Skip to main content

Radicalisation: No Prevention Without ‘Juridicalisation’

  • Chapter
  • First Online:
Investigating Radicalization Trends

Abstract

In Western societies, radicalisation has grown and emerged as a point of interest through academia, law enforcement and the judicial system. This interest has sparked a series of contemporary debates surrounding what prevention methods are deemed most appropriate and should be adopted to tackle radicalisation as a nuanced factor within the judicial sector. This chapter explores this concept through a historical process looking at the emergence of radicalisation and its characteristics from the perspectives of different academic theories. Through an explorative literature and law review, the chapter highlights the most influential socio-psychological theorists in understanding radicalisation, risk management tools and shaping prevention methods to date. What unearths from this discussion is the overlapping of the ageing model of crime prevention through the separation of criminology from jurisprudence with a contemporary model which focuses on risk assessments, surveillance, predictive profiling, administrative practices and the incline of multi-agency public-private partnerships. Through critical analysis, this nuanced prevention/deradicalisation model alongside its methods, projects and tools is comparatively discussed in how it is used by European countries specifically for far-right threats. It also studies debates within academia which assesses their effectiveness both intrinsically and extrinsically for criminal and intelligence analysts, societal members and the overall European society. The analysis highlights the modern intertwining of police and judicial methods of prevention, thus creating a multi-agency approach. It also uncovers a number of issues with the new methods including racial profiling, human rights misconceptions, obtrusiveness of surveillance societies, stretching of police resources and the differences between European countries in tackling extremism, which combined are tarnishing the trust and relationship between the judicial sector and the wider public. In concluding discussions the chapter reflects upon the transition of contemporary prevent strategies and how Western strategies into security and prevention can be understood through: security priorities, hybrid policing models between intelligence services and LEAs, the de-juridicalisation of prevention processes and public-private cooperation.

This research was funded by the DG Justice, project ‘J-S.A.F.E. Judicial Strategy Against all Forms of Violent Extremism in Prison’, in cooperation with the Italian Ministry of Justice, Department of Prison Administration, Triveneto Office.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 99.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 129.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Garland D. describes this process in his The Culture of Control. Crime and Social Order in Contemporary Society , Chicago, University Press, 2001: ‘As recently as 1979, those involved in the business of crime control shared a common set of assumptions about the framework that shaped criminal justice and penal practices. There was a relatively settled, self-conscious, institutional field and the debates and disagreements that occurred operated within well-established boundaries. (…) Today, for better or for worse, we lack any such agreement, any settled culture, or any clear sense of the big picture. Policy development appears highly volatile, with an unprecedented amount of legislative activity, much dissension in the rank of practitioner groups, and a good deal of conflict between experts and politicians’ (Garland 2001: 4).

  2. 2.

    ‘It would be going too far to say that criminal justice suffered a “collapse” or a “breakdown” in the period after the mid-1970s, but there is no doubt that the institutional arrangements of penal-welfarism and, more generally, of modern criminal justice, were undermined and unsettled in these years’ (Garland 2001: 104).

  3. 3.

    ‘SCP is based upon the idea that crime is a rational decision (SCP theorists will then advance the concept of “rationality of irrationality” or “bounded rationality”), designed to weigh the risks and benefits for the offender, and how in the absence of effective controls, offenders will focus on suitable targets. Routine activity theory relies on the occurrence of three key characteristics: a motivated offender, a suitable victim, and a lack of control. Crime Pattern Theory, as developed by Pat and Paul Brantingham, is a complex way of explaining why crimes are committed in certain areas’ (Bianchi 2018: 14).

  4. 4.

    ‘The events of the late 1980s may have consigned Marx and Engels to the scrapheap of failed ideologies, but their description of capitalist modernity in the Communist Manifesto remains as true today as it ever was’ (Garland 2001: 79).

  5. 5.

