- 1Tactical Research Unit, Bond University, Gold Coast, QLD, Australia
- 2Faculty of Health Sciences and Medicine, Bond University, Gold Coast, QLD, Australia
- 3Department of General Psychology and Methodology, University of Bamberg, Bamberg, Germany
Police officers face the challenging task of identifying potential threats daily. Failure to identify these threats soon enough can lead to physical injury, and, in the case of an armed offender, a fatal outcome. As such, the ability of an officer to identify an armed threat is critical. This scoping review aimed to identify and synthesize current literature regarding the ability of police officers or CCTV operators to identify an immediate source of threat. A systematic and repeated search of academic databases (Ovid Medline, PubMed, SportDiscus, Web of Science, and Embase) was finalized 26th of November 2024. All articles were screened for relevance against inclusion and exclusion criteria. A snowballing approach was employed, and the reference lists of pertinent studies were searched for additional sources of information. From an initial 14,812 records, four studies specifically met the eligibility criteria. All these studies evaluated the ability of law enforcement officers to identify threats and assessed the performance of the officers by investigating risk estimates and detection tests. Various video data-based tasks and tests have been used to assess the ability to identify upcoming or acute threats. Limited research has been published of studies investigating police officer concealed threat detection approaches, methods, and outcomes, highlighting a paucity of research in this critical field.
Introduction
Police officers face various types of threats daily. These threats can include potentially aggressive and dangerous behaviors (Covington et al., 2014; Tiesman et al., 2018) and dealing with individuals suffering from psychological conditions (Yee et al., 2020). Whilst dealing with these individuals, officers and security personnel may need to detect and identify threats like concealed weapons (Pratihar and Yadav, 2014) or identify people, making them the target of their aggression (Schouten and Brennan, 2016; Johnson, 2019). Stop-and-search situations can go fatally wrong (Baumgartner et al., 2018) due to resistance from alleged offenders hoping to escape arrest and face associated charges, leading to around 10% of all police officers being assaulted and violently attacked each year (Bierie, 2017), with the number of assaults against officers rising (FBI, 2024). While the factors influencing these occurrences vary (Den Heyer, 2023) and the challenge of analyzing such incidents lies in the complexity of these encounters (Den Heyer, 2024), the ability to detect and identify concealed weapons and potential threats is of great relevance, as well as the necessity to gain an empirical understanding of threats via behavioral approaches (Sweet et al., 2017).
This ability to detect and identify potential threats sooner could allow police officers (and security personnel) to react more quickly or even prevent violent or malicious acts. However, this requires police officers to identify threats through observation and inherent contextualization of the situation in dynamic and versatile circumstances (Orr et al., 2020). The complexity of this requirement is espoused by research identifying physical assaults as the leading cause of injury in police officers (Tiesman et al., 2018). Thus, training officers to identify threats through observation as soon as possible is crucial when aiming to obtain safety at an officer level as without this training, severe consequences may ensue, especially if decisions are made incorrectly or are made too slowly. These consequences include personal, psychological, and professional impacts. Moreover, the decisions made may impact the safety of others, including their colleagues, the suspects, potential victims, as well as bystanders (Shortland et al., 2020).
Within the last decade, research in this field of threat observation has focused on psychophysiological markers of threat (Aikins et al., 2010; Marchak, 2013) and on developing machine learning algorithms to detect the concealment of objects, such as handguns from video images (Cohen et al., 2008; Darker et al., 2007), and concealed items via detection systems (Debnath and Bhowmik, 2021). Recent publications reviewed the methods applied in real-time early detection of weapons (Berardini et al., 2025) and describe the remaining challenges with these automated systems (Abi-Nader et al., 2025; Yadav et al., 2025). The consistency in their performance is challenged when it comes to detecting small objects, multiple weapons, in occlusion of weapons, and detecting weapons of different types fast and consistently in varying and complex settings (Berardini et al., 2025). Automated systems are ideally available 24/7 and, once established, seem to be a reliable support for surveillance tasks. Automated and deep learning systems have been successfully applied in areas like healthcare (Dias et al., 2020; Konstantinidis et al., 2021), sports (Tisserand et al., 2017), and education (Stefanidis et al., 2019). In security AI-based systems have outperformed other methods (Pisati et al., 2024). Ultimately, AI is based on the understanding of the relevant behaviors and movement