with state interests, targeting foreign entities perceived as hostile to China, including the US, Taiwan, and Japan. The author’s analysis builds upon prior research into China’s red hacker groups.

Center for Security Studies (CSS), ETH Zürich . 2025. 74p.

Nuclear Terrorism: Assessment of U.S. Strategies To Prevent, Counter, and Respond to Weapons of Mass Destruction

By The National Academies of Sciences, Engineering, and Medicine

For nearly eight decades, the world has been navigating the dangers of the nuclear age. Despite Cold War tensions and the rise of global terrorism, nuclear weapons have not been used in conflict since Hiroshima and Nagasaki in 1945. Efforts such as strategic deterrence, arms control and non-proliferation agreements, and the U.S.-led global counterterrorism have helped to keep nuclear incidents at bay. However, the nation's success to date in countering nuclear terrorism does not come with a guarantee, success often carries the risk that other challenges will siphon away attention and resources and can lead to the perception that the threat no longer exists.

This report found that U.S. efforts to counter nuclear or radiological terrorism are not keeping pace with the evolving threat landscape. The U.S. government should maintain a strategic focus and effort on combatting terrorism across the national security community in coordination with international partners, State, Local, Tribal and Territorial authorities, the National Laboratories, universities and colleges, and civil society. Developing and sustaining adequate nuclear incident response and recovery capabilities at the local and state levels will likely require significant new investments in resources and empowerment of local response from Federal Emergency Management Agency (FEMA), working with the Centers for Disease Control and Prevention, Environmental Protection Agency, Department of Energy, and National Institutes of Health

Washington, DC: The National Academies Press. 2024. 158p.

After Action Report Washington Navy Yard September 16, 2013 Internal Review Of The Metropolitan Police Department Washington, D.C.

Metropolitan Police Department, Washington D.C.

On the morning of Monday, September 16, 2013, Aaron Alexis entered Building 197 at the Washington Navy Yard, where he served as an independent contractor, and carried out the most deadly workplace mass shooting in the Nation’s Capital in recent memory.

Over the course of 69 minutes, Alexis terrorized thousands of employees of Naval Sea Systems Command, firing indiscriminately from a shotgun he had legally purchased two days earlier and a handgun he had taken from a security guard after mortally wounding the guard. He would also get into multiple shooting engagements with responding law enforcement officers, seriously injuring a Metropolitan Police Department (MPD) officer. In his final confrontation with police, Alexis ambushed and fired upon another MPD officer. Fortunately, the officer was saved by his protective vest and was able to return fire, killing Alexis and ending his rampage. When it was over, Alexis had shot and killed twelve people and injured several others.

*****

In the aftermath of the incident, the members of MPD first and foremost want to remember and honor the twelve people who lost their lives. Twelve people went to work that Monday, but did not return home to their loved ones. It is truly a senseless tragedy beyond comprehension, and there are no words adequate enough to express our condolences. Our thoughts remain with the victims’ families and friends.

Metropolitan Police Department, Washington D.C. 2014.. 84p.

Lone Wolf Terrorism in America: Using Knowledge of Radicalization Pathways to Forge Prevention Strategies

Mark S. Hamm and Ramon Spaaij

This research offers the largest and most comprehensive database ever created on lone wolf terrorism, along with a theory-informed case study component based on direct contact with imprisoned lone wolf terrorists, and a comparative analysis distinguishing lone wolves from those who undergo radicalization in a group setting. Strictly in terms of lethality, the data indicate that lone wolf terrorism in America is not on the rise. Although lone wolf terrorism may not be increasing, it is undergoing two important changes in modus operandi. First, uniformed police and military personnel have become the primary target of lone wolf terrorists. Second, consistent with the relaxation of U.S. gun laws since the 1990s and the recent trend in mass shootings, the lone wolf’s preferred weaponry is now a staggering range of high-velocity firearms. While there is no standard profile of the lone wolf terrorist, most of them are unemployed, single white males with a criminal record. Compared to members of terrorist groups, lone wolves are older, less educated and more prone to mental illness.

The study validates a series of commonalities associated with pathways to radicalization for lone wolf terrorists. The radicalization model indicates that lone wolf terrorism begins with a combination of personal and political grievances which form the basis for an affinity with online sympathizers. This is followed by the identification of an enabler, followed by the broadcasting of terrorist intent. The final commonality is a triggering event, or the catalyst for terrorism. The ability of law enforcement and intelligence communities to detect and prevent lone wolf terrorism demands a clear understanding of these radicalization processes. Such insight may provide investigators with a sort of detection system, or “signatures”—as minimal as they may appear—that an individual with a terrorist intent will demonstrate in preparing for an attack. Crucial to this understanding is the broadcasting of intent. While lone wolves physically isolate from society, at the same time they seek recognition for their causes through spoken statements and threats, manifestos, e-mail messages, texting and videotaped proclamations. Focusing on this kind of immediate objective of radicalization among lone wolves, rather than on their underlying grievances, may sharpen our focus on the dangers posed by lone wolf terrorism.

U.S. Department of Justice.. February 2015. 28p.

