Your new experience awaits. Try the new design now and help us make it even better

SYSTEMATIC REVIEW article

Front. Psychol., 01 October 2025

Sec. Forensic and Legal Psychology

Volume 16 - 2025 | https://doi.org/10.3389/fpsyg.2025.1627066

The critical role of threat detection and movement behavior assessment: Identifying key concepts, research scope, and gaps—a scoping review

Sandra Adiarte,,Sandra Adiarte1,2,3Claus-Christian Carbon
Claus-Christian Carbon3*Robin Orr,Robin Orr1,2Elisa F. D. Canetti,Elisa F. D. Canetti1,2
  • 1Tactical Research Unit, Bond University, Gold Coast, QLD, Australia
  • 2Faculty of Health Sciences and Medicine, Bond University, Gold Coast, QLD, Australia
  • 3Department of General Psychology and Methodology, University of Bamberg, Bamberg, Germany

Police officers face the challenging task of identifying potential threats daily. Failure to identify these threats soon enough can lead to physical injury, and, in the case of an armed offender, a fatal outcome. As such, the ability of an officer to identify an armed threat is critical. This scoping review aimed to identify and synthesize current literature regarding the ability of police officers or CCTV operators to identify an immediate source of threat. A systematic and repeated search of academic databases (Ovid Medline, PubMed, SportDiscus, Web of Science, and Embase) was finalized 26th of November 2024. All articles were screened for relevance against inclusion and exclusion criteria. A snowballing approach was employed, and the reference lists of pertinent studies were searched for additional sources of information. From an initial 14,812 records, four studies specifically met the eligibility criteria. All these studies evaluated the ability of law enforcement officers to identify threats and assessed the performance of the officers by investigating risk estimates and detection tests. Various video data-based tasks and tests have been used to assess the ability to identify upcoming or acute threats. Limited research has been published of studies investigating police officer concealed threat detection approaches, methods, and outcomes, highlighting a paucity of research in this critical field.

Introduction

Police officers face various types of threats daily. These threats can include potentially aggressive and dangerous behaviors (Covington et al., 2014; Tiesman et al., 2018) and dealing with individuals suffering from psychological conditions (Yee et al., 2020). Whilst dealing with these individuals, officers and security personnel may need to detect and identify threats like concealed weapons (Pratihar and Yadav, 2014) or identify people, making them the target of their aggression (Schouten and Brennan, 2016; Johnson, 2019). Stop-and-search situations can go fatally wrong (Baumgartner et al., 2018) due to resistance from alleged offenders hoping to escape arrest and face associated charges, leading to around 10% of all police officers being assaulted and violently attacked each year (Bierie, 2017), with the number of assaults against officers rising (FBI, 2024). While the factors influencing these occurrences vary (Den Heyer, 2023) and the challenge of analyzing such incidents lies in the complexity of these encounters (Den Heyer, 2024), the ability to detect and identify concealed weapons and potential threats is of great relevance, as well as the necessity to gain an empirical understanding of threats via behavioral approaches (Sweet et al., 2017).

This ability to detect and identify potential threats sooner could allow police officers (and security personnel) to react more quickly or even prevent violent or malicious acts. However, this requires police officers to identify threats through observation and inherent contextualization of the situation in dynamic and versatile circumstances (Orr et al., 2020). The complexity of this requirement is espoused by research identifying physical assaults as the leading cause of injury in police officers (Tiesman et al., 2018). Thus, training officers to identify threats through observation as soon as possible is crucial when aiming to obtain safety at an officer level as without this training, severe consequences may ensue, especially if decisions are made incorrectly or are made too slowly. These consequences include personal, psychological, and professional impacts. Moreover, the decisions made may impact the safety of others, including their colleagues, the suspects, potential victims, as well as bystanders (Shortland et al., 2020).

