Pub Date : 2023-03-30DOI: 10.1080/18335330.2022.2158361
Fiona Druitt, Debra Smith, R. Spaaij, D. Kernot, Adriarne Laver
ABSTRACT A number of publications have recently suggested or claimed that autism spectrum disorders (ASD) do or may increase an individual’s risk of or vulnerability for terrorism engagement. In this paper, we aim to ascertain the extent and nature of this purported relationship between ASD and terrorism engagement as reported in peer-reviewed literature. We analyse the relevant literature by considering research designs and the importance of comparison groups in analytic studies for studying why outcomes occur. This review finds that the evidential and theoretical basis in research for the identified suggestions and claims is lacking. Existing research cannot definitively conclude, nor does it suggest, that individuals with ASD are any more vulnerable to, or any more at risk of, terrorism engagement than other individuals. The findings of this literature review pose questions that arise across the research-practice debate. We discuss and attempt to broaden the research-practice debate in relation to the ongoing ASD-terrorism debate by drawing upon critique from the field of science studies.
{"title":"Do autism spectrum disorders (ASD) increase the risk of terrorism engagement? A literature review of the research evidence, theory and interpretation, and a discussion reframing the research-practice debate","authors":"Fiona Druitt, Debra Smith, R. Spaaij, D. Kernot, Adriarne Laver","doi":"10.1080/18335330.2022.2158361","DOIUrl":"https://doi.org/10.1080/18335330.2022.2158361","url":null,"abstract":"ABSTRACT A number of publications have recently suggested or claimed that autism spectrum disorders (ASD) do or may increase an individual’s risk of or vulnerability for terrorism engagement. In this paper, we aim to ascertain the extent and nature of this purported relationship between ASD and terrorism engagement as reported in peer-reviewed literature. We analyse the relevant literature by considering research designs and the importance of comparison groups in analytic studies for studying why outcomes occur. This review finds that the evidential and theoretical basis in research for the identified suggestions and claims is lacking. Existing research cannot definitively conclude, nor does it suggest, that individuals with ASD are any more vulnerable to, or any more at risk of, terrorism engagement than other individuals. The findings of this literature review pose questions that arise across the research-practice debate. We discuss and attempt to broaden the research-practice debate in relation to the ongoing ASD-terrorism debate by drawing upon critique from the field of science studies.","PeriodicalId":37849,"journal":{"name":"Journal of Policing, Intelligence and Counter Terrorism","volume":"18 1","pages":"307 - 332"},"PeriodicalIF":0.0,"publicationDate":"2023-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43584509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-03-16DOI: 10.1080/18335330.2023.2189023
Ryan Shaffer
{"title":"Intelligence sharing between asymmetrical allies: the United States, Uganda, Sudan, and South Sudan against the LRA","authors":"Ryan Shaffer","doi":"10.1080/18335330.2023.2189023","DOIUrl":"https://doi.org/10.1080/18335330.2023.2189023","url":null,"abstract":"","PeriodicalId":37849,"journal":{"name":"Journal of Policing, Intelligence and Counter Terrorism","volume":"18 1","pages":"410 - 412"},"PeriodicalIF":0.0,"publicationDate":"2023-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49291475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-03-15DOI: 10.1080/18335330.2023.2187704
Aviezer Tucker
{"title":"From unreliable sources: Bayesian critique and normative modelling of HUMINT inferences","authors":"Aviezer Tucker","doi":"10.1080/18335330.2023.2187704","DOIUrl":"https://doi.org/10.1080/18335330.2023.2187704","url":null,"abstract":"","PeriodicalId":37849,"journal":{"name":"Journal of Policing, Intelligence and Counter Terrorism","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43975518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-03-15DOI: 10.1080/18335330.2023.2187705
Stephen Coulthart, M. Shahriar Hossain, Jessica Sumrall, Christopher Kampe, K. Vogel
{"title":"Data-Science literacy for future security and intelligence professionals","authors":"Stephen Coulthart, M. Shahriar Hossain, Jessica Sumrall, Christopher Kampe, K. Vogel","doi":"10.1080/18335330.2023.2187705","DOIUrl":"https://doi.org/10.1080/18335330.2023.2187705","url":null,"abstract":"","PeriodicalId":37849,"journal":{"name":"Journal of Policing, Intelligence and Counter Terrorism","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48242523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-02-12DOI: 10.1080/18335330.2023.2171308
M. Demir
ABSTRACT The study examined the effect of perceived use of body-worn cameras (BWCs) on procedural justice, police lawfulness, police legitimacy, specific compliance, general compliance, cooperation with police, and satisfaction with police. Data for the study were obtained from a survey administered to randomly selected undergraduate students (N = 617). Independent samples t-test for bivariate analysis and structural equation modeling for unmediated and mediated analyses were conducted. The respondents believed that BWCs would significantly improve procedural justice, police lawfulness, and satisfaction with police; however, they were significantly less likely to believe that BWCs would increase cooperation and general compliance. Perceived use of BWCs, however, did not have a significant effect on police legitimacy and specific compliance. The results of the mediation analyses showed that the effect of perceived use of BWCs on compliance, cooperation, and satisfaction was mediated through procedural justice and police legitimacy. BWCs improve citizen perceptions of procedural justice, police lawfulness, and satisfaction with police, and procedural justice and police legitimacy mediate the effect of BWCs on compliance and cooperation.
