Open Access Publisher and Free Library
TERRORISM.jpeg

TERRORISM

Terrorism-Domestic-International-Radicalization-War-Weapons-Trafficking-Crime-Mass Shootings

Posts in Criminal Justice
The Islamic State in Afghanistan: A Jihadist Threat in Retreat?

By The International Crisis Group

What’s new? Since the Taliban takeover of Afghanistan in 2021, the Islamic State-Khorasan Province (IS-KP) has emerged as a major international security threat, orchestrating or inspiring attacks abroad following a Taliban clampdown on its home turf. Although its strikes have fallen in number in 2025, its offensive could resurge. Why does it matter? Despite the recent lull, IS-KP might reactivate commanders willing to carry out attacks abroad or coordinate with other ISIS branches to launch them. Even a small number of highprofile operations – such as the March 2024 mass shooting and arson in Moscow – can cause numerous deaths and have major international repercussions. What should be done? Coordination among security services has improved, particularly in intelligence sharing and rendition. There are strong reasons not to resort to military action, but more could be done in terms of collaborating with the Taliban and Syrian governments, redefining the global anti-ISIS coalition’s law enforcement role, and supporting Central Asian countries.

Crisis Group Asia Briefing N°183

Brussels: International Crisis Group, 2025. 28p.

download
Criminal Justice Interventions for Preventing Radicalisation, Violent Extremism and Terrorism: An Evidence and Gap Map

By Michelle Sydes | Lorelei Hine | Angela Higginson4 | James McEwan | Laura Dugan | Lorraine Mazerolle3

Background: Criminal justice agencies are well positioned to help prevent the radicalisation of individuals and groups, stop those radicalised from engaging in violence, and reduce the likelihood of terrorist attacks. This Evidence and Gap Map (EGM) presents the existing evidence and gaps in the evaluation research. Objectives: To identify the existing evidence that considers the effectiveness of criminal justice interventions in preventing radicalisation, violent extremism and terrorism. Search Methods: We conducted a comprehensive search of the academic and grey literature to locate relevant studies for the EGM. Our search locations included the Global Policing Database (GPD), eight electronic platforms encompassing over 20 academic databases, five trial registries and over 30 government and non‐ government websites. The systematic search was carried out between 8 June 2022 and 1 August 2022. Selection Criteria: We captured criminal justice interventions published between January 2002 and December 2021 that aimed to prevent radicalisation, violent extremism, and/or terrorism. Criminal justice agencies were broadly defined to include police, courts, and corrections (both custodial and community). Eligible populations included criminal justice practitioners, places, communities or family members, victims, or individuals/groups who are radicalised or at risk of becoming radicalised. Our map includes systematic reviews, randomised controlled trials, and strong quasi‐experimental studies. We placed no limits on study outcomes, language, or geographic location. Data Collection and Analysis: Our screening approach differed slightly for the different sources, but all documents were assessed in the systematic review software program DistillerSR on the same final eligibility criteria. Once included, we extracted information from studies using a standardised form that allowed us to collect key data for our EGM. Eligible systematic reviews were assessed for risk of bias using the AMSTAR 2 critical appraisal tool. Main Results: The systematic search identified 63,763 unique records. After screening, there were 70 studies eligible for the EGM (from 71 documents), of which two were systematic reviews (assessed as moderate quality), 16 were randomised controlled trials, and 52 were strong quasi‐experimental studies. The majority of studies (n = 58) reported on policing interventions. Limited evidence was found related to courts or corrections interventions. The impact of these interventions was measured by a wide variety of outcomes (n = 50). These measures were thematically grouped under nine broad categories including (1) terrorism, (2) extremism or radicalisation, (3) non‐terror related crime and recidivism, (4) citizen perceptions/intentions toward the criminal justice system and government, (5) psychosocial, (6) criminal justice practitioner behaviours/attitudes/ beliefs, (7) racially targeted criminal justice practices, (8) investigation efficacy, and (9) organisational factors. The most commonly assessed outcomes included measures of terrorism, investigation efficacy, and organisational factors. Very limited research assessed intervention effectiveness against measures of extremism and/or radicalisation. Authors’ Conclusions: Conducting high‐quality evaluation research on rare and hidden problems presents a challenge for criminal justice research. The map reveals a number of significant gaps in studies evaluating criminal justice responses to terrorism and radicalisation. We conclude that future research should focus attention on studies that consolidate sound measurement of terrorism‐related outcomes to better capture the potential benefits and harms of counter‐terrorism programs, policies and practices which involve criminal justice agencies.

