On July 13, 2024, at the Trump rally in Pennsylvania, someone attempted to assassinate Republican Presidential Candidate Donald Trump. This attempt sparked a large-scale discussion on social media. We collected posts from X (formerly known as Twitter) one week before and after the assassination attempt and aimed to model the short-term effects of such a ``shock'' on public opinions and discussion topics. Specifically, our study addresses three key questions: first, we investigate how public sentiment toward Donald Trump shifts over time and across regions (RQ1) and examine whether the assassination attempt itself significantly affects public attitudes, independent of the existing political alignments (RQ2). Finally, we explore the major themes in online conversations before and after the crisis, illustrating how discussion topics evolved in response to this politically charged event (RQ3). By integrating large language model-based sentiment analysis, difference-in-differences modeling, and topic modeling techniques, we find that following the attempt the public response was broadly sympathetic to Trump rather than polarizing, despite baseline ideological and regional disparities.
Mexico has experienced a notable surge in assassinations of political candidates and mayors. This article argues that these killings are largely driven by organized crime, aiming to influence candidate selection, control local governments for rent-seeking, and retaliate against government crackdowns. Using a new dataset of political assassinations in Mexico from 2000 to 2021 and instrumental variables, we address endogeneity concerns in the location and timing of government crackdowns. Our instruments include historical Chinese immigration patterns linked to opium cultivation in Mexico, local corn prices, and U.S. illicit drug prices. The findings reveal that candidates in municipalities near oil pipelines face an increased risk of assassination due to drug trafficking organizations expanding into oil theft, particularly during elections and fuel price hikes. Government arrests or killings of organized crime members trigger retaliatory violence, further endangering incumbent mayors. This political violence has a negligible impact on voter turnout, as it targets politicians rather than voters. However, voter turnout increases in areas where authorities disrupt drug smuggling, raisin
The assassination of President John Fitzgerald Kennedy (JFK) traumatized the nation. In this paper we show that evidence used to rule out a second assassin is fundamentally flawed. This paper discusses new compositional analyses of bullets reportedly to have been derived from the same batch as those used in the assassination. The new analyses show that the bullet fragments involved in the assassination are not nearly as rare as previously reported. In particular, the new test results are compared to key bullet composition testimony presented before the House Select Committee on Assassinations (HSCA). Matches of bullets within the same box of bullets are shown to be much more likely than indicated in the House Select Committee on Assassinations' testimony. Additionally, we show that one of the ten test bullets is considered a match to one or more assassination fragments. This finding means that the bullet fragments from the assassination that match could have come from three or more separate bullets. Finally, this paper presents a case for reanalyzing the assassination bullet fragments and conducting the necessary supporting scientific studies. These analyses will shed light on whet
In developed nations assassinations are rare and thus the impact of such acts on the electoral and political landscape is understudied. In this paper, we focus on Twitter data to examine the effects of Japan's former Primer Minister Abe's assassination on the Japanese House of Councillors elections in 2022. We utilize sentiment analysis and emotion detection together with topic modeling on over 2 million tweets and compare them against tweets during previous election cycles. Our findings indicate that Twitter sentiments were negatively impacted by the event in the short term and that social media attention span has shortened. We also discuss how "necropolitics" affected the outcome of the elections in favor of the deceased's party meaning that there seems to have been an effect of Abe's death on the election outcome though the findings warrant further investigation for conclusive results.
We give new formulas on the total number of born particles in the stable birth-and-assassination process, and prove that it has an heavy-tailed distribution. We also establish that this process is a scaling limit of a process of rumor scotching in a network, and is related to a predator-prey dynamics.
Using transaction-level trade data from Polymarket's 2024 U.S. presidential election market, we study how prediction markets process shocks. We analyze three events: the Biden-Trump debate, the assassination attempt on Trump, and Biden's dropout. Trading rises after each shock, especially among incumbent traders with pre-event exposure against a Trump victory, who are also more likely to flip positions. Price adjustment differs across shocks. The debate-induced price jump largely reverses, the assassination-attempt repricing persists, and Biden's dropout triggers two-sided trading with little net price change. These patterns link post-news price dynamics to liquidity and disagreement about how shocks map into election odds.
