THE INDIVIDUAL RISK ASSESSMENT OF TERRORISM

47
University of Virginia School of Law Public Law and Legal Theory Working Paper Series 2011- 34 The Individual Risk Assessment of Terrorism John Monahan University of Virginia School of Law September 2011 This paper may be downloaded without charge from the Social Science Research Network Electronic Paper Collection: http://ssrn.com/abstract=1928722 A complete index of University of Virginia School of Law research papers is available at Law and Economics: http://www.ssrn.com/link/U-Virginia-LEC.html Public Law and Legal Theory: http://www.ssrn.com/link/U-Virginia-PUB.html

Transcript of THE INDIVIDUAL RISK ASSESSMENT OF TERRORISM

University of Virginia School of Law Public Law and Legal Theory Working Paper Series 2011- 34

The Individual Risk Assessment of Terrorism

John Monahan

University of Virginia School of Law

September 2011

This paper may be downloaded without charge from the

Social Science Research Network Electronic Paper Collection:

http://ssrn.com/abstract=1928722

A complete index of University of Virginia School of Law research papers is available at

Law and Economics: http://www.ssrn.com/link/U-Virginia-LEC.html

Public Law and Legal Theory: http://www.ssrn.com/link/U-Virginia-PUB.html

Running head: INDIVIDUAL RISK ASSESSMENT OF TERRORISM 1

Psychology, Public Policy, and Law, in press.

The Individual Risk Assessment of Terrorism

John Monahan

University of Virginia

Author Note

John Monahan, School of Law, University of Virginia.

This research was supported by the Department of Defense, in contract with ViaGlobal

Solutions LLC. The opinions expressed in this article are mine alone. I thank Susan Brandon,

Deborah Loftis, Reid Meloy, and the participants at the University of Virginia’s Working

Conference on the Risk Assessment of Terrorism for their comments on the ideas developed

here. I am grateful to Lynn Boyter and Patrick Fleming for arranging that meeting. Much of this

research was conducted while I was Professor in Residence at the New York University School

of Law, for which I am indebted to Dean Richard Revesz and Professor James Jacobs.

Correspondence concerning this article should be addressed to John Monahan, School of

Law, University of Virginia, 580 Massie Road, Charlottesville, VA 22903-1789. E-mail:

[email protected]

© (2012) American Psychological Association

Running head: INDIVIDUAL RISK ASSESSMENT OF TERRORISM 2

Abstract

I attempt to identify the central conceptual and methodological challenges that must be overcome

if the risk assessment of terrorism is to make the same progress that in recent years has

distinguished the risk assessment of other forms of violence. Four principal conclusions are

offered. First, clarity from the outset on what is being assessed—the risk of terrorism in the

aggregate, or of specific types of terrorism, or of specific phases in the process of becoming a

terrorist, or of specific roles in terrorist activity—is a prerequisite to progress in research.

Second, one current approach to the risk assessment of more common violence (e.g., assault)—

the approach known as structured professional judgment—usefully may be applied to the risk

assessment of terrorism. However, given that many known risk factors for common violence are

in fact not risk factors for violent terrorism, the substantive content of any instrument to assess

the risk of terrorism will be very different from the substantive content of current instruments

that address common violence. Third, since there is little existing evidence supporting the non-

trivial validity of any individual risk factors for terrorism, the highest priority for research should

be the identification of robust individual risk factors. Promising candidates include ideologies,

affiliations, grievances, and “moral” emotions. Finally, it is highly unlikely that an instrument to

assess the risk of terrorism can be validated prospectively. An infrastructure for facilitating

access to known groups of terrorists and non-terrorists from the same populations may be crucial

for conducting a program of scientifically rigorous and operationally relevant research on the

individual risk assessment of terrorism.

Key words: risk assessment, risk factors, terrorism, validation, violence

Running head: INDIVIDUAL RISK ASSESSMENT OF TERRORISM

On November 5, 2009, yelling “Allahu Akbar,” U.S. Army Major Nidal Hasan killed 13

people and wounded 32 others at Fort Hood, Texas. All but two of the victims were military

personnel. In response to this shooting, Defense Secretary Robert M. Gates commissioned an

Independent Review to identify and address possible deficiencies in Department of Defense

(DoD) practices “related to force protection and identifying DoD employees who could

potentially pose credible threats to themselves or others.” Among the conclusions of this review,

titled Protecting the Force: Lessons from Fort Hood (2010b), was the following:

Academics have been developing violence risk assessment tools that the Department of

Defense could employ or emulate. For example, the MacArthur Violence Risk

Assessment Study produced a model to predict risk of violence among patients recently

discharged from psychiatric facilities. Software incorporating this model was quite

successful in its assessment of whether patients fell into a low- or high-risk group for

violence (Monahan et al, 2005). This software, called Classification of Violence Risk, is

available for use with acutely hospitalized civil patients, and suggests that the

development of tools for other populations may be worth pursuing... A full academic

literature review would reveal other tools like these that the Department of Defense might

use in part or in whole. The Department of Defense could also sponsor the development

of [its own] comprehensive risk assessment tool (pp. D4-5).

In this article, I attempt to identify the conceptual and methodological impediments that

must be overcome in order to conduct scientifically valid and operationally relevant research on

the individual risk assessment of terrorism. Part I briefly describes two of the principal contexts

in which an individual’s1 risk of terrorism is assessed: when making decisions about the

detention of accused or adjudicated terrorists, and when selecting and retaining military or

civilian contract employees of the Department of Defense. Part II provides an account of existing

approaches to the individual risk assessment of forms of violent behavior more common than

terrorism (e.g., assault), and considers whether these approaches can be generalized to violent

terrorism. Part III surveys existing evidence of what constitute individual risk factors for

terrorism. Part IV—the heart of the article— elaborates on four of the most critical conceptual

and methodological challenges that must be surmounted if progress in this area is to be made: the

heterogeneity of what is meant by “terrorism,” the optimal degree of structuring risk

assessments, the need for more robust risk factors, and the creation of an infrastructure for

validating these risk factors.

Throughout the article, I adopt the definition of terrorism used by the Department of

Defense (2010a): “The calculated use of unlawful violence or threat of unlawful violence to

inculcate fear, intended to coerce or to intimidate governments or societies in the pursuit of goals

that are generally political, religious, or ideological.”

1 This article concerns an individual’s risk of terrorism. One can also assess more macro-level forms of risk, e.g., the

risk that a given type of terrorist act will occur in a given country over a given time period (LaFree & Ackerman,

2009). These are important forms of risk assessment, but they are not the form of risk assessment dealt with here. In

addition, this paper deals with assessments of terrorism risk, and not with the communication of those assessments

to decision makers (Heilbrun, Wolbransky, Shah, & Kelly, 2010; Fischhoff, 2011).

Running head: INDIVIDUAL RISK ASSESSMENT OF TERRORISM 4

Part I: Two Contexts for the Risk Assessment of Terrorism

Decisions requiring an estimate of an individual’s risk of terrorism arise in many aspects

of national security (Department of Defense, 2010b). To facilitate discussion, I focus on two of

the most frequent uses of terrorism risk assessment. The first use concerns decisions regarding

the detention of individuals prior to the adjudication2 of a charge of having committed a terrorist

act, or the release from detention of individuals adjudicated as having committed such an act.

Terrorist risk assessment in detention decisions might be seen as reflecting the perspective of

terrorism as crime (Kruglanski, Crenshaw, Post, & Victoroff, 2008), since it corresponds closely

to the most frequent uses of violence risk assessment in the American criminal justice system:

the pre-trial detention of defendants accused of crime, and the release on parole of prisoners

convicted of crime (e.g., Monahan & Walker, 2010, Chapter 5; 2011).

In addition to informing decision making on detention, risk assessments of terrorism play

an important role in a second context: employment decisions made by government agencies—

what might be termed terrorism as workplace violence (Barling, Dupre, & Kelloway, 2009;

White & Meloy, 2010). The workplace violence perspective applies to the selection and retention

of members of the military itself (e.g., Fort Hood’s Major Hasan), as well as to the selection and

retention of civilian contract employees. It is often referred to as the identification of “insider”

terrorists (Bulling & Scalora, 2008).

Decisions on Detention

Consistent with the terrorism as crime perspective, the Department of Defense (2006), in

a document titled Medical Program Support for Detainee Operations, defines “behavioral

science consultants” as “[h]ealth care personnel qualified in behavioral sciences who are assigned

exclusively to provide consultative services to support authorized law enforcement or intelligence

activities” (p. 2), and states that these consultants “may advise command authorities responsible for

determinations of release or continued detention of detainees of assessments concerning the

likelihood that a detainee will, if released, engage in terrorist, illegal, combatant, or similar activities

against the interests of the United States” (p. 9). Similarly, Kennedy, Borum, and Fein (2011, p. 70)

have recently noted:

A relatively small but growing number of psychologists have assumed professional roles and

duties that focus primarily on supporting CI [Counterintelligence] and CT [Counterterrorism]

operations. These psychologists are not assigned to these roles for purposes of providing

health-related services and sometimes describe their role or themselves as operational

psychologists to emphasize this distinction... [These] psychologists may conduct risk

assessments.

On March 7, 2011, President Obama issued an Executive Order titled “Periodic Review

of Individuals Detained at Guantanamo Bay Naval Station Pursuant to the Authorization for Use

2 For the purpose of improving empirical research on the risk assessment of terrorism, it is not necessary to take a

position on the relative legal merits of criminal trials versus military commissions to adjudicate guilt for the

commission of terrorist acts (Vladeck, 2010; Wittes, 2010).

Running head: INDIVIDUAL RISK ASSESSMENT OF TERRORISM 5

of Military Force.” The Order stated that “Continued law of war detention is warranted for a

detainee subject to [p]eriodic review… if it is necessary to protect against a significant threat to

the security of the United States.”3

Little published information is available on how these assessments of “significant threat”

are conducted (Felter & Brachman, 2007; Denbeaux & Denbeaux, 2008). Savage, Glaberson

and Lehren (2011) claim that at one point detainees were assessed as having a “high risk,” a

“medium risk,” or a “low risk” of terrorism, but that this has recently changed:

In 2009, a task force of officials from the government’s national security agencies re-

evaluated all 240 detainees then remaining at the prison [i.e., Guantanamo Bay, Cuba].

They vetted the military’s assessments against information held by other agencies, and

dropped the “high/medium/low” risk ratings in favor of a more nuanced look at how each

detainee might fare if released, in light of his specific family and national environment.

But those newer assessments are still secret and not available for comparison.

In addition to the lack of descriptive information on the current status of assessing

terrorism risk in the context of decision making regarding detention, the validity of current risk

assessment methods is unclear. The most recent estimate by the Office of the Director of

National Intelligence (December 2010) is that 150 of the 598 detainees who have been released

from Guantanamo Bay (25 percent) are false negatives, i.e., they were subsequently “confirmed

or suspected of reengaging in terrorist or insurgent activities” (p. 1).4 This estimate, however, is

highly contested. For example, Bergen, Tiedemann, and Lebovich (2011), writing in Foreign

Policy, claim that “the true rate for those [released detainees] who have taken up arms or are

suspected of doing so is more like 6 percent.”

Decisions on Employment

Individual risk assessment of U.S. military personnel is discussed in detail in Protecting

the Force: Lessons from Fort Hood (2010b). The most pertinent of the findings from this report

is that “DoD programs, policies, process, and procedures that address identification of indicators

for violence are outdated, incomplete, and fail to include key indicators of potentially violent

behaviors” (p. 11). The report recommends that the Department of Defense “[d]evelop a risk

assessment tool for commanders, supervisors, and professional support service providers to

determine whether and when DoD personnel present risks for various types of violent behavior”

(p. 12).

From a workplace violence perspective, the selection and retention of DoD civilian

contract employees has received much less attention than the selection and retention of military

3 The Executive Order is available at http://www.whitehouse.gov/the-press-office/2011/03/07/executive-order-

periodic-review-individuals-detained-guant-namo-bay-nava

4 “Confirmed” is defined in the report as “a preponderance of information identifying a specific former GTMO

detainee [i.e., a person who had been detained at the U. S. Naval Base at Guantanamo Bay, Cuba] as directly

involved in terrorist or insurgent activities.” “Suspected” is defined as “plausible but unverified or single-source

reporting indicating a specific former GTMO detainee is directly involved in terrorist or insurgent activities."

Appended to both definitions is the statement that “engaging in anti-U.S. statements or propaganda does not qualify

as terrorist or insurgent activity.”

Running head: INDIVIDUAL RISK ASSESSMENT OF TERRORISM 6

personnel. By way of background, since the Revolutionary War—when General Washington

hired civilians to drive wagons and to supply food to the Continental Army—the U.S. military

has relied on civilian contractors. What has changed drastically over the centuries is the extent of

this reliance. During the Revolution, one contractor was hired for every six uniformed members

of the military. Today, there is approximately one contractor for each uniformed member of the

military (Commission on Wartime Contracting in Iraq and Afghanistan, 2009). As a

representative of the Department of Defense recently testified, “We’re simply not going to war

without contractors” (Commission on Wartime Contracting in Iraq and Afghanistan, 2011, p.

18). These contract employees perform a wide range of services. In Iraq in 2010, contractors

performed two-thirds of all base support functions (e.g., food preparation, laundry, and grounds

maintenance). Importantly, they also provided 12 percent of all security services, including

armed security services (Schwartz, 2010).

The National Research Council (2010, p. 7) has noted in this regard that “many of the

support services that historically were provided by army members are now provided by locals.

So now it is important to be able to tell—with most of the people involved speaking a foreign

language—which people can be trusted enough to be let onto the base on a regular basis.”

How is the risk of terrorism by DoD contract employees or potential contract employees

currently assessed? Contractors who are U.S. citizens are required to undergo a standard

computerized background check of federal records (e.g., arrest records from the FBI and

employment records from the Office of Personnel Management). However, the DoD has not

established procedures to apply this background check requirement to foreign nationals—who

constitute 80 percent of all contract employees (Commission on Wartime Contracting in Iraq and

Afghanistan, 2011)—and “large numbers of people who gain access to our facilities are not

vetted at all under current procedures” (Department of Defense, 2010b, p. 14).

The reason for not establishing vetting procedures is readily apparent. Given that the FBI

and other U.S. sources have only limited data on foreign national contractor personnel—who

may have spent minimal if any time in the United States—and also given “the inconsistent

quality of criminal and employment records from one country to another” (Government

Accountability Office, 2009, p. 15), background screening is often not a realistic possibility. For

example, neither Iraq (Government Accountability Office, 2006), nor Afghanistan (U.S. Institute

of Peace, 2006) appears to have working a computerized system of criminal record keeping.

Since U.S. records are often inapplicable to local nationals, and host country records are

often nonexistent, unstructured interviews are often used to assess the risk of terrorism presented

by potential contract personnel (Government Accountability Office, 2006). However, a report of

the U.S. Senate Armed Services Committee (2010) provides evidence that current strategies for

terrorism risk assessment among DoD contractors are ineffective. For example, the Committee

found numerous instances of “private security contractors funneling U.S. taxpayers’ dollars to

Afghan warlords and strongmen linked to murder, kidnapping, bribery, as well as Taliban and

other anti-Coalition activities” (p. i).5

5 Indeed, the Commission on Wartime Contracting in Iraq and Afghanistan (2011, p. 73) reported that “During a

March 2011 trip to Afghanistan, experts told the Commission that extortion of funds from U.S. construction projects

Running head: INDIVIDUAL RISK ASSESSMENT OF TERRORISM 7

Part II. Approaches to the Individual Risk Assessment of Common Violence and Their

Application to Violent Terrorism

How is the risk of violence currently assessed for types of violence other than terrorism?