patterns defined for detection and the design of the program it is attached to (Dimitropoulos et al., 2021). Some scientific projects have explored threat identification at a crowd level. However, detailed work on the specific movement cues observers use to recognize emergent threats within a crowd is absent (Brunye et al., 2014; Crundall and Eyre-Jackson, 2017). Other structured assessment tools such as the Behavioral Threat Assessment and Management (BTAM) program and the Terrorist Radicalization Assessment Protocol (TRAP-18) (Guldimann and Meloy, 2020; Nguyen et al., 2024)—employ evidence-based tools to assess individuals at risk of targeted violence or radicalization, respectively. Though effective, these tools rely on timely, multidisciplinary, collaborative data collection from various sources, which can often be fragmented, limiting their practical application when law enforcement officer is faced with imminent threat (Nguyen et al., 2024; Meloy et al., 2021; Amman and MacKizer, 2017). TRAP-18 has shown strong reliability and predictive validity through studies assessing lone-actor threats (Guldimann and Meloy, 2020; Challacombe and Lucas, 2019), but like BTAM, it demands comprehensive multidisciplinary data and time for accurate evaluations. However, while these approaches and assessment tools are reliable for assessing the chances of radicalization of lone-actor terrorists, they do not include offender-related, movement-based indicators of the threat focusing on the moments directly prior to the attack. While TRAP-18 assesses the risk of radicalization from a wealth of data, the evaluation and detailed analysis of the imminent threat are not very well investigated. In this regard, findings on behavioral or movement abnormalities should, in the best case, support the accurate assessment of the level of danger, and prevent impending attacks (Sweet et al., 2023). Having the skills to know how and what to observe could be advantageous for officers and security personnel when dealing with members of the public, especially given the versatility of tasks officers perform in various settings (Kleygrewe et al., 2022), any of which could include unexpected attacks.
This scoping review aimed to identify and summarize knowledge regarding police officers and security personnel’s observation skills as part of an imminent threat assessment involving a concealed weapon or item, or an impending criminal act. The secondary aims include: (a) offering insights into current best practices in relation to human observer detection of a threat of concealed weapons, (b) exploration of common themes and challenges related to this topic, (c) discussing core findings, and (d) identifying relevant gaps in the literature and suggest directions for further research.
Methods
This scoping review followed the Preferred Reporting Items for Systematic reviews and Meta-Analyses extension for Scoping Reviews (PRISMA-SCR) guidelines (Page et al., 2021).
Search strategy, information sources, and eligibility criteria
A list of relevant key search terms, derived from the concepts of “threat assessment,” “observation,” and “law enforcement,” was prepared by the lead author (SA) and confirmed by fellow authors and in consultation with Bond University Library Services. Supplementary material 1 provides search terms for PubMed, with complete search terms for all databases provided. As needed, an ‘*’ Boolean operator was used to ensure variants of the terms were captured. The keywords were trialled to ensure known articles in this field were captured. Prior to use, the search terms were contextualized to each of the selected databases using the systematic review accelerator (Clark et al., 2020). A search of five different databases known to publish research in this field (Ovid Medline, PubMed, SportDiscus, Web of Science, and Embase) was conducted on the 26th of November 2024.
To be included in this review studies had to: (a) investigate a threat involving (i.e., violent attack) and/or threat in the form of concealed carry or evaluate the detection of threat (e.g., impending criminal acts), (b) report on the levels of task performance of the relevant population (e.g., detection task, observational task, prediction task) systematically and experimentally, including observation of movement/ behavior in the form of schematic or realistic material (e.g., Closed Circuit Television (CCTV) footage), (c) involve law enforcement, military and/ or security personnel undergoing threat assessment/identification, and (d) be peer-reviewed original research published in English. Studies were excluded if they: (a) investigated other threats (i.e., medical conditions, diseases, prevention of political, social, personal, or environmental crisis), (b) did not involve experimental research and/or included qualitative data collection only, (c) used ‘still’ images or material that did not portray movement (i.e., photographs or inanimate objects or lack of motion or movement), (d) used an automated detection system instead of human-based assessment (i.e., real-time surveillance CCTV footage, automated detection technology), or (e) focused on after incident assessment of offender behavior and/or on historical, medical, or personal data for behavior assessment (i.e., structured assessment of historical data on violent attacks such as terrorist attacks).