Lessons From Fort Hood: Improving Our Ability To Connect The Dots

By Committee On Homeland Security House Of Representatives

The hearing focuses on improving information sharing across intelligence and law enforcement agencies following the Fort Hood attack.

• Major Nidal Hasan, the suspect, communicated with terrorist Anwar al-Awlaki, raising red flags that were missed by authorities.

• The FBI and the Department of Defense had pieces of information that, if combined, might have prevented the attack.

• The Webster Commission investigated the FBI’s handling of the case and found shortcomings in policy guidance and technology.

• Recommendations included enhancing data management, training, and policies for counterterrorism leads.

• The Commission emphasized the need for better information sharing and technology to prevent future attacks.

• The ISE works to improve information sharing while protecting privacy and civil liberties.

• The hearing highlighted the importance of addressing information-sharing gaps to enhance national security.

One Hundred Twelfth Congress Second Session, September 14, 2012. 54p.

Reducing Terrorism Through Situational Crime Prevention

May Contain Mark-Ups

By Joshua D. Freilich & Graeme R. Newman

The book “Reducing Terrorism Through Situational Crime Prevention,” edited by Joshua D.Freilich and Graeme R. Newman, explores how situational crime prevention (SCP) techniques can be applied to reduce terrorism. The central theme is that strategies proven effective in preventing conventional crimes can also mitigate terrorism by manipulating environmental factors to block opportunities for terrorist acts. The book includes various case studies and theoretical discussions that illustrate how SCP can be tailored to address specific types of terrorism, such as bioterrorism, hostage-taking, and insurgent attacks.Each chapter delves into different aspects of SCP, such as increasing the effort required to commit a terrorist act, increasing the risks for terrorists, reducing the rewards, and removing excuses for terrorism.One notable case study in the book is the analysis of the 23 Korean hostages inAfghanistan, which demonstrates how SCP measures can be applied in real-world scenarios to prevent terrorist kidnappings. The book also discusses the importance of understanding the terrorists decision-making processes and the situational factors that influence their actions. By integrating SCP with script theory, the authors provide a detailed procedural map of terrorist activities, which can help in developing targeted prevention strategies. Overall, the book emphasizes a practical, evidence-based approach to counter-terrorism, highlighting the need for continuous adaptation and learning to effectively combat evolving terrorist threats

Criminal Justice Press, 2009, 244 pages

Domestic Terrorists' Contact with System Stakeholders Before Attacks

MCBRIDE, MEGAN K.; JENKINS, MONIQUE

From the document: "Within the public violence literature--that is, the literature on domestic terrorism, mass shootings, school shootings, and hate crimes, among others--leakage has been identified as a core warning behavior. Leakage occurs when a would be assailant communicates an intention to harm a target before committing an attack. This communication can vary in timing, level of detail, form, intentionality, and audience. Through such a communication, an individual might directly verbalize an intent to commit an act, make more subtle threats and innuendos, or share a plan via social media. Researchers have found relatively high levels of leakage associated with acts of public violence, including adolescent-perpetrated mass murders, mass shootings, political and public figure assassinations, and domestic terrorism. For this reason, leakage--which often occurs in interactions online or with loved ones--can be an important warning sign. But leakage to family, friends, or acquaintances is not the only way to detect when an individual is intending to commit an act of public violence, and over the last decade, researchers have started to examine preattack contact with system stakeholders, such as law enforcement, mental health, and education professionals. [...] We sought to advance understanding of what percentage of the violent extremist population could be 'catchable' in the sense that an individual had been in previous contact with a system stakeholder (e.g., law enforcement, mental health provider) or had been reported to a system stakeholder (e.g., by a friend or loved one to whom they had intentionally or unintentionally leaked information). To explore this issue, we leveraged a new dataset: the Domestic Terrorism Offender Level Database (DTOLD). The database includes detailed information on the 320 non-Islamist individuals who carried out terrorist attacks in the United States between January 1, 2001, and December 31, 2020. Specifically, we sought to understand what percentage of this population was known to system stakeholders at some point before they perpetrated their attacks." Further information for this document can be found here: www.cna.org/reports/2024/08/domestic-terrorists-contact-with-system-stakeholders-before-attacks

CNA CORPORATION. 2024. 4p.

REVOLUTIONARY RADICALISM: ITS HISTORY, PURPOSE AND TACTICS. Vol. 4.

Report Of The Joint Legislative Committee Investigating Seditious Activities, Filed April 24, 1920, In The Senate Of The State Of New York.

From the Introduction: “In the report here presented the Committee seeks to give a and clear, unbiased statement and history of the purposes objects, tactics and methods, of the various forces now at work in the United States, and particularly within the State of New York, are which seeking to undermine and destroy, not only the government under which we live, but also the very structure of American society ; it also seeks to analyze the various constructive forces which are at work throughout the country counteracting these evil influences and to present the many industrial and social problems that these constructive forces must meet and are meeting. The Great War has shaken the foundation of European civilization. …”

Albany. J. B.. Lyon Company, Printers. 1920. 1264p.