Here, I give an overview of general approaches to the risk assessment of what might be called

“common violence”—such as the FBI violent index crimes of murder, rape, robbery, and

assault—in the criminal justice system (e.g., in the pre-trial detention and parole decision making

contexts described earlier as the terrorism as crime perspective) as well as in the mental health

system (e.g., in decisions regarding the civil commitment of people who are mentally ill and

believed to be “dangerous to others,” or who qualify as “sexually violent predators”) (Monahan,

2006).

Much that follows in terms of the creation of a research agenda on the risk assessment of

terrorism flows from the definition of risk assessment that one chooses. The definition of risk

assessment given by Kraemer, Kazdin, Offord, Kessler, Jensen, & Kupfer (1997) is the one I have

found most useful: “The process of using risk factors to estimate the likelihood (i.e., probability)

of an outcome occurring in a population.” Importantly, Kraemer et al (1997) define a risk factor6

simply as any variable that (a) statistically correlates with the outcome (in this case, violence),

and also (b) precedes the outcome in time. There is no implication in this definition that the risk

factor in any sense “causes” the occurrence of the outcome.7

and transportation contracts is the insurgent’s second-largest funding source” (with the drug trade being the largest

funding source).

6 It is important to clearly differentiate the use of risk factors to predict behavior from what is commonly (and

always pejoratively) referred to as “profiling.” “Profiling” is defined in the Oxford English Dictionary (2011) as

“selection for scrutiny by law enforcement officials, etc., based on superficial characteristics (as ethnic background

or race) rather than on evidentiary criteria; esp. = racial profiling.”

http://www.oed.com/view/Entry/152090?redirectedFrom=profiling#eid

None of the potential risk factors for terrorism considered here concern ethnic background, race, or other

“superficial characteristics.” None concern “scrutiny by law enforcement officials, etc.,” of groups in the general

population, either domestic or foreign (see, in general, Kennedy, Borum, & Fein, 2011).

7 It would be disingenuous not to acknowledge that there are definitions of risk more nuanced than the one given

here. For example, Hart (2009, p. 145) states:

The concept [of risk] is multi-faceted, referring to the nature of the hazard, the likelihood that the hazard

will occur, the frequency or duration of the hazard, the seriousness of the hazard’s consequences, and the

imminence or duration of the hazard. The concept of risk is also inherently dynamic and contextual, as

hazards arise and exist in specific circumstances.

See Hart and Logan (in press) for an account of “formulating violence risk.” Following Heilbrun (1997), however, I

believe that risk assessment and risk reduction are often most efficiently pursued as separate rather than integrated

tasks (Monahan, Steadman, Silver, Appelbaum, Robbins, Mulvey, Roth, Grisso, & Banks, 2001). On the reduction

of terrorism risk (sometimes called “de-radicalization” or “disengagement”) see Kruglanski, Gelfand, & Gunaratna

(2010) and Horgan & Braddock (2010). This paper considers only risk assessment and not risk reduction, which, as

Hart (2009) states, indeed necessitates an understanding of what Kraemer et al (1997) refer to as “causal” risk

factors.

Running head: INDIVIDUAL RISK ASSESSMENT OF TERRORISM 8

Approaches to the Risk Assessment of “Common” Violence

Many accounts of violence risk assessment rely on Paul Meehl’s (1954) canonical

distinction between “clinical” and “actuarial” (sometimes called “statistical”) prediction. In

recent years, however, many risk assessment instruments have been developed that are not

adequately characterized by a simple clinical-actuarial dichotomy. Rather, the risk assessment

process now exists on a continuum of rule-based structure, with completely unstructured

(“clinical”) assessment occupying one pole of the continuum, completely structured (“actuarial”)

assessment occupying the other pole, and several forms of partly-structured and partly-

unstructured assessment lying between the two.

Skeem and Monahan (2011) in this regard have argued that the violence risk assessment

process might usefully be seen as having four components: (a) identifying empirically-valid risk

factors, (b) determining a method for measuring (“scoring”) these risk factors (c) establishing a

procedure for combining scores on the risk factors, and (d) producing a final estimate of the

likelihood that violence will occur. It is possible to array five current approaches to violence risk

assessment according to whether the approach structures (i.e., specifies rules for generating)

none, one, two, three, or all four components of this process.

Approach 1: Unmodified clinical risk assessment.

Completely “clinical” risk assessment structures none of the components of the risk

assessment process. The clinician selects, measures, and combines risk factors, and produces a

final estimate of violence risk, as his or her clinical experience and professional judgment

indicate. There are no explicit rules to structure these decisions. Different risk factors may be

used for different individuals.

Approach 2: Modified clinical risk assessment.

Performing a violence risk assessment by reference to a standard list of risk factors that

either have been found by research to be empirically valid, or are part of “received wisdom

derived from practice in the field” (Appelbaum & Gutheil, 2007, p. 56), structures one

component of the process. It identifies which risk factors the clinician should attend to in

conducting his or her assessment. But standard lists of risk factors do not go further and specify a

method for measuring the risk factors on the list.

Approach 3: Structured professional judgment.

Approaches to violence risk assessment that structure two components of the process—

the identification and the measurement of risk factors—are often called “structured professional

judgment.” For example, in the HCR [Historical-Clinical-Risk Management]-20 (Webster,

Douglas, Eaves, & Hart, 1997) risk assessment instrument, twenty risk factors are listed, and

each risk factor is scored 0 if it is absent in the case being assessed, 1 if it is possibly present or

present to a limited extent, and 2 if it is definitely present. Structured professional judgment

instruments, however, do not go further and specify how the individual risk factor scores should

be combined in clinical practice to yield a total score. As Webster et al (1997, p. 22) have stated:

“it makes little sense to sum the number of risk factors present in a given case... [Rather,] it is

Running head: INDIVIDUAL RISK ASSESSMENT OF TERRORISM 9

both possible and reasonable for an assessor to conclude that an assessee is at high risk for

violence based on the presence of a single risk factor,” such as a direct threat to kill.

Approach 4: Modified actuarial risk assessment.

Approaches to risk assessment that structure three components of the process—the

identification, measurement, and combination of risk factors—are illustrated by the

Classification of Violence Risk (COVR) actuarial software (Monahan et al, 2005), mentioned in

the DoD report Protecting the Force (2010b). Those who developed this instrument do not

recommend that the final estimate of the likelihood of violence reflect only the combined scores

on the assessed risk factors, however. Given the possibility that rare factors influence the

likelihood of violence in a particular case—and that, precisely because such factors rarely occur,

they will never appear on any actuarial instrument—a clinical review of the risk estimate

produced by the actuarial software is advised.

Approach 5: Unmodified actuarial risk assessment.

The best known instrument that structures all four of the components of the violence risk

assessment process is the Violence Risk Appraisal Guide (VRAG) (Quinsey, Harris, Rice, &

Cormier, 2006). This instrument not only structures the identification, measurement, and

combination of risk factors, it also specifies that once an individual’s violence risk has been

actuarially estimated, the risk assessment process is complete. That is, there should be no clinical

review of the actuarial estimate. As Quinsey et al have stated, “What we are advising is not the

addition of actuarial methods to existing practice, but rather the replacement of existing practice

with actuarial methods” (p. 197).

Of the five approaches, the first (“unmodified clinical”) has some, but very limited,

empirical support (Lidz, Mulvey, & Gardner, 1993). As Mossman (1994) concluded in an

influential review, “representative data from the past two decades suggests that clinicians are able

to distinguish violent from nonviolent patients with a modest, better-than-chance level of

accuracy” (p. 790).

No research systematically compares the validity of all the approaches to risk assessment

described above. Relevant data are available, however, on approaches that structure two or

more components. These data provide little evidence that one validated instrument predicts

violence significantly better than another. In a meta-analysis of 28 studies that controlled for

methodological variation, Yang, Wong, and Coid (2010) concluded that in terms of their

predictive value, nine well-known risk assessment instruments were largely “interchangeable.”

The same judgment was reached by McDermott, Dualan, and Scott (2011).

Why might different instruments perform equally in predicting violence? One possible

explanation is that they tap—albeit in different ways—shared dimensions of risk, despite their

varied items and formats (Skeem & Monahan, 2011). For example, Kroner, Mills, and Reddon

(2005) factor analyzed a number of well-validated instruments and concluded that the

instruments assess four overlapping dimensions of violence risk: (a) criminal history, (b) an

irresponsible lifestyle, (c) psychopathy and criminal attitudes, and (d) substance abuse-related

problems.

Running head: INDIVIDUAL RISK ASSESSMENT OF TERRORISM 10

Can Approaches to the Risk Assessment of “Common” Violence Be Generalized to the Risk

Assessment of Terrorism?

The question of whether existing approaches to the risk assessment of common

violence—or any subset of these approaches—can be generalized to the risk assessment of

terrorism is the subject of a lively debate in two fields: criminology and forensic psychology. For

example, the criminologists LaFree and Dugan (2004) compare research on terrorism to research

on violence and crime more broadly. They note five conceptual similarities between the two

endeavors:

“(1) the study of terrorism, like the study of crime, has been intensively interdisciplinary

…; (2) both terrorism and crime are social constructions…; (3) for both terrorism and

crime, there are major differences between formal definitions and how these definitions

are applied in actual practice…; (4) terrorism, like common crime, is disproportionately

committed by young males…; [and] (5) sustained levels of terrorism, like sustained

levels of crime, undermine social trust” (pp. 54-56).

LaFree and Dugan (2004) also note six conceptual differences between terrorism and

common crime:

“(1) While terrorist activities typically constitute multiple crimes (e.g., murder,

kidnapping, extortion), for many nations, a specific crime of terrorism does not exist…;

(2) The response to common crime rarely moves beyond local authorities, whereas the

response to terrorism usually does…; (3) while those who commit common crimes are

usually trying to avoid detection, those who commit terrorism are often seeking

maximum attention and exposure…; (4) terrorism, unlike common crime, is typically a

means to broader political goals…; (5) terrorists are more likely than common criminals

to see themselves as altruists…; [and] (6) terrorists are more likely than common

criminals to innovate [i.e., more likely than common criminals to change their criminal

activities over time]” (pp. 57-60).

LaFree and Dugan believe that “many of the differences between terrorism and common

crime are no more challenging than differences between common crime and more specialized

crimes, such as youth-gang activity, organized crime, hate crime, or domestic violence” (p. 71).

Similarly, Rosenfeld (2003, p. 34) rejects the proposition that “terrorism is qualitatively different

from the forms of violence we [i.e., criminologists] study.”

In the field of forensic psychology, the applicability of existing approaches to violence

risk assessment to the context of terrorism has been challenged by Dernevik, Beck, Grann, Hoge,

and McGuire (2009a). They take the view that “findings from studies of mentally disordered

offenders and generally violent correctional samples may well not be relevant in relation to

predicting recidivistic offending in perpetrators of politically-motivated behavior” (p. 508) (cf

Gudjonsson (2009) and Dernevik, Beck, Grann, Hoge, & McGuire (2009b)).

Answering the question of whether existing approaches to the risk assessment of common

violence can be generalized to the risk assessment of terrorism requires first answering another

question: what are valid individual risk factors for terrorism?

Running head: INDIVIDUAL RISK ASSESSMENT OF TERRORISM 11

Part III: Individual Risk Factors for Terrorism: The Evidence

For over a decade—since September 11, 2001—the empirical research on terrorism has

focused strongly on Islamic (or jihadi) terrorism. Therefore, many of the potential risk factors for

individual terrorism described below were studied in an Islamic context (Victoroff & Kruglanski,

2009). Even in this context, however, “there has been little systematic study of the specific

relationship between… risk factors and aspects of terrorism. Such research is vital as a prelude to

any attempt to create useful risk assessment tools for terrorism” (Roberts & Horgan, 2008, p. 7).

Ten putative risk factors for terrorism have received the bulk of research attention.

Age

To no one’s surprise, there seems to be a consensus across many studies that the mean

age of violent terrorists ranges from approximately 20 to approximately 29, with Middle Eastern

offenders at the lower end of that range, and Chechens at the higher end (Pape, 2005; Merari,

2005, 2010; Davis and Cragin, 2009), in part because of mean age differences in the general

populations from which terrorists emerge in different parts of the world.

Gender

Many studies also report that the great preponderance of terrorists are male (Atran, 2003;

McCauley & Segal, 1987; Bakker, 2006; Merari, 2005, 2010). However, LaFree and Ackerman

(2009, p. 351) note that “compared with gender variation for common crimes, there appears to be

greater gender variation for terrorism.” As an example of this variation, Pape (2005) reported

that percentages of women varied greatly across terrorist groups, with no women among the al

Qaeda terrorists to more than half women for the Chechens and Kurds. Women who engage in

terrorism are sometimes widows of men killed by government forces. This is sufficiently

common that female Chechen suicide bombers are colloquially known as Black Widows. Forst

(2008) points out that violent terrorism (e.g., detonating bombs) may require less upper-body

strength than many ordinary violent crimes (e.g., mugging). Women also may have a strategic

advantage in that they can get close to targets without receiving the same level of scrutiny as

men (Berko, Erez, & Globokar, 2010).

Marital Status

In addition to being young and male, the majority of terrorists appear to be unmarried

(Atran, 2003; Merari, 2005; Gartenstein-Ross & Grossman, 2009). In contrast to this

generalization, however, Sageman (2008) reported that three-quarters of the jihadi terrorists in

his study were married. Indeed, he found that many of his subjects married into terrorist

organizations. Men joining these organizations often were not fully trusted unless their wives

were daughters or sisters of other terrorists. LaFree and Ackerman (2009) caution that there is

relatively little good research on marriage and terrorism, and the research that exists often lacks

comparison groups of non-terrorists drawn from the same population. Merari (2010, p. 73),

studying suicide terrorism, notes that “the single status of almost all suicides may suggest that

single persons are more willing to volunteer for suicide missions. However, in the Palestinian

case, it has also usually been the policy of the organizations to refrain from recruiting married

persons for such missions.”

Running head: INDIVIDUAL RISK ASSESSMENT OF TERRORISM 12

Social Class

While the empirical evidence tends to support, if only in a qualified manner, the existence

of widely-suspected correlations between terrorism and age, gender, and marital status, the

evidence thoroughly contradicts the common belief that terrorists are disproportionately of lower

social class (Atran, 2003; Krueger & Maleckova, 2002; McCauley & Segal, 1987; Victoroff,

2005). In terms of occupation, income, and educational level, terrorists appear to be largely

indistinguishable from the local population. Surprisingly, one recent study even found that

suicide bombers “were, on average, much better educated than the population from which they

emerged” (Merari, 2010, p. 74). As Pape (2005, p. 216) has observed, terrorists “resemble the

kind of politically conscious individuals who might join a grassroots movement more than they

do wayward adolescents or religious fanatics.” LaFree and Ackerman (2009, p. 353) note that

“an interesting and thus far largely untested proposition is that terrorists are disproportionately

drawn from well-educated middle-class individuals who are employed in positions that are lower

in status than those that might be warranted by their credentials.”

