751
Views
1
CrossRef citations to date
0
Altmetric
Articles

Violent extremism risk assessment and screening analysis: applicability, challenges, and new developments

&
Pages 301-313 | Received 07 Aug 2021, Accepted 23 Sep 2021, Published online: 14 Nov 2022

References

  • Altier, M. B., Leonard Boyle, E., & Horgan, J. G. (2021). Returning to the fight: An empirical analysis of terrorist reengagement and recidivism. Terrorism and Political Violence, 33(4), 836–860. doi:10.1080/09546553.2019.1679781
  • Aly, A., Taylor, E., & Karnovsky, S. (2014). Moral disengagement and building resilience to violent extremism: An education intervention. Studies in Conflict & Terrorism, 37(4), 369–385.
  • Bakker, E. (2006). Jihadi terrorists in Europe their characteristics and the circumstances in which they joined the jihad: An exploratory study. The Hague: Netherlands Institute of International Relations. http://www.clingendael.nl/publications/2006/20061200_cscp_csp_bakker.pdf
  • Barracosa, S., & March, J. (2021). Dealing with radicalised youth offenders: The development and implementation of a youth-specific framework. Front Psychiatry, 12, 773545.
  • Baumer, E. P., & Wright, R. (2002). Crime, shame and recidivism. British Journal of Criminology, 41, 40–59.
  • Beardsley, N. L., & Beech, A. R. (2013). Applying the violent extremist risk assessment (VERA) to a sample of terrorist case studies. Journal of Aggression, Conflict and Peace Research, 5(1), 4–15. doi:10.1108/17596591311290713
  • Bjørgo, T., & Horgan, J. (2009). Leaving terrorism behind: Individual and collective disengagement.: New York, NY: Routledge.
  • Booth, S., & Davis, N. (2021). Operational perspectives on terrorism and managing the risk. In L. Close, & D. Impiombato (Eds.), Counterterrorism yearbook (pp. 83–86.
  • CBC (2013) Toronto 18-member Ali Mohamed Dirie reportedly died in Syria. Canadian Broadcasting Corporation. Retrieved June 9, 2018. http://www.cbc.ca/news/world/toronto-18-member-ali-mohamed-dirie-reportedly-died-in-syria-1.1868119.
  • CCOHS (2018). Canadian Centre for Occupational Health and Safety, Government of Canada. Retrieved June 13, 2018. https://ccohs.ca/oshanswers/hsprograms/risk_assessment.html.
  • Corner, E., & Gill, P. (2015). A false dichotomy? Mental illness and lone-actor terrorism. Law and Human Behavior, 39, 23–34. http://doi.org/10.1037/lhb0000102
  • Corner, E., Gill, P., & Mason, O. J. (2016). Mental health disorders and the terrorist: A research note probing selection effects and disorder prevalence. Studies in Conflict & Terrorism, 39(6), 560–568. doi:10.1080/1057610X.2015.1120099
  • Council of Europe (2016). Council of Europe handbook for prison and probation services regarding radicalisation and violent extremism. Strasbourg: COE. https://rm.coe.int/16806f9aa9
  • Crenshaw, M. (1995). Thoughts on relating terrorism to historical context. In M. Crenshaw (Ed.), Terrorism in context (pp. 3–2). University Park, PA: Pennsylvania State University Press.
  • Crenshaw, M. (2000). The psychology of terrorism: An agenda for the 21st century. Political Psychology, 21, 405–420. doi:10.1111/0162-895X.00195
  • De Luce, D., Gramer, R., & Winter, J. (2017, June 23). John Walker Lindh, Detainer #001 in the global war of terror, will go free in two years. What then? Foreign Policy.
  • De Simone, D. (2019, December 2). London Bridge: Who was the attacker. BBC News. Retrieved December 4, 2019. https://www.bbc.com/news/uk-50611788
  • Freeze, C. (2013, September 25). Toronto 18 terrorist reportedly killed in Syrian war. Globe and Mail.
  • Gill, P. (2015). Lone-actor terrorists: A behavioral analysis. London, England: Routledge.
  • Gill, P., & Corner, E. (2017). There and back again: The study of mental disorder and terrorist involvement. American Psychologist, 72(3), 231–241.
  • Globe and Mail (2010, September 19). It’s too soon to give Ali Dirie a second chance. The Globe and Mail Editorial.
  • Gruenewald, I., Chermak, S., & Freilich, J. D. (2013). Far-Right lone wolf homicides in the United States. Studies in Conflict & Terrorism, 36(12), 1005–1024. doi:10.1080/1057610X.2013.842123
  • Hoffman, B. (1998). Inside terrorism. New York: Columbia University Press.
  • Horgan, J. (2003). Leaving terrorism behind: An individual’s perspective. In A. Silke (Ed.), Terrorists, victims and society (pp. 109–130). New York: John Wiley and Sons.
  • Horgan, J. (2005). The psychology of terrorism. London: Routledge.
  • Horgan, J. (2008). From profiles to pathways and roots to routes: Perspectives from psychology on radicalization into terrorism. The ANNALS of the American Academy of Political and Social Science, 618, 80–94.
