The path to terrorist violence : a threat assessment model for radical groups at risk of escalation to acts of terrorism
Olson, Dean T.
MetadataShow full item record
A threat assessment model to identify domestic radical groups on a trajectory towards terrorist violence remains an elusive goal. The lack of a model constrains proactive counter-terrorism efforts resulting in largely reactive strategies that often are ineffectual in discovering and disrupting terrorist plots while in an inchoate stage. The Path to Terrorist Violence Model, based on a threat assessment model used in the emerging field of threat management for the judiciary and elected officials, is a valid and reliable assessment methodology to identify radical groups at risk of escalation to acts of terrorism. By focusing on attack-related behaviors that a group must take to mount a planned attack, the Path to Terrorist Violence avoids contentious issues related to psychosocial, religious, race or ethnicity-based profiling assumptions.
Showing items related by title, author, creator and subject.
Naval Postgraduate School Center for Homeland Defense and Security (CHDS) (Monterey, California. Naval Postgraduate SchoolCenter for Homeland Defense and Security, 2006-07);July 2006. The July 2006 issue of Homeland Security Affairs offers articles about risk perception, domestic right wing extremist groups, social network analysis, and the impact of foreign policy on homeland security. It ...
Arthur, Kevin R. (Monterey, California. Naval Postgraduate School, 2004-09);Countries sponsoring and supporting terrorism impede the efforts of the United States and the international community to fight terrorism. Until states that support terrorism cease such sponsorship, they remain a critical ...
Naval Postgraduate School Center for Homeland Defense and Security (CHDS) (Monterey, California. Naval Postgraduate SchoolCenter for Homeland Defense and Security, 2007-09);September 2007. Six years after the attacks of 9/11, the practice and discipline of homeland defense and security have evolved and matured, moving into an era of self-evaluation. The essays and articles in Volume III, Issue ...