Major Mental Illness

The lack of any relationship between major mental illnesses such as schizophrenia or

bipolar disorder and terrorism may be the most frequently and uniformly replicated finding in the

field (McCauley & Segal, 1987; Kruglanski & Fishman, 2006; Silke, 1998; Taylor & Quayle,

1994; Merari, 2005, 2010; Post, 2007). Little has changed—at least regarding group-based

terrorists (see below)—in the three decades since Martha Crenshaw (1981) famously noted that

“the outstanding common characteristic of terrorists is their normality.”

Interestingly, a number of careful recent studies indicate that mental illness is heavily

implicated in violence and threatened violence against public figures (e.g., James, Meloy,

Mullen, Pathe, Farnham, Preston, & Darnley, 2010). These studies explicitly “[e]xcluded…all

cases, whether perpetrated by an individual or a group, that had a clear terrorism motivation”

(Hoffmann, Meloy, Guldimann & Ermer, 2011, p. 151; cf. Hoffman, 2006, p. 37). For example,

James, Mullen, Meloy, Pathe, Farnham, Preston, and Darnley (2007) report that among those

who attacked European politicians between 1990 and 2004, people with a serious mental illness

were responsible for almost all of the fatal and seriously injurious attacks.

Prior Crime

Pape’s (2005, p. 210) influential study of suicide terrorists found “no evidence of major

criminal behavior, such as murder, beyond the petty crime normally associated with terrorist

groups, such as money laundering (of tiny sums) and theft.” Merari (2010) reported similar

findings. Likewise, the New York Police Department reports that violent radicals are generally

free of a record of past crime (Silber & Bhatt, 2007). Bakker (2006, p. 43), on the other hand, in

a study of 242 jihadi terrorists in Europe, concluded that “at least a quarter of the sample” had a

criminal record.

The crime of most theoretical relevance to the risk assessment of future violent terrorism,

of course, is past violent terrorism. However, I know of no studies that directly address past

terrorism as a risk factor for future terrorism, perhaps because people adjudicated as terrorists are

Running head: INDIVIDUAL RISK ASSESSMENT OF TERRORISM 13

infrequently given the opportunity to recidivate. The limited data mentioned earlier on detainees

released from Guantanamo—whose post-release rate of actual or suspected terrorism is

estimated to be between six percent (Bergen et al, 2011) and 25 percent (Office of the Director of

National Intelligence, 2010)—may be relevant here. Not all of the people released from

Guantanamo were ever adjudicated as having committed an initial act of terrorism, however, so

it is unclear what fraction of this 6 to 25 percent are actually “recidivists.”

Suicidality

That terrorists who commit suicide bombings are otherwise suicidal is a plausible

hypothesis. However, a review of five published studies of prospective suicide terrorists or the

surviving friends and families of deceased terrorists concluded that “the many discrepancies

uncovered between suicide terrorists and other suicides on key factors known to underpin

suicidality, suggest that such terrorists are not truly suicidal and should not be viewed as a

subgroup of the general suicide population” (Townsend, 2007, p. 35). Similarly, Pape (2005, p.

172) noted that “many suicide terrorists are acting on the basis of motives fundamentally

different from those that underlie ordinary suicide and would probably not commit suicide absent

the special circumstances that create these motives.” Merari (2010, p. 221) in this regard

concluded that suicide terrorism “differs sufficiently from ordinary suicide to be recognized as

sui generis.” Only a small proportion of individuals involved in terrorism choose to be involved

in suicide terrorism (Crenshaw, 2007; LaFree & Dugan 2009; cf Lankford, 2010): the great

majority of terrorists only detonate bombs that they are not wearing.

Substance Abuse

While many terrorist organizations fund their operations by trafficking in drugs to be

used by others (Dishman, 2001), there is little evidence that terrorists themselves are prone to

substance abuse. Indeed, Merari (2010, p. 221), in his large study of Palestinian suicide terrorists,

found that “none whatsoever were alcohol or drug abusers (most of the suicides were members

of extremist Islamic organizations, which have conducted a fierce struggle against drugs in the

Palestinian society, and alcohol drinking is, of course, forbidden for Muslims)” (see also Atran,

2002).

Personality Disorder

Scholarship on personality disorder among terrorists has focused on the concept of

psychopathy. Borum (2011, p. 19), for example, has noted that “although terrorists often commit

heinous acts, they would rarely be considered classic ‘psychopaths.’” Merari (2010, p. 254)

concluded that “contrary to common criminals, suicide bombers are unlikely to display

psychopathic characteristics; psychopaths do not sacrifice themselves for the community” (see

also Victoroff, 2005). Likewise, McCauley (2007, p. 15) observed that “[t]he mutual

commitment and trust that is evident within [terrorist groups] and in the cooperation among the

groups is radically inconsistent with the psychopathic personality.”

Personality

The search for personality traits that distinguish terrorists from non-terrorists with any

degree of reliability has a long and frustrating history (Reich, 1990; Hoffman, 2006; Davis &

Running head: INDIVIDUAL RISK ASSESSMENT OF TERRORISM 14

Cragin, 2009; McCormick, 2003; Sageman, 2008). In recent years, and after a great many

failures, that search has been “more or less abandoned” (Smelser, 2007, p. 94; Weine, 2009). No

existing personality test or other psychological instrument has been reliably shown to produce

scores for any psychological trait that significantly differentiates—either predictively or

postdictively—people in a given population who engage in terrorist acts from people in the same

population who do not.

Importantly, however, Merari (2010, p. 253) reasonably has cautioned that the conclusion

that terrorists do not share personality characteristics “rests on the absence of research rather than

on direct findings.”

A scientifically sound conclusion that terrorists have no common personality traits must

be based on many comparative studies of terrorists from different countries and

functions, using standard psychological tests and clinical interviews. As such studies

have not been published, the only scientifically sound conclusion for now is that we do

not know whether terrorists share common traits, but we cannot be sure that such traits do

not exist” (p. 235).8

Summary

From the existing research, therefore, it appears that none of the four overlapping

dimensions of the risk of common violence identified by Kroner et al (2005)—criminal history,

an irresponsible lifestyle, psychopathy and criminal attitudes, and substance abuse—characterize

those who commit violent terrorism. In addition, there is little empirical evidence supporting the

validity of other putative risk factors for terrorism beyond what is already obvious (i.e., age,

gender, and perhaps marital status). Indeed, the strongest empirical findings are entirely

negative: terrorists in general tend not to be impoverished or mentally ill or substance abusers or

psychopaths or otherwise criminal; suicidal terrorists tend not to be clinically suicidal. In no

society studied to date have personality traits been found to distinguish those who engage in

terrorism from those who refrain from it.

Part IV: Conceptual and Methodological Challenges

Merari and Friedland (1985, p. 348) surely understate the case when they write that “the

subject of terrorism does not lend itself easily to research” (see also Crenshaw, 1990; Taylor,

2010). Here, I lay out four conceptual and methodological issues that must be confronted and

resolved—at least provisionally—before a robust program of short- and long-term research to

improve the individual risk assessment of terrorism can be fully operational (Fein & Vossekuil,

1999). The four issues concern the heterogeneity of what is meant by “terrorism,” the optimal

degree of structuring a risk assessment procedure, the need for more robust risk factors, and the

development of an infrastructure for validating these risk factors.

8 In his own small-scale study of Palestinian terrorists, Merari (2010, p. 113), reported that “In general, as a group

the would-be suicides differed significantly in their personality characteristics from non-suicide terrorists. This

difference suggests that certain types of people are more likely to be attracted to suicide terrorists’ missions. Most

were socially marginal youngsters with a keen sense of social failure. Shy and withdrawn, they lacked self-

confidence and feared rejection, were eager to please, and tended to avoid conflicts.”

Running head: INDIVIDUAL RISK ASSESSMENT OF TERRORISM 15

First, however, it is necessary to mention one crucial issue that will not be addressed

further here: the verification of risk factors that rely in whole or in part on the statements of the

individuals whose risk of terrorism is being assessed. As the National Research Council (NRC)

Workshop Summary, Field Evaluation in the Intelligence and Counterintelligence Context

(2010, p. 7), correctly observed, a key question in any form of risk assessment for terrorism that

relies on subjects’ self-report is, “Are they being honest?”

The empirical literature on lie detection is vast and remarkably contentious (e.g., Bond &

DePaulo, 2008; Wagner, 2010; Loftus, 2011; Vrij, Granhag, Mann & Leal, 2011). A

comprehensive or even a highly selective review of this literature is beyond the scope of this

article. Methods of answering the “honesty” question were aired at length in the 2010 NRC

Workshop, as well as by Bhatt and Brandon (2008), Brandon, 2011) and Evans, Meissner,

Brandon, Russano, and Kleinman (2010). Rather than reiterate the many excellent points made in

these recent sources, I will refer the reader to them and otherwise bracket this issue for further

consideration as an agenda for research on the risk assessment of terrorism is developed.9

Issue 1: The Heterogeneity of the Outcome: Terrorist Types, Processes, and Roles

Is terrorism a sufficiently unified phenomenon that it constitutes a coherent outcome

measure in risk assessment research? Or, as the National Science and Technology Council (2005,

p. 7) stated, is it the case that “‘terrorism’ may oversimplify different types of actors, warfare,

and motivations, encapsulating them in a single group or act so that critical variables are

overlooked”? The Global Terrorism Database lists the “top five” of the twenty most active

terrorist organizations in terms of attack frequency since 1970 as Peru’s Shining Path, the

Basque Fatherland and Freedom organization, El Salvador’s Farabundo Marti National

Liberation Front, the Irish Republican Army, and the Revolutionary Armed Forces of Columbia

(LaFree & Dugan, 2009, Table 1). The question is whether these groups—or more recently

active ones, such as al-Qaeda—have anything in common, other than their willingness to use

violence against noncombatants in order to advance their (very different) political goals.

Many risk assessment instruments for common violence “split” rather than “lump” the

outcome variable (Zerubavel, 1996); that is, rather than attempt to assess the risk of violence in

general, they attempt to assess the risk of specific types of violence, such as domestic violence

(Hilton, Harris, & Rice, 2009), sexual violence (Hart & Boer, 2010), violence among people with

mental illness (Monahan et al, 2001), violence among prisoners (Andrews, Bonta, & Wormith,

2004), violence in workplaces (White & Meloy, 2010), or violence in schools (Cornell, 2009).

9 As the NRC (2003) importantly noted with regard to the polygraph:

Polygraph screening may be useful for achieving such objectives as deterring security violations, increasing

the frequency of admissions of such violations, deterring employment applications from potentially poor

security risks, and increasing public confidence in national security organizations. On the basis of field

reports and indirect scientific evidence, we believe that polygraph testing is likely to have some utility for

such purposes. Such utility derives from beliefs about the procedure’s validity, which are distinct from

actual validity or accuracy… However, overconfidence in the polygraph—a belief in its accuracy that goes

beyond what is justified by the evidence—also presents a danger to national security objectives.

Overconfidence in polygraph screening can create a false sense of security among policy makers,

employees in sensitive positions, and the general public that may in turn lead to inappropriate relaxation of

other methods of ensuring security (p. 7).

Running head: INDIVIDUAL RISK ASSESSMENT OF TERRORISM 16

Analogous to this “splitting” rather than “lumping” trend in the risk assessment of

common violence, should research attempt to advance the risk assessment of terrorism in

general, or should it limit the outcome for a given risk assessment instrument to a specific type of

terrorism, on the hypothesis that different types of terrorism may function very differently from

one another, and therefore a risk factor for one type of terrorism may not be a risk factor for

another type (Forst, 2008)? Put more concretely, is it plausible to expect that the risk factors for

joining the Irish Republican Army are the same as the risk factors for joining the Taliban?

Candidates often mentioned as distinct “types” of terrorism include suicide terrorism (e.g., Pape,

2005), homegrown terrorism (e.g., Turchie & Puckett, 2007; Gartenstein-Ross & Grossman,

2009), “lone-wolf” assailants (Spaaij, 2010; Moskalenko & McCauley, 2011), domestic

terrorism (Sanchez-Cuenca & de la Calle, 2009), and “insider” threats (e.g., Bulling & Scalora,

2008; see in general Miller, 2006, Shaw, 2006).

In addition to these conceptually-derived types of terrorism, “types” can be empirically

generated. Rieger (2010), for example, used data from the 2007 Gallup World Poll, with a

sample size of 27,528 people in a total of 140 countries, to identify respondents who “strongly

believed the attacks of 9/11 were completely justified, [and] strongly believed that attacks

against civilians in pursuit of a goal were completely justified, especially those committed by

other civilians” (p. 77). To be classified as having “radical” views, a respondent must have given

the strongest possible response to these questions. Rieger contrasted such respondents with

others who did not share these views, and concluded that there were two types of potential

terrorists:

Type One Radicals were highly intolerant mainstream individuals who had little to no

confidence in their current government’s ability to meet what they saw as a desirable

future… Type Two Radicals were downscale individuals [in terms of income,] who

viewed themselves as victims and sought a strong leader and/or ideology for hope” (pp.

78-79; see also Rieger, 2011).

Finally, if one agrees with the Homeland Security Advisory Council’s Report on the

Future of Terrorism Task Force (2007) that “the most significant threat to the homeland today

stems from a global movement, underpinned by a jihadist/Salafist ideology” (p. 3), should

research on the risk assessment of terrorism simply take the jihadist/Salafist type of terrorism as

its initial research priority, recognizing full well that there are other types of terrorism whose

risk needs to be assessed, but perhaps with less urgency at this geopolitical moment?

Arguments can be made for and against any of the above choices of outcome measure,

much as arguments are made for “splitting” versus “lumping” in the risk assessment of common

violence. Narrower, well-specified types of terrorism may reflect more theoretically coherent

motivations on the part of the perpetrators, and may point to the existence of risk factors that are

specific to one rather than another type of terrorism.

Importantly, risk factors for lone-wolf terrorism may differ significantly from risk factors

for group-based terrorism. For example, as noted above, Crenshaw (1981), relying on studies of

the members of terrorist organizations, concluded that “the outstanding common characteristic of

terrorists is their normality.” The question cogently raised by Spaaij (2010, p. 862) is “whether

this observation applies not only to members of terrorist organizations, but also to lone wolf

Running head: INDIVIDUAL RISK ASSESSMENT OF TERRORISM 17

terrorists.” Both Spaaij (2010) and Hewitt (2003) suggest that Crenshaw’s observation may not

apply.10

To the extent that certain variables function as valid risk factors for lone-wolf terrorism

but do not function as valid risk factors for group-based terrorism—or vice versa—then to lump

lone-wolf terrorists with group-based terrorists in a single analysis would serve to mask what

might otherwise be important findings.

On the other hand, a broader, more generic operational definition of terrorism would

allow for a larger sample size of terrorists, and thus more statistical power in analyzing risk

assessment data.

Whether one ultimately decides to use an operational definition of terrorism in general or

of a specific type of terrorism is one important question. A second important question is whether

to conceive of terrorism as an event that occurs or does not occur, or as a process that unfolds

over time and across organizational contexts (Horgan, 2005; Taylor and Horgan, 2006;

Suttmoeller, Chermak, Freilich, & Fitzgerald, 2011). Horgan (2008), for example, believes that

certain risk factors (described below) may provide a framework for “openness to socialization”

into terrorism, i.e., they may be relevant to assessing the risk of becoming initially involved in

terrorism. Once the individual moves further in the process of becoming a terrorist, however,

different risk factors may come into play.

