DETECTION AND PREVENTION PROTOCOL IN JIHADIST RADICALIZATION PROCESSES

Volume 9, Issue 3, June 2025     |     PP. 144-164      |     PDF (348 K)    |     Pub. Date: May 4, 2025
DOI: 10.54647/sociology841380    16 Downloads     90 Views  

Author(s)

Víctor Rodríguez González, Isabel I University, Burgos, Spain
Dr. Carmen González Vaz, Cunef University, Madrid, Spain
Dr. Claudio Paya Santos, Valencia International University, Valencia, Spain

Abstract
The processes of terrorist radicalization of jihadist etiology are highly complex due to the indoctrination processes that are used. Although the target person does not have a defined, clear and typical profile, it does have some evaluable factors that can be quantified in order to determine a recruitment risk index.Carrying out early detection of these radicalization processes and target persons is essential to achieve preventive and timely action. This would prevent the process from taking hold in the person. Otherwise, after a process that can have different durations, different attitudes could be adopted. Some of the consequences derived from recruiting range from facilitating new recruiting processes, economic financing or enlisting in the ranks of a terrorist group to committing different terrorist acts with a clear objective: instilling as much damage and fear as possible.To this end, an indirect application protocol has been drawn up on those people suspected of being victims of a recruitment process. It is possible to obtain a numerical risk index to adopt the necessary preventive measures and actions that must be adopted.

Keywords
Detection; Prevention; radicalization; Jihadism; Terrorism

Cite this paper
Víctor Rodríguez González, Dr. Carmen González Vaz, Dr. Claudio Paya Santos, DETECTION AND PREVENTION PROTOCOL IN JIHADIST RADICALIZATION PROCESSES , SCIREA Journal of Sociology. Volume 9, Issue 3, June 2025 | PP. 144-164. 10.54647/sociology841380

References

[ 1 ] Cancio Meliá, M. (2003). “¿«Derecho Penal del Enemigo»?”, Jakobs, G & Cancio Melía, Á, M., Derecho Penal del Enemigo, 1ª Edición, Ed. Thomson Civitas.
[ 2 ] Cancio Meliá, M. (2008). “El injusto de los delitos de organización: peligro y significado”, ICADE. Revista cuatrimestral de las Facultades de Derecho y Ciencias Económicas y Empresariales, n. 74
[ 3 ] Castell. Monserrat, C. (2015). “Título XXII. Delitos contra el orden público”, CORCOY BIDASOLO, M. / MIR PUIG, S. (Dirs.), Comentarios al Código Penal. Reforma LO 1/2015 y LO 2/2015, Ed. Tirant lo Blanch
[ 4 ] Cobo del Rosal, M. (2008). Tratado de Derecho Procesal Penal español, Ed. Edita CESEJ. Centro de Estudios Superiores de Especialidades Jurídicas.
[ 5 ] Cuerda Arnau, M. L. / Fernández Hernández, A. (2019). Adoctrinamiento, adiestramiento y actos preparatorios en materia terrorista, Ed. Aranzadi.
[ 6 ] Cuerda Arnau, M. L. (2018). “Adoctrinamiento de jóvenes terroristas y sistema penal”, de la Cuesta Aguado, P. M. & Ruíz Rodríguez, L. R. (Coords.), Liber amicorum estudios jurídicos en homenaje al profesor doctor Juan Mª. Terradillos Basoco, Ed. Tirant lo Blanch.
[ 7 ] Díaz Revorio, F. J. (2007). “La libertad de pensamiento: un análisis de la jurisprudencia constitucional española y europea”, Revista iuris et veritas, n.º 34.
[ 8 ] Gimeno Sendra, V. (2015) Manual de Derecho Procesal Penal, Ediciones Jurídicas Castillo de la Luna.
[ 9 ] González Vaz, C. (2021). El delito de autocapacitación terrorista (art. 575.2 CP), J.M. Bosch
[ 10 ] González Vaz, C. (2021) “El elemento subjetivo del delito de autocapacitación terrorista (art. 575,2 CP): una nueva interpretación”, Revista Penal, n. 48.
[ 11 ] Gorjón Barranco, M.C. (2018). “El cibercrimen político: especial referencia al ciberterrorismo en España”, en Pérez Cepeda, A.I. (Dir.), RUIZ AIRAS, M. (Coord.), El terrorismo en la actualidad: un nuevo enfoque político criminal, Ed. Tirant lo Blanch.
[ 12 ] Meines, M. et al. (2017). Ran Manual: Responses to returnees: Foreign terrorist fighters and their families, Editado por Ran Centre of Excellenc, 2017.
[ 13 ] Papalzzo, F. C. (1979). Il principio di determinatezza nel diritto penale, Ed. CEDAM. Casa editrice Dott. Antonio Milani.
[ 14 ] Sukanya, G., & Priyadarshini, J. (2021). A meta-analysis of attention models on legal judgment prediction system. International Journal of Advanced Computer Science and Applications, 12(2), 531-538.
[ 15 ] Valero Heredia, A. (2013). Libertad de conciencia, neutralidad del estado y principio de laicidad (un estudio constitucional comparado), Ministerio de Justicia.
[ 16 ] Zgryziewicz, R., Daesh recruitment. How the group attracts supporters, NATO Strategic Communications Centre of Excellence, 2016, p. 20.