99
Views
0
CrossRef citations to date
0
Altmetric
Research Article

Evaluating counter-terrorism interventions to promote reports about leaking prior to terrorist attacks

, &
Received 24 Mar 2023, Accepted 08 Apr 2024, Published online: 26 Apr 2024

References

  • Amman, M., Bowlin, M., Buckles, L., Burton, K. C., Brunell, K. F., Gibson, K. A., Griffin, S. H., Kennedy, K., & Robins, C. J. (2017). Making prevention a reality: Identifying, assessing, and managing the threat of targeted attacks. FBI. https://www.fbi.gov/file-repository/making-prevention-a-reality.pdf/view.
  • Bouhana, N., Corner, E., Gill, P., & Schuurman, B. (2018). Background and preparatory behaviours of right-wing extremist lone actors: A comparative study. Perspectives on Terrorism, 12, 150–163.
  • Della Porta, D., & LaFree, G. (2012). Guest editorial: Processes of radicalization and De-radicalization. International Journal of Conflict and Violence (IJCV), 6, 4–10. https://doi.org/10.4119/ijcv-2926
  • Die Bundesregierung. (2016). Strategie der Bundesregierung zur Extremismusprävention und Demokratieförderung [Strategy of the federal government for the prevention of extremism and the promotion of democracy]. Bundesministerium für Familie, Senioren, Frauen und Jugend. https://www.bmfsfj.de/resource/blob/109002/5278d578ff8c59a19d4bef9fe4c034d8/strategie-der-bundesregierung-zur-extremismuspraevention-und-demokratiefoerderung-data.pdf.
  • Dudenhoefer, A.-L., Niesse, C., Görgen, T., Tampe, L., Megler, M., Gröpler, C., & Bondü, R. (2021). Leaking in terrorist attacks: A review. Aggression and Violent Behavior, 58, 101582. https://doi.org/10.1016/j.avb.2021.101582
  • Eisenman, D. P., Weine, S., Shah, N. D., Jones, N. V., Polutnik Smith, C., Thomas, P., & Grossman, M. (2022). Bystander reporting to prevent violent extremism and targeted violence: learning from practitioners. Behavioral Sciences of Terrorism and Political Aggression, 1–19. https://doi.org/10.1080/19434472.2022.2130960
  • Eisenman, D. P., Weine, S., Thomas, P., & Grossman, M. (2022). Community reporting thresholds: Sharing information with authorities concerning terrorism and targeted violence. Final Research Report for National Institute of Justice. https://www.ojp.gov/pdffiles1/nij/grants/304119.pdf.
  • Federal Emergency Management Agency (FEMA). (2012). Improving the public’s awareness and reporting of suspicious activity. Key research findings from literature review, household surveys, focus groups, and interviews. United States Department of Homeland Security. https://info.publicintelligence.net/FEMA-ImprovingSAR.pdf.
  • Federal Office for Migration and Refugees. (2013). Faith or extremism? Help for relatives: The Advice Centre on Radicalisation. https://www.bamf.de/SharedDocs/Anlagen/EN/Behoerde/Beratungsstelle/broschuere-glaube-oder-extremismus.pdf?__blob=publicationFile&v=17.
  • Gill, P., Corner, E., McKee, A., Hitchen, P., & Betley, P. (2022). What do closed source data tell us about lone actor terrorist behavior? A research note. Terrorism and Political Violence, 34(1), 113–130. https://doi.org/10.1080/09546553.2019.1668781
  • Githens-Mazer, J., Lambert, R., Baker, A. H., Cohen-Baker, S., & Pieri, Z. (2010). Muslim communities perspectives on radicalisation in Leicester, UK. Centre for Studies in Islamism and Radicalisation (CIR).
  • Gleicher, L., Alderden, M., & Weine, S. M. (2020). Attitudes regarding becoming an engaged bystander for targeted violence prevention. Crime Prevention and Community Safety, 22(3), 261–282. https://doi.org/10.1057/s41300-020-00091-w
  • Hamm, M. S., & Spaaij, R. (2017). The age of lone wolf terrorism. Columbia University Press.
  • Haner, M., Sloan, M. M., Pickett, J. T., & Cullen, F. T. (2022). When do Americans “see something, say something”? Experimental evidence on the willingness to report terrorist activity. Justice Quarterly, 39(5), 835–853. https://doi.org/10.1080/07418825.2021.1942162
  • Hassan, R., & Martin, B. (2016). Islamophobia, social distance and fear of terrorism in Australia: A preliminary report. University of South Australia. https://apo.org.au/sites/default/files/resource-files/2016-01/apo-nid60899.pdf.
  • Hou, M., Jia, L., & Tan, J. (2021). To tip off or not? Predicting gatekeepers’ reporting intentions of a deviant close-other through desirability and feasibility. Psychology, Crime & Law, 27(9), 890–913. https://doi.org/10.1080/1068316X.2020.1863404
  • Imhoff, R. (2014). SIPSCI-10. In C. J. Kemper, E. Brähler, & M. Zenger (Eds.), Psychologische und sozialwissenschaftliche Kurzskalen: Standardisierte Erhebungsinstrumente für Wissenschaft und Praxis [Psychological and social science short scales: Standardized survey instruments for science and practice] (pp. 279–282). Medizinisch Wissenschaftliche Verlagsgesellschaft.
  • Kenyon, J., Baker-Beall, C., & Binder, J. (2023). Lone-actor terrorism – A systematic literature review. Studies in Conflict & Terrorism, 46(10), 2038–2065. https://doi.org/10.1080/1057610X.2021.1892635
