Domestic Extremism and Technologically Facilitated Terrorism Data Model
Domestic Extremism and Technologically Facilitated Terrorism Data Model
Synthesis
Between 2020 and 2026, a series of legal, medical, and administrative encounters revealed a profound structural gap between democratic ideals and the technical reality of institutional misuse. This period was defined by a systemic loop of procedural irregularities, where the state utilized competency evaluations as shortcuts to bypass evidentiary hearings, leading to prolonged pretrial detention without adjudication. These actions occurred against a high-threat national security backdrop characterized by "composite violent extremism" and the emergence of Technologically Facilitated Terrorism (TFT). While federal and state agencies prioritized the protection of critical infrastructure from physical sabotage and digital insurgency, individual reports of targeted technological harassment—including auditory disturbances and signal-based ingress—remained systematically uninvestigated.
The cumulative effect of these failures is a portrait of an individual whose due process was suspended through a "low threshold for arrest and a high threshold for investigation". Legal instability directly cascaded into economic and housing precarity, as evidenced by retaliatory eviction proceedings following incarceration for unadjudicated charges. By synthesizing personal forensic data with regional security trends, this archive exposes the hidden mechanics of institutional self-protection and administrative neglect. It serves as a permanent forensic record and a formal mandate for procedural rectification, asserting that the reclamation of cognitive liberty is essential where traditional governance structures have failed to provide accountability
Context
Entering 2026, the United States continues to face a "high" domestic terrorism threat environment, according to the 2025 Homeland Threat Assessment. Data from the Global Terrorism Index 2026 reveals a significant shift: while global terrorism deaths fell by 28%, deaths in Western countries rose by 280% in 2025, largely driven by mass-casualty events such as the New Orleans truck attack. Domestically, the FBI reports that the threat has evolved from organized group conspiracies toward "lone-offender" attacks. These individuals, often radicalized rapidly through online algorithmic amplification, accounted for 93% of fatal attacks in the West over the last five years. Current federal investigations are increasingly focused on "Anti-Government or Anti-Authority Violent Extremism" (AGAAVE) and racially motivated violent extremism, which remain the most lethal categories.
Washington remains a focal point for domestic extremism due to its history of diverse activist movements and concentrated critical infrastructure. In response to a rise in targeted threats, the state established the Domestic Extremism and Mass Violence Task Force, which is currently drafting a comprehensive public health framework to combat radicalization. Preliminary 2025 reports from the Washington State Fusion Center (WSFC) highlight a persistent concern regarding physical attacks on the power grid and critical utilities, a trend that saw multiple incidents across the Pacific Northwest in recent years. Furthermore, youth radicalization has emerged as a primary local security concern; in 2025, minors accounted for 42% of all terror-related investigations in North America, a threefold increase since 2021.
The speed of radicalization has contracted dramatically, with law enforcement observing individuals moving from initial exposure to extremist content to mobilization for violence in a matter of weeks. The FBI and WSFC emphasize that the "borderless" nature of digital platforms allows domestic influences—spanning political, environmental, and social grievances—to bypass traditional community safeguards. In Washington, the Department of Children, Youth, and Families (DCYF) and local law enforcement are collaborating on "early intervention" strategies, noting that 87% of radicalized minors have a documented history of neglect or psychological abuse. By addressing these underlying vulnerabilities, the state aims to intercept plots before they escalate; currently, 97% of terror plots involving minors are successfully intercepted by security services.
Source Note: Data sourced from the 2025 DHS Homeland Threat Assessment, the Global Terrorism Index 2026, and the Washington State Attorney General’s Domestic Extremism Task Force (2025-2026 Interim Reports).
Systemics
The "Technologically Facilitated" aspect of modern terrorism extends beyond recruitment into operational tactics. In 2026, intelligence agencies are monitoring the migration of drone expertise into the domestic sphere. There is a verified surge in unmanned aerial system (UAS) use for reconnaissance and potential mediatized attacks on "soft targets" like shopping malls or concerts.