Campbell Systematic Reviews, 19(4). 2023. 53p.

download
The Use of Artificial Intelligence in Countering Online Radicalisation in Indonesia

By Raneeta Mutiara

Digitalisation of the activities of Islamic State in Iraq and Syria (ISIS) has been a longstanding issue in Southeast Asia. In recent years, the nature of this threat has become more widespread and complex. In countries like Indonesia, where radicalisation is primarily offline, online platforms still play a role in spreading extremist ideas and maintaining ideological networks. The phenomenon of online radicalisation can erode social cohesion, highlighting the need for strategic measures to counter its destabilising impact.

Indonesia has made several attempts to combat online radicalisation. The National Counter Terrorism Agency of Indonesia (BNPT) initiated the Duta Damai Dunia Maya campaign to counter harmful content on the Internet. Other online initiatives, such as BincangSyariah and Islamidotco, have also been promoting Islamic literacy, moderating religious interpretations, and correcting misleading narratives.

Nevertheless, Indonesia still encounters online radicalisation cases. In July 2024, Indonesia’s elite counterterrorism unit, Densus 88, detained a 19-year-old student who had expressed allegiance to ISIS through social media and was believed to be planning attacks on religious sites before he was caught.

The swift progress of Artificial Intelligence (AI), especially in areas of machine learning (ML) and natural language processing (NLP), presents both opportunities and challenges in combating online radicalisation in Indonesia. AI, generally defined as machines mimicking human intelligence, enables systems to recognise patterns, analyse content, and produce outputs in text, images, and videos. Within this AI landscape, ML allows models to enhance themselves through data, while NLP, as a specific ML application, deals with understanding and generating human language. These advancements provide possibilities for creating early detection systems, content moderation tools, and sentiment analysis tools that can spot and counter extremist messages online.

For the research, the author conducted interviews with fifteen experts across different fields, including law enforcement officers, academics, representatives from civil society organisations (CSOs), and employees of AI start-ups in Indonesia. The qualitative data collected from this process have been analysed through thematic analysis, and the preliminary findings reveal that AI can indeed complement the conventional CVE (countering violent extremism) methods in the country, albeit not without challenges

S. Rajaratnam School of International Studies, NTU Singapore, 2025. 6p.

download
Rethinking Religion and Radicalization: Terrorism and Violence Twenty Years After 9/11

Edited by Michele Grossman

With contributions from a range of regions and disciplines, this open access volume offers theoretically compelling and empirically rich new insights on the relationship between religion and violent extremism. The role of religion and religiosity in processes of radicalisation to violence has been at the forefront of debates around terrorism and extremism for decades. The events of 9/11 gave new impetus to these debates, cementing assumptions about the role of Islam as the key driver for religiously inspired violent radicalisation, and defining the way in which radicalisation to violence is understood. The years since 9/11 have seen a striking diversification in the terrorist and violent extremist landscape, yet the treatment of how religious beliefs, concepts and histories are entangled with established and emergent violent ideologies and social movements has changed far less. By looking beyond Islamist-inspired or attributed terrorism, this volume explores how violent extremists instrumentalise religion and religiosity in unexpected ways, from Orthodox Christianity and Hindutva to ‘conspirituality’, far-right extremism, and single-issue social movements. The eBook editions of this book are available open access under a CC BY-NC-ND 4.0 licence on bloomsburycollections.com

London: Bloomsbury Academic, 2025. 312p.

download
The Terrorism News Beat: Professionalism, Profit, and the Press

By Aaron M. Hoffman

Critics of terrorism news coverage often describe it as a sensationalized and intimidating area of reporting. However, this characterization offers a misleading guide to the coverage of terrorist threats and attacks, counterterrorism, and community responses to terrorism that appears in U.S. newspapers. Counterterrorism—not terrorist threats or attacks—is the most reported-on subject in newspapers such as the New York Times and Wall Street Journal. Rather than focusing on accounts of terrorist attacks, militarized counterterrorism, or counterterrorism failures, journalists more often cover counterterrorism successes, criminal justice, and diplomatic or community responses to terrorism. The Terrorism News Beat engages thinking about terrorism and the news media from the fields of political science, communication, criminology, economics, and sociology using multimethod research involving more than 2,500 newspaper articles published between 1997 and 2018. Chapters analyze the terrorism news beat’s subject matter, language, and coverage of the Oklahoma City Bombing, Olympic Park bombing, 9/11 attacks, DC Sniper case, and Dallas Police shooting. When it comes to language use, Hoffman finds that, rather than giving into the temptation to convey the news in lurid detail, journalists are minimalists. The language used to depict events on the terrorism beat is typically moderate and extreme words like “torture” appear only as necessary. The Terrorism News Beat shows that contrary to claims of sensationalism, the tone of terrorism coverage becomes even more sober during terrorism crises than it is during non-crisis periods and meets journalistic standards for quality.