{"title":"The effect of perceived use of body-worn cameras on procedural justice, police legitimacy, police lawfulness, compliance, cooperation, and satisfaction","authors":"M. Demir","doi":"10.1080/18335330.2023.2171308","DOIUrl":"https://doi.org/10.1080/18335330.2023.2171308","url":null,"abstract":"ABSTRACT The study examined the effect of perceived use of body-worn cameras (BWCs) on procedural justice, police lawfulness, police legitimacy, specific compliance, general compliance, cooperation with police, and satisfaction with police. Data for the study were obtained from a survey administered to randomly selected undergraduate students (N = 617). Independent samples t-test for bivariate analysis and structural equation modeling for unmediated and mediated analyses were conducted. The respondents believed that BWCs would significantly improve procedural justice, police lawfulness, and satisfaction with police; however, they were significantly less likely to believe that BWCs would increase cooperation and general compliance. Perceived use of BWCs, however, did not have a significant effect on police legitimacy and specific compliance. The results of the mediation analyses showed that the effect of perceived use of BWCs on compliance, cooperation, and satisfaction was mediated through procedural justice and police legitimacy. BWCs improve citizen perceptions of procedural justice, police lawfulness, and satisfaction with police, and procedural justice and police legitimacy mediate the effect of BWCs on compliance and cooperation.","PeriodicalId":37849,"journal":{"name":"Journal of Policing, Intelligence and Counter Terrorism","volume":"18 1","pages":"375 - 409"},"PeriodicalIF":0.0,"publicationDate":"2023-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42450906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-02-08DOI: 10.1080/18335330.2023.2171310
Ryan Shaffer
{"title":"Varying dimensions of India’s national security: emerging perspectives","authors":"Ryan Shaffer","doi":"10.1080/18335330.2023.2171310","DOIUrl":"https://doi.org/10.1080/18335330.2023.2171310","url":null,"abstract":"","PeriodicalId":37849,"journal":{"name":"Journal of Policing, Intelligence and Counter Terrorism","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45337492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-02-01DOI: 10.1080/18335330.2023.2171309
Eric Halford
ABSTRACT Counter-terrorism (CT) policing in the United Kingdom is presently delivered by Counter Terrorism Policing Headquarters (CTPHQ) through their Counter Terrorism Command (CTC) in the Metropolitan police. Their work is supported by 11 regional police counter-terrorism units (CTUs) across the UK. This is a relatively new model and as a result, joint working with the UK security Services (MI5) has significantly changed. With increased focus on collaboratively gathering and sharing CT intelligence the new structure and working relationships were designed to overcome existing impediments to intelligence sharing to improve the UKs CT capability. Since the changes, there has been limited empirical assessment of their impact. To address this, our preliminary study uses a mixture of questionnaires and interviews with CT officers in a single CTU to analyze the blockers and enablers of intelligence sharing since the shift to this new working model. Results indicate significant improvements in bilateral intelligence sharing between the police and security services. Responses suggest this has primarily been driven by closer joint working that has enabled higher frequency face-to-face contact. We discuss the findings in the context of implications for the UK’s ability to combat terrorism and future ways to continue improvements.
{"title":"A scoping analysis of the counter terrorism command policing structure and its impact on intelligence sharing between the police and the security services","authors":"Eric Halford","doi":"10.1080/18335330.2023.2171309","DOIUrl":"https://doi.org/10.1080/18335330.2023.2171309","url":null,"abstract":"ABSTRACT Counter-terrorism (CT) policing in the United Kingdom is presently delivered by Counter Terrorism Policing Headquarters (CTPHQ) through their Counter Terrorism Command (CTC) in the Metropolitan police. Their work is supported by 11 regional police counter-terrorism units (CTUs) across the UK. This is a relatively new model and as a result, joint working with the UK security Services (MI5) has significantly changed. With increased focus on collaboratively gathering and sharing CT intelligence the new structure and working relationships were designed to overcome existing impediments to intelligence sharing to improve the UKs CT capability. Since the changes, there has been limited empirical assessment of their impact. To address this, our preliminary study uses a mixture of questionnaires and interviews with CT officers in a single CTU to analyze the blockers and enablers of intelligence sharing since the shift to this new working model. Results indicate significant improvements in bilateral intelligence sharing between the police and security services. Responses suggest this has primarily been driven by closer joint working that has enabled higher frequency face-to-face contact. We discuss the findings in the context of implications for the UK’s ability to combat terrorism and future ways to continue improvements.","PeriodicalId":37849,"journal":{"name":"Journal of Policing, Intelligence and Counter Terrorism","volume":"18 1","pages":"353 - 374"},"PeriodicalIF":0.0,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49456689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-24DOI: 10.1080/18335330.2023.2165136
Kristy Campion, M. Nolan, N. O'Brien
ABSTRACT The contemporary extreme right is home to diverse milieus, some of which challenge or confuse stereotypical understandings of the threat. This study seeks to describe and organise the different milieus of the Australian extreme right into a typology based on the past decade of observable violent activities. The typology proposes a threefold way to view the Australian extreme right: 1. ethnocentric milieus, who asymmetrically evaluate other peoples and cultures, commonly informed by abstractions and preconceptions, especially as related to religion or ethnicity; 2. anti-government milieus, who fixate on the government and its policies as the primary source of societal woes; and 3. religious milieus, spanning numerous religious traditions and faiths, who anchor their worldviews in theological constructions. Having developed this typology, we revisited counteractions anchored in international practice and domestic legislation. We suggest that the existing domestic legislative environment is sufficient to manage these threats when informed by international practice.