Screening and selection process
All records identified in the search were imported into a reference management software (EndNote, version 21, Clarivate Analytics, Philadelphia, United States), where duplicates were removed. After screening titles and abstracts, the full text of potentially relevant studies was obtained. Full-text studies were screened by the first author (SA), and findings were discussed with fellow authors (EFDC & RO) to minimize the risk of bias. The remaining relevant studies were printed, read, and processed in the following order: (1) Inspecting the title and keywords of the study, (2) reading and highlighting central information in the abstract, (3) cross-checking the keywords, the used terminology, and the investigated population (4) screening the conclusions section, the methods section and outcome measures, (5) identifying and marking common themes, approaches, methods and shared references (cross-referencing), and finally (6) reading the whole text highlighting relevant parts (if applicable) and extracting relevant information. The screening process focused on the mentioned inclusion/ exclusion criteria. The final decision on studies to be included was based on discussion and consensus between all authors.
Data charting and items
Data charting included tabulating key information for structured documentation purposes. Due to the heterogeneity of methods, paradigms, and measures used in the different studies, data charting was reported in two steps: (1) a table giving a general overview, excluding the outcome measures, and (2) a table reporting the studies documenting the individual outcome measures. Items of interest included study characteristics (authors, country, participants), experimental methodology, type of threat (i.e., carrying a concealed firearm or unstable object, suicide bomb attack, impending criminal act), performance in threat assessment/identification task, and outcome measures (e.g., firearm detection tests, measurement of sensitivity to non-verbal cues or concealed firearm, risk estimates).
Results
The systematic search yielded 14,812 records. Duplicates (n = 2,849) were removed, and 1,553 records were excluded as not relevant to the research question (e.g., risk assessment in the context of injuries/ diseases/ therapy treatment). The titles and abstracts of the remaining 10,410 records were screened, and 20 full-text studies were assessed for eligibility. Fifteen studies were excluded, with reasons documented (Supplementary material 2), leaving four studies eligible to be included in the review (Blechko et al., 2008; Crundall and Eyre-Jackson, 2017; Sweet et al., 2023; Sweet et al., 2017) as outlined in Figure 1.
Summary of included articles
Table 1 provides the characteristics of the four included studies. All included studies compared the ability of trained personnel (i.e., police officers, CCTV operators) and lay people (i.e., students, members of the public) to identify threats using video/motion analysis. However, given the differences in methodologies used, their findings will be reported separately.
Sweet et al. (2017) systematically investigated the ability of officers (age = 40.53 ± 8.83 years; years of experience = 14.53 ± 9.40) and naïve control group participants (students ranging from 18 to 24 (19.12 ± 1.35) years of age) to detect concealed weapons in schematic video footage in three discriminative studies. In their first experiment, officers and naïve controls performed significantly better than chance in discriminating threat (Cohen’s d = 0.27 95% CI [0.08, 0.46], t (106) = 2.79, p < 0.001) by identifying a concealed handgun via a classic signal detection paradigm. In their second experiment, participants had to assess whether one of several individuals carrying a backpack was carrying a concealed unstable device. Both investigated groups performed better than chance (d = 0.47 95% CI [0.31, 0.63], t (103) = 5.74, p < 0.001). In their final experiment, participants were asked to choose between two individuals, deciding which one of the two was concealing an unstable device in their backpack. In this study, police officers and the naïve control group performed at chance level (pc = 0.50 95% CI [0.47, 0.53], t (103) = 0.11, p = 0.91). All three experiments included customized schematic video footage of different scenarios and lengths. The researchers varied the threat stimuli (i.e., firearm, improvised explosive device (IED)) and choice paradigms (classic signal paradigm, compound decision paradigm, two-alternative forced choice paradigm). While officers and naïve controls performed significantly better than chance in the first experiment, outcomes of the second and third experiment showed no significant differences between laypeople and police officers in identifying weapon concealment or threat detection in form of an IED (Sweet et al., 2017).
In a later series of studies, Sweet et al., compared the perception of patterns of movement and the detection of concealment in law enforcement officers and naïve observers with a different team of colleagues. They conducted a series of experiments using a Lens Model framework (Sweet et al., 2023). The goal of the first study was to investigate the ability of law enforcement officers to identify and articulate behavioral cues in videos indicating a person is carrying a concealed weapon or item. Participants (n = 120) were recruited for the first study. These participants included 50 law enforcement officers (25 females) and 70 students (30 females). Officers ranged in age from 24 to 62 (age = 38.00 ± 7.60 years) and had a mean of 12.38 (±9.68) years of experience. Student participants ranged in age from 18 to 43 years (age = 29.15 ± 3.25). All participants in this experiment showed poor ability to distinguish between individuals concealing a handkerchief and those who were not (Sweet et al., 2023), with officers being less accurate than laypersons (M = 0.19 and 0.51, SD = 0.94 and 1.05, respectively).