    ‘Private prisons, victim impact statements, community notification laws, sentencing guidelines, electronic monitoring, punishment in the community, “quality of life” policing, restorative justice—these and dozens of other developments lead us into unfamiliar territory where the ideological lines are far from clear and where the old assumptions are an unreliable guide’ (Garland 2001: 4).

  6. 6.

    ‘Criminological theory is of little help in dealing with crime in the real world because it finds causes in distant factors, such as child rearing practices, genetic makeup, and psychological or social processes. These are mostly beyond the reach of everyday practice, and their combination is extremely complicated for those who want to understand crime, and do something about it’ (Clarke and Eck 2008).

  7. 7.

    ‘Primary crime prevention identifies conditions of the physical and social environment that provide opportunities for precipitate criminal acts. Here the objective of intervention is to alter those conditions so that crimes cannot occur. Secondary crime prevention engages in early identification of potential offenders and seeks to intervene in their lives in such a way that they never commit criminal violations. Tertiary crime prevention deals with actual offenders and involves intervention in their lives in such a fashion that they will not commit further offences’ (Brantingham and Faust 1976: 290).

  8. 8.

    The New York Police Department (NYPD), Radicalization in the West: The Homegrown Threat (NYPD 2007: 21), was the first linear predictive model aimed at detecting the emergence of radicalisation phenomena. We used this method in our Bianchi S., Jihadist Radicalisation in European Prisons: Experimental Project for the Identification of Jihadist Radicalisation in European Prisons, European Commission—Directorate General Justice Freedom and Security, CRYME JLS/2007/ISEC/551-2010; M. Sageman proposed a non-linear predictive model in 2007  in Radicalization of Global Islamist Terrorists, United States Senate Committee on Homeland Security and Governmental Affairs, which was then adjusted in 2008  in his article ‘A Strategy for Fighting International Islamist Terrorists’, in The Annals of the American Academy of Political and Social Science, 618 (1), pp. 223–231. Taarnby developed a model in eight steps, analysing recruitment pre- and post-11/9 (Taarnby, M. (2003) Profiling Islamic Suicide Terrorists, a research report for the Danish Ministry of Justice. Danish Ministry of Justice, and (2005) Recruitment of Islamist Terrorists in Europe: Trends and Perspectives. Danish Ministry of Justice). In its study on al-Muhagirun Q. Wiktorowicz (2004), ‘Joining the Cause: Al-Muhajiroun and Radical Islam’, The Roots of Radical Islam, Department of International Studies, Rhodes College identifies four sequential processes. McCauley C. and Moskalenko S. (2008) ‘Mechanisms of Political Radicalization: Pathways Toward Terrorism’, Terrorism and Political Violence, 20 (3), pp. 415–433 have identified 12 ‘mechanisms’ of political radicalisation which operate across three levels: that of the individual, the group and the mass level. A pathway of suicide bombers, articulated in four steps, is offered by P. Gills (2007) ‘A Multi-Dimensional Approach to Suicide Bombing’, International Journal of Conflict and Violence, 1 (2), pp. 142–159, and 2008, ‘Suicide Bomber Pathways Among Islamic Militants’, Policing, 4 (2), pp. 412–422.

  9. 9.

    GDAP 0384043 dated 14-11-2015, GDAP 0385582 dated 16-11-2015 and GDAP 0248805 dated 20-7-2016.

  10. 10.

    Now available in: https://www.prisonlegalnews.org/news/publications/radicalization-in-the-west-the-homegrown-threat-nypd-2007pdf/

  11. 11.

    The legal settlement is available in: https://www.aclu.org/sites/default/files/field_document/1211._stipulation_of_settlement_and_order_1.7.16_0.pdf

  12. 12.

    D.P.R. 30 giugno 200, n. 230.

  13. 13.

    Ministero della Giustizia-GDAP-0445731-2011, Circolare 3594/6044

  14. 14.

