Home > Open Access Journals > JSS > Vol. 19 > No. 1 (2026)
Author Biography
Hunter LaCroix earned his Doctorate from St. John’s University, MA from Johns Hopkins University, MPA from Norwich University and BA from Hobart and William Smith Colleges. Dr. LaCroix currently teaches for St. John’s University and the University System of Maryland at the University of Maryland Global Campus. Previously, he taught at the University of Pittsburgh Graduate School for International Affairs. Dr. LaCroix has taught and published on a variety of subjects including cybercrime, counterterrorism, critical infrastructure protection, intelligence, counterintelligence, and Homeland Security Legal and Policy Issues. Dr. LaCroix has also worked for the U.S federal government in a variety of emergency response, IT, and public safety roles. Separate from that, he has served as a contractor for EMS and firefighter services for the Department of the Navy, and several athletic programs; as well as volunteered for several fire and EMS departments where he was an EMT, Firefighter, Rescue Technician, and HAZMAT specialist.
Shevach Berkovits holds a Doctorate in Homeland Security from St. John's University, an M.A. in Communications from the New York Institute of Technology, and a B.S. in Criminal Justice from St. John's University. His research focuses include risk assessment and management in policing, police reform, police training, and resilience. Additionally, Dr. Berkovits has conducted extensive research on community policing and the development of training programs that enhance the relationship between law enforcement and the communities they serve. He is an active law enforcement officer with over 17 years of experience, bringing both academic insight and practical expertise to his work.
DOI
https://doi.org/10.5038/1944-0472.19.1.2547
Subject Area Keywords
Counterterrorism, Fundamentalism, Homeland security, Identity, Ideology, Radicalization, Social media, Social movements, Terrorism / counterterrorism, Violent extremism
Abstract
The 'lone wolf' figure has long been central to counterterrorism analysis, representing the trajectory from non-participant to self-directed actor aligned with extremist causes. Traditional frameworks emphasizing in-person networks or online exposure, however, fail to capture the transformation of radicalization in the algorithmic age. The Arab Spring demonstrated the mobilizing power of digital platforms, yet movements like ISIS later weaponized these networks to provide ideology, belonging, and identity to dislocated populations. This article introduces the concept of the Digital Radical—an individual who transitions from passive consumer to active propagator of extremist narratives, sustaining and expanding radical ecosystems in a symbiotic relationship that becomes a critical step in the radicalization process. Drawing on Social Identity Theory (SIT), Self-Determination Theory (SDT), and Impression Management Theory (micro-level), Social Movement Theory (SMT) (meso-level), and Constructivist International Relations Theory (CIRT) (macro-level), the analysis models how belonging, validation, and collective identity drive propagation and radicalization. Comparative case studies of jihadist, far-right, and accelerationist movements illustrate how algorithmic reinforcement and identity performance convert users into propagators and eventual radicals. The study concludes with a framework for countering extremist propagation at both infrastructural and algorithmic levels—featuring PropagationRisk Scoring, One-Click Friction, Recommendation Perturbation, and Cross-Platform Hash Coordination. By reframing the consumer-to-propagator transition as a critical stage of digital radicalization, this article seeks to shift counterterrorism strategy from reactive moderation to proactive disruption of the infrastructures that sustain extremism online.
Recommended Citation
LaCroix, Hunter and Berkovits, Shevach. "The Digital Radical: Online Extremism, Propagation, and Terror by Design's Strategic Implications for Homeland Security." Journal of Strategic Security 19, no. 1 (2026)
: 121-167.
DOI: https://doi.org/10.5038/1944-0472.19.1.2547
Available at:
https://digitalcommons.usf.edu/jss/vol19/iss1/7