The second study used material from the experiment of (Sweet et al., 2017). Fifty-one law enforcement officers (female = 6) and 56 students (male = 37) participated. The officers ranged in age from 27 to 64 years (age = 40.53 ± 8.83 years) and had a mean of 14.53 (± 9.40) years of experience. Student participants ranged in age from 18–24 years (age = 19.12 ± 1.35 years).
Participants had difficulties in identifying specific diagnostic behaviors for concealment and furthermore struggled in detecting whether the concealed object was a firearm, an unstable device, or a handkerchief. In summary, their second study suggests that discriminating between individuals who are concealing and those who are not can hardly be obtained by focussing on a few reliable behavioral cues or movement patterns. The outcome revealed poor judgment capabilities for law enforcement and naïve observers. Recommendations include further research to enable empirically supported training for the accurate and appropriate articulation of relevant behaviors, allowing for the clear justification when searching individuals who carry concealed weapons (Sweet et al., 2023).
Blechko et al. (2008) conducted an experiment comparing CCTV operators’ and laypeople’s skills in detecting concealed carry of individuals (a firearm or an innocuous object / a bottle) by viewing CCTV footage. The assessments were conducted in two steps: (1) a profile of the nonverbal sensitivity test (PONS Test) as designed by Rosenthal and colleagues measured the participant’s ability to read body language (decoding silent, non-verbal behavioral cues), and (2) a firearm detection test investigating the participants’ skill in detecting handgun carrying by using modified CCTV footage (Rosenthal et al., 1979). The outcome of the PONS test analyzing overall movement was similar between laypersons and CCTV operators (0.72 ± 0.06 and 0.71 ± 0.06, respectively). Similarly, the sensitivity to detect concealed firearms was not significantly different between laypersons and CCTV operators (U = 16.00; r = −0.42; p = 0.105). Notably, this study identified a significant negative correlation between the emotional state of the observed individuals, particularly when demonstrating sensation-seeking behavior, and an observer’s sensitivity to detect concealment (rs = −0.60; n = 12; p = 0.040). Although their findings demonstrated average success in the detection task, their outcomes showed that the emotions experienced by the individual carrying a concealed firearm could support the detection of concealed carry (Blechko et al., 2008).
Crundall and Eyre-Jackson (2017) investigated if experienced police officers had a superior ability to detect impending criminal acts when compared to the general public. The researchers compared police officers (age = 36 ± 9.0 years, range 21–56 years, M = 10 years in service) and members of the general public (age = 35.76 ± 12.0 years, range 20–63 years) in their accuracy for discriminating criminal intent by watching CCTV footage. Participants were randomly assigned to one of the two tested video display conditions (freeze frame or occlusion). In addition, the data also included control clips containing no criminal actions. Overall, participants responded significantly slower to the control clips than the crime clips [F(1,54) = 12.81, MSe = 1.24 p < 0.05, control clips mean = 3.07 s; crime clips mean = 2.33 s]. A main effect regarding the participant group was found [F(1,54) = 4.2, MSe = 125.4, p < 0.05], with police officers performing significantly better than members of the general public (55.7% vs. 49.6%) and the officers having the fastest response time in correctly identifying crime clips [F(1,54) = 3.94, MSe = 1.24, p = 0.05]. Given this experimental setup (with clips being obscured prior to the criminal act), the researchers’ findings support those officers attended key components of the given scenes in an appropriate and timely way. Officers were significantly better and faster in the detection task than members of the public (Crundall and Eyre-Jackson, 2017).
In summary, the four presented studies (Blechko et al., 2008; Crundall and Eyre-Jackson, 2017; Sweet et al., 2023; Sweet et al., 2017) investigated the ability of trained personnel (police officers and CCTV operators) to detect threats in the form of concealed firearms or objects alongside control groups of students and members of the general public. A common finding in the four studies was that most participants performed at chance level with trained personnel not performing much better than laypeople in detecting concealed objects or threats (Blechko et al., 2008; Sweet et al., 2017; Sweet et al., 2023). In only one study police officers outperformed lay people significantly (Crundall and Eyre-Jackson, 2017).
Although all studies used videos as stimuli, it must be noted that the four included studies used a variety of paradigms, materials, and methods in their investigations which impede comparability. The volume of evidence from these studies suggests that there is a major need for original and interventional research in this field.
Discussion
This scoping review aimed to identify literature and summarize knowledge about threat identification by human observers, explore common themes and challenges in this topic, and identify gaps in the literature to guide future research in threat identification. The current research focus, identified in this review, was on threat identification based on video material (i.e., CCTV footage) rather than investigating the human skill of acute ad hoc threat detection. The terminology and methodologies used across the studies were inconsistent, making comprehensive comparisons, volume of evidence summation, and direct transfer of outcomes to practice problematic.