Ann Arbor: University of Michigan Press, 2025. 255p.

download
Constitutionality of 18 U.S.C. §§ 922(b)(1) and (c)(1), which together prohibit Federal Firearms Licensees from selling handguns to eighteen-to-twenty-year-old adults.

U.S.Court of Appeals 5th Circuit. No. 23-30033

700 F.3d 185 (5th Cir. 2012) (“NRA I”), this court upheld those provisions. But that decision, which was criticized at the time, see National Rifle Ass’n, Inc. v. Bureau of Alcohol, Tobacco, Firearms, & Explosives, 714 F.3d 334, 341 (5th Cir. 2013) (“NRA II”) (Jones, J., dissenting from denial of rehearing en banc), preceded two recent clarifying Supreme Court opinions on the methodology by which we construe gun regulations under the Second Amendment. We are now compelled to focus intently on the evidence of firearm access and ownership by eighteen-to-twenty-year-olds near and at the founding, and we conclude that (1) NRA I is incompatible with the Bruen and Rahimi decisions of the Supreme Court, and (2) these provisions are inconsistent with the Second Amendment. Accordingly, we REVERSE the district court’s contrary judgment and REMAND for further proceedings consistent with this opinion..

Appeal from the United States District Court for the Western District of Louisiana USDC No. 6:20-CV-1438. 29p.

download
From the Barroom the Barrel to the Border: Exploring the Roots: Exploring the Roots and Ramifications of Gun Trafficking from the United States to Mexico

By Alexandra Punishill

Nowhere is the discussion surrounding gun violence more prominent than in the United States, with the impacts of our gun-friendly culture being felt around the world. This thesis analyzes the dynamics of gun trafficking from the United States to Mexico and sheds light on its role in fueling the epidemic of gun violence south of the border. It is argued that the particular system of federalism adopted by the United States has led to a variety of state-level gun regulations that have shaped domestic gun policy and have had an international impact. Despite Mexico’s persistent efforts to combat the gun violence orchestrated by powerful organized crime networks, success remains elusive. Central to this discourse is Mexico’s legal action against U.S. gun companies, signaling a significant shift in its approach to addressing the root causes of the crisis. However, it is argued that without substantive changes to gun laws in the United States, gun violence in Mexico will continue to have a devastating impact on both sides of the border.

Claremont McKenna College, CMC Senior Theses. 3577. 2024. 66p.

download
Genocide Watch

May Contain Markup

Edited by Helen Fein

Definitions of Genocide: The book explores various definitions of genocide, highlighting the limitations of the U.N. Genocide Conventionand proposing broader sociological definitions.

Recognition and Denial: It discusses the challenges in recognizing and labeling genocides, including the role of media and state motives in denial and misinformation.

Prevention and Punishment: The book examines approaches to preventing genocide and holding perpetrators accountable, includingreflections on historical cases and legal frameworks.

Role of Refugees: Refugees are highlighted as contemporary witnesses to genocide, with their testimonies providing crucial evidence andinsights into ongoing atrocities.

SAGE Publications, 1993, 204 pages

READ
Domestic Terrorists' Contact with System Stakeholders Before Attacks

MCBRIDE, MEGAN K.; JENKINS, MONIQUE

From the document: "Within the public violence literature--that is, the literature on domestic terrorism, mass shootings, school shootings, and hate crimes, among others--leakage has been identified as a core warning behavior. Leakage occurs when a would be assailant communicates an intention to harm a target before committing an attack. This communication can vary in timing, level of detail, form, intentionality, and audience. Through such a communication, an individual might directly verbalize an intent to commit an act, make more subtle threats and innuendos, or share a plan via social media. Researchers have found relatively high levels of leakage associated with acts of public violence, including adolescent-perpetrated mass murders, mass shootings, political and public figure assassinations, and domestic terrorism. For this reason, leakage--which often occurs in interactions online or with loved ones--can be an important warning sign. But leakage to family, friends, or acquaintances is not the only way to detect when an individual is intending to commit an act of public violence, and over the last decade, researchers have started to examine preattack contact with system stakeholders, such as law enforcement, mental health, and education professionals. [...] We sought to advance understanding of what percentage of the violent extremist population could be 'catchable' in the sense that an individual had been in previous contact with a system stakeholder (e.g., law enforcement, mental health provider) or had been reported to a system stakeholder (e.g., by a friend or loved one to whom they had intentionally or unintentionally leaked information). To explore this issue, we leveraged a new dataset: the Domestic Terrorism Offender Level Database (DTOLD). The database includes detailed information on the 320 non-Islamist individuals who carried out terrorist attacks in the United States between January 1, 2001, and December 31, 2020. Specifically, we sought to understand what percentage of this population was known to system stakeholders at some point before they perpetrated their attacks." Further information for this document can be found here: www.cna.org/reports/2024/08/domestic-terrorists-contact-with-system-stakeholders-before-attacks