    European Security Strategy-A secure Europe in a better World, Brussels, 12.12.2003, https://europa.eu/globalstrategy/en/european-security-strategy-secure-europe-better-world; The European Union Counter-Terrorism Strategy, Justice and Home Affairs Council meeting, Brussels 1 December 2005, www.consilium.europa.eu/uedocs/cms_Data/docs/pressdata/en/jha/87257.pdf; Communication from the Commission to the European Parliament and the Council—The EU Internal Security Strategy in Action: Five steps towards a more secure Europe (COM(2010) 673 final of 22.11.2010); Renewed European Union Internal Security Strategy Implementation Paper, Brussels, 14 July 2015, 10854/15; European Council, June 2016, Shared Vision, Common Action: A Stronger Europe: A Global Strategy for the EU Foreign and Security Policy.

  15. 15.

    https://www.gov.uk/government/publications/prevent-duty-guidance

  16. 16.

    The first document is GDAP0093040 dd. 13-3-2015, following the initial EU strategy in the same year.

  17. 17.

    ‘In fact, it depends not only on subjective and objective assessments, but also on the logistical and security characteristics of the institute, on the personnel provided and on the availability of the vehicles, as well as on the confidential information held by the institute’s managers’ (GDAP-0445732-2011, Circolare 3594/6044: 17).

  18. 18.

    https://www.durham.police.uk/About-Us/Documents/Peels_Principles_Of_Law_Enforcement.pdf

  19. 19.

    DL 20 febbraio 2017, n. 14, recante “Disposizioni urgenti in materia di sicurezza delle città” (in GU n. 42 del 20 febbraio 2017).

  20. 20.

    DL 20 February 2017, n. 14, recante “urgent provisions on the safety of cities” (in GU n. 42 20 February 2017).

  21. 21.

    NOMS HQ, National Probation Service, Managing Terrorist and Extremist Offenders in the Community, AI 13/2014- PI 10/2014.

  22. 22.

    The Role of Religion in Exit Programmes and Religious Counselling in Prison and Probation Settings, Ex Post Paper, RAN Centre of Excellence, 10-11 October 2017, Madrid, available from: https://ec.europa.eu/home-affairs/sites/homeaffairs/files/what-we do/networks/radicalisation_awareness_network/about-ran/ran-p-and-p/docs/ran_pp_role_of_religion_in_exit_programmes_10-11_10_2017_en.pdf

  23. 23.

    https://hudoc.echr.coe.int/eng#{%22fulltext%22:[%22De%20Tommaso%22],%22itemid%22:[%22001-173433%22]

  24. 24.

    MAUGERI, Preventive measures and cases of general danger: the European court condemns Italy for the lack of quality of the “law”, but a swallow does not make spring; VIGANÒ, The Court of Strasbourg takes a severe blow to the Italian discipline of personal prevention measures, in: www.penalecontemporaneo.it

  25. 25.

    Now in: https://theintercept.com/series/the-fbis-secret-rules/

  26. 26.

    http://graphics.nytimes.com/packages/pdf/nyregion/20070215_nycruling.pdf

  27. 27.

    Now in: https://theintercept.com/series/the-fbis-secret-rules/

  28. 28.

    https://www.aclu.org/legal-document/raza-v-city-new-york-order-approving-stipulation-settlement

  29. 29.

    https://www.aclu.org/cases/raza-v-city-new-york-legal-challenge-nypd-muslim-surveillance-program

  30. 30.

    More specifically Directive (UE) 2016/343 dated 9 March 2016, often recalled by rights activists.

  31. 31.

    Paragraph 144. Please see also Mennitto c. Italia [GC], n. 33804/96, § 23, CEDU 2000 X; Micallef c. Malta [GC], n. 17056/06, § 74, CEDU 2009; e Boulois c. Lussemburgo [GC], n. 37575/04, § 90, CEDU 2012).

  32. 32.

    https://www.takedownproject.eu

  33. 33.