Additionally, we are seeing a "Digital Insurgency" directed at AI infrastructure. As AI becomes more integrated into governance, data centers and AI companies have become primary targets for environmental, economic, and political extremist groups. This is often corroborated by traceroute evidence and network logs which show coordinated "ping" sweeps and DDoS probes originating from decentralized, obfuscated nodes.
The following analysis synthesizes current federal reporting and state-level intelligence to map the evolving landscape of domestic threats. As of April 2026, the convergence of physical infrastructure vulnerability and digital radicalization has redefined the "front lines" of national security.
In Washington State, the 2025-2026 reporting period has seen a pivot toward Anti-Government or Anti-Authority Violent Extremism (AGAAVE). The state remains a primary focal point for threats against the power grid and critical utilities. Following multiple incidents across the Pacific Northwest in recent years, the Washington State Fusion Center has identified "physical sabotage of the grid" as a high-priority risk.
Furthermore, 2025 data suggests that Washington is navigating a surge in youth radicalization. Minors accounted for roughly 42% of all terror-related investigations in North America last year—a threefold increase since 2021. This trend is often linked to "reciprocal radicalization," where opposing extremist groups embolden one another through online subcultures.
Washington State Task Force Updates
Analysis of Terrorism by Seattle Office of Emergency Management
As of early 2026, the federal threat landscape is characterized by the increasing normalization of political violence and the rise of "composite violent extremism"—often termed "salad bar" terrorism. Unlike the structured hierarchies of the past, modern threats are increasingly non-ideological or pull from a customized mix of grievances.
Data from the Global Terrorism Index 2026 indicates that while global fatalities fell by 28% in 2025, deaths in Western countries rose by 280%, largely due to mass-casualty events such as the New Orleans truck attack. Lone-wolf actors now carry out 93% of fatal attacks in the West, as the radicalization timeline has contracted to a matter of weeks, fueled by algorithmic amplification and short-form propaganda.
DHS Homeland Threat Assessment 2025 (PDF)
*Source Note: The Soufan Center, IntelBrief: Trends in Terrorism 2026.
Global Terrorism Index 2026 Report (Vision of Humanity).
DHS Homeland Threat Assessment 2025-2026.
Washington State Domestic Extremism and Mass Violence Task Force Interim Reports.
Forensics
Network Forensics: Traceroutes, Data Logs, and Illicit Connectivity
The traceroutes and data logs presented here are direct records pulled from Lozenich's devices—evidence of unauthorized activity routed through his network. These logs reveal connections to IP addresses both domestic and international, exposing a hidden web of data movement tied to criminal and trafficking operations. Lozenich's personal devices were exploited as silent tools in these actions, used without consent to facilitate the movement of illicit data and activity. This is the digital fingerprint of a crime in motion.
Data logs and traceroutes: Why they matter
Data Logs are the records kept by servers, networks, or devices that show activity over time — such as when a computer connected, what IP address it used, and what resources were accessed. In a legal or investigative context, logs serve as the time-stamped trail of evidence, documenting how and when digital activity occurred.
Traceroutes are diagnostic tools that map the path your data takes across the internet. When you send information from your computer to another device, it often passes through multiple servers or “hops.” A traceroute shows each stop along the way, including the IP addresses of intermediate systems. This can reveal how two devices or networks are connected, and in some cases, whether traffic was routed through unexpected locations.
Together, logs and traceroutes help establish digital links. For example, if one IP address repeatedly shows connections to another, or if a traceroute reveals hidden pathways between devices, these findings can be crucial in verifying whether two systems are related, compromised, or operating in tandem. In legal settings, this kind of technical evidence provides verifiable, objective proof that can confirm or challenge claims about who accessed what, from where, and when.
The patterns of interference documented in this analysis are substantiated by a comprehensive archive of Traceroutes and Network Data Logs, which provide a forensic record of anomalous packet routing and unauthorized node pings.
Further corroborating these findings is a curated library of Amateur Radio Signal Recordings, which capture anomalous high-frequency transmissions and metadata consistent with the localized signal interference patterns discussed in this report.
