All of these resources are available from our website. We’ve included a QR code for each project, directing you to its webpage where all associated resources are available in one place. New resources are being published all the time. You can be updated on these new resources by signing up for our newsletter at www.crestresearch.ac.uk/contact/newsletter and/or by following us on social media.
We have organised the catalogue into the following categories:
Understanding Beliefs and Values
This theme focuses on understanding the beliefs and values of individuals and groups that present a threat to national security in the UK. It offers an understanding of far-right extremism, Islamic extremism, and militant anti-fascism. To further understanding and counter ignorance, it offers guides on various aspects of Islam and British Muslim communities as well as exploring claims of Sikh radicalisation.
In addition to understanding belief systems, this theme considers how and why ideas are shared. It covers work on disinformation and social media, in part through consideration of Russia. It looks at the use of Russian fake social media accounts, and Russian-speaking foreign fighters in Syria and Iraq. This is supplemented by work on violence promotion in Chan cultures, conspiracy theories, the direct and indirect effects of trauma on radicalisation, and reciprocal radicalisation.
In order to expand our knowledge of violence reduction and disengagement, this theme reports on the internal brakes on violent escalation, and includes work which seeks to learn lessons from the conflict in Northern Ireland. To enhance policy makers’ knowledge, the theme covers Countering Violent Extremism initiatives, and the effectiveness of existing deradicalisation programmes.
Gathering Intelligence
This theme focuses on ways to gather intelligence from, and about, groups and individuals. It covers specific interviewing techniques that help practitioners to elicit accurate information in interview or debrief settings, such as the Timeline Technique, the Cognitive Interview, the Model Statement Technique, the Unexpected Questions Technique, and the RING task – which has been specifically designed to support the recall of information about people involved in networks. Relatedly, it considers the importance of rapport building to effective intelligence gathering and illustrates this in both offline and in-person interviews.
To help practitioners make good judgements about where threats to accuracy lie, the theme covers different types of inconsistency and when they matter; what it means when someone says that they ‘don’t know’ or ‘don’t remember‘ something; and techniques that help practitioners to detect deception such as the Verifiability Technique.
As well as looking at effective tools and techniques for eliciting information and assessing its veracity, the theme focuses on individuals carrying out the intelligence gathering. It examines the adaptive behaviour of practitioners in a law enforcement context, and provides an insight into coping under stress in security settings and the effects this can have on performance. Of course, not all intelligence is gathered by interviewing and so the theme considers surveillance in the form of spotting faces and rare targets.
In organisations that gather large amounts of intelligence, technological advances are being used to assist practitioners in their analysis. Here we consider software tools designed to help analysts process large volumes of data quickly and effectively, the role of explanation in systems which use artificial intelligence to help analyse intelligence, and technological advances, such as how to use keystroke dynamics to identify the name and native language of an anonymous user.
Assessing Risk
This theme focuses on the assessment of risk to specific people (such as employees), from a wide variety of actors (such as violent extremists), and via a range of techniques (such as disinformation campaigns).
It includes guides and reports on assessing risk of violence from groups and individuals such as Islamic extremists and far-right groups. We also have reports that enable a more nuanced understanding of risk of violence such as research on the internal brakes on violent escalation, research on trauma, adversity, and engagement in violent extremism, understanding how terrorists and criminals make decisions, how countering violent extremism interventions apply to women, and the relationship between mental health and terrorism.
In this theme we also include guides on technology enabled risk such as phishing attacks, the Internet of Things, and risks from the spread of disinformation. Examples draw on Russia and disinformation, focusing on the Caucasus, Ukraine, and the annexation of Crimea.
The theme looks at assessing risk to employees, including workshops that focused on performance and coping under stress, as well as understanding moral injury and trauma in child exploitation investigators.
From the opposite angle, other work explores the risk from employees, and we include a series of reports on organisational change and insider threat, as well as research on the cyber security risks of digital hoarding behaviour.
Deterring Threats
This theme is broad in scope, addressing our need to better understand how we can deter threat and protect ourselves.
It addresses deterring threat from terrorism through examination of how criminals and terrorists make decisions, and reports on interventions that prevent and counter extremism. This includes interventions that offer promise in disrupting groups through Telegram, and those that consider effective management of terrorism-related offenders in prison.
It looks at public experiences of counter terrorism measures in the UK and overseas; examines how members of the public can help deter threat by reporting suspicious behaviour; and explores how to inoculate against the spread of disinformation.
The theme also considers how security professionals can communicate better with employees about how to protect organisations; understanding and mitigating the risk of large-scale change to counterproductive workplace behaviour; and how to best protect staff from phishing attacks in order to mitigate cyber threats.
The innovative tools outlined in the imaginative scenario planning toolkit enable policy makers to consider future threat and deterrence.
Resources by Project
CREST has a large and growing number of projects focused on providing evidence-based solutions to problems faced by those on the frontline in mitigating and preventing security threats. In this section we list the variety of outputs produced by each project. These are added to continuously, even by projects where funding has now finished, as peer-reviewed articles are published, follow-up studies conducted, and research translated into toolkits, guides, and briefs for direct application.
If you’d find it useful to have some of this research summarised and translated for use in your area of work, please get in touch. Likewise, if you’re a researcher who thinks we’ve missed some of the relevant work out, let us know and we’ll make sure it is added to the list!
Magazine
CREST Security Review (CSR) is a magazine that presents clear, accessible summaries of the latest behavioural and social science research relevant to security. Over the past decade, CSR has become a trusted resource for those addressing today’s complex security challenges.
Articles are written by leading UK and international experts, translating cutting-edge research into practical insights for government, police, and security professionals. Each issue of CSR focuses on a particular theme, such as cyber security, trust, and misinformation, while also including timely articles that showcase new research beyond any set topic.
Written for busy professionals outside academia, CSR addresses the crucial ‘so what?’, demonstrating why this research matters and how it can be applied in practice. Whether you are a civil servant, policymaker, practitioner or simply interested in the human dimensions of security threats, CSR provides a gateway to robust, evidence-based knowledge that supports informed decision-making.
Free to read online, with a limited print run for those in the field, CSR connects the UK’s and the world’s foremost researchers with the practitioners who benefit most from their expertise.
If you have found any of our issues useful, please take a moment to fill in our short survey (just three questions). Your feedback helps us improve and ensure CSR continues to meet your needs. Simply scan the QR code or go to www.crestresearch.ac.uk/csr-survey
Download the CREST Catalogue 2025
Copyright Information
As part of CREST’s commitment to open access research, this text is available under a Creative Commons BY-NC-SA 4.0 licence. Please refer to our Copyright page for full details.
IMAGE CREDITS: Copyright ©2025 R. Stevens / CREST (CC BY-SA 4.0)