This paper examines the dynamic relationship between electoral polls and indicators of economic and financial uncertainty during the last two U.S. presidential elections (2020 and 2024). Using daily polling data on Donald Trump and measures such as the Aruoba-Diebold-Scotti Business Conditions Index, the 5-year Breakeven Inflation Rate, the Trade Policy Uncertainty index, and the VIX, we estimate conditional correlation models to capture time-varying interactions. The analysis reveals that in 2020, correlations between polls and uncertainty measures were highly dynamic and event-driven, reflecting the influence of exogenous shocks (COVID-19, oil price collapse) and political milestones (primaries, debates). In contrast, during the 2024 campaign, correlations remained close to zero, stable, and largely unresponsive to shocks, suggesting that entrenched polarization and non-economic events (e.g., assassination attempt, candidate changes) muted the economic channel. The study highlights how the interplay between voter sentiment, financial markets, and uncertainty varies across electoral contexts, offering a methodological contribution through the application of Dynamic Conditional Cor
Business Email Compromise (BEC) is a high-impact social engineering threat with extreme operational asymmetry: false negatives can trigger large financial losses, while false positives primarily incur investigation and delay costs. This paper compares two BEC detection paradigms under a cost-sensitive decision framework: (i) a semantic transformer approach (DistilBERT) for contextual language understanding, and (ii) a forensic psycholinguistic approach (CatBoost) using engineered linguistic and structural cues. We evaluate both on a hybrid dataset (N = 7,990) combining legitimate corporate email and AI-synthesised adversarial fraud generated across 30 BEC taxonomies, including character-level Unicode obfuscations. We add classical baselines (TF-IDF+LogReg and character n-gram+Linear SVM), an ablation study for the Smiling Assassin Score, and a homoglyph-map sensitivity analysis. DistilBERT achieves AUC = 1.0000 and F1 = 0.9981 at 7.403 ms per email on GPU; CatBoost achieves AUC = 0.9860 and F1 = 0.9382 at 0.855 ms on CPU. A three-way cost-sensitive decision policy (auto-allow, auto-block, manual review) optimises expected financial loss under a 1:5,167 false-negative-to-false-posit
The deployment of traditional deep learning models in high-risk security tasks in an unlabeled, data-non-exploitable video intelligence environment faces significant challenges. In this paper, we propose a lightweight anomaly detection framework based on color features for surveillance video clips in a high sensitivity tactical mission, aiming to quickly identify and interpret potential threat events under resource-constrained and data-sensitive conditions. The method fuses unsupervised KMeans clustering with RGB channel histogram modeling to achieve composite detection of structural anomalies and color mutation signals in key frames. The experiment takes an operation surveillance video occurring in an African country as a research sample, and successfully identifies multiple highly anomalous frames related to high-energy light sources, target presence, and reflective interference under the condition of no access to the original data. The results show that this method can be effectively used for tactical assassination warning, suspicious object screening and environmental drastic change monitoring with strong deployability and tactical interpretation value. The study emphasizes the
Sentiment analysis of textual content has become a well-established solution for analyzing social media data. However, with the rise of images and videos as primary modes of expression, more information on social media is conveyed visually. Among these, facial expressions serve as one of the most direct indicators of emotional content in images. This study analyzes a dataset of Instagram posts related to the 2024 U.S. presidential election, spanning April 5, 2024, to August 9, 2024, to compare the relationship between textual and facial sentiment. Our findings reveal that facial expressions align with text sentiment, where positive sentiment aligns with happiness, although neutral and negative facial expressions provide critical information beyond negative valence. Furthermore, during politically significant events such as Donald Trump's conviction and assassination attempt, posts depicting Trump showed a 12% increase in negative sentiment. Crucially, Democrats use their opponent's fear to depict weakness, whereas Republicans use their candidate's anger to depict resilience. Our research highlights the potential of integrating facial expression analysis with textual sentiment analy
The Resistance: Avalon is a partially observable social deduction game. This area of AI game playing is fairly undeveloped. Implementing an AI for this game involves multiple components specific to each phase as well as role in the game. In this paper, we plan to iteratively develop the required components for each role/phase by first addressing the Assassination phase which can be modeled as a machine learning problem. Using a publicly available dataset from an online version of the game, we train classifiers that emulate an Assassin. After trying various classification techniques, we are able to achieve above average human performance using a simple linear support vector classifier. The eventual goal of this project is to pursue developing an intelligent and complete Avalon player that can play through each phase of the game as any role.