  • Horgan, J. (2012). Interviewing the terrorists: Reflections on fieldwork and implications for psychological research. Behavioral Sciences of Terrorism and Political Aggression, 4(3), 195–211.
  • Horgan, J., Shortland, N., Abbasciano, S., & Walsh, S. (2016). Actions speak louder than words: A behavioral analysis of 183 individuals convicted for terrorist offenses in the United States from 1995 to 2012. Journal of Forensic Sciences, 61(5), 1228–1237.
  • ISD (2019). Institute for Strategic Dialogue. Retrieved December 3, 2019. https://isdglobal.org/jacob-davey-writes-inthetelegraph-on-how-nz-atrocities-prove-that-far-right-terrorism-is-an-organized-global-threat/.
  • Johnson, B. (2019). Boris Johnson on London attack and avoiding Andrew Neil interview: Video. https://www.theguardian.com/global/video/2019/dec/01/boris-johnson-on-dodging-andrew-neil-interview-and-london-bridge-attack-video.
  • Johnson, C. (2019, March 23). FBI Stays on watch as terrorists finish prison terms and broader threat evolves. NPR. https://www.npr.org/2019/05/23/726175246/fbi-stays-on-watch-as-terrorists-finish-prison-terms-and-broader-threat-evolves?utm_medium=RSS&utm_campaign=news&t=1573771451094.
  • Joseph, J., & Corkhill, J. (2011). Information evaluation: How one group of intelligence analysts go about the task. 4th Australian Security and Intelligence Conference, Edith Cowan University, Perth. Available at https://ro.edu.au/cgi/viewcontent.cgi?article=1019andcontext=asi
  • Keenan, M. (2016) Second reading speech to the Australian Commonwealth House of Representatives, Thursday December 1, on the Criminal Code Amendment (High Risk Terrorist Offenders) Bill 2016, p.5147 http://parlinfo.aph.gov.auparlInfo/genpdf/chamber/hansardr/b564519e-8c2b-4dbf-a1e8-8c9334a04537/0127/hansard_frag.pdf;fileType=application%2Fpdf.
  • Kruglanski, A. W., Chen, X., Dechesne, M., Fishman, S., & Orehek, E. (2009). Fully committed: Suicide bombers’ motivation and the quest for personal significance. Political Psychology, 30, 331–357. doi:10.1111/j.1467-9221.2009.00698.x
  • LaFree, G. & Ackerman, G. (2009). The empirical study of terrorism: Social and legal research. Annual Review of Law and Social Science.,5, 347–374
  • Laqueur, W. (1999). The new terrorism: Fanaticism and the arms of mass destruction. New York: Oxford University Press.
  • Laqueur, W. (2003). No end to war: Terrorism in the twenty-first century. New York: Continuum.
  • Lee, S. (2021) Parliament of Australia, Parliamentary Joint Committee on Intelligence and Security, downloaded 16 July 2021 and located at https://parlinfo.aph.gov.au/parlInfo/download/committees/commjnt/dd6ec9b4-dd4a-4fc5-84c4-22baae1f833a/toc_pdf/Parliamentary%20Joint%20Committee%20on%20Intelligence%20and%20Security_2021_04_29_8720_Official.pdf;fileType=application%2Fpdf#search=%22committees/commjnt/dd6ec9b4-dd4a-4fc5-84c4-22baae1f833a/0000%22.
  • Lloyd, M., & Dean, C. (2015). The development of structured guidelines for assessing risk in extremist offenders. Journal of Threat Assessment and Management, 2(1), 40–52.
  • Maghan, J., & Kelly, R. J. (1989). Terrorism and corrections: The incarcerated radical. In J. R. Buckwalter (Ed.), International terrorism: The decade ahead (pp. 29–53). Chicago, IL: University of Illinois Press, Office of Criminal Justice.
  • Monahan, J. (2012). The individual risk assessment of terrorism. Psychology, Public Policy, and Law, 18(2), 167–205. doi:10.1037/a0025792
  • Monahan, J. (2015). The individual risk assessment of terrorism: Recent developments. Public Law and Legal Theory Research Paper Series, 2015-57, September 2015: http://ssm.com/abstract=2665815.
  • Olding, R. (2014, August 1) Jihadi Khalid Sharrouf says he would have launched attack in Australia. The Sydney Morning Herald. Retrieved June 9, 2018. https://www.smh.com.au/world/jihadi-khaled-sharrouf-says-he-would-have-launched-attack-in-australia-20140731-zz5k1.html.
  • Parlina, I., Fitri, N., Ramadhani, & Sundaryani, F. (2016, January 15). Terrorist attacks blamed on IS recruit Bahrun Naim. The Jakarta Post. Retrieved June 9, 2018. http://www.thejakartapost.com/news/2016/01/15/terrorist-attacks-blamed-is-recruit-bahrun-naim.html
  • Post, J. M. (2005). Psychology: Report of the psychology working group. Addressing the Causes of Terrorism: The Club de Madrid Series on Democracy and Terrorism, 1. The International Summit on Democracy, Terrorism and Security, 8-11 March 2005. Available from Club de Madrid, Felipe 1 V, 9-3 izda, 28014 Madrid, Spain.