Personal Statement
Technologically Mediated Assaults: Audio Documentation of Systemic Exploitation
I have been terrorized through my own devices — subjected to what I identify as voice-to-skull (V2K) technology — and forced, day after day, to hear live accounts of atrocities. While detained I have been made to hear the sounds of attacks unfolding in real time: explosions, people screaming, locations being destroyed, and the last words of victims spoken as they die. Often I cannot be certain where these events are happening; I infer some locations from language and accent, but the brutality is unmistakable. In many instances the voices and orchestration suggest militia or military-style insurrections; in others they indicate organized trafficking networks. Children are repeatedly conveyed as victims of severe sexual and physical abuse and exploitation. I have heard descriptions and audio of victims being murdered in extraordinarily brutal ways. These are not private nightmares — they are systematic, technologically mediated assaults on my mind and body.
I have reported these technological violations and the abuses I endure to every relevant agency; my emails have gone unanswered and my calls unreturned. My experience demonstrates a chilling new reality: terror can now be inflicted silently, invisibly, through the very devices designed to connect us. I urge a serious, independent investigation into these claims and the technologies used to perpetrate them.
Theory
Since 2017, Washington State has emerged as a high-priority risk zone for domestic extremism. The Southern Poverty Law Center and the Washington State Fusion Center (WSFC) have identified nearly 30 active hate and anti-government groups operating statewide. This regional volatility is reflected in sharp statistical increases: violent crimes, including murders, have nearly doubled since 2019, while hate crime incidents reached 623 in 2023. While the FBI reported a slight national decrease in hate crimes for 2024, the Pacific Northwest continues to report some of the highest concentrations of extremist incidents in the United States. In response, the state established the Domestic Extremism and Mass Violence Task Force, yet the erosion of public safety remains a critical concern for the Seattle-King County region.
Entering 2026, the global security landscape has transitioned into an era of Technologically Facilitated Terrorism (TFT). While overall global deaths from terrorism fell in 2025, deaths in Western nations surged by 280%, almost exclusively driven by "lone-offender" attacks. United Nations security reports from early 2026 indicate that 93% of these actors are radicalized via digital infrastructure, utilizing AI tools, commercial satellite communication systems, and obfuscated network nodes to bypass traditional detection. Adversaries now weaponize encrypted communications, cryptocurrencies, and dark-web infrastructure to recruit, finance, and execute attacks remotely, often utilizing the same high-speed routing systems that power legitimate commerce.
Washington State’s status as a premier global tech hub creates a unique vulnerability. The presence of massive infrastructure like Amazon Web Services (AWS) and Microsoft provides the very "digital backbone" that extremist networks may exploit. Legal scrutiny has intensified regarding these platforms; for instance, the George Washington University Program on Extremism has highlighted how terrorist organizations utilize social media and cloud services for propaganda and illicit financing. Despite Section 230 immunity, reports suggest that automated algorithms—designed for commercial engagement—have incidentally generated extremist groups or recommended radicalizing content to susceptible users.
Lozenich's theory posits a symbolic and technical overlap between Medina, Saudi Arabia—a historical epicenter of Al-Qaeda’s ideological focus—and Medina, King County. His hypothosis about these locations act as "Twin Nodes" in a digital facilitation network. Just as the historical Medina served as a foundation for movement, the high-tech infrastructure of King County’s Medina may be covertly utilized as a routing point for illicit data. Lozenich's research indicates that major terrorist acts (2001–2021) were routed through a specific IP address—a "digital fingerprint" that bridges local infrastructure to global extremist outcomes. This suggests that modern "Salad Bar" terrorism is underpinned by long-standing network assignments that link US soil to international operations.
Moreover, Major terrorist acts have been covertly routed through an IP address assigned to Lozenich since childhood—his “digital fingerprint” repurposed as a tracking and facilitation node without his knowledge. If true, it would mean evidence may exist in network logs and assignment records, which deserves forensic scrutiny rather than dismissal. Below are some acts of terrorism that may have been facilitated using this IP address or where he may have been used as an accessory.