Little systematic research was identified in this review that was specifically conducted on analyzing the performance of human detection tasks when aiming to identify threats. While threat assessment is typically conducted by trained experts in clinical settings prior to or after a critical incident (Meloy et al., 2012). Underpinned by the fact that human observers have been shown to be good at recognizing biological movement patterns (Johansson, 1973), the assessment of an imminent threat must be done in the field to provide ecologically valid results. Furthermore, performing well under extreme pressure is an essential requirement for law enforcement officers (Heusler and Sutter, 2020). Thus, officers must be able to recognize critical visual information (Fallon et al., 2014) and assess and react immediately according to an emerging situation (Murray et al., 2024). Vickers and Lewinski (2012) demonstrated that the ability to control gaze and focus of attention under threat result in better shooting accuracy, decision making, and firing speed. While this demonstrates that gaze control and focus of attention under threat are crucial, mechanisms behind how these are maintained during life-threatening situations still needs to be elucidated. Law enforcement officers have been victims of targeted violence, which makes a re-evaluation of traditional practices necessary (Harris and Lurigio, 2012). While some research does suggest that there is a difference in the nonverbal behavior of non-offenders and offenders (Koller et al., 2015), whereby criminal investigators were able to recognize thieves prior to them committing a crime, the scientific examination of the movement patterns and behaviors of attackers that occur immediately before, during, or after an attack is lacking (Dias et al., 2020; Konstantinidis et al., 2021; Tisserand et al., 2017; Stefanidis et al., 2019; Dimitropoulos et al., 2021; Brunye et al., 2014). The nature of policing duties yields a call for evidence-based, objective, and describable behavior patterns to train and support law enforcement officers in using a more diagnostic approach to detect threats, like the concealment of objects or weapons (Sweet et al., 2023). However, the volume of evidence to inform such training for police officers (and security officers) is limited.
The observation and analysis of behavior is a complex area to investigate, with numerous factors to consider and as such, it is an area that should not be neglected in favor of Artificial Intelligence (AI). As such, further research investigating and formalizing an approach to identify movement patterns and behaviors of attackers that occur immediately before, during, or after an attack is needed. Once these factors have been established and validated, officers and AI programs can be trained using a systematic and evidence-based approach.
Limitations
A limitation to this review was the scarcity of finding sufficient peer-reviewed, published research studies investigating this field to provide “best practice guidelines” for this framework to train threat assessment. The diversity of frameworks, forms of tasks and methodologies applied inhibits direct comparability of research outcomes. While critical for establishing evidence-based best practice, the inability to review and cite grey literature of classified documents (anticipated given this field of research, where security and safety issues are inevitably involved), limits broader knowledge development. A second-order impact of this security and safety limitation means that work may not be shared across agencies, thus limiting the cohesive development of an evidence-based system through which to inform training, be it for officers or AI programs.
Conclusion
Aiming to obtain the ‘street-level’ safety of an officer, training to identify threats as soon as possible is crucial when wanting to mitigate an immediate threat. Findings from the four studies informing this scoping review, include a diversity of approaches and outcomes, demonstrate a clear shortage of research in this area through which to build a volume of evidence to support best practice training. Research into this gap is necessary to assist in the prevention of life-threatening attacks on officers and larger-scale attacks on the community by individuals, as well as create more safety for presumable offenders. A focus on scenario-based experimental settings and detection tasks on real-life video footage could produce more transferable outcomes. To enhance future training and elevate the chances for safety for all involved, understanding the behaviors and movement patterns occurring prior to an attack needs to be at the core of future research interests. Interdisciplinary research projects should aim to answer questions like: What are the key movement patterns visible when carrying concealed? How can these patterns be described and explained? Consistency in methodology and research approach across a larger series of studies would support reliable and valid outcomes and enable the comparison of findings across the field. Structured basic research would furthermore facilitate the application of findings into AI-based systems. Stakeholders, scholars and practitioners aiming to understand the relevant behaviors related to immediate threats would benefit from this type of future research.
Data availability statement
The raw data supporting the conclusions of this article will be made available by the authors, without undue reservation, if requested.
Author contributions
SA: Conceptualization, Data curation, Formal analysis, Investigation, Methodology, Project administration, Resources, Software, Validation, Visualization, Writing – original draft, Writing – review & editing. C-CC: Methodology, Supervision, Writing – review & editing, Funding acquisition. RO: Conceptualization, Investigation, Methodology, Project administration, Supervision, Validation, Writing – review & editing. EC: Conceptualization, Data curation, Formal analysis, Investigation, Methodology, Project administration, Software, Supervision, Validation, Visualization, Writing – review & editing, Resources.