  • Kenyon, J., Binder, J., & Baker-Beall, C. (2022). The Internet and radicalisation pathways: Technological advances, relevance of mental health and role of attackers. His Majesty’s Prison and Probation Service. https://assets.publishing.service.gov.uk/media/638f089bd3bf7f327e1ea969/internet-radicalisation-report.pdf.
  • Kroeger, M. D. C. (2023). Leaking im Rahmen von Psychotherapien (Unpublished master’s thesis). Psychologische Hochschule Berlin.
  • McCauley, C., & Moskalenko, S. (2008). Mechanisms of political radicalization: Pathways toward terrorism. Terrorism and Political Violence, 20(3), 415–433. https://doi.org/10.1080/09546550802073367
  • Meloy, J. R., & O’Toole, M. E. (2011). The concept of leakage in threat assessment. Behavioral Sciences & the Law, 29(4), 513–527. https://doi.org/10.1002/bsl.986
  • Mendonça, S., Cardoso, G., & Caraça, J. (2012). The strategic strength of weak signal analysis. Futures, 44(3), 218–228. https://doi.org/10.1016/j.futures.2011.10.004
  • Murphy, K., Cherney, A., & Teston, M. (2019). Promoting Muslims’ willingness to report terror threats to police: Testing competing theories of procedural justice. Justice Quarterly, 36(4), 594–619. https://doi.org/10.1080/07418825.2018.1437210
  • Neumann, P. R. (2013). Radikalisierung, Deradikalisierung und Extremismus [Radicalization, deradicalization and extremism]. Aus Politik und Zeitgeschichte, 63, 3–10.
  • Pearce, J. M., Parker, D., Lindekilde, L., Bouhana, N., & Rogers, M. B. (2019). Encouraging public reporting of suspicious behaviour on rail networks. Policing and Society, 30(7), 835–853. https://doi.org/10.1080/10439463.2019.1607340
  • Phillips, P. J., & Pohl, G. (2020). How terrorism red flags become weak signals through the process of judgement and evaluation. Journal of Police and Criminal Psychology, 35(3), 377–388. https://doi.org/10.1007/s11896-019-09345-2
  • Rose, M. M., & Morrison, J. (2023). An exploratory analysis of leakage warning behavior in lone-actor terrorists. Behavioral Sciences of Terrorism and Political Aggression, 15(2), 179–214. https://doi.org/10.1080/19434472.2021.1900325
  • Rowe, M. P. (2021). Bystanders: ‘See something, say something’ is not enough. Alternatives to the High Cost of Litigation, 39(10), 153–165. https://doi.org/10.1002/alt.21914
  • Rumpf, T., Horn, S., Vogt, C., Göbel, K., Goergen, T., Zibulski, K. M., Uttenweiler, V., & Bondü, R. (2024). Leaking in intimate partner homicide: A systematic review. Trauma, Violence, and Abuse, 1–15. https://doi.org/10.1177/15248380241237213
  • Schuurman, B. (2020). Non-involvement in terrorist violence: Understanding the most common outcome of radicalization processes. Perspectives on Terrorism, 14, 14–26.
  • Schuurman, B., & Carthy, S. L. (2023). Who commits terrorism alone? Comparing the biographical backgrounds and radicalization dynamics of lone-actor and group-based terrorists. Crime & Delinquency, 1–26. https://doi.org/10.1177/00111287231180126
  • Silver, J., Horgan, J., & Gill, P. (2018). Foreshadowing targeted violence: Assessing leakage of intent by public mass murderers. Aggression and Violent Behavior, 38, 94–100. https://doi.org/10.1016/j.avb.2017.12.002
  • Singelnstein, T. (2020). Preventive Turn. Wie Gefahr und Risiko zum zentralen Gegenstand von Strafrecht und sozialer Kontrolle werden [Preventive turn. How danger and risk become the central subject of criminal law and social control]. In T. Fischer, & E. Hilgendorf (Eds.), Gefahr. Baden-Badener Streitgespräche, Bd. 5 [Danger. Baden-Baden debates, Ed. 5] (pp. 95–111). Nomos.
  • Tampe, L., & Bondü, R. (2023). Assessing and reporting leaking of violent intent: Influences of perpetrator and witness characteristics. European Journal of Criminology, 20(3), 1164–1184. https://doi.org/10.1177/14773708221120004
  • Tampe, L., & Bondü, R. (2024a). “Killing all infidels”: Leaking prior to Islamist attacks in Germany. Manuscript in press.
  • Tampe, L., & Bondü, R. (2024b). Strategies to enhance the reporting and detection of leaking prior to Islamist terrorist attacks. Manuscript in preparation.
  • Thomas, P., Grossman, M., Miah, S., & Christmann, K. (2017). Community reporting thresholds: Sharing information with authorities concerning violent extremist activity and involvement in foreign conflict: A UK replication study: Research Report. University of Huddersfield. http://eprints.hud.ac.uk/id/eprint/33161/1/Community%20Reporting%20Thresholds%20UK%20Final%20 Report.pdf.
  • Tolsma, J., Blaauw, J., & te Grotenhuis, M. (2012). When do people report crime to the police? Results from a factorial survey design in the Netherlands, 2010. Journal of Experimental Criminology, 8(2), 117–134. https://doi.org/10.1007/s11292-011-9138-4
  • Williams, M. J., Horgan, J. G., & Evans, W. P. (2015). The critical role of friends in networks for countering violent extremism: Toward a theory of vicarious help-seeking. Behavioral Sciences of Terrorism and Political Aggression, 8(1), 45–65. https://doi.org/10.1080/19434472.2015.1101147

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.