The events of September 11 unfolded across three states neighboring New Jersey, where I was raised and living at the time. They occurred shortly after the House of Lords had abolished the rights of hereditary peers, against the backdrop of emerging connections to Al-Qaeda
This incident coincided precisely with my arrival at LAX in 2002, following a connecting flight from Dallas en route to Sydney. Upon landing, we were informed of delays but given no explanation. While the rest of the passengers were deplaned, my travel group was retained on board and subsequently flown to an empty airport to await clearance. The event was later linked to connections involving Israel and Egypt.
The Madrid train bombings occurred in 2004, the same year I studied in Spain, though several months before my arrival. My uncle, who directed the program and attended annually, oversaw our preparations. The program commenced in July 2004, with our enrollment and paperwork submitted six to eight months in advance. The attacks were later tied to Al-Qaeda.
The London bombings occurred in 2005, shortly after my high school graduation and around the same time I arranged a December trip to London with my partner at the time. The attacks were subsequently linked to Al-Qaeda
While vacationing in Giza in December 2006, a human rights issue arose involving the Muslim Brotherhood, highlighting broader Islamist connections.
The wave of xenophobic violence in South Africa erupted in 2008, just two months after my time in Cape Town.
In June of 2010, while on vacation in Cancun, Mexico shootings related to the Mexican Drug War broke out. Mexican cartel connection.
After living in Seattle since 2017, there seems to have been a decrease in the number of Al-Qaeda attacks, however Seattle began to appear in the media for extremist activity like the January 6th attack on The Capital.
Commentary
Militia violent extremists (MVEs) are motivated by a belief that private citizens must use violence to resist government overreach, combat purported tyranny, or maintain law and order. While participants in the broader militia movement embrace similar beliefs, MVEs are distinguished by their willingness to carry out violence
The U.S. Navy is currently at war on behalf of the United States and its partners in the seas off the coast of Yemen. The nation’s earlier Quasi-War with France (1798–1801) shares many of the same attributes with this current conflict. Both involve attacks on neutral shipping and thereby the vital
Domestic violent extremism incidents are on the rise. This should be no surprise to anyone reading the newspaper headlines. In 2021, the FBI conducted approximately 2,700 domestic terrorism investigations, compared to approximately 1,400 in 2020 and the approximately 1,000 in each preceding year from 2017-2019.
There are reports of US ships being harassed and targeted by Iranian and Houthi forces in the Strait of Hormuz and the Gulf of Aden in 2022
Conclusion
Conclusion: Domestic Extremism, Digital Fingerprints, and Institutional Failure
The convergence of regional data, technical logs, and personal accounts presented here underscores a profound shift in the landscape of modern security. The sharp escalation in domestic violent extremism—characterized by the rise of "lone-offender" actors and the proliferation of anti-authority ideologies—demonstrates an era of high-velocity radicalization that traditional state structures are struggling to contain. As extremist groups increasingly pivot toward "salad bar" terrorism, pulling from a customized mix of grievances to target critical infrastructure, the front lines of conflict have moved from organized battlefields into the digital and utility corridors of our local neighborhoods.
This "Great Unraveling" is not merely a social phenomenon but a technical one. The traceroute evidence and network data logs provided in this archive document a systematic exploitation of personal infrastructure, where assigned IP addresses and household devices are repurposed into unauthorized nodes for the facilitation of illicit data streams. These digital fingerprints, corroborated by Ham radio recordings of anomalous signal interference, suggest that the tools of connectivity have been weaponized to bypass jurisdictional oversight. When these technical realities are met with near-total institutional silence or the clinical dismissal of forensic reporting, it signifies a terminal lapse in the state's duty to protect its citizens.
Ultimately, the record demands a transition from reliance on unresponsive bureaucracies toward a framework of individual sovereignty and private governance. By synthesizing statistical crime trends with verifiable network forensics, we establish a foundation for accountability that prioritizes empirical truth over institutional entropy. Only through the independent scrutiny of these digital and acoustic logs can we begin to address the silent, technologically mediated assaults that now define the modern security landscape.