Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Skip to content
This is a Non-Federal dataset covered by different Terms of Use than Data.gov.

Dynamic, Graph-Based Risk Assessments for the Detection of Violent Extremist Radicalization Trajectories Using Large Scale Social and Behavioral Data, United States, Canada, United Kingdom, Germany, 1994-2020

Metadata Updated: March 12, 2025

This project examines the trajectory of radicalization of jihadists and Incels with two broad objectives in mind. First, to develop new integrated computational technology that can mine, monitor, and screen for the occurrence of behaviors associated with dangerously escalating extremism in large heterogenous databases and provide early warnings of individuals or groups on behavioral trajectories toward extremist violence. Second, to harness data science methodologies to enable rapid, semi-automated support for law enforcement analysts and social science researchers to produce structured behavioral indicator profiles from text sources. The study operated from the premise that being that violent extremists are a rare, complex phenomenon, it is futile to search for a profile of extremism. Rather, it is better to focus on explaining how people come to embrace violent extremism. This path, referred to here as a radicalization trajectory, implies that an arc exists leading the perpetrator from entertaining extremist ideas to action, and that there is a somewhat predictable pathway from a normal, if perhaps angry state, to the perpetration of a violent attack in the name of the ideology. Two teams were combined to analyze radicalization trajectories: data collection and analysis led by Brandeis University and technology development led by Colorado State University (CSU). The questions revolving around the technological development were as follows: Can tools that rigorously examine and account for the activities of close associates better predict the likelihood that an individual would engage in violent extremism? Which risk assessment indicators for violent extremism in the extant literature are detectable via automated or semi-automated technologies, and what databases and datasets must be integrated to facilitate this detection? Can computationally efficient tools be used to mine these databases for the specific purposes of monitoring and screening for individuals and small groups posing a significant risk for violence? Users should refer to the data collection notes field below for additional information about study citation.

Access & Use Information

Restricted: This dataset can only be accessed or used under certain conditions. Non-Federal: This dataset is covered by different Terms of Use than Data.gov. License: us-pd

Downloads & Resources

Dates

Metadata Created Date March 12, 2025
Metadata Updated Date March 12, 2025

Metadata Source

Harvested from DOJ JSON

Additional Metadata

Resource Type Dataset
Metadata Created Date March 12, 2025
Metadata Updated Date March 12, 2025
Publisher National Institute of Justice
Maintainer
Identifier 4269
Data First Published 2022-01-13T10:53:49
Language eng
Data Last Modified 2022-01-13T11:01:33
Rights These data are restricted due to the increased risk of violation of confidentiality of respondent and subject data.
Public Access Level restricted public
Aicategory Not AI-ready
Bureau Code 011:21
Metadata Context https://project-open-data.cio.gov/v1.1/schema/catalog.jsonld
Metadata Catalog ID https://www.justice.gov/data.json
Schema Version https://project-open-data.cio.gov/v1.1/schema
Catalog Describedby https://project-open-data.cio.gov/v1.1/schema/catalog.json
Harvest Object Id 3170e329-947e-4ac4-91f6-4da4c5d282b1
Harvest Source Id 11827822-e56a-442a-9edb-6b249b7ddcc3
Harvest Source Title DOJ JSON
Internalcontactpoint {"@type": "vcard:Contact", "fn": "Jennifer Scherer", "hasEmail": "mailto:Jennifer.Scherer@usdoj.gov"}
Jcamsystem {"acronym": "OJP_EXT", "id": 8, "name": "External system not available in CSAM"}
License http://www.usa.gov/publicdomain/label/1.0/
Metadatamodified 9/2/2022 6:22:00 PM
Program Code 011:060
Publisher Hierarchy Office of Justice Programs > National Institute of Justice
Sourceidentifier https://doi.org/10.3886/ICPSR38135
Source Datajson Identifier True
Source Hash 8430ca7d3b1df1a314b2225e0bf8d61c85920a5de63bcd3c55be2a08e260c0ac
Source Schema Version 1.1

Didn't find what you're looking for? Suggest a dataset here.