Horgan’s distinction between initiation into terrorism and later continued involvement in

terrorist acts is reminiscent of Blumstein, Cohen, Roth, and Visher’s (1986) concept of “criminal

careers.” Risk factors for beginning to participate in a life of crime (i.e., for committing a first

crime) may be very different from risk factors for continuing to commit crimes at a high rate or

for a long period. “Thus, separating the participation rate from the course of active offenders’

criminal careers enables one to isolate influences on the initiation of offending from influences

on the frequency or duration of a criminal career” (Blumstein et al, 1986, p. 2).

Finally, in addition to differences between types of terrorism and phases in the process of

terrorism, there are different roles that can be played in a terrorist operation (Merari, 2010, p.

264; Gill & Young, 2011). As Horgan (2008, p. 86) notes:

The reality of terrorist movements today… is that this most public of roles and functions

tends to merely represent the tip of an iceberg of activity. Supporting the execution of a

violent attack are those directly aiding and abetting the event, those who house the

terrorist or provide other kinds of support, raise funds, generate publicity, provide

intelligence, and so forth. The person we think of as “the terrorist” is therefore fulfilling

only one of multiple functions in the movement, albeit the most dramatic in terms of

direct consequences.

10

As a second example of the benefits of “splitting” rather than “lumping” in the choice of terrorism outcome

measure, Gartenstein-Ross & Grossman (2009, p. 14) in their study of 117 “homegrown” terrorists of the jihadi type

in the U.S. and the U.K., found that the homegrown terrorists they studied were “of a less privileged socioeconomic

upbringing, and had both a weaker educational background and weaker professional prospects than previous studies

suggest is typical of the global terrorist movement as a whole.”

Running head: INDIVIDUAL RISK ASSESSMENT OF TERRORISM 18

The choice of a broad or a narrow outcome measure in terrorism risk assessment research

is a crucial but often neglected issue. Yet, without clarity from the outset on whether we are

attempting to assess the risk of terrorism in the aggregate, or of specific types of terrorism—or of

specific phases in the process of becoming or of remaining a terrorist, or of specific roles in

terrorist activity—we are unlikely to produce a coherent body of empirical findings on the risk

assessment of terrorism.

Issue 2: The Optimal Degree of Structuring the Risk Assessment of Terrorism

In Part II, drawing heavily upon Skeem and Monahan (2011), I argued that the process

for assessing the risk of “common” violence might usefully be seen as having four components:

(a) identifying valid risk factors, (b) determining a method for measuring (“scoring”) each of

these risk factors (c) establishing a procedure for combining the scores on the various risk

factors, and (d) producing a final estimate of violence risk. I also argued that it is possible to

array five current approaches to the risk assessment of common violence according to whether

the approach structures none, one, two, three, or all four components of the risk assessment

process. Unfortunately, the range of approaches that can be taken in the risk assessment of

terrorism is likely to be significantly narrower than is the case with the risk assessment of

common violence.

First, the option of structuring no components of the risk assessment process—i.e.,

relying on unmodified clinical prediction—is even less viable in the context of terrorism than it

is in the context of common violence. At least common violence is common: it occurs often, and

therefore a practicing clinician, especially a forensic psychologist or psychiatrist, may be able to

draw upon a large store of experience with violence in making his or her subjective judgments.

Some of that experience may include feedback on the accuracy (or lack thereof) of prior risk

assessments and the clinician may have learned valuable, if painful, lessons from that feedback

(Kahneman & Klein, 2009).

For two reasons, this clinical learning is unlikely to occur in the case of terrorism. First,

terrorism is much less common than “common” violence. This, of course, is a very good thing.

But it means that few clinicians, other than those who work in national security, are likely to

have a large—or even a small—store of experience with terrorism to draw upon in making their

clinical judgments. Second, whatever experience clinicians, including clinicians who work in

national security, have with assessing terrorism risk is unlikely to have been accompanied by the

kind of feedback from which the clinicians may have learned about their successes and mistakes:

no one who is clinically assessed as presenting a “high” risk of terrorism is about to be released

from detention or offered a military promotion or a job as a DoD contract employee. I address

this issue at greater length below.

Second, the two most structured options described earlier—modified and unmodified

actuarial risk assessment—seem patently infeasible in the context of assessing terrorism risk.

The sample size of people who actually engage in terrorist acts will never be large enough to

allow the statistical power needed to determine the optimal quantitative combination of risk

factor scores, or to generate a final estimate of risk that does not rely in substantial part on

clinical judgment. This issue is also addressed at greater length below.

Running head: INDIVIDUAL RISK ASSESSMENT OF TERRORISM 19

Of the five approaches to structuring the risk assessment of common violence identified

by Skeem and Monahan (2011), only two might feasibly apply to the risk assessment of

terrorism: modified clinical risk assessment, in which key risk factors for terrorism are identified,

and structured professional judgment, in which key risk factors for violence are both identified

and measured. Of these two feasible approaches, the latter seems clearly preferable, since the

former functions largely as a checklist to jog the assessor’s memory.

To my knowledge, only one instrument has been developed specifically to assess the risk

of terrorism, and that instrument adopts the structured professional judgment approach pioneered

by Webster et al (1997). The Violent Extremism Risk Assessment, or VERA, was developed in

Canada by D. Elaine Pressman (2009). Pressman concluded that three-quarters of the risk factors

for common violence on the HCR-20 had little or no relationship to risk factors believed to

characterize violent extremists. Therefore, she attempted to identify risk factors more relevant to

the context of terrorism:

Items on the VERA have been supported by the results of research undertaken in the area

of radicalization and terrorism, are based on previous work undertaken in collaboration

with RCMP [i.e., Royal Canadian Mounted Police] personnel having operational

experience with criminal violent extremists, have followed from discussions with

professionals in the security and intelligence fields and have used relevant information

obtained from interviews and self-report questionnaire data on radicalization (p. 21).

Each of the items scored on the VERA is scored as high, moderate, or low, based on

interviews and/or records. As with other structured professional instruments in clinical use, such

as the HCR-20, the items are not combined in clinical practice in a specified manner (e.g., by

summing scores), and the final risk estimate is a matter of informed clinical judgment.

The current version of the VERA (Consultative Version 2, Pressman & Flockton, 2010, p.

5), consists of 31 items grouped into five categories:

1. Beliefs and Attitudes, e.g., “Victim of injustice and grievances.”

2. Context and Intent, e.g., “Anger and expressed intent to act violently.”

3. History and Capability, e.g., “Network (family, friends) involved in violent action.”

4. Commitment and Motivation, e.g., “Driven by moral imperative, moral superiority.”

5. Protective Factors, e.g., “Family support for non-violence.”

Issue 3: The Need for New Risk Factors for Terrorism

As indicated in Part III above, existing research has largely failed to find valid nontrivial

risk factors for terrorism. Without the identification of valid risk factors, the individual risk

assessment of terrorism is impossible. Fortunately, several scholars have recently proposed

variables that they believe are promising candidates for being risk factors for terrorism. Horgan

(2008, p. 84), for example, while carefully noting that “the dangers of overgeneralization should

Running head: INDIVIDUAL RISK ASSESSMENT OF TERRORISM 20

be obvious,” hypothesizes that among the “predisposing risk factors for involvement in

terrorism” may be the following:

“1. The presence of some emotional vulnerability, in terms of feelings of anger,

alienation (often synonymous with feelings of being culturally uprooted or displaced and

a longing for a sense of community), and disenfranchisement…

2. Dissatisfaction with their current activity, whether it be political or social protest, and

the perception that conventional political activity just does not work or produce results...

3. Identification with victims—either real, in terms of personal victimization (e.g., by the

military or police) or less tangible...

4. Crucially, the person has to believe that engaging in violence against the state or its

symbols is not inherently immoral…

5. Also important is a sense of reward that the recruit has about what ‘being in this

movement’ represents. All suicide bombers, across the world, have one thing in common.

They come to believe that they will achieve more in death than they ever could in life…

6. Finally, kinship or other social ties to those experiencing similar issues, or already

involved, are crucial” (pp. 84-85).

In addition, McCauley and Moskalenko (2011), while strongly emphasizing that “there is

no one path, no royal road, no ‘conveyor belt’ from activism to terrorism” (p. 218), proposed six

individual-level “mechanisms of political radicalization” (p. 12).

1. Personal Grievance: “Harm to self or loved ones can move individuals to hostility and

violence toward perpetrators” (p. 13).

2. Group Grievance: “Threat or harm to a group or cause the individual cares about can

move the individual to hostility and violence toward perpetrators” (p. 21).

3. Slippery Slope: “Small involvements in political conflict can create new forces moving

an individual toward radicalization” (p. 35).

4. Love: “Love for someone already radicalized can move an individual toward

radicalization” (p. 49).

5. Risk and Status: “The attractions of risk-taking and status can move individuals,

especially young males, to radical political action” (p. 58).

6. Unfreezing: “Loss of social connection can open an individual to new ideas and new

identity that may include political radicalization” (p. 75).

Note that a number of Pressman and Flockton’s (2010), and Horgan’s (2008), and

McCauley and Moskalenko’s (2011) proposed risk factors overlap. Take two examples. First,

compare Pressman and Flockton’s “Victim of injustice and grievances,” with Horgan’s

Running head: INDIVIDUAL RISK ASSESSMENT OF TERRORISM 21

“Identification with victims—either real, in terms of personal victimization (e.g., by the military

or police) or less tangible,” and with McCauley and Moskalenko’s “Harm to self or loved ones

can move individuals to hostility and violence toward perpetrators.” Second, compare Pressman

and Flockton’s “Network (family, friends) involved in violent action,” with Horgan’s “Kinship

or other social ties to those experiencing similar issues, or already involved, are crucial,” and

with McCauley and Moskalenko’s “Love for someone already radicalized can move an

individual toward radicalization.”

From my own reading of the empirical literature on terrorism, I would single out four

categories of variables—each of which can find a parallel in Pressman and Flockton (2010),

Horgan (2008), and/or McCauley and Moskalenko (2011)—that seem to be auspicious

candidates for terrorism risk factors. These categories center on ideologies, affiliations,

grievances, and moral emotions.

Ideology

A study analyzing suicide terrorists’ farewell videos and interviewing mothers of

deceased suicide bombers found that the stated reasons for suicide terrorism were almost

uniformly ideological (Kruglanski, Chen, Dechesne, Fishman, & Orehek, 2009). In this regard,

Saucier, Akers, Shen-Miller, Knežević, & Stankov (2009, p. 256) define an ideology they term

militant extremism as “zealous adherence to a set of beliefs and values, with a combination of

two key features: advocacy of measures beyond the norm (i.e., extremism) and intention and

willingness to resort to violence (i.e., militancy)” (see also Stankov, Higgins, Saucier, &

Knežević, 2010; Stankov, Saucier, & Knežević, 2010; and Gartenstein-Ross & Grossman,

2009).

To develop a model of militant-extremist ideology in a “culture-fair” manner, Saucier et

al (2009) extracted statements from written material produced by extremist groups from seven

regions around the world: Europe, Middle East, Sub-Saharan Africa, South Asia, East Asia,

Latin America, and North America (see also Smith, 2004). To be sampled, the groups had to be

active within the last 150 years and had to have committed actual violence involving the death of

multiple persons outside the group. Saucier et al (2009) identified 16 themes that recurred in

multiple written statements. The 16 themes are summarized in Table 1.

The authors hypothesize that the themes “could be assembled to form a coherent and

potentially compelling narrative, and this narrative may be the source of much of the appeal that

salient militant-extremist groups generate” (p. 269; see also Leuprecht, Hataley, Moskalenko, &

McCauley, 2009, 2010). The narrative that they propose is as follows:

We (i.e., our group, however defined) have a glorious past, but modernity has been

disastrous, bringing on a great catastrophe in which we are tragically obstructed from

reaching our rightful place, obstructed by an illegitimate civil government and/or by an

enemy so evil that it does not even deserve to be called human. This intolerable situation

calls for vengeance. Extreme measures are required; indeed, any means will be justified

for realizing our sacred end. We must think in military terms to annihilate this evil and

purify the world of it. It is a duty to kill the perpetrators of evil, and we cannot be blamed

for carrying out this violence. Those who sacrifice themselves in our cause will attain

Running head: INDIVIDUAL RISK ASSESSMENT OF TERRORISM 22

glory, and supernatural powers should come to our aid in this struggle. In the end, we will

bring our people to a new world that is a paradise (p. 265).

It is crucial to stress here the vast gulf between terrorist ideology and terrorist action

(Karagiannis & McCauley, 2006; Horgan, 2008; Kurzman, 2011). As McCauley and

Moskalenko (2011) note, “Polls in Muslim countries indicate that millions sympathize with

jihadist goals or justify terrorist attacks. But Muslim terrorists number only in the thousands. The

challenge is to explain how only one in a thousand with radical beliefs is involved in radical

action” (p. 5; see also Merari, 2010, p. 246).

If certain ideological commitments disproportionately serve a facilitating role in the

initiation to—or in the continuation of—terrorism, the existence of such commitments might

function as an individual risk factor for terrorism, or at least for some types of terrorism.11

If this

is so, the reliable measurement of these ideological commitments is an important methodological

pursuit (Borum, in press a, in press b).

In addition, given that many more people espouse ideological commitments conducive to

terrorism than participate in terrorist acts, perhaps these ideological commitments manifest

themselves in terrorist behavior primarily in individuals with certain pre-existing personality

characteristics (although, as discussed above, no such characteristics have yet been identified

(Merari, 2010)). One candidate for a personality characteristic that might differentiate— among

people with what Saucier et al (2009) call militant-extremist ideological commitments—those

who refrain from terrorism and those who engage in terrorism is “boldness” (Patrick, Fowles, &

Krueger, 2009; Patrick, 2010) or “fearlessness” (Newman, Curtin, Bertsch, & Baskin-Sommers,

2009).12

Affiliations

People who commit terrorist acts tend to associate with other people who commit

terrorist acts (Smith, 2008; Weine, Horgan, Robertson, Loue, Mohamed, & Noor, 2009).

Sageman (2008) reported that about 70 percent of the people who join al-Qaeda do so with

friends, and about 20 percent do so with kin. Atran (2008) noted that friends tend to become kin

as they marry one another's sisters and cousins. The web can greatly facilitate this terrorist

bonding process (Theohary & Rollins, 2011).

Along these lines, Ginges, Hansen, and Norenzayan (2009) propose an alternative to the

hypothesis that certain religious beliefs (e.g., the belief that “martyrs” will be rewarded in an

afterlife) directly influence support for suicide terrorist attacks. They refer to their alternative as

the coalitional-commitment hypothesis: the relationship of religion to suicide attacks may be

independent of any particular religious beliefs and more a function of religion’s powerful ability

to strengthen coalitional identities and to foster “parochial altruism.” Parochial altruism is a

11

For example, Moskalenko & McCauley (2011, p. 124) have recently noted that “Ideology and ideas of justice

may… be more important for solo political action than for action embedded in radical groups or terrorist

organizations.”

12

I am grateful to Jennifer Skeem for this suggestion.