    ‘While Garland analyse the developments from the perspective of the dichotomy welfare/control, we prefer to consider the unbalanced evolution of institutional bodies in the light of the relations between executive powers/judicial powers/civil society or private sector. In our opinion, the real change from the seventieth is represented by the disproportionate role which politician assigned to executive agencies, like intelligence and LEAs, at the expenses of judges and prosecutors; (1) the extension of the security “field” (as defined by Garland) to sectors, traditionally not considered as part of the security competences; (2) the intrusion of private actors into the security scene. These relevant changes occurred within legal and institutional frameworks which maintained a certain degree of stability, therefore generating contradictions, procedural conflicts, inhomogeneous practices and policies and, last but not least, conflicts among citizens. To summarize, security became a battle field for politicians and media, with all the related consequences on the public opinion. What Garland defines as the new culture of control is not only a phenomenon resulting from the removal of security from the welfarist theories, but rather their merging with the advanced models of Situational Crime Prevention (SCP) in the form of prevention of terrorism’ (Bianchi 2018: 14).

  34. 34.

    For the concept of ‘Global Governance’ please refer to: Yunker, G.A., The Idea of World Government: From Ancient Times to the Twenty-First Century, New York, Routledge, 2011; Rosenau J.N., Czempiel E.-O., Governance without Government: Order and Chance in World politics, Cambridge, Cambridge University Press, 1992; Mazover M., Governing the World: History of an Idea, New York, Penguin, 2012; Cassese S., The Global Polity: Global Dimension of Democracy and the Rule of Law, Sevilla, Global Law Press, 2012.

  35. 35.

    The UN Report of the Commission on Global Governance goes back to 1992 and was published in 1995 with the title Our Global Neighbourhood, Oxford, Oxford University Press, 1995.

  36. 36.

    The reference is the Global Administrative Law Project, which started in 2005, thanks to the researches of the New York University School of Law. The main concept was proposed by B. Kingsbury, N. Krisch and R.B. Stewart, The Emergence of Global Administrative Law, in: Law and Contemporary Problems, vol. 68, n. 3-4, 2005.

  37. 37.

    Bianchi S., 2017, Understand the dimensions of organized crime and terrorist networks for developing effective and efficient security solutions for first-line practitioners and professionals, in TAKEDOWN EU-Horizon 2020 Research and Innovation Programme under Grant Agreement No 700688, D.2.4 Documentation of the OC/TN response approaches and policies.

  38. 38.

    In 1998, at a symposium on the continuing political relevance of the peace of Westphalia, the former NATO secretary-general Solana pronounced a famous speech criticising ‘the original Westphalian order…the Westphalian system had its limits. For one, the principle of sovereignty it relied on also produced the basis for rivalry, not community of states; exclusion, not integration’ (Solana, Securing Peace in Europe, North Atlantic Treaty Organisation, Symposium on the Political Relevance of the 1648 Peace of Westphalia, Munster 12 November 1998).

  39. 39.

    On the evolution of preventive measures in Italy, please see Manna, Misure di Prevenzione: aspetti comparatistici e prospettive di riforma, QG, 1995, 2, 311 e sgg.; Guerrini-Mazza, Le Misure di Prevenzione-Profili sostanziali e processuali, Padova, 1996.

References

  • Amodio, A. (1975). Il processo di prevenzione: l’illusione della giurisdizionalità, Giust. Pen., III.

    Google Scholar 

  • Bauman, Z., & Lyon, D. (2013). Liquid surveillance. A conversation. Cambridge: Polity Press.

    Google Scholar 

  • Belli, R., & Freilich, J. D. (2009). Situational Crime Prevention and non-violent terrorism: A ‘soft’ approach against ideologically motivated tax refusal. In J. D. Freilich & G. R. Newman (Eds.), Reducing terrorism through situational crime prevention. Cullompton, Devon: Willan Publishing.