CNA CORPORATION. 2024. 4p.

download
White Supremacist and Anti‐government Extremist Groups in the US

Keneally, Katherine; Davey, Jacob

From the document: "This project by the Global Network on Extremism and Technology (GNET) looks at the user journeys of individuals who enter and participate in the online spaces of extremist communities. A user journey here refers to the distinct path a user may follow to reach their goals when accessing and using an online space belonging to extremist communities. User journeys are particularly important in offering insights into the rationale and motivations of users on the one hand, and to the inner workings of extremist online communities on the other. This is vital for understanding their goals and objectives. In selecting the ideologies for this project, we drew upon extremist communities - rather than extremist and terrorist organisations or groups - including those actors that participate in the extremist milieu and share ideas but do not necessarily operate in concert. These ideologies include those of formal and well-defined extremist organisations of White supremacist and anti-government extremist groups in the United States, supporter networks of Islamic State (IS), and looser communities of extremist actors including accelerationists, incels and chan site members who operate on shared platforms, congregating around common beliefs but without the connection of formal membership. This project is a response to the growing interest in understanding how individuals enter and participate in online spaces of extremist communities."

Global Network On Extremism And Technology (GNET). 24 JUL, 2024.

download
Catalyzing Crisis: A Primer on Artificial Intelligence, Catastrophes, and National Security

DREXEL, BILL; WITHERS, CALEB

From the document: "Since ChatGPT [Chat Generative Pre-Trained Transformer] was launched in November 2022, artificial intelligence (AI) systems have captured public imagination across the globe. ChatGPT's record-breaking speed of adoption--logging 100 million users in just two months--gave an unprecedented number of individuals direct, tangible experience with the capabilities of today's state-of-the-art AI systems. More than any other AI system to date, ChatGPT and subsequent competitor large language models (LLMs) have awakened societies to the promise of AI technologies to revolutionize industries, cultures, and political life. [...] This report aims to help policymakers understand catastrophic AI risks and their relevance to national security in three ways. First, it attempts to further clarify AI's catastrophic risks and distinguish them from other threats such as existential risks that have featured prominently in public discourse. Second, the report explains why catastrophic risks associated with AI development merit close attention from U.S. national security practitioners in the years ahead. Finally, it presents a framework of AI safety dimensions that contribute to catastrophic risks."

CENTER FOR A NEW AMERICAN SECURITY. UN, 2024. 42p.

download
Firearm Violence: A Public Health Crisis in America

UNITED STATES. PUBLIC HEALTH SERVICE. OFFICE OF THE SURGEON GENERAL

From the document: "A recent nationally representative survey (n=1,271) found that the majority of U.S. adults or their family members (54%) have experienced a firearm-related incident. Among all respondents, 21% have personally been threatened with a firearm, 19% have a family member who was killed by a firearm (including by suicide), 17% have witnessed someone being shot, 4% have shot a firearm in self-defense, and 4% have been injured by a firearm (Figure 2). 'Nearly 6 in 10 U.S. adults say that they worry 'sometimes,' 'almost every day,' or 'every day,' about a loved one being a victim of firearm violence.' Such high levels of exposure to firearm violence for both children and adults give rise to a cycle of trauma and fear within our communities, contributing to the nation's mental health crisis. This Advisory describes the public health crisis of firearm violence in America and describes strategies for firearm injury and violence prevention, with a focus on the health and well-being of children, families, and communities."