Running head: INDIVIDUAL RISK ASSESSMENT OF TERRORISM 23

concept developed by Choi and Bowles (2007) that combines parochialism, i.e., hostility toward

individuals who are not members of one’s own group, with altruism, i.e., benefitting in-group

members at a tremendous cost to oneself.13

Ginges et al (2009) report several studies finding that

the frequency with which Palestinian Muslims attend mosque, but not their frequency of prayer,

positively predicted support for suicide attacks. In addition, experimentally bringing to mind

synagogue attendance, but not experimentally bringing to mind prayer, increased the likelihood

that Israeli settlers would state that a suicide attack against Palestinians was “extremely heroic.”

In another study, with a multireligious sample, the frequency of attendance at organized religious

services, but not the frequency of prayer, predicted parochial altruism (see Putnam & Campbell,

2010). Ginges et al conclude that the relationship between religion and support for suicide

attacks is independent of “devotion to particular religious belief, or indeed to religious belief in

general. [Rather, the relationship] is a function of collective religious activities that facilitate

popular support for suicide attacks and parochial altruism more generally” (p. 230; see also

Liddle, Machluf, & Shackelford, 2010; Ginges, Hansen, & Norenzayan, 2010; Graham & Haidt,

2010; Liddle, Bush, & Shackelford, 2011). The well-known group-polarization effect, whereby

group discussion tends to make those participating in it advocate more extreme positions and

riskier actions than those not participating in it (McCauley & Moskalenko, 2010) may play an

important role in explaining why coalitional-commitment mediates the relationship between

religious belief and terrorism.

If kinship, friendship, and romantic affiliation often play a crucial role in the

development of terrorist ideology and in the transformation of that ideology into terrorist actions,

risk assessment must focus not just on the individual being assessed, but must also incorporate

information on the behavior of those with whom the individual closely affiliates. The extensive

literature on criminal gangs may be a source of useful insights in this regard (Sandia National

Laboratories, 2002; Goldson, 2011).

Grievances

Personal and group grievances are frequently implicated in accounts of the development

of terrorism (Atran, 2003). McCauley and Moskalenko (2011), for example, note that personal

grievances (i.e., “[h]arm to self or loved ones”) can combine with group grievances (i.e.,

“[t]hreat or harm to a group or cause the individual cares about”) in two primary ways:

One possibility is that each mechanism adds its independent contribution to

radicalization. The second possibility is that the power of multiple mechanisms is more

like a multiplication than an addition. There could be synergisms such that particular

combinations of mechanisms are particularly potent… Our cases of individual

radicalization by personal grievance showed considerable overlap in experience with

cases of individual radicalization by group grievance. We were led to recognize that

these two kinds of grievance are often found together. Indeed either kind of grievance is

likely to produce the other. Personal grievance can lead an individual to seek out and

13

On the concept of altruism, McCauley and Moskalenko (2011) note that “studies of altruism have shown the

importance of sympathy and empathy in predicting help for a stranger in distress. Although altruism research has not

yet examined the relation between empathy and aggression toward the perpetrator of a stranger’s distress, the

importance of individual differences in empathy for understanding political radicalization may be worth pursuing”

(p. 33).

Running head: INDIVIDUAL RISK ASSESSMENT OF TERRORISM 24

cooperate with others feeling anger toward the same perpetrator: the personal then

becomes political. Group grievance can lead to involvement in conflicts with the

government and police that are experienced as unjustified repression: the political then

becomes personal (pp. 214-215.

Others have argued that one particular grievance—the loss of a loved one—may

indirectly remind a person of his or her own mortality in a particularly personal way, and that

being reminded of one’s own death has important behavioral consequences. Terror Management

Theory, for example, holds that people respond to what that theory refers to as the “existential”

fear of death by clinging to their existing worldviews more tenaciously, since those worldviews

may provide a measure of protection against otherwise debilitating anxiety. As stated by

Pyszczynski, Rothschild, and Abdollahi (2008, p. 319), “in the face of elevated concerns about

death, people are more prone to dehumanizing, vilifying, and supporting the killing of

worldview-threatening others.” A recent meta-analysis concluded that the central hypothesis of

the theory—that death affects us without our conscious realization—“is robust and produces

moderate to large effects across a wide variety of mortality salience manipulations as well as

attitudinal, behavioral, and cognitive dependent variables”14

(Burke, Martens, & Faucher, 2010,

p. 187).

Several studies have directly applied Terror Management Theory to the study of terrorism

(for a review, see Vail, Motyl, Abdollahi, & Pyszczynski, 2010). Pyszczynski, Abdollahi,

Solomon, Greenberg, Cohen, and Weise (2006), for example, in a randomized experimental

study of Iranian college students, found that students reminded of death were more supportive of

“martyrdom” attacks against the United States than students not reminded of death. In addition,

Kokdemir and Yeniceri (2010) found that predominantly Muslim university students in Turkey,

when reminded of death, wanted their country to have stronger relations with Turkmenistan (also

predominantly Muslim) and weaker relations with England and Greece. Finally, Chatard, Arndt,

and Pyszczynski (2010) have found that the death of loved ones leads to a long-term polarization

of political attitudes and opinions.

Grievances, particularly in the form of the loss of loved ones due to military actions by

those perceived to be enemies, may be an undervalued individual risk factor for terrorism.

Grievances may be particularly potent risk factors for terrorism in “cultures of honor” (Nibbett

&Cohen, 1996) in which “men are sensitive to a cultural script in which aggression is used to

restore threatened manhood” (Bossin & Vandello, 2011, p. 83).

The three risk factors for terrorism just discussed—ideology, affiliations, and

grievances—have been combined by Kruglanski, Chen, Dechesne, Fishman, & Orehek (2009)

into an overarching notion of a “significance quest” that is undertaken by suicidal terrorists:

14

This is not to say that there is general agreement that “existential” fear of death is what produces these effects. See

Navarrete and Fessler (2005):

Adherence to ingroup ideology increases after exposure to death-related stimuli, a reaction that proponents

of terror management theory explain as a psychological defense against the uniquely human existential fear

of death. We argue that existential concerns are not the relevant issue; rather, such concepts can be

subsumed under a larger category of adaptive challenges that prime coalitional thinking (p. 297).

Running head: INDIVIDUAL RISK ASSESSMENT OF TERRORISM 25

Recent analysis of the motivations for suicidal terrorism have identified a broad variety

of motives (the “fatal cocktail”) having to do with potential perpetrators’ (1) personal

traumas and frustrations, (2) ideological reasons, and (3) social pressures to which they

may be subjected. [W]e introduced the notion of significance quest as an integrative

concept tying these motivational categories together: Personal traumas and frustrations

could encourage a “collectivistic switch” to a terrorism-justifying ideology because the

latter may afford a means for restoring the lost significance occasioned by various

unsettling events. Besides, terrorism-justifying ideologies may afford a relatively simple

means of substantial significance gain and attainment of a hero or a martyr status in the

eyes of one’s community (p. 353).

The final set of variables that may have particular promise as risk factors for terrorism

concern emotions that are increasingly being termed “moral.”

Moral Emotions

Numerous scholars recently have argued that terrorism can only be understood in terms

of morality, that is, in terms of other groups violating one’s own group’s “sacred values”

(Ginges, Atran, Sachdeva, & Medin, 2011). Tetlock (2002) defines a sacred value as “any value

toward which a moral community proclaims, at least in rhetoric, an unbounded or infinite

commitment.” For example, Ginges, Atran, Medlin, and Shikaki (2007) report several

experiments carried out with Palestinian and Israeli participants showing that violent opposition

to compromise over values considered by one group or the other to be sacred—e.g., exchanging

land for peace, sovereignty over Jerusalem, and the right of Palestinian refugees to return to their

former lands inside Israel—is increased by offering material incentives (i.e., the payment of

money) to compromise with one’s adversary, but is decreased when the adversary makes

symbolic compromises over their own sacred values (e.g., recognizing the right of the other to

exist as a state). In other words, the use of material incentives to promote the resolution of

conflict backfires when adversaries see these incentives as a challenge to the “sacredness” of

their moral values (see also Atran, Axelrod, & Davis, 2007).15

Ginges and Atran (2009a) have

replicated this result with Indonesian madrassa students, with the “backfire effect” being the

strongest among the most radicalized students. As summarized by Ginges and Atran (2009b), it

appears that “choices people make in violent intergroup conflicts, from whether to accept a

compromise to whether individuals commit themselves to violent collective action, are bound by

moral commitments to collective interests” (p. 122. See also Ginges & Atran, 2011).

In this regard, Haidt (2012; Haidt & Kesebir, 2010; see also Hutcherson & Gross, 2011)

has described a “new synthesis” in the study of morality that may have important implications

for studying the violent actions in which terrorists feel morally obligated to engage. A key aspect

of this new synthesis is the primacy of moral emotions over moral reasoning. “Moral reasoning,

when it occurs, is usually a post-hoc process in which we search for evidence to support our

initial intuitive reaction” (Haidt, 2007, p. 998). Haidt (2003) posited that the principal moral

emotions used to condemn others are anger, contempt, and disgust. McCauley and Moskalenko

(2011, pp. 19-20) have focused on the relationship between anger and terrorism:

15

In a related article, Rai and Fiske (2011) have stated, “When someone offers you a million dollars for your

daughter, you do not counter with three million—you regard the offer as heinously offensive” (p. 66).

Running head: INDIVIDUAL RISK ASSESSMENT OF TERRORISM 26

There seems to be an easy path from personal grievance to anger to aggression toward the

perpetrator…But [there are] two complications about this path. The first complication is

the transition from revenge against a particular perpetrator to justice against a particular

class or category of people… The complication of the path between personal grievance

and political violence is then the psychology of attribution in which both victims and

perpetrators are raised to the level of classes or categories. We need a theory that can

describe when and how individual events are interpreted in terms of conflict between

groups… The second complication of the path from personal grievance to political

violence is that the experience of anger is relatively brief. Psychologists studying

emotion, whether anger or any other emotion, try to measure the emotion or its effects

only in the minutes immediately after instigating the emotion. How can an emotional

experience that lasts only minutes explain political violence that is planned and carried

out over periods of months and years?

Matsumoto (2010), on the other hand, sees disgust as the moral emotion most closely

associated with terrorism (Rozin, Haidt, & McCauley, 2008; Hodson & Costello, 2007). Note

that ways to measure moral emotions outside the context of terrorism already exist. Some of

these procedures rely on self-report (e.g., the Novaco Anger Scale (Novaco, 2004); the Disgust

Scale-Revised (Haidt, McCauley & Rozin, 1994, modified by Olatunji et al (2007)), making

them subject to concerns regarding subjects’ feigning answers. Other measurement procedures,

however, rely on physiological measures of disgust (Sherman, Haidt & Coan, 2010), or on the

recognition of micro-expressions (Ekman, 2007), which may be more difficult to manipulate

(e.g., see Matsumodo (2005) on ratings of expressions of contempt).

I have argued here that four categories of variables have promise as risk factors for

terrorism: the ideologies, affiliations, and grievances of potential terrorists, and the emotions that

they experience as morally salient. It is entirely possible that some pathways to some types of

terrorism operate through one set of risk factors and other pathways to other types of terrorism

operate through a different set of risk factors.

Issue 4: The Problem of Validation

To appreciate the profound problem of empirically validating an instrument for assessing

an individual’s risk of terrorism, it may be useful to contrast the hypothetical validation of such

an instrument with the actual validation of an existing instrument for assessing the risk of

common violence. I take as an illustration the Classification of Violence Risk (COVR) (Monahan

et al, 2001)16

, since that is the instrument mentioned in the DoD report, Protecting the Force

(2010b).

In brief, to validate the COVR, the instrument was administered to two independent

samples of acute mental hospital inpatients (n = 700). A stratified random sample of 177 of these

patients—each of whom had been classified by the instrument as either at “high” risk or at “low”

risk of violence—were prospectively followed in the community for four months after discharge

from the hospital (Monahan, Steadman, Robbins, Appelbaum, Banks, Grisso, Heilbrun, Mulvey,

Roth, & Silver, 2005). Of the 700 patients whose risk of violence was assessed, only three

16

Full disclosure: I am one of the co-owners of the Classification of Violence Risk.

Running head: INDIVIDUAL RISK ASSESSMENT OF TERRORISM 27

(0.4%) had not been discharged from the hospital within ten weeks after admission, and these

three patients were eliminated from the analysis. Follow-up data—consisting of interviews with

the patients and with collaterals (e.g., family members) about the patients’ violence in the

community during the first four months after hospital discharge (with the confidentiality of the

interviews guaranteed by a Federal Confidentiality Certificate), as well as police and hospital

records—were obtained for 157 of the 177 patients in the sample (89%).

The results of the COVR validation study were that during the follow-up approximately

(1) one-in-ten of the patients classified by the instrument as “low” risk of violence committed a

violent act; and (2) one-in-two of the patients classified by the instrument as “high” risk of

violence committed a violent act. This difference was highly statistically significant.

Contrast this actual validation study of an instrument to assess the risk of common

violence with a hypothetical validation study of an instrument to assess the risk of terrorism. For

example, consider the validation of a terrorism risk assessment instrument to be used in deciding

whether to release from detention an individual found to have committed such an act—what was

earlier called terrorism as crime. Three questions immediately come to mind:

Where does one find 700 people who have committed an act of terrorism to whom

the terrorism risk assessment instrument could be administered?

When does it happen that virtually all (99.6%) of the people adjudicated as

terrorists are released into the community in a short period of time?

How does one locate, interview, and obtain official data concerning the great

majority (89%) of those terrorists who have been released into the community, in

order to determine whether or not they have, in fact, committed a new act of

terrorism?

As stated by the National Research Council (2010, p. 33), “One reason that the area of

counterterrorism… has so few evaluation studies is the fact that terrorist activities, unlike

criminal activities, are rare. Thus researchers have relatively little information to work with.” A

second reason is that the cost of a false negative prediction—concluding that an individual will

be safe when in fact he or she goes on to commit a violent act—while often high in the case of

common violence, may be catastrophically higher in the case of violent terrorism. No one wants

to be the risk assessor who recommended the release of a detainee—or the promotion of a

military officer, or the hiring of a civilian contractor—who later flies a plane into a building (see

Tetlock & Mellers (2011) on “accountability ping-pong,” and McGraw, Todorov, & Kunreuther

(2011) on “preventing terrorism or preventing blame”).

For the reasons given above, it is difficult to avoid the conclusion that in no real-world

national security context can an instrument to assess the risk of terrorism be prospectively

validated in the same manner that risk assessment instruments for common violence are

prospectively validated. That is, in no real-world national security context can an instrument to

assess the individual risk of terrorism be prospectively validated by

Running head: INDIVIDUAL RISK ASSESSMENT OF TERRORISM 28

administering the risk assessment instrument to large groups of people in either a

terrorism as crime or a terrorism as workplace violence context, and

releasing a large portion of these individuals from detention—including those

who score as “high” risk of terrorism on the instrument—or employing them as

members of the U.S. military or as DoD civilian contractors, and

monitoring their behavior to determine which ones commit terrorist acts and

which ones do not, in order to determine whether the instrument is able to

statistically distinguish the former from the latter.

This, as the saying goes, is not going to happen.