    Google Scholar 

  • Bianchi, S. (2010). Jihadist radicalisation in European prisons: Experimental project for the identification of Jihadist radicalisation in European prisons. European Commission - Directorate General Justice Freedom and Security- CRYME JLS/2007/ISEC/551-2010.

    Google Scholar 

  • Bianchi, S. (2017). Documentation of the OC/TN response approaches and policies. Takedown Report (D.2.4, 2017 -non communicable).

    Google Scholar 

  • Bianchi, S. (2018). Initial practitioners-toolkits and policy recommendations. Takedown Report (Deliverable D4.4, 2018- non communicable yet, waiting for the EC clearance).

    Google Scholar 

  • Bigo, D., Carrera, S., Hernanz, N., Jeandesboz, J., Parkin, J., Ragazzi, F., Scherrer, A., & Policy Dept. C: Citizen’s Rights and Constitutional Affairs. (2013). National programmes for mass surveillance of personal data in EU MSs and their compatibility with EU Law (p. 15). Brussels: EP Directorate General for Internal Policies.

    Google Scholar 

  • Brantingham, P. P. (1993). Environment, routine, and situation: Toward a pattern theory of crime. In R. Clarke & M. Felson (Eds.), Routine activity and rational choice, advances in criminological theory (Vol. 5). New Brunswick, NJ: Transaction Publishers.

    Google Scholar 

  • Brantingham, P. J., & Faust, F. L. (1976). A conceptual model of crime prevention. Crime and Delinquency., 22(3), 284–296.

    Article  Google Scholar 

  • Bricola, F. (1974). Teoria generale del reato, Utet, Torino.

    Google Scholar 

  • CAGE. (2017). Home Office Blacklisted: The secretive Home Office Units silencing voices of dissent. London: Cage Advocacy.

    Google Scholar 

  • CAGE. (n.d.) The science of pre-crime: The secret ‘radicalisation’ study underpinning prevent. [online]. Retrieved from https://cage.ngo/publication/the-science-of-pre-crime/.

  • Cartlett, J., Birdwell, J., & King, M. (2010). The edge of violence: A radical approach to extremism. London: Demos.

    Google Scholar 

  • Cass. (2012). Sez. V, 13 November 2012, O.G., n. 14044. In Foro It., 2013, 10, II, col. 530.

    Google Scholar 

  • Christmann, K. (2012). Preventing religious radicalisation and violent extremism: A systematic review of the research evidence. London: Youth Justice Board.

    Google Scholar 

  • Cohen, L. E., & Felson, M. (1979). Social change and crime rate trends: a routine activity approach. American Sociological Review, 44, 588–608.

    Google Scholar 

  • Cornish, D., & Clarke, R. V. (1986). The Reasoning Criminal: Rational Choice Perspectives on Offending., Hague: Springer- Verlag.

    Google Scholar 

  • Clare, J., & Morgan, F. (2009). Exploring parallels between situational prevention and non-criminological theories for reducing terrorist Risk. Crime Prevention Studies., 25, 207–227.

    Google Scholar 

  • Clarke, R. V. (1980). “Situational” crime prevention: Theory and practice. British Journal of Criminology., 20(2), 136–147.

    Article  Google Scholar 

  • Clarke, R. V. (1983). Situational crime prevention: Its theoretical basis and practical scope. In M. Tonry & N. Morris (Eds.), Crime and justice: An annual review of research (Vol. 4, pp. 225–256). Chicago, IL: University of Chicago Press.

    Google Scholar 

  • Clarke, R. V., & Eck, J. (2008). Become a problem solving crime analyst in 55 steps, Italian version. Università di Trento (Original version London, Jill Dando Institute of Crime Science, University College, 2003).

    Google Scholar 

  • Clarke, R. V., & Newman, G. (2006). Outsmarting the terrorists. Westport, CT: Praeger Security International.