Funding
The author(s) declare that no financial support was received for the research and/or publication of this article.
Conflict of interest
The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.
Generative AI statement
The authors declare that no Gen AI was used in the creation of this manuscript.
Any alternative text (alt text) provided alongside figures in this article has been generated by Frontiers with the support of artificial intelligence and reasonable efforts have been made to ensure accuracy, including review by the authors wherever possible. If you identify any issues, please contact us.
Publisher’s note
All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.
Supplementary material
The Supplementary material for this article can be found online at: https://www.frontiersin.org/articles/10.3389/fpsyg.2025.1627066/full#supplementary-material
References
Abi-Nader, D., Harb, H., Jaber, A., Mansour, A., Osswald, C., Mostafa, N., et al. (2025). Marie: one-stage object detection mechanism for real-time identifying of firearms. Comput. Model. Eng. Sci. 142, 279–298. doi: 10.32604/cmes.2024.056816
Aikins, D. E., Martin, D. J., and Morgan, C. III. (2010). Decreased respiratory sinus arrhythmia in individuals with deceptive intent. Psychophysiology 47, 633–636. doi: 10.1111/j.1469-8986.2010.00976.x
Amman, M., and Mackizer, M. (2017). A crisis threat assessment: the boy in the bunker. J. Threat Assess. Manag. 4, 77–97. doi: 10.1037/tam0000081
Baumgartner, F. R., Epp, D. A., and Shoub, K. (2018). Suspect citizens: What 20 million traffic stops tell us about policing and race. Cambridge, UK: Cambridge University Press.
Berardini, D., Migliorelli, L., Galdelli, A., and Marín-Jiménez, M. J. (2025). Edge artificial intelligence and super-resolution for enhanced weapon detection in video surveillance. Eng. Appl. Artif. Intell. 140:109684. doi: 10.1016/j.engappai.2024.109684
Blechko, A., Darker, I., and Gale, A. (2008) Skills in detecting gun carrying from CCTV. 2008 42nd Annual IEEE International Carnahan Conference on Security Technology. IEEE, 265–271.
Brunye, T. T., Howe, J. L., and Mahoney, C. R. (2014). Seeing the crowd for the bomber: spontaneous threat perception from static and randomly moving crowd simulations. J. Exp. Psychol. Appl. 20, 303–322. doi: 10.1037/xap0000029
Challacombe, D. J., and Lucas, P. A. (2019). Postdicting violence with sovereign citizen actors: an exploratory test of the Trap-18. J. Threat Assess. Manag. 6, 51–59. doi: 10.1037/tam0000105
Clark, J. M., Sanders, S., Carter, M., Honeyman, D., Cleo, G., Auld, Y., et al. (2020). Improving the translation of search strategies using the polyglot search translator: a randomized controlled trial. J. Med. Libr. Assoc. 108, 195–207. doi: 10.5195/jmla.2020.834
Cohen, C. J., Morelli, F., and Scott, K. A. (2008) A surveillance system for the recognition of intent within individuals and crowds. 2008 IEEE Conference on Technologies for Homeland Security, IEEE, 559–565.
Covington, M. W., Huff-Corzine, L., and Corzine, J. (2014). Battered police: risk factors for violence against law enforcement officers. Violence Vict. 29, 34–52. doi: 10.1891/0886-6708.VV-D-12-00022
Crundall, D., and Eyre-Jackson, L. (2017). Predicting criminal incidents on the basis of non-verbal behaviour: the role of experience. Secur. J. 30, 703–716. doi: 10.1057/sj.2015.33
Darker, I., Gale, A., Ward, L., and Blechko, A. (2007) Can CCTV reliably detect gun crime? 2007 41st Annual IEEE International Carnahan Conference on Security Technology, IEEE, pp. 264–271.