United States. Public Health Service. Office of the Surgeon Genera. . 2024. 49p.

download
“You are doomed!" Crisis-specific and Dynamic Use of Fear Speech in Protest and Extremist Radical Social Movements

By Simon Greipl, Julian Hohner, Heidi Schulze, Patrick Schwabl, Diana Rieger

Social media messages can elicit emotional reactions and mobilize users. Strategic utilization of emotionally charged messages, particularly those inducing fear, potentially nurtures a climate of threat and hostility online. Coined fear speech (FS), such communication deliberately portrays certain entities as imminently harmful and drives the perception of a threat, especially when the topic is already crisis-laden. Despite the notion that FS and the resulting climate of threat can serve as a justification for radical attitudes and behavior toward outgroups, research on the prevalence, nature, and context of FS is still scarce. The current paper aims to close this gap and provides a definition of FS, its theoretical foundations, and a starting point for (automatically) detecting FS on social media. The paper presents the results of a manual as well as an automated content analysis of three broadly categorized actor types within a larger radical German Telegram messaging sphere (2.9 million posts). With a rather conservative classification approach, we analyzed the prevalence and distribution of FS for more than five years in relation to six crisis-specific topics. A substantial proportion between 21% and 34% within the observed communication of radical/extremist actors was classified as FS. Additionally, the relative amount of FS was found to increase with the overall posting frequency. This underscores FS's potential as an indicator for radicalization dynamics and crisis escalation.

Journal of Quantitative Description: Digital Media. Vol. 4, 2024.

download
Biden Administration's Middle East Policy at a Time of War: An Assessment of US Policy Six Months into the Israel-Hamas War

KATULIS, BRIAN

From the document: "[1] The Biden administration set forth five main objectives in reaction to the Oct. 7 Hamas attack against Israel and ensuing war in the Gaza Strip: [a.] Support Israel's self-defense and objective of eliminating the threat posed by Hamas; [b.] Secure the safe return of hostages; [c.] Prevent a wider regional war; [d.] Protect civilians and respond to a growing humanitarian crisis in Gaza; and [e.] Create a post-war plan for reconstruction leading to a two-state solution and wider regional normalization efforts in coordination with regional and international partners. [2] Six months into the Israel-Hamas war, the Biden administration has not achieved enough progress toward these goals, although it has avoided some of the worst-case scenarios. Success is hampered in part by tensions stemming from the fact that some of the tactics and policy approaches are at odds with each other."

MIDDLE EAST INSTITUTE (WASHINGTON, D.C.). 1014. 9p.

download
United States International Cyberspace & Digital Policy Strategy: Towards an Innovative, Secure, and Rights-Respecting Digital Future

United States. Department Of State.

From the document: "The United States seeks to work with allies, partners, and stakeholders across the globe to shape the design, development, governance, and use of cyberspace and digital technologies to advance economic prosperity and inclusion; enhance security and combat cybercrime; promote and protect the exercise of human rights, democracy, and the rule of the law; and address transnational challenges. The United States believes in the critical role that the responsible uses of digital technologies and interconnected networks play in empowering people, and that an open, interoperable, secure, and reliable Internet enables new solutions to global challenges. Autocratic states and other actors, however, have used cyber and digital tools to threaten international peace and stability, harm others, exert malign influence, and undermine the exercise of human rights. An innovative, rights-respecting international cyberspace and digital technology policy strategy is foundational to U.S. strategic, security, economic, and foreign policy interests. Leadership in cyberspace, the digital economy, and emerging digital technologies is central to advancing the U.S. vision set forth in the October 2022 National Security Strategy (NSS) of a 'free, open, secure, and prosperous world.' As the lead foreign policy agency for the United States, the Department of State is advancing the 2023 National Cybersecurity Strategy (NCS) and its objectives of forging international partnerships to build an open, resilient, defensible, and rights-respecting digital ecosystem."

UNITED STATES. DEPARTMENT OF STATE. 6 MAY, 2024

download
Fulcrum: The Department of Defense: Information Technology Advancement Strategy

UNITED STATES. DEPARTMENT OF DEFENSE. CHIEF INFORMATION OFFICER

From the document: "Fulcrum represents the Department's ambitious Information Technology (IT) advancement strategy designed to leverage the power of technology to drive transformative change and serves as a tipping point for catalyzing digital modernization for the warfighter. To propel the Department forward, we must ensure continued success and relevance in the digital age. Fulcrum will enable achievement of the DoD mission and strategic objectives with unparalleled efficiency and effectiveness. [...] The DoD Chief Information Officer's (DoD CIO) mission is to 'connect', 'protect', and 'perform'. Fulcrum outlines a vision guided by four lines of effort (LOEs) representing a strategic shift that embraces technology as a mission enabler. [...] Fulcrum features the DoD CIO's IT goals and objectives for Fiscal Years (FYs) 2025-2029 that provide essential support to the priorities in the National Defense Strategy (NDS), and the supporting DoD Strategic Management Plan (SMP)."

