skip navigation


Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.


NCJ Number: 250481 Find in a Library
Title: Final Report: Empirical Assessment of Domestic Radicalization (EADR)
Author(s): Michael Jensen Ph.D.; Gary LaFree Ph.D.
Project Director: Patrick A. James
Date Published: December 2016
Page Count: 111
Sponsoring Agency: National Institute of Justice (NIJ)
Washington, DC 20531
US Dept of Justice NIJ Pub
Washington, DC 20531
Grant Number: 2012-ZA-BX-0005
Sale Source: US Dept of Justice NIJ Pub
810 Seventh Street, NW
Washington, DC 20531
United States of America
Document: PDF
Type: Report (Grant Sponsored); Report (Study/Research); Research (Applied/Empirical)
Format: Document; Document (Online)
Language: English
Country: United States of America
Annotation: Based on an analysis of the largest known database on individual radicalization in the United States, this study produced a number of findings relevant to countering domestic violent extremism.
Abstract: The database for this study is entitled “Profiles of Individual Radicalization in the United States” (PIRUS). It includes 147 variables that cover demographic, background, group affiliation, and ideological information for 1,473 violent and non-violent extremists from across the ideological spectrum. This study analyzed the database using comparative descriptive statistics and multivariate logistic regression techniques. It produced 56 life-course narratives of individuals who were radicalized in the United States. These narratives were analyzed using fuzzy-set qualitative comparative analysis, a methodology that makes it possible to determine the causal conditions and pathways most salient for explaining radicalization to violence. Findings show the importance of considering age and gender when designing prevention and intervention programs. Older individuals were found to be especially prevalent among far-right individuals and single-issue milieus. Women were found in large numbers on the far left. Intervention and prevention programs should also target the face-to-face and virtual social networks that mobilize lone and group-based extremists to commit violent acts. This study also found that pre-radicalization criminal activity and post-radicalization clique membership are strongly associated with violent behaviors among radicalized individuals. This suggests attention to individuals with criminal histories and those known to associate with others holding extreme views. Individuals with a far-right ideology and those motivated by Salafi jihadist ideologies are more likely than animal-rights and environmental activists to engage in violence. The majority of extremists are driven by psychological and emotional vulnerabilities that stem from lost significance, personal trauma, and collective crises. Interventions that focus on particular communities are likely to be counterproductive, since they stimulate feelings of collective victimization. 27 tables, 4 figures, 159 references, and appended methodological details
Main Term(s): Criminology
Index Term(s): Counter-Terrorism; Counter-terrorism intelligence; Counter-terrorism training; Domestic terrorism; National Institute of Justice (NIJ); NIJ final report; NIJ Resources; Terrorist profiles; Violent offenders
To cite this abstract, use the following link:

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.