    Google Scholar 

  • Cornish, D. (1994). The procedural analysis of offending and its relevance for situational prevention. In R. Clark (Ed.), Crime prevention studies (Vol. 3). Monsey, NY: Criminal Justice Press.

    Google Scholar 

  • CSIS (Canada Security Intelligence Service). (2018). Mobilization to violence. [online]. (Terrorism) Research. Retrieved from: https://csis.gc.ca/pblctns/thrpblctns/2018-02-05-en.php

  • Eck, J. (2003). Police problems: The complexity of problem theory, research and evaluation. In J. Knutsson (Ed.), Problem oriented policing: From innovation to mainstream, crime prevention studies (Vol. 15). Monsey, NY: Criminal Justice Press.

    Google Scholar 

  • European Commission. (2008). Manual on Violent Radicalisation – European Commission – JHA,

    Google Scholar 

  • European Commission. (2016). Manual on violent radicalisation JHA, 2008; GDAP 0384043 dd. 14-11-2015; GDAP 0385582 dd. 16-11-2015; GDAP 0248805 dd. 20-7-2016 as integrated with GDAP 0248805 dd. 20-7-2016.

    Google Scholar 

  • Ferguson, T. (1995). The Investment Theory of Party Competition and the Logic of Money-Driven Political Systems, The University of Chicago Press, Chicago-London.

    Google Scholar 

  • Ferrajoli, L. (1997). Diritto e ragione. Teoria del garantismo penale. Bari: Laterza.

    Google Scholar 

  • FRA-Fundamental Rights Agency. (2017). Surveillance by intelligence services: fundamental rights safeguards and remedies in the EU. Vol. I: Member States’ legal framework, Vienna,

    Google Scholar 

  • Garland, D. (2001). The culture of control: Crime and social order in contemporary society. Chicago: The University of Chicago Press.

    Book  Google Scholar 

  • Global Terrorism Database. (2015). Incident summary: 11/13/2015. National Consortium for the Study of Terrorism and Responses to Terrorism. [online]. (Viewed 3 June 2017). Retrieved from http://www.start.umd.edu/gtd/search/IncidentSummary.aspx?gtdid=201511130008.

  • Gutheil, M., et al. (2017). EU and Member States’ policies and laws on persons suspected of terror-related crimes. Study for the LIBE committee. DG HOME. PE596.832.

    Google Scholar 

  • Home Office. (April 2015–March 2016). Individuals referred to and supported through the Prevent Programme. Statistical Bulletin 23/17. 9 November 2017 D4.4 Initial practitioners-toolkits and policy recommendations.

    Google Scholar 

  • Kissinger, H. (2014). World Order: Reflections on the Character of Nations and the Course of History. Penguin Press.

    Google Scholar 

  • Lloyd, M., & Dean, C. (2011). ERG 22+ structured professional guidelines for assessing risk of extremist offending. England: Ministry of Justice, National Offender Management Service. Offender Services and Interventions Group [non communicable].

    Google Scholar 

  • Lloyd, M., & Dean, C. (2016). The development of structured guidelines for assessing risk in extremist offenders. Journal of Threat Assessment and Management., 2(1), 40–52.

    Article  Google Scholar 

  • Massachusetts State Police. (2014). After action report for the response to the 2013 Boston Marathon Bombings (Boston: 2014). [online]. Retrieved from http://www.mass.gov/eopss/docs/mema/afteraction-report-for-the-response-to-the-2013-boston-marathon-bombings.pdf.

  • Michels, R. (1911). Zur Soziologie des Parteiwesens in der modernen Demokratie. In Untersuchungen über die oligarchischen Tendenzen des Gruppenlebens. Leipzig: Werner Klinkhardt.

    Google Scholar 

  • Moghaddam, M. F. (2005). The staircase of terrorism. American Psychologist., 60(2), 161–169.