Occasionally during the course of the human learning experience we are faced with an anomaly. An aberration of sorts, which try as we might, defies appropriate classification. The recent paper by Spiegelman et al.--Chemical and forensic analysis of JFK assassination bullet lots: Is a second shooter possible?--is one such aberration. It is riddled with both misconceptions and errors of fact. Purporting to cast doubt on the NAA (neutron activation analysis) work conducted by Dr. Vincent Guinn in the investigation of the assassination of President John F. Kennedy, it fails miserably. The paper offers two central conclusions, one which is demonstrably false, and the other which is specious. The authors opine; ``If the assassination fragments are derived from three or more separate bullets, then a second assassin is likely, as the additional bullet would not be attributable to the main suspect, Mr. Oswald.'' This statement relating to the likelihood of a second assassin based on the premise of three or more separate bullets is demonstrably false. The available evidence indicates that Oswald fired three shots, one of which is believed to have missed. However, on the off chance that all t
We are interested in predator-prey dynamics on infinite trees, which can informally be seen as particular two-type branching processes where individuals may die (or be infected) only after their parent dies (or is infected). We study two types of such dynamics: the chase-escape process, introduced by Kordzakhia with a variant by Bordenave, and the birth-and-assassination process, introduced by Aldous & Krebs. We exhibit a coupling between these processes and branching random walks starting from a random point and killed at the barrier 0. This sheds new light on the chase-escape and birth-and-assassination processes, which allows us to recover by probabilistic means previously known results and also to obtain new results. For instance, we find the asymptotic behavior of tail of the number of infected individuals in both the subcritical and critical regimes for the chase-escape process, and show that the birth-and-assassination process ends almost surely at criticality.
Personal item tracking devices are popular for locating lost items such as keys, wallets, and suitcases. Originally created to help users find personal items quickly, these devices are now being abused by stalkers and domestic abusers to track their victims' location over time. Some device manufacturers created `anti-stalking features' in response, and later improved on them after criticism that they were insufficient. We analyse the effectiveness of the anti-stalking features with five brands of tracking devices through a gamified naturalistic quasi-experiment in collaboration with the Assassins' Guild student society. Despite participants knowing they might be tracked, and being incentivised to detect and remove the tracker, the anti-stalking features were not useful and were rarely used. We also identify additional issues with feature availability, usability, and effectiveness. These failures combined imply a need to greatly improve the presence of anti-stalking features to prevent trackers being abused.
The Roman Empire shaped Western civilization, and many Roman principles are embodied in modern institutions. Although its political institutions proved both resilient and adaptable, allowing it to incorporate diverse populations, the Empire suffered from many internal conflicts. Indeed, most emperors died violently, from assassination, suicide, or in battle. These internal conflicts produced patterns in the length of time that can be identified by statistical analysis. In this paper, we study the underlying patterns associated with the reign of the Roman emperors by using statistical tools of survival data analysis. We consider all the 175 Roman emperors and propose a new power-law model with change points to predict the time-to-violent-death of the Roman emperors. This model encompasses data in the presence of censoring and long-term survivors, providing more accurate predictions than previous models. Our results show that power-law distributions can also occur in survival data, as verified in other data types from natural and artificial systems, reinforcing the ubiquity of power law distributions. The generality of our approach paves the way to further related investigations not
We consider the spreading dynamics of two nested invasion clusters on an infinite tree. This model was defined as the chase-escape model by Kordzakhia and it admits a limit process, the birth-and-assassination process, previously introduced by Aldous and Krebs. On both models, we prove an asymptotic equivalent of the extinction probability near criticality. In the subcritical regime, we give a tail bound on the total progeny of the preys before extinction.
