Comment

Quick reads exploring the world of social and behavioural science and security threats

A different perspective on CVE

Benjamin Lee interviews Ray Hill – a grassroots activist challenging extremism one conversation at a time. My research looks at grassroots efforts to counter…

Transmission in context

The transmission of ideas, beliefs and practices takes many forms, from time-honoured familial socialisation to innovative adaptions in radical social networks. Here, CREST Researchers,…

Learning to be a Muslim

Jonathan Scourfield explains that when attempting to identify violent extremism, it is important to understand the religious mainstream, to have something against which to…

Why Transmission?

Why transmission?

Kim Knott explains what we can learn from studying the transmission of ideas, beliefs and values. Studying transmission focuses attention on how, where and…

When does inconsistency matter

When does inconsistency matter?

Does it matter when someone seems to change their story from one interview to another – if they’ve added some new information or contradict…

Cyber crime and the social web

Criminal activity on the Social Web represents a new frontier for national and international security and crime fighting – by Pete Burnap and Matt…

How does memory work?

Interviewing survivors of, witnesses to and participants in terror attacks enables investigators to piece together what happened and how. Understanding how the memory works…