REVOLUTIONARY RADICALISM: ITS HISTORY, PURPOSE AND TACTICS. Vol. 3.

Report Of The Joint Legislative Committee Investigating Seditious Activities, Filed April 24, 1920, In The Senate Of The State Of New York.

From the Introduction: “In the report here presented the Committee seeks to give a and clear, unbiased statement and history of the purposes objects, tactics and methods, of the various forces now at work in the United States, and particularly within the State of New York, are which seeking to undermine and destroy, not only the government under which we live, but also the very structure of American society ; it also seeks to analyze the various constructive forces which are at work throughout the country counteracting these evil influences and to present the many industrial and social problems that these constructive forces must meet and are meeting. The Great War has shaken the foundation of European civilization. …”

Albany. J. B.. Lyon Company, Printers. 1920. 1264p.

REVOLUTIONARY RADICALISM: ITS HISTORY, PURPOSE AND TACTICS. Vol. 2.

Report Of The Joint Legislative Committee Investigating Seditious Activities, Filed April 24, 1920, In The Senate Of The State Of New York.

From the Introduction: “In the report here presented the Committee seeks to give a and clear, unbiased statement and history of the purposes objects, tactics and methods, of the various forces now at work in the United States, and particularly within the State of New York, are which seeking to undermine and destroy, not only the government under which we live, but also the very structure of American society ; it also seeks to analyze the various constructive forces which are at work throughout the country counteracting these evil influences and to present the many industrial and social problems that these constructive forces must meet and are meeting. The Great War has shaken the foundation of European civilization. …”

Albany. J. B.. Lyon Company, Printers. 1920. 1264p.

REVOLUTIONARY RADICALISM: ITS HISTORY, PURPOSE AND TACTICS. Vol. 1.

Report Of The Joint Legislative Committee Investigating Seditious Activities, Filed April 24, 1920, In The Senate Of The State Of New York.

From the Introduction: “In the report here presented the Committee seeks to give a and clear, unbiased statement and history of the purposes objects, tactics and methods, of the various forces now at work in the United States, and particularly within the State of New York, are which seeking to undermine and destroy, not only the government under which we live, but also the very structure of American society ; it also seeks to analyze the various constructive forces which are at work throughout the country counteracting these evil influences and to present the many industrial and social problems that these constructive forces must meet and are meeting. The Great War has shaken the foundation of European civilization. …”

Albany. J. B.. Lyon Company, Printers. 1920. 1264p.

White Supremacist and Anti‐government Extremist Groups in the US

Keneally, Katherine; Davey, Jacob

From the document: "This project by the Global Network on Extremism and Technology (GNET) looks at the user journeys of individuals who enter and participate in the online spaces of extremist communities. A user journey here refers to the distinct path a user may follow to reach their goals when accessing and using an online space belonging to extremist communities. User journeys are particularly important in offering insights into the rationale and motivations of users on the one hand, and to the inner workings of extremist online communities on the other. This is vital for understanding their goals and objectives. In selecting the ideologies for this project, we drew upon extremist communities - rather than extremist and terrorist organisations or groups - including those actors that participate in the extremist milieu and share ideas but do not necessarily operate in concert. These ideologies include those of formal and well-defined extremist organisations of White supremacist and anti-government extremist groups in the United States, supporter networks of Islamic State (IS), and looser communities of extremist actors including accelerationists, incels and chan site members who operate on shared platforms, congregating around common beliefs but without the connection of formal membership. This project is a response to the growing interest in understanding how individuals enter and participate in online spaces of extremist communities."

Global Network On Extremism And Technology (GNET). 24 JUL, 2024.

Introducing SHIFT Analysis and Understanding Intra-Actions Within QAnon: Co-Presence of Conspiracy Beliefs and Extremism, Full Report

CENTRE FOR RESEARCH AND EVIDENCE ON SECURITY THREATS

From the document: "Eruptions of violence during the events of January 6th 2021 exemplified the need to understand how conspiracy theories and extremism interact to create security threats. Social media presents as a key player in this exchange, and this project sought to respond to that dynamic by exploring and seeking to understand the intra-actions in groups which discuss both conspiracy beliefs and extreme ideas. To achieve this, it synthesises techniques from computer science and social science to analyse data from platforms which enable and promote unguarded speech. [...] This report seeks to understand how conspiracy theories and extreme ideologies impact one another. [...] This report will introduce a new method analysis of conspiracy and politically motivated groups named the SHIFT analysis. This analysis combines data science and social research techniques within a broadly abductive approach to develop new understanding of dynamic events. SHIFT analysis, which is mutable and robust to examine a singular group or between group interactions in this context, is applied to examine the QAnon movement, in the context of the lead up to and aftermath of January 6th, which espoused both extreme political ideology and conspiracy beliefs." "SHIFT" comes from the beginning letters of the following five analysis procedures: 1. 'S'ocial network analysis and identification; 2. 'H'one extracted sample and coding; 3. 'I'nvestigative netnography; 4. 'F'rame analysis; and 5. 'T'ext analytics.

CENTRE FOR RESEARCH AND EVIDENCE ON SECURITY THREATS. JUN, 2024. 36p.