We are not watching two separate threat streams. We are watching a single set of operational techniques migrate across ideologies. Over the last decade violent jihadists perfected a low-cost, distributed method for inspiring and enabling attacks abroad and at home. That same method is now embedded in the far-right ecosystem in the United States: decentralized radicalization online, “open-source” how-to materials, manifesto and livestream culture, encrypted logistics, and a clear focus on soft targets and critical infrastructure. These are not abstract parallels. Federal assessments identify lone offenders and small groups as the most persistent operational threat and warn that both domestic violent extremists and foreign-inspired actors are using online messaging to motivate violence.
Practical tactics migrated first in form and then in function. Jihadist groups invested heavily in English-language propaganda and simple tactical guides aimed at enabling self-directed attackers. The effect was to lower the barrier between grievance and lethal action. Far-right accelerationist networks have adopted the same approach: curated propaganda, glorification of past attackers, and PDFs and channel posts that double as operational primers. Online ecosystems now work the same way for both movements: mass distribution on permissive platforms, then relocation to encrypted apps for operational planning and logistics. The result is a set of shared vulnerabilities for defenders and the same intelligence challenge: small, insulated actors who radicalize online and act with little or no direct command-and-control.
The model is not hypothetical. The 2019 Christchurch attacker streamed his assault and posted a manifesto online to maximize exposure and contagion. The Buffalo supermarket shooter in 2022 explicitly borrowed language and structure from earlier manifestos. Both cases show a recurrent play: publicly circulating an ideological tract, then using live or recorded violence as the propaganda engine to recruit imitators. That combination of pre-attack publication and broadcasted violence is a direct replication of methods jihadists used to motivate “lone wolf” attacks in Western countries. When an attacker can create their own narrative and distribute it worldwide in minutes, any hardened perimeter or single-point defense becomes insufficient.
Far-right groups are also moving beyond inspiration and into operations that mirror jihadist emphasis on critical-target disruption. Recent federal criminal complaints and reporting show accelerationist actors sharing open-source infrastructure maps and discussing simultaneous strikes on electric substations to produce cascading outages. Those posts and the subsequent arrests demonstrate that the far-right playbook now contains explicit targeting guidance for infrastructure—published and circulated in the same “how-to” style that jihadist magazines once used to teach bomb-making and target selection. That is a material shift in intent and capability.
What defenders must accept is simple and disagreeable. Traditional counters to extremist networks that rely on identifying rigid hierarchies and tracked financial flows will miss the modern actor. The threat is tactical, modular, and platform-agnostic. Countermeasures have to be equally pragmatic: rapid information-sharing between federal and local partners, prioritized threat-hunting against open-source indicators of operational plotting, targeted disruption of encrypted logistics when probable cause exists, and hardened protection for soft targets and critical nodes whose failure multiplies harm. Government advisories already stress where violence is likely to be directed and encourage private sector partnerships; those directives require urgent operational follow-through in states and municipalities that remain under-resourced.
Finally, policy must separate ideology from tactics. Free societies tolerate offensive ideas. They cannot tolerate readily reproducible, detailed manuals that convert violent intent into operational capability. Platforms and law enforcement need clearer processes for rapidly triaging content that is both instructional and tied to extremist networks. At the same time, communities and local institutions must act on the premise that a single inspired individual can cause mass harm. Preventive investments in awareness, physical hardening at high-risk sites, and local investigative capacity are not optional. They are the practical price of living in a networked information environment where playbooks cross ideological lines and scale quickly.