Aiming to fill a crucial gap in our observational knowledge of the early Universe, experiments around the world continue to attempt to verify the claimed detection of the redshifted 21-cm signal from Cosmic Dawn by the EDGES experiment. This sky-averaged or 'global' signal from neutral hydrogen should be detectable at low radio frequencies (50-200 MHz), but is difficult to measure due to bright foreground emission and difficulties in reaching the required levels of instrumental-calibration precision. In this paper we outline our progress toward using a novel new method to measure the global redshifted 21-cm signal. Motivated by the need to use alternative methods with very different systematic errors to EDGES for an independent result, we employ an array of closely-spaced antennas to measure the global sky signal interferometrically, rather than using the conventional approach with a single antenna. We use simulations to demonstrate our newly-developed methods and show that, for an idealised instrument, a 21-cm signal could theoretically be extracted from the visibilities of an array of closely-spaced dipoles. We verify that our signal-extraction methods work on real data using obs
Fairness and centredness of ideals in commutative rings, i.e., the relations between assassins and weak assassins of a module, its small or large torsion submodule, and the corresponding quotients, are studied. General criteria as well as more specific results about idempotent or nil ideals are given, and several examples are presented.
This paper has attracted interest around the world from the media (both TV and newspapers). In addition, we have received letters, emails and telephone calls. One of our favorites was a voicemail message asking us to return a call to Australia at which point we would learn who really killed JFK. We welcome the opportunity to respond to the letter to the editor from Mr. Fiorentino. Mr. Fiorentino claims that our ``statement relating to the likelihood of a second assassin based on the premise of three or more separate bullets is demonstrably false.'' In response we would like to simply quote from page 327 of Gerald Posner's book Case Closed, one of the most well known works supporting the single assassin theory: ``If Connally was hit by another bullet, it had to be fired from a second shooter, since the Warren Commission's own reconstructions showed that Oswald could not have operated the bolt and refired in 1.4 seconds.'' Mr. Fiorentino also claims that the ``second fatal flaw is the use of a rather uncomplicated formula based on Bayes Theorem.'' Let $E$ denote the evidence and $T$ denote the theory that there were just two bullets (and hence a single shooter). We used Bayes Theorem
On 2014 Dec. 9.61, the All-Sky Automated Survey for SuperNovae (ASAS-SN or "Assassin") discovered ASASSN-14lp just $\sim2$ days after first light using a global array of 14-cm diameter telescopes. ASASSN-14lp went on to become a bright supernova ($V = 11.94$ mag), second only to SN 2014J for the year. We present prediscovery photometry (with a detection less than a day after first light) and ultraviolet through near-infrared photometric and spectroscopic data covering the rise and fall of ASASSN-14lp for more than 100 days. We find that ASASSN-14lp had a broad light curve ($Δm_{15}(B) = 0.80 \pm 0.05$), a $B$-band maximum at $2457015.82 \pm 0.03$, a rise time of $16.94^{+ 0.11 }_{- 0.10 }$ days, and moderate host--galaxy extinction ($E(B-V)_{\textrm{host}} = 0.33 \pm 0.06$). Using ASASSN-14lp we derive a distance modulus for NGC 4666 of $μ= 30.8 \pm 0.2$ corresponding to a distance of $14.7 \pm 1.5$ Mpc. However, adding ASASSN-14lp to the calibrating sample of Type Ia supernovae still requires an independent distance to the host galaxy. Finally, using our early-time photometric and spectroscopic observations, we rule out red giant secondaries and, assuming a favorable viewing angle