If prospective validation is not remotely feasible, “known group” validation methods

(Cronbach & Meehl, 1955; DeVellis, 2011) may be the most that can realistically be achieved

when validating risk factors for terrorism—singly, or aggregated into a risk assessment

instrument. In a known-group validation, the researcher would (a) measure the presence of a

putative risk factor among a group of people known to be terrorists, and (b) measure the presence

of the same putative risk factor among a matched group of people from the same population who

are known not to be terrorists, and (c) compare the prevalence of the putative risk factor between

the two groups. If the prevalence rates of the putative risk factor do not differ to a statistically

significant degree, the researcher can conclude that the putative risk factor is in fact not a valid

risk factor for terrorism. If the prevalence rates of the two groups are statistically significantly

different from one another, the researcher can conclude that the putative risk factor fulfills at

least one of the two criteria for being a valid risk factor set forth by Kraemer et al (1997): it

correlates with the outcome. Whether the putative risk factor fulfills the other Kraemer et al

criterion for being a valid risk factor—did it precede the outcome in time?—would still need to

be established. For example, if a certain ideological commitment, or a given moral emotion,

became manifest in terrorists only after they had already become terrorists, that commitment or

emotion would not be a risk factor for initiation into terrorism.

There may be few viable alternatives to relying on known-group methods to validate risk

factors for terrorism. If this is the case, an infrastructure for facilitating researchers’ access to

known groups of terrorists17

and non-terrorists from the same populations may be crucial for

conducting a program of research on the individual risk assessment of terrorism (see Horgan,

2011). This research should be stringently governed by applicable legal and ethical standards

(Kennedy & Williams, 2011).

Conclusions

This article attempted to identify the most important conceptual and methodological

challenges that must be overcome if the risk assessment of terrorism is to make the same

17

As examples of “known groups” of detained terrorists, the Federal Bureau of Prisons (2010) houses “216

individuals with a history of or nexus to international terrorism.” In addition, 172 people are detained as enemy

combatants at the U.S. Naval Base in Guantanamo Bay, Cuba (Savage et al, 2011), and approximately 1,800 people

are detained in the Parwan Detention Facility in Bagram, Afghanistan (Hennessy-Fiske, 2011).

Running head: INDIVIDUAL RISK ASSESSMENT OF TERRORISM 29

progress that in recent years has distinguished the risk assessment of other forms of violence.

Four principal conclusions are offered.

First, clarity from the outset on what risk we are trying to assess—the risk of terrorism in

the aggregate, or of specific types of terrorism, or of specific phases in the process of becoming a

terrorist, or of specific roles in terrorist activity—is a prerequisite to progress in research.

Second, one current approach to the risk assessment of common violence—structured

professional judgment—usefully may be applied to the risk assessment of terrorism. However,

given that many known risk factors for common violence are not risk factors for terrorism, the

substantive content of any instrument to assess the risk of terrorism will be very different from

the substantive content of existing instruments that address common violence.

Third, since there is little evidence supporting the non-trivial validity of any individual

risk factors for terrorism, the highest priority for research should be the identification of robust

individual risk factors. Promising candidates include ideologies, affiliations, grievances, and

moral emotions.

Finally, it is highly unlikely that an instrument to assess the risk of terrorism can be

validated prospectively. An infrastructure for facilitating access to known groups of terrorists

and non-terrorists from the same populations may be crucial for conducting a scientifically

rigorous and operationally relevant program of research on the individual risk assessment of

terrorism.

Running head: INDIVIDUAL RISK ASSESSMENT OF TERRORISM 30

References

Andrews, D., Bonta, J., & Wormith, J. (2004). Manual for the Level of Service/Case

Management Inventory (LS/CMI). Toronto: Multi-Health Systems.

Appelbaum, P., & Gutheil, T. (2007). Clinical handbook of psychiatry and the law. 4th Ed.

Philadelphia: Wolters Kluwer.

Atran, S. (2002). In gods we trust: The evolutionary landscape of religion. New York:

Oxford University Press.

Atran, S. (2003). Genesis of suicide terrorism. Science, 299, 1534-1539. doi:

10.1126/science.1078854

Atran, S., Axelrod, R. & Davis, R. (2007). Sacred barriers to conflict resolution. Science,

317, 1039-1041. doi: 10.1126/science.1144241

Atran, S. (2008, March 12). The making of a terrorist: A need for understanding from the

field. Testimony before the House Appropriations Subcommittee on Homeland Security.

Washington, DC. Retrieved from

http://sitemaker.umich.edu/satran/files/atran_congress_12march08.pdf

Bakker, E. (2006). Jihadi terrorists in Europe their characteristics and the circumstances

in which they joined the jihad: An exploratory study. The Hague: Netherlands Institute of

International Relations. Retrieved from

http://www.clingendael.nl/publications/2006/20061200_cscp_csp_bakker.pdf

Barling, J., Dupre, K., & Kelloway, E. (2009). Predicting workplace aggression and

violence. Annual Review of Psychology, 60, 671-692. doi:

10.1146/annurev.psych.60.110707.163629

Bergen, P., Tiedemann, K., & Lebovich, A. (2011, January 11). How many Gitmo alumni

take up arms? Foreign Policy. Retrieved from

http://www.foreignpolicy.com/articles/2011/01/11/how_many_gitmo_alumni_take_up_arms

Berko, A., Erez, E., & Globokar, J. (2010). Gender, crime and terrorism: The case of

Arab/Palestinian women in Israel. British Journal of Criminology, 50, 670-689. doi:

10.1093/bjc/azq013

Bhatt, S., & Brandon, S. (2009). Review of voice stress based technologies for the

detection of deception. Unpublished manuscript.

Blumstein, A., Cohen, J., Roth, J., & Visher, C. (Eds.). (1986). Career careers and

“career criminals” (Vol. 1). Washington, DC: National Academy Press.

Bond, C., & DePaulo, B. (2008). Individual differences in judging deception: Accuracy

and bias. Psychological Bulletin, 134, 477-492. doi: 10.1037/0033-2909.134.4.477

Running head: INDIVIDUAL RISK ASSESSMENT OF TERRORISM 31

Borum, R. (2011). Understanding terrorist psychology. In A. Silke (Ed.), The psychology

of counter-terrorism (pp. 19-33). London: Routledge.

Borum, R. (in press a). Radicalization and involvement in violent extremism I: A review

of definitions and applications of social science theories. Journal of Strategic Security.

Borum, R. (in press b). Radicalization and involvement in violent extremism II: A review

of conceptual models and empirical research. Journal of Strategic Security.

Bosson, J., & Vandello, J. (2011). Precarious manhood and its links to action and

aggression. Current Directions in Psychological Science, 20, 82-86. doi:

10.1177/0963721411402669

Brandon, S. E. (2011). Impacts of psychological science on national security agencies

post-9/11. American Psychologist, 66, 495-506. doi: 10.1037/a0024818

Bulling, D., & Scalora, M. (2008). Behavioral science guidelines for assessing insider

threats. Retrieved from

http://ppc.nebraska.edu/userfiles/file/Documents/projects/ThreatAssessment/BehavScienceGuide

linesforInsiderThreat.pdf

Burke, B., Martens, A., & Faucher, E. (2010). Two decades of terror management theory:

A meta-analysis of mortality salience research. Personality and Social Psychology Review, 14,

155-195. doi: 10.1177/1088868309352321

Chatard, A., Arndt, J., & Pyszczynski, T. (2010). Loss shapes political views? Terror

management, political ideology, and the death of close others. Basic and Applied Social

Psychology, 32, 2-7. doi: 10.1080/01973530903539713

Choi, J., & Bowles, S. (2007). The coevolution of parochial altruism and war. Science,

318, 363-640. doi: 10.1126/science.1144237

Commission on Wartime Contracting in Iraq and Afghanistan. (2009). Interim report to

Congress: At what cost? Contingency contracting in Iraq and Afghanistan. Retrieved from

http://www.wartimecontracting.gov/docs/CWC_Interim_Report_At_What_Cost_06-10-09.pdf

Commission on Wartime Contracting in Iraq and Afghanistan. (2011). Transforming

wartime contracting: Controlling costs, reducing risks—Final report to Congress. Retrieved

from http://www.wartimecontracting.gov/docs/CWC_FinalReport-lowres.pdf

Cornell, D. (2009). Recommended practices for Virginia college threat assessment.

Virginia Department of Criminal Justice Services’ School Safety Center. Richmond, Virginia.

Retrieved from http://youthviolence.edschool.virginia.edu/threat-assessment/pdf/college-threat-

recommended-practices.pdf

Crenshaw, M. (1981). The causes of terrorism. Comparative Politics, 13, 379-399. doi:

10.2307/421717

Running head: INDIVIDUAL RISK ASSESSMENT OF TERRORISM 32

Crenshaw, M. (1990). Questions to be answered, research to be done, knowledge to be

applied. In W. Reich (Ed.), Origins of terrorism: Psychologies, ideologies, theologies, states of

mind (pp. 247-269). New York: Cambridge University Press.

Crenshaw, M. (2007). Explaining suicide terrorism: A review essay. Security Studies,

16, 133-162. doi: 10.1080/09636410701304580

Cronbach, L. J., & Meehl, P. H. (1955). Construct validity in psychological tests.

Psychological Bulletin, 52, 281-302. doi: 10.1037/h0040957

Davis, P., & Cragin, K. (Eds.). (2009). Social science for counterterrorism: Putting the

pieces together. Santa Monica: Rand National Defense Research Institute. Retrieved from

http://www.rand.org/pubs/monographs/2009/RAND_MG849.pdf

Denbeaux, M. & Denbeaux, J. (2006). No-hearing hearings. CSRT: The modern habeas

corpus? Retrieved from

http://law.shu.edu/publications/guantanamoReports/final_no_hearing_hearings_report.pdf

Department of Defense (2006). Instruction Number 2310.08E. Medical program support

for detainee operations. Retrieved from

http://www.dtic.mil/whs/directives/corres/pdf/231008p.pdf

Department of Defense (2010a). DOD dictionary of military and associated terms.

Retrieved from http://www.dtic.mil/doctrine/dod_dictionary/data/t/7591.html

Department of Defense (2010b). Protecting the force: Lessons from Fort Hood—Report

of the Department of Defense Independent Review. Retrieved from

http://www.defense.gov/pubs/pdfs/DOD-ProtectingTheForce-Web_Security_HR_13jan10.pdf

Dernevik, M., Beck, A., Grann, M., Hogue, T. & McGuire, J. (2009a). The use of

psychiatric and psychological evidence in the assessment of terrorist offenders. Journal of

Forensic Psychiatry & Psychology, 20, 508-515. doi: 10.1080/13501760902771217

Dernevik, M., Beck, A., Grann, M., Hogue, T., & McGuire, J. (2009b). A response to Dr.

Gudjonsson’s commentary. Journal of Forensic Psychiatry & Psychology, 20, 520-522. doi:

10.1080/13501760902771258

DeVellis, R.F. (2011). Scale development: Theory and applications (3rd ed.). Thousand

Oaks, CA: Sage Publications.

Dishman, C. (2001). Terrorism, crime, and transformation. Studies in Conflict and

Terrorism, 24, 43-58. doi: 10.1080/10576100118878

Ekman, P. (2007). Emotions revealed: Recognizing faces and feelings to improve

communication and emotional life. New York: Holt.

Running head: INDIVIDUAL RISK ASSESSMENT OF TERRORISM 33

Evans, J., Meissner, C., Brandon, S., Russano, M., & Kleinman, S. (2010). Criminal

versus HUMINT Interrogations: The Importance of Psychological Science to Improving

Interrogative Practice. Journal of Psychiatry and Law, 38, 215-249.

Federal Bureau of Prisons (2010). State of the Bureau 2009. Retrieved from

http://www.bop.gov/news/PDFs/sob09.pdf

Fein, R.A., & Vossekuil, B.V. (1999). Assassination in the United States: An operational

study of recent assassins, attackers, and near-lethal approachers. Journal of Forensic Sciences,

44, 321-333.

Felter, J., & Brachman, J. (2007). CTC report: An assessment of 516 combatant status

review tribunal (CSRT) unclassified summaries. Retrieved from

http://www.ctc.usma.edu/csrt/CTC-CSRT-Report-072407.pdf

Fessler, D., & Navarrete, C. (2005) The effect of age on death disgust: Challenges to

Terror Management perspectives. Evolutionary Psychology, 3, 279-296.

Fischhoff, B. (2011). Communicating about the risks of terrorism (or anything else).

American Psychologist, 66, 520-531. doi: 10.1037/a0024570

Forst, B. (2008). Terrorism, crime and public policy. Cambridge, UK: Cambridge

University Press.

Gartenstein-Ross, D., & Grossman, L. (2009). Homegrown terrorists in the U.S. and U.K.

An empirical examination of the radicalization process. Foundation for Defense of

Democracies, Center for Terrorism Research. Retrieved from

http://www.defenddemocracy.org/downloads/HomegrownTerrorists_USandUK.pdf

Gill, P. & Young, J. (2011). Comparing role-specific terrorist profiles. Retrieved from

http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1782008

Ginges, J., & Atran (2009a). Noninstrumental reasoning over sacred values: An

Indonesian case study. Psychology of Learning and Motivation, 50, 193-206. doi:

10.1016/S0079-7421(08)00406-4

Ginges, J. & Atran, S. (2009b). What motivates participation in violent political action:

Selective incentives or parochial altruism? Annals of the New York Academy of Sciences, 1167,

115-123. doi: 10.1111/j.1749-6632.2009.04543.x

Ginges, J. & Atran, S. (2011). War as a moral imperative (not just practical politics by

other means). Proceedings of The Royal Society B. doi:10.1098/rspb.2010.2384.

Ginges, J., Atran, S., Medin, D., & Shikaki, K. (2007). Sacred bounds on rational

resolution of violent political conflict. Proceedings of the National Academy of Sciences, 104,

7357-7360. doi: 10.1073/pnas.0701768104

Ginges, J., Atran, S., Sachdeva, S., & Medin, D. (2011). Psychology out of the

Running head: INDIVIDUAL RISK ASSESSMENT OF TERRORISM 34

laboratory: The challenge of violent extremism. American Psychologist, 66, 507-519. doi:

10.1037/a0024715

Ginges, J., Hansen, I., & Norenzayan, A. (2009). Religion and support for suicide attacks.

Psychological Science, 20, 224-230. doi: 10.1111/j.1467-9280.2009.02270.x

Ginges, J., Hansen, I., & Norenzayan, A. (2010). Religious belief, coalitional

commitment, and support for suicide attacks: Response to Liddle, J., Machluf, K., &

Shackelford, T. Evolutionary Psychology, 8, 346-349.

Goldson, B. (2011). Youth in crisis?: 'Gangs', territoriality and violence. New York:

Routledge.

Government Accountability Office (2006). Military operations: Background screenings

of contractor employees supporting deployed forces may lack critical information, but U.S.

forces take steps to mitigate the risk contractors may pose. Retrieved from

http://www.gao.gov/products/GAO-06-999R

Government Accountability Office (2009). Contingency contract management DOD

needs to develop and finalize background screening and other standards for private security

contractors. Retrieved from http://www.gao.gov/products/GAO-09-351

Graham, J., & Haidt, J. (2010). Beyond beliefs: Religions bind individuals into moral

communities. Personality and Social Psychology Review, 14, 140-150. doi:

10.1177/1088868309353415

Gudjonsson, G. (2009). The assessment of terrorist offenders: a commentary on the

Dernevik et al. article and suggestions for future directions. Journal of Forensic Psychiatry &

Psychology, 20, 516-519. doi: 10.1080/13501760902771233

Haidt, J. (2003). The moral emotions. In R. J. Davidson, K. R. Scherer, & H. H.