Debnath, R., and Bhowmik, M. K. (2021). A comprehensive survey on computer vision based concepts, methodologies, analysis and applications for automatic gun/knife detection. J. Vis. Commun. Image Represent. 78:103165. doi: 10.1016/j.jvcir.2021.103165
Den Heyer, G. (2023). “Assaults on police officers: A review of the predictors” in Police use of force: Global perspectives and policy implications. eds. J. F. Albrecht, D. K. Das, and D. O. Das Cham, Switzerland: Springer Nature Switzerland. 233–264. doi: 10.1007/978-3-031-22705-9_12
Den Heyer, G. (2024). “Examining assaults on police officers: an international review of the factors that influence the occurrence of these attacks” in Special Topics in Policing: Critical Issues and Global Perspectives, volume 1. eds. J. F. Albrecht and G. den Heyer Cham, Switzerland: Springer Nature Switzerland 233–264. doi: 10.1007/978-3-031-56347-8_2
Dias, S. B., Grammatikopoulou, A., Diniz, J. A., Dimitropoulos, K., Grammalidis, N., Zilidou, V., et al. (2020). Innovative Parkinson's disease patients' motor skills assessment: the i-prognosis paradigm. Front. Comput. Sci. 2:20. doi: 10.3389/fcomp.2020.00020
Dimitropoulos, K., Daras, P., Manitsaris, S., Fol Leymarie, F., and Calinon, S. (2021). Artificial intelligence and human movement in industries and creation. Frontiers Media Sa 8. doi: 10.3389/frobt.2021.712521
Fallon, C. K., Panganiban, A. R., Wohleber, R., Matthews, G., Kustubayeva, A. M., and Roberts, R. (2014). Emotional intelligence, cognitive ability and information search in tactical decision-making. Pers. Individ. Differ. 65, 24–29. doi: 10.1016/j.paid.2014.01.029
FBI (2024). Federal Bureau of Investigation. Crime data explorer. National law enforcement officers killed and assaulted infographic. Available online at: https://www.fbi.gov/news/press-releases/fbi-releases-officers-killed-and-assaulted-in-the-line-of-duty-2023-special-report-and-law-enforcement-employee-counts (Accessed February 26, 2025)
Guldimann, A., and Meloy, J. R. (2020). Assessing the threat of lone-actor terrorism: the reliability and validity of the Trap-18. Forens. Psychiatr. Psychol. Kriminol. 14, 158–166. doi: 10.1007/s11757-020-00596-y
Harris, A. J., and Lurigio, A. J. (2012). Threat assessment and law enforcement practice. J. Police Crisis Negot. 12, 51–68. doi: 10.1080/15332586.2012.645375
Heusler, B., and Sutter, C. (2020). Gaze control in law enforcement: comparing a tactical police unit to patrol officers. J. Police Crim. Psychol. 33, 777–793. doi: 10.1007/s11896-020-09412-z
Johansson, G. (1973). Visual perception of biological motion and a model for its analysis. Percept. Psychophys. 14, 201–211. doi: 10.3758/BF03212378
Johnson, L. A. (2019). Understanding assaults against police officers: A study of conflict escalation in police encounters with the public. Leeds, UK: Doctoral dissertation, University of Leeds.
Kleygrewe, L., Oudejans, R. R., Koedijk, M., and Hutter, R. (2022). Police training in practice: organization and delivery according to European law enforcement agencies. Front. Psychol. 12. doi: 10.3389/fpsyg.2021.798067
Koller, C. I., Wetter, O. E., and Hofer, F. (2015). What is suspicious when trying to be inconspicuous? Criminal intentions inferred from nonverbal behavioral cues. Perception 44, 679–708. doi: 10.1177/0301006615594271
Konstantinidis, D., Dimitropoulos, K., and Daras, P. (2021) Towards real-time generalized ergonomic risk assessment for the prevention of musculoskeletal disorders. The 14th Pervasive Technologies Related to Assistive Environments Conference, 466–472.
Marchak, F. M. (2013). Detecting false intent using eye blink measures. Front. Psychol. 4:736. doi: 10.3389/fpsyg.2013.00736
Meloy, J. R., Goodwill, A., Clemmow, C., and Gill, P. (2021). Time sequencing the Trap-18 indicators. J. Threat Assess. Manag. 8, 1–19. doi: 10.1037/tam0000157
Meloy, R. J., Hoffmann, J., Guldimann, A., and James, D. (2012). The role of warning behaviors in threat assessment: an exploration and suggested typology. Behav. Sci. Law 30, 256–279. doi: 10.1002/bsl.999
Murray, N. P., Lewinski, W., Sandri Heidner, G., Lawton, J., and Horn, R. (2024). Gaze control and tactical decision-making under stress in active-duty police officers during a live use-of-force response. J. Mot. Behav. 56, 30–41. doi: 10.1080/00222895.2023.2229946
Nguyen, T. L., Scalora, M. J., and Bulling, D. (2024) Behavioral threat assessment and management programs: Practitioner-informed baseline capabilities. A technical report published by the National Counterterrorism Innovation Technology, and Education (NCITE) Center. Omaha: NE. Available online at: https://digitalcommons.unomaha.edu/cgi/viewcontent.cgi?article=1098&context=ncitereportsresearch
Orr, R., Hinton, B., Wilson, A., Pope, R., and Dawes, J. (2020). Investigating the routine dispatch tasks performed by police officers. Safety 6:54. doi: 10.3390/safety6040054
Page, M. J., Mckenzie, J. E., Bossuyt, P. M., Boutron, I., Hoffmann, T. C., Mulrow, C. D., et al. (2021). The PRISMA 2020 statement: an updated guideline for reporting systematic reviews. BMJ 372, 1–9. doi: 10.1136/bmj.n71
Pisati, R., Astya, R., and Chauhan, P. (2024) A profound review of AI-driven crime detection in CCTV videos. 2024 Sixth International Conference on Computational Intelligence and Communication Technologies (CCICT), IEEE, 193–199.
