The Open Access Publisher and Free Library
04-terrorism.jpg

TERRORISM

TERRORISM-DOMESTIC-INTERNATIONAL-RADICALIZATION-WAR

Posts tagged Terrorism Prevention
Domestic Terrorists' Contact with System Stakeholders Before Attacks

MCBRIDE, MEGAN K.; JENKINS, MONIQUE

From the document: "Within the public violence literature--that is, the literature on domestic terrorism, mass shootings, school shootings, and hate crimes, among others--leakage has been identified as a core warning behavior. Leakage occurs when a would be assailant communicates an intention to harm a target before committing an attack. This communication can vary in timing, level of detail, form, intentionality, and audience. Through such a communication, an individual might directly verbalize an intent to commit an act, make more subtle threats and innuendos, or share a plan via social media. Researchers have found relatively high levels of leakage associated with acts of public violence, including adolescent-perpetrated mass murders, mass shootings, political and public figure assassinations, and domestic terrorism. For this reason, leakage--which often occurs in interactions online or with loved ones--can be an important warning sign. But leakage to family, friends, or acquaintances is not the only way to detect when an individual is intending to commit an act of public violence, and over the last decade, researchers have started to examine preattack contact with system stakeholders, such as law enforcement, mental health, and education professionals. [...] We sought to advance understanding of what percentage of the violent extremist population could be 'catchable' in the sense that an individual had been in previous contact with a system stakeholder (e.g., law enforcement, mental health provider) or had been reported to a system stakeholder (e.g., by a friend or loved one to whom they had intentionally or unintentionally leaked information). To explore this issue, we leveraged a new dataset: the Domestic Terrorism Offender Level Database (DTOLD). The database includes detailed information on the 320 non-Islamist individuals who carried out terrorist attacks in the United States between January 1, 2001, and December 31, 2020. Specifically, we sought to understand what percentage of this population was known to system stakeholders at some point before they perpetrated their attacks." Further information for this document can be found here: www.cna.org/reports/2024/08/domestic-terrorists-contact-with-system-stakeholders-before-attacks

CNA CORPORATION. 2024. 4p.

Transphobic discourse and moral panic convergence: A content analysis of my hate mail

By Michelle Sydes, Lorelei Hine, Angela Higginson, James McEwan, Laura Dugan, Lorraine Mazerolle

Background: Criminal justice agencies are well positioned to help prevent the radicalisation of individuals and groups, stop those radicalised from engaging in violence, and reduce the likelihood of terrorist attacks. This Evidence and Gap Map

(EGM) presents the existing evidence and gaps in the evaluation research. Objectives: To identify the existing evidence that considers the effectiveness of criminal justice interventions in preventing radicalisation, violent extremism and terrorism.

Search Methods: We conducted a comprehensive search of the academic and grey literature to locate relevant studies for the EGM. Our search locations included the Global Policing Database (GPD), eight electronic platforms encompassing over 20 academic databases, five trial registries and over 30 government and nongovernment websites. The systematic search was carried out between 8 June 2022 and 1 August 2022.

Selection Criteria: We captured criminal justice interventions published between January 2002 and December 2021 that aimed to prevent radicalisation, violent extremism, and/or terrorism. Criminal justice agencies were broadly defined to include police, courts, and corrections (both custodial and community). Eligible populations included criminal justice practitioners, places, communities or family members, victims, or individuals/groups who are radicalised or at risk of becoming radicalised. Our map includes systematic reviews, randomised controlled trials, and strong quasi‐experimental studies. We placed no limits on study outcomes, language, or geographic location.

Data Collection and Analysis: Our screening approach differed slightly for the different sources, but all documents were assessed in the systematic review software program DistillerSR on the same final eligibility criteria. Once included, we extracted information from studies using a standardised form that allowed us to collect key data for our EGM. Eligible systematic reviews were assessed for risk of bias using the AMSTAR 2 critical appraisal tool.

United States, Campbell Collaboration. 2023, 53pg