Goldsmith (Eds.), Handbook of affective sciences (pp. 852-870). Oxford: Oxford University

Press.

Haidt, J. (2007). The new synthesis in moral psychology. Science, 316, 998-1002. doi:

10.1126/science.1137651

Haidt, J. (2012). The righteous mind: Why people are divided by politics and religion.

New York: Pantheon Books.

Haidt, J., & Kesebir, S. (2010). Morality. In S. Fiske & D. Gilbert (Eds.), Handbook of

social psychology, 5th ed (pp.797-832). Hoboken: Wiley.

Haidt, J., McCauley, C., & Rozin, P. (1994). Individual differences in sensitivity to

disgust: A scale sampling seven domains of disgust elicitors. Personality and Individual

Differences, 16, 701-713. doi: 10.1016/0191-8869(94)90212-7

Running head: INDIVIDUAL RISK ASSESSMENT OF TERRORISM 35

Hart, S. D. (2009). Evidence-based assessment of risk for sexual violence. Chapman

Journal of Criminal Justice, 1, 143-165.

Hart, S. D., & Boer, D. P. (2010). Structured professional judgment guidelines for sexual

violence risk assessment: The Sexual Violence Risk–20 (SVR-20) and Risk for Sexual Violence

Protocol (RSVP). In R. K. Otto & K. S. Douglas (Eds.), Handbook of violence risk assessment

tools (pp. 269-294). Milton Park, UK: Routledge.

Hart, S., & Logan, C. (in press). Formulation of violence risk using evidence-based

assessments: The Structured Professional Judgment approach. In P. Sturmey & M. McMurran

(Eds.), Forensic case formulation. Chichester, UK: Wiley Blackwell.

Heilbrun, K. (1997). Prediction versus management models relevant to risk assessment:

The importance of legal decision-making context. Law and Human Behavior, 21, 347-359. doi:

10.1023/A:1024851017947

Heilbrun, K., Wolbransky, M., Shah, S., & Kelly, R. (2010). Risk communication of

terrorist acts, natural disasters, and criminal violence: Comparing the processes of understanding

and responding. Behavioral Sciences and the Law, 28, 717–729. doi: 10.1002/bsl.940

Hennessy-Fiske, M. (2011, May 11). Review board weighs in on Afghan detainees. Los

Angeles Times, p. A1.

Hewitt, C. (2003). Understanding terrorism in America: From the Klan to al Qaeda.

New York: Routledge.

Hilton, N., Harris, G., & Rice, M. (2009). Risk assessment for domestically violent men:

Tools for criminal justice, offender intervention, and victim services. Washington DC: American

Psychological Association.

Hodson, G., & Costello, K. (2007). Interpersonal disgust, ideological orientations, and

dehumanization as predictors of intergroup attitudes. Psychological Science, 18, 691-698. doi:

10.1111/j.1467-9280.2007.01962.x

Hoffman, B. (2006). Inside terrorism: Revised and expanded Edition. New York:

Columbia University Press.

Hoffmann, J., Meloy, J., Guldimann, A. & Ermer, A. (2011). Attacks on German public

figures, 1968-2004: Warning behaviors, potentially lethal and non-lethal acts, psychiatric status,

and motivations. Behavioral Sciences and the Law. doi: 10.1002/bsl.979

Homeland Security Advisory Council (2007). Report on the future of terrorism task

force. Retrieved from http://www.dhs.gov/xlibrary/assets/hsac-future-terrorism-010107.pdf

Horgan, J. (2005). The psychology of terrorism. London: Routledge. doi:

10.4324/9780203496961

Running head: INDIVIDUAL RISK ASSESSMENT OF TERRORISM 36

Horgan, J. (2008). From profiles to pathways and roots to routes: Perspectives from

psychology on radicalization into terrorism. Annals of the American Association of Political and

Social Sciences, 618, 80-94. doi: 10.1177/0002716208317539

Horgan, J. (2011). Interviewing the terrorists: Reflections on fieldwork and implications

for psychological research. Behavioral Sciences of Terrorism and Political Aggression.

Retrieved from http://www.tandfonline.com/doi/abs/10.1080/19434472.2011.594620#preview

Horgan, J., & Braddock, K. (2010). Rehabilitating the terrorists?: Challenges in assessing

the effectiveness of de-radicalization programs. Terrorism and Political Violence, 22, 267-291.

doi: 10.1080/09546551003594748

Hutcherson, C. & Gross, J. (2011). The moral emotions: A social-functionalist account

of anger, disgust, and contempt. Journal of Personality and Social Psychology, 200, 719-737.

doi: 10.1037/a0022408

James, D., Meloy, J., Mullen, P., Pathe, M., Farnham, R., Preston, L. & Darnley, B.

(2010). Abnormal attentions toward the British royal family: Factors associated with approach

and escalation. Journal of the American Academy of Psychiatry and the Law, 38, 329-340.

James, D., Mullen, P., Meloy, J., Pathe, M., Farnham, F., Preston, L., & Darnley, B.

(2007). The role of mental disorder in attacks on European politicians 1990–2004. Acta

Psychiatrica Scandinavica, 116, 334-344. doi: 10.1111/j.1600-0447.2007.01077.x

Kahneman, D., & Klein, G. (2009). Conditions for intuitive expertise: A failure to

disagree. American Psychologist, 64, 515-526. doi: 10.1037/a0016755

Karagiannis, M., & McCauley, C. (2006). Hizb ut-Tahir al-Islami: Evaluating the threat

posed by a radical Islamic group that remains nonviolent. Terrorism and Political Violence, 18,

315-334. doi: 10.1080/09546550600570168

Kennedy, K., Borum, R., & Fein, R. (2011). Ethical dilemmas in psychological

consultation to counterintelligence and counterterrorism activities. In C. Kennedy & T. Williams

(Eds.), Ethical practice in operational psychology: Military and national intelligence

applications (pp. 69-83). Washington, D.C.: American Psychological Association. doi:

10.1037/12342-004

Kennedy, C., & Williams, T. (Eds.). (2011). Ethical practice in operational psychology:

Military and national intelligence applications. Washington, D.C.: American Psychological

Association.

Kokdemir, D., & Yeniceri, Z. (2010). Terror management in a predominantly Muslim

country: The effects of mortality salience on university identity and on preference for the

development of international relations. European Psychologist, 15, 165-174. doi: 10.1027/1016-

9040/a000012

Kraemer, H., Kazdin, A., Offord, D., Kessler, R., Jensen, P., & Kupfer, D. (1997).

Coming to terms with the terms of risk. Archives of General Psychiatry, 54, 337-343.

Running head: INDIVIDUAL RISK ASSESSMENT OF TERRORISM 37

Kroner, D., Mills, J., & Reddon, J. (2005). A coffee can, factor analysis, and prediction of

antisocial behavior: The structure of criminal risk. International Journal of Law & Psychiatry, 28,

360-374. doi: 10.1016/j.ijlp.2004.01.011

Krueger, A., & Maleckova, J. (2002, June 24). Does poverty cause terrorism? The New

Republic, pp. 27-33.

Kruglanski, A., Chen, X., Dechesne, M., Fishman, S., & Orehek, E. (2009). Fully

committed: Suicide bombers’ motivation and the quest for personal significance. Political

Psychology, 30, 331-357. doi: 10.1111/j.1467-9221.2009.00698.x

Kruglanski, A., Crenshaw, M., Post, J., & Victoroff, J. (2008). What should this fight be

called? Metaphors of counterterrorism and their implications. Psychological Science in the

Public Interest, 8, 97-133. doi: 10.1111/j.1539-6053.2008.00035.x

Kruglanski, A., & Fishman, S. (2006). Terrorism: Between “syndrome” and “tool”.

Current Directions in Psychological Science, 15, 45-48. doi: 10.1111/j.0963-7214.2006.00404.x

Kruglanski, A., Gelfand, M., & Gunaratna, R. (2010, January). Detainee de-

radicalization: A challenge for psychological science. APS Observer, pp. 1-4.

Kurzman, C. (2011). The missing martyrs: Why there are so few Muslim terrorists. New

York: Oxford University Press.

LaFree, G. & Ackerman, G. (2009). The empirical study of terrorism: Social and legal

research. Annual Review of Law and Social Science, 5, 347-374. doi:

10.1146/annurev.lawsocsci.093008.131517

LaFree, G. & Dugan, L. (2004). How does studying terrorism compare to studying

crime? In M. DeFlem (Ed.), Terrorism and counter-terrorism: Criminological perspectives ( p.

53-74). New York: Elsevier.

LaFree, G., & Dugan, L. (2009). Research on terrorism and countering terrorism. Crime

and Justice, 38, 413-477.

Lankford, A. (2010). Do suicide terrorists exhibit clinically suicidal risk factors? A

review of initial evidence and call for future research. Aggression and Violent Behavior, 15,

334-340. doi: 10.1016/j.avb.2010.06.001

Leuprecht, C., Hataley, T., Moskalenko, S., & McCauley, C. (2009). Winning the battle

but losing the war? Narrative and counter-narratives strategy. Perspectives on Terrorism, 3, 25-

35.

Leuprecht, C., Hataley, T., Moskalenko, S., & McCauley, C. (2010). Containing the

narrative: Strategy and tactics in countering the storyline of global jihad. Journal of Policing,

Intelligence and Counter Terrorism, 5, 42-57. doi: 10.1080/18335300.2010.9686940

Running head: INDIVIDUAL RISK ASSESSMENT OF TERRORISM 38

Liddle, J., Bush, L. & Shackelford, T. (2011). An introduction to evolutionary

psychology and its application to suicide terrorism. Behavioral Sciences of Terrorism and

Political Aggression, 3, 176-197. doi: 10.1080/19434472.2010.512157

Liddle, J., Machluf, K., & Shackelford, T. (2010). Understanding suicide terrorism:

Premature dismissal of the religious-belief hypothesis. Evolutionary Psychology, 8, 343-345.

Lidz, C., Mulvey, E., & Gardner, W. (1993). The accuracy of predictions of violence to

others. Journal of the American Medical Association, 269, 1007-1011. doi:

10.1001/jama.269.8.1007

Loftus, E. F. (2011). Intelligence gathering post-9/11. American Psychologist, 66, 532-

541. doi: 10.1037/a0024614

Matsumoto, D. (2005). Scalar ratings of contempt expressions. Journal of Nonverbal

Behavior, 29, 91-104. doi: 10.1007/s10919-005-2742-0

Matsumoto, D. (2010). The role of emotion in escalating violent non-state actors to

hostility. In L. Fenstermacher (Ed.), Protecting the homeland from international and domestic

terrorism threats: Current multi-disciplinary perspectives on root causes, the role of ideology,

and programs for counter-radicalization and disengagement. U. S. Government Interagency

White Paper. Retrieved from

http://www.start.umd.edu/start/publications/U_Counter_Terrorism_White_Paper_Final_January

_2010.pdf

McCauley, C. (2007). Psychological issues in understanding terrorism and the response

to terrorism. In B. Bongar, L. Brown, L. Beutler, J. Breckenridge, & P. Zimbardo (Eds.),

Psychology of Terrorism. New York: Oxford University Press.

McCauley, C., & Moskalenko, S. (2010). Individual and group mechanisms of

radicalization. In L. Fenstermacher (Ed.), Protecting the homeland from international and

domestic terrorism threats: Current multi-disciplinary perspectives on root causes, the role of

ideology, and programs for counter-radicalization and disengagement. U. S. Government

Interagency White Paper. Retrieved from

http://www.start.umd.edu/start/publications/U_Counter_Terrorism_White_Paper_Final_January

_2010.pdf

McCauley, C., & Moskalenko, S. (2011). Friction: How radicalization happens to them

and us. New York: Oxford University Press.

McCauley, C., & Segal, M. (1987). Social psychology of terrorist groups. In C. Hendrick

(Ed.), Review of Personality and Social Psychology, Vol. 9 (pp. 231-256). Beverly Hills, CA:

Sage.

McCormick, G. (2003). Terrorist decision making. Annual Review of Political Science,

6, 473-507. doi: 10.1146/annurev.polisci.6.121901.085601

Running head: INDIVIDUAL RISK ASSESSMENT OF TERRORISM 39

McDermott, B., Dualan, I., & Scott, C. (2011). The predictive ability of the Classification

of Violence Risk (COVR) in a forensic psychiatric hospital. Psychiatric Services, 62, 430-433.

doi: http://dx.doi.org/10.1176/appi.ps.62.4.430

McGraw, A., Todorov, A., & Kunreuther, H. (2011). A policy maker’s dilemma:

Preventing terrorism or preventing blame. Organizational Behavior and Human Decision

Processes, 115, 25-34.

Meehl, P. (1954). Clinical versus statistical prediction: A theoretical analysis and a review of

the evidence. Minneapolis: University of Minnesota. doi: 10.1037/11281-000

Merari, A. (2005). Social, organizational and psychological factors in suicide terrorism.

In T. Bjorgo (Ed.), Root causes of terrorism: Myths, reality and ways forward (pp. 70-89).

London: Routledge. doi: 10.4324/9780203337653_chapter_6

Merari, A. (2010). Driven to death: Psychological and social aspects of suicide

terrorism. New York: Oxford University Press.

Merari, A., & Friedland, N. (1985). Social psychological aspects of political terrorism. In

S. Oscamp (Ed.), International conflict and national public policy issues: Applied social

psychology annual, Vol. 6 (pp. 185-205). Beverly Hills: Sage Publications.

Miller, L. (2006). The terrorist mind: II. Typologies, psychopathologies, and practical

guidelines for investigations. International Journal of Offender Therapy and Comparative

Criminology, 50, 255-268. doi: 10.1177/0306624X0528140

Monahan, J. (2006). A jurisprudence of risk assessment: Forecasting harm among prisoners,

predators, and patients. Virginia Law Review, 92, 391-435.

Monahan, J, Steadman, H., Robbins, P., Appelbaum, P., Banks, S., Grisso, T., Heilbrun,

K., Mulvey, E., Roth, L., & Silver, E. (2005). An actuarial model of violence risk assessment for

persons with mental disorders. Psychiatric Services, 56, 810-815.

Monahan, J., Steadman, H., Silver, E., Appelbaum, P., Robbins, P., Mulvey, E., Roth, L.,

Grisso, T., & Banks, S. (2001). Rethinking risk assessment: The MacArthur study of mental

disorder and violence. New York: Oxford University Press.

Monahan, J. & Walker, L. (2010). Social science in law: Cases and materials (7th

ed).

New York: Foundation Press.

Monahan, J., and Walker, L. (2011). Twenty-five years of Social Science in Law. Law

and Human Behavior, 35, 72-82. doi: 10.1007/s10979-009-9214-8

Moskalenko, S., & McCauley, C. (2011). The psychology of lone-wolf terrorism.

Counseling Psychology Quarterly, 24, 115-126. doi: 10.1080/09515070.2011.581835

Mossman, D. (1994). Assessing predictions of violence: Being accurate about accuracy.

Journal of Consulting and Clinical Psychology, 62, 783–792.

Running head: INDIVIDUAL RISK ASSESSMENT OF TERRORISM 40

National Research Council (2003). The polygraph and lie detection. Retrieved from

http://www.nap.edu/openbook.php?isbn=0309084369

National Research Council (2010). Field evaluation in the intelligence and

counterintelligence context: Workshop summary. Retrieved from

http://www.nap.edu/openbook.php?record_id=12854&page=R1

National Science and Technology Council. (2005). Combating terrorism: Research

priorities in the social, behavioral and economic sciences. Washington, DC: Executive Office of

the President.