  • Post, J. M. (2007). The mind of the terrorist: The psychology of terrorism from the IRA to Al Qaeda. New York: Palgrave Macmillan.
  • Pressman, D.E. (2009). Risk assessment decisions for violent political extremism 2009-02. Ottawa: Public Safety Canada, Government of Canada. Cat. No. PS3-1/2009-2-1EPDF; https://www.publicsafety.gc.ca/cnt/rsrcs/pblctns/2009-02-rdv/2009-02-rdv-eng.pdf171
  • Pressman, D. E. (2012). Risk assessment and terrorism: The Canadian context. In D. Gartenstein-Ross, & L. Frum (Eds.), Terror in the peaceable kingdom (pp. 139–154). Washington D.C.: FDD Press.
  • Pressman, D. E., & Bibeau, L. (2020). Pertinence de VERA-2R dans l’évaluation du risque de violence extremiste – Application dans les Services policiers et la sécurité national. In L. Bibeau (Ed.), Evaluation de la menace et du risque dans different contexts de violence (pp. 251–287). Yvon Blais: Thomson Reuters.
  • Pressman, D. E., & Duits, N. (2019). From VERA to VERA-2R: New developments in the risk assessment of violent political extremism (article translated and published in French). In M. Benbouriche, & M. Hertzog-Evans (Eds.), Cahiers de la Securite et de la justice, No. 46 (pp. 57–71). INHESJ. (Available in English upon request from the authors).
  • Pressman, D. E., Duits, N., Rinne, T., & Flockton, J. S. (2018). VERA-2R violent extremism risk assessment revised version 2 Dutch Ministry of Justice and Security, Government of The Netherlands, Utrecht, The Netherlands.
  • Pressman, D. E., & Flockton, J. S. (2012). Calibrating risk for violent political extremists and terrorists: The VERA 2 structured assessment. The British Journal of Forensic Practice, 14(4), 237–251.
  • Pressman, D. E., & Flockton, J. S. (2014). Violent extremist risk assessment: Issues and applications of the VERA 2 in a high-security correctional setting. In A. Silke (Ed.), Prisons, terrorism and extremism: Critical issues in management, radicalisation and reform (pp. 122–143). Oxon, UK: Routledge.
  • Pressman, D. E., & Ivan, C. (2016). Internet Use and violent extremism: A cyber-VERA risk assessment protocol. In M. Khader, L. S. Neo, G. Ong, E. Tan, & J. Chen (Eds.), Countering violent extremism and radicalisation in the digital Era (pp. 391–409). Hersey, PA: IGI Global.
  • Roberts, K., & Horgan, J. (2008). Risk assessment and the terrorist. Perspectives on Terrorism, 2(6), 1–6. Retrieved May 5, 2018.
  • Sageman, M. (2004). Understanding terrorist networks. Philadelphia, PA: University of Pennsylvania Press.
  • Sageman, M. (2008). Leaderless Jihad. Terror networks in the twenty first century. Philadelphia, PA: University of Pennsylvania Press.
  • Schuurman, B., & Bakker, E. (2016). Reintegrating jihadist extremists: Evaluating a Dutch initiative, 2013-2014. Behavioral Sciences of Terrorism and Political Aggression, 8(1), 66–85. doi:10.1080/19434472.2015.1100648
  • Schuurman, B., Harris-Hogan, S. J. F., Zammit, A. W., & Lentini, P. (2014). Operation pendennis: A case study of an Australian terrorist plot. Perspectives on Terrorism, 8(4), 91–99.
  • Trump, D. (2019, May 24). President Donald Trump as quoted and heard in a news video on Bloomberg News. https://www.bloomberg.com/news/videos/2019-05-24/trump-on-american-taliban-release-video
  • UNODC (2016). Handbook on the management of violent extremist prisoners and the prevention of radicalization to violence in prisons. New York: United Nations Office on Drugs and Crime. https://www.unodc.org/documents/brussels/News/2016.10_Handbook_on_VEPs.pdf.
  • Van der Heide, L., Van der Zwan, M. & van Leyenhorst, M. (2019). The practitioner's guide to the Galaxy - a comparison of risk assessment tools for violent extremism. ICCT Research paper: September 2019. doi:10.19165/2019.1.07 ISSN: 2468-0486. https://icct.nl/publication/the-practitioners-guide-to-the-galaxy-a-comparison-of-risk-assessment-tools-for-violent-extremism/
  • Webster, C. D., Douglas, K. S., Eaves, D., & Hart, S. (1997). HCR-20 assessing risk for violence: Version 2.:. Vancouver, BC: Mental Health Law & Policy Institute, Simon Fraser University.
  • Welch, D., & Dredge, S. (2017). Khaled Sharrouf, Australian terrorist believed to have been killed in air strike in Syria. ABC News, Updated August 17, 2017. August 16, 2017.
  • Zaia, R. (2018). Forensic psychiatry and the extremist: A review of recent violence risk assessment tools for offenders convicted of terrorism offences. TSAS Working Paper Series No. 18-04. April 9, 2018. http://tsas.ca/working-papers/

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.