Mitigating the threat of targeted violence: the Terrorist Radicalization Assessment Protocol

Article

Dr. Reid Meloy

Terrorism, specifically lone-actor terrorism, is considered a major national security threat across North America, Australia and Europe. Both the public and private sectors share concerns about this issue, as data indicate lone actors present the most significant risk for a domestic terrorist attack.

The biggest challenge in mitigating this threat of targeted violence lies in the fact that radicalization and the progression toward violence can largely occur online. This means that the process can be quite difficult to detect, especially in the early stages of research and planning for an attack.

Organizations need to develop capacities for both online and on-the-ground intelligence gathering when concerning individuals and behaviors are identified.

In this process, it is crucial to respect privacy rights and constitutional protections inherently entrusted to individuals in functioning democracies.

However, it is also important not to overestimate privacy rights, recognizing that the abundance of open-source intelligence on the internet renders it easily accessible, and that imminent risk of violence typically subsumes privacy rights in most legal situations.

Leveraging Emerging Trends to Counter Targeted Violence

Two major trends are unfolding in this area: teams and tools. Organizations need to enhance their early detection systems, such as leveraging threat assessment protocols, intelligence sharing, and community engagement. Creating multidisciplinary threat management teams and using structured professional judgment instruments to assess risk in individual cases is crucial.
 
Another very promising and new trend is the establishment of regional threat management teams focused on evaluating cross-jurisdictional risks of targeted violence. Effective mitigation of targeted violence requires collaboration among various stakeholders, and encouraging information sharing, coordination, and multi-agency cooperation can help identify potential threats and intervene early.

The origin and function of the Terrorist Radicalization Assessment Protocol-18 ™ (TRAP-18)

Over the past 15 years, as I observed the great difficulty that counterterrorism professionals experienced when they tried to prioritize cases according to both imminency and severity of risk, I began to develop an organizing template for assessing the risk of a terrorist attack, the Terrorist Radicalization Assessment Protocol-18 ™ (TRAP-18).
 
The TRAP-18 provides a means by which mental health, intelligence, law enforcement, and security professionals can organize accumulating operational data on a person of concern. This structured approach aids in determining risk and planning management strategies to reduce the threat of targeted violence.
 
The instrument is designed to code for eight proximal warning behaviors and ten longer term distal characteristics. The TRAP-18 is currently used by counterterrorism experts in North America, Europe, Australia, and South Africa, and among the available tools for assessing individuals under suspicion of terrorist activities, it stands out as the most scientifically validated. 
Research has demonstrated that the TRAP-18 has excellent interrater reliability and promising content, criterion, discriminant, and predictive validity. Comparative and postdictive studies both from my research group and independent sources have shown the TRAP-18’s ability to distinguish between attackers and non-attackers and to provide accurate estimates of risk. Research continues to further validate its effectiveness.

One of our most recent validation efforts was a time sequencing study of 125 lone-actor terrorists, which we did in conjunction with our research colleagues at University College London.

In this research we were able to map the TRAP-18 indicators and show the order in which they are likely to appear in a terrorism case. For example, we know that fixation (preoccupation with a cause) typically precedes identification (seeing oneself as a soldier for the cause). The latter indicator is a powerful predictor of increased risk in a case. In other studies, we have shown how last resort warning behavior – a violent action/time imperative – is a predictor of high risk in terrorism cases.

For more information about TRAP-18, get in touch with MHS at: CustomerService@MHS.com

Dr. J. Reid Meloy is a board-certified forensic psychologist and has been a consultant to the FBI’s Behavioral Analysis Unit for the past two decades. He has been consulting, researching, teaching and writing about personality disorder, psychopathy, stalking, narcissism, criminality, mental disorder, and targeted violence for the past thirty years. Dr. Meloy is co-editor with Dr. Jens Hoffmann of the International Handbook of Threat Assessment (Oxford University Press), which won the Manfred Guttmacher Award from the American Psychiatric Association in 2022. Dr. Meloy is the author of MHS’ Terrorist Radicalization Assessment Protocol-18 ™.

Advertisement

Like / Share:
More stories
Beyond implementing evidence-based practice: Creating rehabilitative experience