Navarrete C., & Fessler, D. (2005). Normative bias and adaptive challenges: A relational

approach to coalitional psychology and a critique of Terror Management Theory. Evolutionary

Psychology, 3, 297-325.

Newman, J., Curtin, J., Bertsch, J., & Baskin-Sommers, A. (2009). Attention moderates

the fearlessness of psychopathic offenders. Biological Psychiatry, 67, 66-70. doi:

10.1016/j.biopsych.2009.07.035

Nibbett, R., & Cohen, D. (1996). The culture of honor: The psychology of violence in the

South. Boulder, CO: Westview Press.

Novaco, R. W. (1994). Assessing anger among mentally disordered persons as a risk for

violence. In J. Monahan and H. Steadman (Eds.), Violence and mental disorder: Developments

in risk assessment (pp. 21-59). Chicago: University of Chicago Press.

Office of the Director of National Intelligence, Summary of the Reengagement of

Detainees Formerly Held at Guantanamo Bay, Cuba (2010). Retrieved from

http://www.dni.gov/electronic_reading_room/120710_Summary_of_the_Reengagement_of_Det

ainees_Formerly_Held_at_Guantanamo_Bay_Cuba.pdf

Olatunji, B., Williams, N., Tolin, D., Sawchuck, C., Abramowitz, J., Lohr, J., & Elwood,

L. (2007). The disgust scale: Item analysis, factor structure, and suggestions for refinement.

Psychological Assessment, 19, 281-297. doi: 10.1037/1040-3590.19.3.281

Pape, R. (2005). Dying to win: The strategic logic of suicide terrorism. New York:

Random House.

Patrick, C. (2010). Conceptualizing the psychopathic personality: Disinhibited, bold, or

just plain mean. In D. Lynam & R. Salekin (Eds.), Handbook of child and adolescent

psychopathy (pp. 15–48). New York: Guilford Press.

Patrick, C., Fowles, D., & Krueger, R. (2009). Triarchic conceptualization of

psychopathy: Developmental origins of disinhibition, boldness, and meanness. Development and

Psychopathology, 21, 913-938. doi: 10.1017/S0954579409000492

Post, J.M. (2007). The mind of the terrorist: The psychology of terrorism from the IRA

to Al Qaeda. New York: Palgrave Macmillan.

Running head: INDIVIDUAL RISK ASSESSMENT OF TERRORISM 41

Pressman, D. E. (2009). Risk assessment decisions for violent political extremism.

Retrieved from http://www.publicsafety.gc.ca/res/cor/rep/_fl/2009-02-rdv-eng.pdf

Pressman, D. E. & Flockton, J. (2010). Risk assessment decisions for violent political

extremism. Consultative Version 2. Unpublished manuscript.

Putnam, R., & Campbell, D. (2010). American grace: How religion divides and unites us.

New York: Simon and Schuster.

Pyszczynski, T., Abdollahi, A., Solomon, S., Greenberg, J., Cohen, F., & Weise, D.

(2006). Mortality salience, martyrdom, and military might: The great Satan versus the axis of

evil. Personality and Social Psychology Bulletin, 32, 525–537.

Pyszczynski, T., Rothschild, Z. & Abdollahi, A. (2008). Terrorism, violence, and hope

for peace: A Terror Management perspective. Current Directions in Psychological Science, 17,

318-322. doi: 10.1111/j.1467-8721.2008.00598.x

Quinsey, V.L., Harris, G.T., Rice, M.E., & Cormier, C.A. (2006). Violent offenders:

Appraising and managing risk (2nd ed). Washington, DC: American Psychological Association.

doi: 10.1037/11367-000

Rai, T. & Fiske, A. (2011). Moral psychology is relationship regulation: Moral motives for

unity, hierarchy, equality, and proportionality. Psychological Review, 118, 57-75. doi:

10.1037/a0021867

Reich, W. (1990). Understanding terrorist behavior: The limits and opportunities of

psychological inquiry. In W. Reich (Ed.), Origins of terrorism: Psychologies, ideologies,

theologies, states of mind (pp. 261-279). New York: Cambridge University Press.

Rieger, T. (2010). The anatomy of a swamp: Predictive factors of different types of

radicalism. In L. Fenstermacher (Ed.), Protecting the homeland from international and domestic

terrorism threats: Current multi-disciplinary perspectives on root causes, the role of ideology,

and programs for counter-radicalization and disengagement. U. S. Government Interagency

White Paper. Retrieved from

http://www.start.umd.edu/start/publications/U_Counter_Terrorism_White_Paper_Final_January

_2010.pdf

Rieger, T. (2011). Not all radicals are the same: Implications for Counter-radicalization

strategy. Gallup Inc. Unpublished manuscript.

Roberts, K., & Horgan, J. (2008). Risk assessment and the terrorist. Perspectives on

Terrorism, 2, 3-9.

Rosenfeld, R. (2003). Why criminologists should study terrorism. Crime & Justice

International, 19, 34-35.

Rozin, P., Haidt, J., & McCauley, C. (2008). Disgust. In M. Lewis, J. M. Haviland-Jones

& L. F. Barrett (Eds.), Handbook of emotions, 3rd ed. (pp. 757-776). New York: Guilford Press.

Running head: INDIVIDUAL RISK ASSESSMENT OF TERRORISM 42

Sageman, M. (2008). Leaderless jihad: Terror in the twenty-first century. Philadelphia:

University of Pennsylvania Press.

Sanchez-Cuenca, I., & de la Calle, L. (2009). Domestic terrorism: The hidden side of

political violence. Annual Review of Political Science, 12, 31-49. doi:

10.1146/annurev.polisci.12.031607.094133

Sandia National Laboratories (2002). Terrorist organizations and criminal street gangs.

Albuquerque, N.M.: Advanced Concept Group. Retrieved from

http://www.au.af.mil/au/awc/awcgate/sandia/terrorism_gang_analogy.pdf

Saucier, G., Akers, L., Shen-Miller, S., Knežević, G., & Stankov, L. (2009). Patterns of

thinking in militant extremism. Perspectives on Psychological Science, 4, 256-271. doi:

10.1111/j.1745-6924.2009.01123.x

Savage, C., Glaberson, W., & Lehren, A. (2011, April 24). Classified files offer new

insights into detainees. New York Times, p. A1. Retrieved from

http://www.nytimes.com/2011/04/25/world/guantanamo-files-lives-in-an-american-

limbo.html?scp=1&sq=Classified%20files%20offer%20new%20insights%20into%20detainees&

st=cse

Schwartz, M. (2010, July 2). Department of Defense contractors in Iraq and Afghanistan:

Background and analysis. Congressional Research Service, pp. 1-25. Retrieved from

http://feraljundi.com/2010/07/19/publications-crs-dod-contractors-in-iraq-and-afghanistan-

background-and-analysis-july-2010/

Shaw, E. (2006). The role of behavioral research and profiling in malicious cyber insider

investigations. Digital Investigation, 3, 20-31. doi: 10.1016/j.diin.2006.01.006

Sherman, G., Haidt, J., & Coan, J. (2010). The psychophysiology of moral disgust: Throat

tightness and heart rate deceleration. Unpublished manuscript.

Silber, M, & Bhatt, A (2007). Radicalization in the west: The homegrown threat. New

York: New York City Police Department. Retrieved from

http://www.nypdshield.org/public/SiteFiles/documents/NYPD_Report-

Radicalization_in_the_West.pdf

Silke, A. (1998). Cheshire-cat logic: The recurring theme of terrorist abnormality in

psychological research. Psychology, Crime and Law, 4, 51-69. doi:

10.1080/10683169808401747

Skeem, J. & Monahan, J. (2011). Current directions in violence risk assessment. Current

Directions in Psychological Science, 20, 38-42. doi: 10.1177/0963721410397271

Smelser, N. (2007). The faces of terrorism: Social and psychological dimensions. Princeton

University Press, 2007.

Running head: INDIVIDUAL RISK ASSESSMENT OF TERRORISM 43

Smith, A. (2008). The implicit motives of terrorist groups: How the needs for affiliation and

power translate into death and destruction. Political Psychology, 29, 55-75. doi: 10.1111/j.1467-

9221.2007.00612.x

Smith, A. (2004). From words to action: Exploring the relationship between a group’s value

references and its likelihood of engaging in terrorism. Studies in Conflict and Terrorism, 27, 409-

437. doi: 10.1080/10576100490483679

Spaaij, R. (2010). The enigma of lone wolf terrorism: An assessment. Studies in Conflict &

Terrorism, 33, 854-870. doi: 10.1080/1057610X.2010.501426

Stankov, L., Higgins., D., Saucier, G., & Knezević G. (2010). Contemporary militant

extremism: a linguistic approach to scale development. Psychological Assessment, 22, 246-58.

doi: 10.1037/a0017372

Stankov, L., Saucier, G., & Knezević G. (2010). Militant extremist mind-set:

Proviolence, vile world, and divine power. Psychological Assessment, 22, 70-86. doi:

10.1037/a0016925

Suttmoeller, M., Chermak, S., Freilich, J., & Fitzgerald, S. (2011). Radicalization and

risk assessment. In L. Kennedy & E. McGarrell (Eds.), Crime and terrorism risk: Studies in

criminology and criminal justice. New York: Routledge.

Taylor, M. (2010). Is terrorism a group phenomenon? Aggression and Violent Behavior,

15, 121-129. doi: 10.1016/j.avb.2009.09.001

Taylor, M., & Horgan, J. (2006). A conceptual framework for addressing psychological

process in the development of the terrorist. Terrorism and Political Violence, 18, 1-17. doi:

10.1080/09546550600897413

Taylor, M. & Quayle, E. (1994). Terrorist lives, London: Brassey.

Tetlock, P. (2002). Social functionalist frameworks for judgment and choice: Intuitive

politicians, theologians, and prosecutors. Psychological Review, 109, 451-471. doi:

10.1037/0033-295X.109.3.451

Tetlock, P. E., & Mellers, B. A. (2011). Intelligent management of intelligence agencies:

Beyond accountability ping-pong. American Psychologist, 66, 542-554. doi: 10.1037/a0024285

Theohary, C., & Rollins, J. (2011, March). Terrorist use of the internet: Information

operations in cyberspace. Congressional Research Service. Retrieved from

http://www.fas.org/sgp/crs/terror/R41674.pdf

Townsend, E. (2007). Suicide terrorists: Are they suicidal? Suicide and Life-Threatening

Behavior, 37, 35-49. doi: 10.1521/suli.2007.37.1.35

Turchie, T. & Puckett, K. (2007). Hunting the homegrown terrorist: The FBI’s war on

homegrown terror. Palisades, NY: History Publishing Company.

Running head: INDIVIDUAL RISK ASSESSMENT OF TERRORISM 44

U.S. Institute of Peace (2006). Briefing paper: Conference on the relationship between

state and non-state justice systems in Afghanistan. Retrieved from

http://www.usip.org/files/file/conference_summary_paper.pdf

U.S. Senate Armed Services Committee (2010). Inquiry into the role and oversight of

private security contractors in Afghanistan. Retrieved from

http://levin.senate.gov/newsroom/supporting/2010/SASC.PSCReport.100710.pdf

Vail, K., Motyl, M., Abdollahi, A., & Pyszczynski, M. (2010). Dying to live: Terrorism,

war, and defending one's way of life. In D. Antonius, A. Brown, T. Walters, J. Ramirez, & S.

Sinclair (Eds.), Interdisciplinary Analyses of Terrorism and Political Aggression (pp. 49-70).

Cambridge, UK: Cambridge University Press.

Victoroff, J. (2005). The mind of the terrorist: A review and critique of psychological

approaches. Journal of Conflict Resolution, 49, 3-42. doi: 10.1177/0022002704272040

Victoroff, J., & Kruglanski, A. (Eds.) (2009). Psychology of terrorism: Classic and

contemporary insights. New York: Psychology Press.

Vladeck, S. (2010). Terrorism trials and the Article III courts after Abu Ali. Texas Law

Review, 88, 1501-1532.

Vrij, A., Granhag, P., Mann, S. & Leal, S. (2011). Outsmarting the liars: Toward a

cognitive lie detection approach. Current Directions in Psychological Science, 20, 28-32. doi:

10.1177/0963721410391245

Wagner, A. (2010). Can neuroscience identify lies? In M. S. Gazzaniga & J. S. Rakoff

(Eds.), A judge's guide to neuroscience: A concise introduction. Santa Barbara: University of

California, Santa Barbara. Retrieved from

http://www.sagecenter.ucsb.edu/A%20Judges%20Guide%20to%20Neuroscience.pdf

Webster, C., Douglas, K., Eaves, D., & Hart, S. (1997). HCR-20: Assessing risk for

violence (Version 2). Vancouver, Simon Fraser University.

Weine, S. (2009, December 15). How are people moved from constitutionally-protected

thoughts to acts of terrorism? Testimony before the Committee on Homeland Security, U.S.

House of Representatives. Retrieved from http://www.hsdl.org/?view&did=29815

Weine, S., Horgan, J., Robertson, C., Loue, S., Mohamed, A., & Noor, S. (2009).

Community and family approaches to combating the radicalization and recruitment of Somali-

American youth and young adults: A psychosocial perspective. Dynamics of Asymmetric

Conflict, 2, 181 – 200.

White, S., & Meloy, J. (2010). The WAVR-21: A structured guide for the workplace

assessment of violence risk (2nd

ed.). San Diego, CA: Specialized Training Services. Retrieved

from http://www.specializedtraining.com/p-77-wavr-21-second-edition.aspx

Running head: INDIVIDUAL RISK ASSESSMENT OF TERRORISM 45

Wittes, B. (2010). Detention and denial: The case for candor after Guantanamo.

Washington, DC: The Brookings Institution. Retrieved from

http://www.brookings.edu/press/Books/2010/detentionanddenial.aspx

Yang, M., Wong, S., & Coid, J. (2010). The efficacy of violence prediction: A meta-

analytic comparison of nine risk assessment tools. Psychological Bulletin, 36, 740-767. doi:

10.1037/a0020473

Zerubavel, E. (1996). Lumping and splitting: Notes on social classification. Sociological

Forum, 11, 421-433. doi: 10.1007/BF02408386

Running head: INDIVIDUAL RISK ASSESSMENT OF TERRORISM 46

Table 1

Sixteen Themes Detected in Statements from Militant-Extremist Groups (from Saucier et al,

2009)

1. One’s own group as tragically obstructed

2. Glorification of the past (especially of one’s group)

3. Utopian thinking

4. Catastrophizing: a focus on calamities in past, present, future

5. Perceived need for unconventional and extreme measures

6. Rationalizations absolving oneself (and one’s group) of responsibility for any harmful

consequences of one’s violence

7. Atypical overextension of military terminology (to all areas of life)

8. Expectation of supernatural intervention

9. Imperative to annihilate evil and purify the world

10. Duty to kill or initiate hostilities

11. Glorification of dying for the cause

12. Machiavellianism in service of the sacred

13. Elevation of intolerance and vengeance to a virtue

14. Dehumanizing one’s adversaries

15. Modernity seen as disastrous

16. Civil government seen as illegitimate