UNITED STATES. DEPARTMENT OF DEFENSE. 6 JUN, 2024

download
Firearm Storage Behaviors — Behavioral Risk Factor Surveillance System, Eight States, 2021–2022

By Norah W. Friar, Molly Merrill-Francis, Elizabeth M. Parker, Carlos Siordia, Thomas R. Simon

Secure firearm storage might help reduce access by children and other unauthorized users and the related risk for injury or death. Information about state-specific prevalence of firearm storage practices can be used to develop secure storage messages and programs; however, such information is often unavailable. Data from the Behavioral Risk Factor Surveillance System, by respondent characteristics, were used to estimate prevalence of keeping firearms in or around the home and related storage practices for eight states that administered the firearm safety module in 2021 or 2022. Overall, 18.4% (California) to 50.6% (Alaska) of respondents reported that a firearm was kept in or around their home. Among those with a firearm in or around the home, 19.5% (Minnesota) to 43.8% (North Carolina) reported that a firearm was stored loaded. Across all eight states, approximately one half of those with a loaded firearm stored at least one loaded firearm unlocked. Among respondents with a child and a loaded firearm in the home, 25.2% (Ohio) to 41.4% (Alaska) reported that a loaded firearm was stored unlocked. Variability in firearm storage practices highlights the importance of local data and suggests opportunities to tailor prevention efforts to specific population groups to reduce risk for firearm handling by children without adult supervision, and other unauthorized persons.

Morbidity and Mortality Weekly Report, Vol. 73 / No. 23 , June 13, 2024.

download
Firearm Violence: A Public Health Crisis in America

By The U.S. Surgeon General

Since 2020, firearm‑related injury has been the leading cause of death for U.S. children and adolescents (ages 1–19), surpassing motor vehicle crashes, cancer, and drug overdose and poisoning (Figure 1). In 2022, 48,204 total people died from f irearm‑related injuries, including suicides, homicides, and unintentional deaths. This is over 8,000 more lives lost than in 2019 and over 16,000 more lives lost than in 2010 .

Washington, DC: Office of the U.S.Surgeon General, 2024. 40p.

download
Grievance-fuelled violence: Modelling the process of grievance development

By Emily Corner and Helen Taylor

Acts of extreme or mass violence perpetrated by lone offenders have become increasingly common in liberal democracies over the past 20 years. Some describe these acts as politically motivated, while others attribute them to mental disorder or criminal intent. This has led to the development of distinct research and practice areas focusing on either violent extremism, mass murder, fixation, stalking, or familial and intimate partner homicide. However, there is increasing understanding that the distinction between political ideology, criminal intent and personal motivation is blurred, and that the violence carried out by these individuals is better understood using the broader concept of grievance-fuelled violence. This work is the first to empirically consolidate the existing research in these distinct areas, employing a multifaceted analytical approach to develop a holistic model of the processes of grievance development among those who commit grievance-fuelled violence.

Research Report no. 27. Canberra: Australian Institute of Criminology. 2023. 95p.

download
Review of violent extremism risk assessment tools in Division 104 control orders and Division 105A post-sentence orders

By Timothy Cubitt and Heather Wolbers

Risk assessment for violent extremism plays a critical role in understanding the threat posed by radicalised offenders and determining how these individuals are managed both in correctional settings and in the community. The Australian Institute of Criminology (AIC) was engaged by the Department of Home Affairs’ Countering Violent Extremism (CVE) Branch to conduct a review of the use of risk assessments for violent extremism in Australia.

The aim of this review was to:

• identify and describe violent extremism risk assessment tools currently available to support risk assessments of convicted terrorist offenders;

• assess each tool’s suitability to assist an expert to conduct an assessment of the risk to the community from an offender, when a court is considering whether to issue a control order under Division 104 or a post-sentence order under Division 105A of the Criminal Code Act 1995 (Criminal Code); and

• review current risk assessment frameworks, including the use of Structured Professional Judgement, to assess the risk of violent extremist offending and consider how violent extremism risk assessment tools might be improved.

A review of relevant peer-reviewed and grey literature was undertaken alongside semi-structured interviews with a group of experts in violent extremism risk assessment. Findings from this review are organised according to the Terms of Reference.

Special reports. no 14. Canberra: Australian Institute of Criminology. 2023. 70p.

download