{"title":"Framing the Australian extreme right: proposing a threefold typology with consideration of legislation and listing regulations","authors":"Kristy Campion, M. Nolan, N. O'Brien","doi":"10.1080/18335330.2023.2165136","DOIUrl":"https://doi.org/10.1080/18335330.2023.2165136","url":null,"abstract":"ABSTRACT The contemporary extreme right is home to diverse milieus, some of which challenge or confuse stereotypical understandings of the threat. This study seeks to describe and organise the different milieus of the Australian extreme right into a typology based on the past decade of observable violent activities. The typology proposes a threefold way to view the Australian extreme right: 1. ethnocentric milieus, who asymmetrically evaluate other peoples and cultures, commonly informed by abstractions and preconceptions, especially as related to religion or ethnicity; 2. anti-government milieus, who fixate on the government and its policies as the primary source of societal woes; and 3. religious milieus, spanning numerous religious traditions and faiths, who anchor their worldviews in theological constructions. Having developed this typology, we revisited counteractions anchored in international practice and domestic legislation. We suggest that the existing domestic legislative environment is sufficient to manage these threats when informed by international practice.","PeriodicalId":37849,"journal":{"name":"Journal of Policing, Intelligence and Counter Terrorism","volume":"18 1","pages":"282 - 306"},"PeriodicalIF":0.0,"publicationDate":"2023-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42634380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-18DOI: 10.1080/18335330.2023.2165137
Isabelle van der Vegt, Bennett Kleinberg, P. Gill
ABSTRACT Large-scale linguistic analyses are increasingly applied to the study of extremism, terrorism, and other threats of violence. At the same time, practitioners working in the field of counterterrorism and security are confronted with large-scale linguistic data, and may benefit from computational methods. This article highlights the challenges and opportunities associated with applying computational linguistics in the domain of threat assessment. Four current issues are identified, namely (1) the data problem, (2) the utopia of predicting violence, (3) the base rate fallacy, and (4) the danger of closed-sourced tools. These challenges are translated into a checklist of questions that should be asked by policymakers and practitioners who (intend to) make use of tools that leverage computational linguistics for threat assessment. The ‘VISOR-P’ checklist can be used to evaluate such tools through their Validity, Indicators, Scientific Quality, Openness, Relevance and Performance. Finally, some suggestions are outlined for the furtherance of the computational linguistic threat assessment field.
{"title":"Proceed with caution: on the use of computational linguistics in threat assessment","authors":"Isabelle van der Vegt, Bennett Kleinberg, P. Gill","doi":"10.1080/18335330.2023.2165137","DOIUrl":"https://doi.org/10.1080/18335330.2023.2165137","url":null,"abstract":"ABSTRACT Large-scale linguistic analyses are increasingly applied to the study of extremism, terrorism, and other threats of violence. At the same time, practitioners working in the field of counterterrorism and security are confronted with large-scale linguistic data, and may benefit from computational methods. This article highlights the challenges and opportunities associated with applying computational linguistics in the domain of threat assessment. Four current issues are identified, namely (1) the data problem, (2) the utopia of predicting violence, (3) the base rate fallacy, and (4) the danger of closed-sourced tools. These challenges are translated into a checklist of questions that should be asked by policymakers and practitioners who (intend to) make use of tools that leverage computational linguistics for threat assessment. The ‘VISOR-P’ checklist can be used to evaluate such tools through their Validity, Indicators, Scientific Quality, Openness, Relevance and Performance. Finally, some suggestions are outlined for the furtherance of the computational linguistic threat assessment field.","PeriodicalId":37849,"journal":{"name":"Journal of Policing, Intelligence and Counter Terrorism","volume":"18 1","pages":"231 - 239"},"PeriodicalIF":0.0,"publicationDate":"2023-01-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48086563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-03DOI: 10.1080/18335330.2022.2153613
Ryan Shaffer
{"title":"Counter-terrorism, intelligence and policing in Sri Lanka: a case study of the 2019 easter terror attacks","authors":"Ryan Shaffer","doi":"10.1080/18335330.2022.2153613","DOIUrl":"https://doi.org/10.1080/18335330.2022.2153613","url":null,"abstract":"","PeriodicalId":37849,"journal":{"name":"Journal of Policing, Intelligence and Counter Terrorism","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48713554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}