Pratihar, P., and Yadav, A. K. (2014). Detection techniques for human safety from concealed weapon and harmful. Int. Rev. Appl. Eng. Res. 4, 71–76.
Rosenthal, R., Hall, J. A., Dimatteo, M. R., Rogers, P. L., and Archer, D. (1979). Sensitivity to nonverbal communication: The Pons test. Baltimore, MD: Johns Hopkins University Press.
Schouten, R., and Brennan, D. V. (2016). Targeted violence against law enforcement officers. Behav. Sci. Law 34, 608–621. doi: 10.1002/bsl.2256
Shortland, N., Thompson, L., and Alison, L. (2020). Police perfection: examining the effect of trait maximization on police decision-making. Front. Psychol. 11:1817. doi: 10.3389/fpsyg.2020.01817
Stefanidis, K., Psaltis, A., Apostolakis, K. C., Dimitropoulos, K., and Daras, P. (2019). Learning prosocial skills through multiadaptive games: a case study. J. Comput. Educ. 6, 167–190. doi: 10.1007/s40692-019-00134-8
Sweet, D. M., Meissner, C. A., and Atkinson, D. J. (2017). Assessing law enforcement performance in behavior-based threat detection tasks involving a concealed weapon or device. Law Hum. Behav. 41, 411–421. doi: 10.1037/lhb0000243
Sweet, D. M., Quigley-Mcbride, A., Meissner, C. A., and Ringstad, K. (2023). Perceptions of movement patterns and concealment detection in naive observers and law enforcement officers: a lens model analysis. Crim. Justice Behav. 50, 351–373. doi: 10.1177/00938548221140360
Tiesman, H. M., Gwilliam, M., Konda, S., Rojek, J., and Marsh, S. (2018). Nonfatal injuries to law enforcement officers: a rise in assaults. Am. J. Prev. Med. 54, 503–509. doi: 10.1016/j.amepre.2017.12.005
Tisserand, Y., Magnenat-Thalmann, N., Unzueta, L., Linaza, M. T., Ahmadi, A., O’connor, N. E., et al. (2017). “Preservation and gamification of traditional sports” in Mixed reality and gamification for cultural heritage. eds. M. Ioannides, N. Magnenat-Thalmann, and G. Papagiannakis (Cham: Springer International Publishing).
Vickers, J. N., and Lewinski, W. (2012). Performing under pressure: gaze control, decision making and shooting performance of elite and rookie police officers. Hum. Mov. Sci. 31, 101–117. doi: 10.1016/j.humov.2011.04.004
Yadav, P., Gupta, N., and Sharma, P. K. (2025). WeaponVision Ai: a software for strengthening surveillance through deep learning in real-time automated weapon detection. Int. J. Inf. Technol. 17, 1717–1727. doi: 10.1007/s41870-024-02375-y
Keywords: concealed carry, detection, law enforcement, perception, non-verbal communication
Citation: Adiarte S, Carbon C-C, Orr R and Canetti EFD (2025) The critical role of threat detection and movement behavior assessment: Identifying key concepts, research scope, and gaps—a scoping review. Front. Psychol. 16:1627066. doi: 10.3389/fpsyg.2025.1627066
Edited by:
Nathan Brooks, New Zealand Police, New ZealandReviewed by:
Nicole Jones, North Carolina State Bureau of Investigation, United StatesBruno Dias, Key Operational Insights, LLC, United States
Copyright © 2025 Adiarte, Carbon, Orr and Canetti. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.
*Correspondence: Claus-Christian Carbon, Y2NjQHVuaS1iYW1iZXJnLmRl