    Article  Google Scholar 

  • Ministero di Giustizia-DAP. (2018). Relazione del Ministro sull’Amministrazione della Giustizia. Anno 2017. Inaugurazione dell’anno giudiziario 2017

    Google Scholar 

  • Newman, G. R., & Clarke, R. V. (2008). Policing terrorism: An executives’s guide. Washington, DC: U.S. Department of Justice: Office for Community Oriented Policing Services.

    Google Scholar 

  • NYPD News. (2016). NYPD to update guidelines Governing Investigations; Will resolve litigation brought by Civil Rights Groups. [online]. NYPD News. Retrieved from http://nypdnews.com/2016/01/nypd-to-update-guidelines-governing-investigations-will-resolve-litigation-brought-by-civil-rights-groups/.

  • Pareto, V. (1916). Trattato di Sociologia Generale. Firenze: Barbera.

    Google Scholar 

  • Portogallo, A. C. (2012). n. 33197/09, § 51, 20 novembre 2012, e Pocius c. Lituania, n. 35601/04, § 43, 6 luglio 2010).

    Google Scholar 

  • Pressman, E. D. (2009). In Her Majesty the Queen in Right of Canada (Ed.), Risk assessment decisions for violent political extremism. 2009-02. Ottawa.

    Google Scholar 

  • Pressman, D. E., & Flockton, J. (2014). Violent extremist risk assessment development of the VERA-2 and applications in the high security correctional setting. In A. Silke (Ed.), Prisons, terrorism and extremism. Critical issues in management, radicalisation, and reform (pp. 122–143). London: Routledge.

    Chapter  Google Scholar 

  • Puglisi, B. G. (1998), Il Procedimento di Prevenzione. Quaderni del CSM. Frascati 18-20 dicembre 1997 - 12-14 Febbraio 1998. 53–72.

    Google Scholar 

  • Reed, S. (2016). The prevent programme: An ethical dilemma for teachers as well as psychiatrists. BJ Psych. Bullettin, 40, 85–86.

    Google Scholar 

  • Rose, G. (1992). The strategy of preventive medicine. Oxford: Oxford University Press.

    Google Scholar 

  • Rose, G. (2001). Sick individuals and sick populations. International Journal of Epidemiology, 30(3), 427–432.

    Article  Google Scholar 

  • Scarcella, A., Page, R., & Furtado, V. (2016). Terrorism, radicalisation, extremism, authoritarianism and fundamentalism: A systematic review of the quality and psychometric properties of assessments. PLoS One, 11(2), e0166947.

    Article  Google Scholar 

  • Summerfield, D. (2016). Mandating doctors to attend counter-terrorism workshops in medically unethical. BJPsych Bullettin, 40, 87–89.

    Article  Google Scholar 

  • The New York Police Department (NYPD). (2007). Radicalization in the west: The homegrown threat.

    Google Scholar 

  • UNODC. (2016). Handbook on the management of violent extremist prisoners and the prevention of radicalization to violence in prisons (p. 71). New York: Criminal Justice Handbook Series.

    Google Scholar 

  • Wilson, J. Q., & Kelling, G. (1982). Broken windows. The Atlantic Monthly, March 29–38, 1982.

    Google Scholar 

  • Wortley, R. (2011). A classification of techniques for controlling situational precipitators of crime. Security Journal., 14, 63–82.

    Article  Google Scholar 

  • Zeigler, S. M., & Smith, M. M. (2017). Terrorism before and during the war on terror: – A more dangerous world? Thousand Oaks, CA: Sage.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sergio Bianchi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Bianchi, S., Ladu, M., Bianchi, S. (2020). Radicalisation: No Prevention Without ‘Juridicalisation’. In: Akhgar, B., Wells, D., Blanco, J. (eds) Investigating Radicalization Trends. Security Informatics and Law Enforcement. Springer, Cham. https://doi.org/10.1007/978-3-030-25436-0_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-25436-0_8

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-25435-3

  • Online ISBN: 978-3-030-25436-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics