By type
By Date
Clear Filters
Policy brief
Lewys Brace
How worried should we be about incel-related violence?
Policy brief |
3 min read
Thesis Summary
Jonathan Kenyon
Exploring the role of the Internet in the radicalisation process and offending of convicted extremists
Thesis Summary |
5 min read
Guide
Alexandra Phelan, Jessica White, Claudia Wallner, James Paterson
Introductory Guide to Understanding Misogyny and the Far-Right
Guide |
10 min read
Report
James Khalil, Martine Zeuthen, Sarah Marsden
A Guide to Deradicalisation & Disengagement Programming
Report |
4 min read
Poster
Rebecca Stevens
Translating research
Poster |
1 min read
Report
Kat Gibbs, Sophie Nightingale
Bias in Emerging Biometric Systems: A Scoping Review
Report |
2 min read
Report
Charis Rice, Martin Innes, Jenny Ratcliffe
Situational Threat And Response Signals (STARS): Public-Facing Counter-Terrorism Strategic Communication Campaigns [FULL LITERATURE REVIEW & SUMMARY BRIEFING]
Report |
3 min read
Poster
Charis Rice, Martin Innes, Jenny Ratcliffe
The STARS Framework
Poster |
1 min read
Report
Charis Rice, Martin Innes, Jenny Ratcliffe
Situational Threat And Response Signals (STARS): Public-facing Counter-Terrorism Strategic Communication Campaigns [SOCIAL MEDIA ANALYSIS]
Report |
2 min read
Report
Sarah Marsden, Ben Lee
Conceptualising Protective Factors: Strengths-Based Approaches
Report |
4 min read
Report
James Hewitt, Ben Lee, Sarah Marsden
Protective Factors in Risk Assessment: Practitioner Perspectives
Report |
2 min read
Thesis Summary
Abbie Marono
The role of closeness in the relationship between nonverbal mimicry and cooperation
Thesis Summary |
1 min read
Guide
Stephane Baele
Artificial Intelligence and Extremism: The Threat of Language Models for Propaganda Purposes
Guide |
7 min read
Report
James Hewitt, James Lewis, Sarah Marsden
The Psychological Effects of Criminal Justice Measures: A Review of Evidence Related to Terrorist Offending
Report |
7 min read
Guide
Kat Gibbs, Sophie Nightingale
AI In Recruitment: Is It Possible to Use it Responsibly?
Guide |
5 min read
Guide
Kat Gibbs, Sophie Nightingale
Multimodal biometrics: A better security system?
Guide |
5 min read
Report
Ben Lee
Lethal Subcultures
Report |
3 min read
Guide
Ben Lee, Sarah Marsden
Protective Factors
Guide |
7 min read
Report
John Blythe, Alan Gray, Francesca Willis, Emily Collins
Simulated Phishing And Employee Cybersecurity Behaviour (SPEC)
Report |
2 min read
Report
Sarah Marsden, Ben Lee
Protective Factors For Violent Extremism And Terrorism: Rapid Evidence Assessment
Report |
3 min read
Guide
Ben Lee
Siege Culture and Accelerationism in the UK
Guide |
7 min read
Report
Noémie Bouhana
Are Conceptual Frameworks Of Radicalisation Leading To Involvement In Terrorism 'Observable'?
Report |
2 min read
Article
Joel Busher, Gareth Harris, Julia Ebner, Zsófia Hacsek, Graham Macklin
The escalation and inhibition of violence during waves of far-right or anti-minority protests
Article |
6 min read
Report
Joel Busher, Gareth Harris, Julia Ebner, Zsófia Hacsek, Graham Macklin
The Dynamics Of Violence Escalation And Inhibition During 'Hot Periods' Of Anti-Minority And Far-Right Activism
Report |
10 min read
Report
Erika Brady, Sarah Marsden
Women and Preventing and Countering Violent Extremism Interventions
Report |
5 min read
Report
Oli Buckley
Collecting And Leveraging Identity Cues With Keystroke Analysis (CLICKA)
Report |
2 min read
Article
Lewys Brace
A Short Introduction To The Involuntary Celibate Sub-Culture
Article |
10 min read
Article
Ben Lee
Only Playing: Extreme-Right Gamification
Article |
4 min read
Report
Sarah Marsden, James Lewis
Trauma, Adversity & Violent Extremism
Report |
7 min read
Report
John F. Morrison, Andrew Silke, Heidi Maiberg, Chloe Slay, Rebecca Stewart
A Systematic Review Of Post-2017 Research On Disengagement And Deradicalisation
Report |
6 min read
Guide
Chris Baber, Ian Apperly, Emily McCormick
AI and System Developers
Guide |
4 min read
Report
Simon Oleszkiewicz, Lynn Weiher, Erik Mac Giolla
Developing A Paradigm To Assess And Measure Adaptability
Report |
3 min read
Guide
Chris Baber, Ian Apperly, Emily McCormick
AI and Senior Managers
Guide |
5 min read
Report
Chris Baber, Ian Apperly, Emily McCormick
Understanding The Problem Of Explanation When Using AI In Intelligence Analysis
Report |
2 min read
Guide
Susan Brandon
Substance or Snake Oil?
Guide |
15 min read
Article
Brooke Rogers, Julia Pearce, David Parker, Lasse Lindekilde
Communicating effectively with the public about terrorism in crowded places
Article |
5 min read
Article
Steven Watson
Risk, benefits, and the affect heuristic in security behaviours
Article |
6 min read
Report
James Lewis, Sarah Marsden
Countering Violent Extremism Interventions: Contemporary Research
Report |
7 min read
Report
Fiona Gabbert, Gordon Wright
Quantifying The Effectiveness Of A Rapport-Building Training Programme
Report |
2 min read
Article
Matthew Fields
Proof of Life or Death?
Article |
4 min read
Report
Nigel Copsey, Samuel Merrill
Understanding 21st-Century Militant Anti-Fascism
Report |
4 min read
Report
Ewout Meijer, Katherine Hoogesteyn, Brianna Verigin, Danielle Finnick
Rapport Building: Online Vs In-Person Interviews
Report |
3 min read
Report
Emma Slade, Emma Williams, Duncan Hodges, Phillip Morgan, Dylan Jones, Bill Macken, Emily Collins, Tasos Spiliotopoulos
Individual Differences in the Adoption, Secure Use, and Exploitation of Smart Home Technology
Report |
4 min read
Guide
Stephane Baele, Lewys Brace, Travis Coan
Mining The Chans
Guide |
6 min read
Report
Stephan Lewandowsky, Muhsin Yesilada
Inoculating Against the Spread of Islamophobic and Radical-Islamist Disinformation
Report |
2 min read
Report
Amarnath Amarasingam, Shiraz Maher, Charlie Winter
How Telegram Disruption Impacts Jihadist Platform Migration
Report |
2 min read
Report
Florence Keen, Blyth Crawford, Guillermo Suarez-Tangil
Memetic Irony and the Promotion of Violence within Chan Cultures
Report |
2 min read
Guide
Ben Lee, Kim Knott
How and Why Ideologies are Shared and Learned
Guide |
15 min read
Guide
Peter Lee
Moral Injury in Child Exploitation Investigators
Guide |
3 min read
Guide
Peter Lee
Exploring Trauma in Child Exploitation Investigators
Guide |
5 min read

Subscribe to the CREST newsletter.

Get the latest news, events and research into security threats delivered directly to your inbox.
Sign up now
Back to top