Within the last decade, research in this field of threat observation has focused on psychophysiological markers of threat (Aikins et al., 2010; Marchak, 2013) and on developing machine learning algorithms to detect the concealment of objects, such as handguns from video images (Cohen et al., 2008; Darker et al., 2007), and concealed items via detection systems (Debnath and Bhowmik, 2021). Recent publications reviewed the methods applied in real-time early detection of weapons (Berardini et al., 2025) and describe the remaining challenges with these automated systems (Abi-Nader et al., 2025; Yadav et al., 2025). The consistency in their performance is challenged when it comes to detecting small objects, multiple weapons, in occlusion of weapons, and detecting weapons of different types fast and consistently in varying and complex settings (Berardini et al., 2025). Automated systems are ideally available 24/7 and, once established, seem to be a reliable support for surveillance tasks. Automated and deep learning systems have been successfully applied in areas like healthcare (Dias et al., 2020; Konstantinidis et al., 2021), sports (Tisserand et al., 2017), and education (Stefanidis et al., 2019). In security AI-based systems have outperformed other methods (Pisati et al., 2024). Ultimately, AI is based on the understanding of the relevant behaviors and movement patterns defined for detection and the design of the program it is attached to (Dimitropoulos et al., 2021). Some scientific projects have explored threat identification at a crowd level. However, detailed work on the specific movement cues observers use to recognize emergent threats within a crowd is absent (Brunye et al., 2014; Crundall and Eyre-Jackson, 2017). Other structured assessment tools such as the Behavioral Threat Assessment and Management (BTAM) program and the Terrorist Radicalization Assessment Protocol (TRAP-18) (Guldimann and Meloy, 2020; Nguyen et al., 2024)—employ evidence-based tools to assess individuals at risk of targeted violence or radicalization, respectively. Though effective, these tools rely on timely, multidisciplinary, collaborative data collection from various sources, which can often be fragmented, limiting their practical application when law enforcement officer is faced with imminent threat (Nguyen et al., 2024; Meloy et al., 2021; Amman and MacKizer, 2017). TRAP-18 has shown strong reliability and predictive validity through studies assessing lone-actor threats (Guldimann and Meloy, 2020; Challacombe and Lucas, 2019), but like BTAM, it demands comprehensive multidisciplinary data and time for accurate evaluations. However, while these approaches and assessment tools are reliable for assessing the chances of radicalization of lone-actor terrorists, they do not include offender-related, movement-based indicators of the threat focusing on the moments directly prior to the attack. While TRAP-18 assesses the risk of radicalization from a wealth of data, the evaluation and detailed analysis of the imminent threat are not very well investigated. In this regard, findings on behavioral or movement abnormalities should, in the best case, support the accurate assessment of the level of danger, and prevent impending attacks (Sweet et al., 2023). Having the skills to know how and what to observe could be advantageous for officers and security personnel when dealing with members of the public, especially given the versatility of tasks officers perform in various settings (Kleygrewe et al., 2022), any of which could include unexpected attacks.

This scoping review aimed to identify and summarize knowledge regarding police officers and security personnel’s observation skills as part of an imminent threat assessment involving a concealed weapon or item, or an impending criminal act. The secondary aims include: (a) offering insights into current best practices in relation to human observer detection of a threat of concealed weapons, (b) exploration of common themes and challenges related to this topic, (c) discussing core findings, and (d) identifying relevant gaps in the literature and suggest directions for further research.

Methods

This scoping review followed the Preferred Reporting Items for Systematic reviews and Meta-Analyses extension for Scoping Reviews (PRISMA-SCR) guidelines (Page et al., 2021).

Search strategy, information sources, and eligibility criteria

A list of relevant key search terms, derived from the concepts of “threat assessment,” “observation,” and “law enforcement,” was prepared by the lead author (SA) and confirmed by fellow authors and in consultation with Bond University Library Services. Supplementary material 1 provides search terms for PubMed, with complete search terms for all databases provided. As needed, an ‘*’ Boolean operator was used to ensure variants of the terms were captured. The keywords were trialled to ensure known articles in this field were captured. Prior to use, the search terms were contextualized to each of the selected databases using the systematic review accelerator (Clark et al., 2020). A search of five different databases known to publish research in this field (Ovid Medline, PubMed, SportDiscus, Web of Science, and Embase) was conducted on the 26th of November 2024.

To be included in this review studies had to: (a) investigate a threat involving (i.e., violent attack) and/or threat in the form of concealed carry or evaluate the detection of threat (e.g., impending criminal acts), (b) report on the levels of task performance of the relevant population (e.g., detection task, observational task, prediction task) systematically and experimentally, including observation of movement/ behavior in the form of schematic or realistic material (e.g., Closed Circuit Television (CCTV) footage), (c) involve law enforcement, military and/ or security personnel undergoing threat assessment/identification, and (d) be peer-reviewed original research published in English. Studies were excluded if they: (a) investigated other threats (i.e., medical conditions, diseases, prevention of political, social, personal, or environmental crisis), (b) did not involve experimental research and/or included qualitative data collection only, (c) used ‘still’ images or material that did not portray movement (i.e., photographs or inanimate objects or lack of motion or movement), (d) used an automated detection system instead of human-based assessment (i.e., real-time surveillance CCTV footage, automated detection technology), or (e) focused on after incident assessment of offender behavior and/or on historical, medical, or personal data for behavior assessment (i.e., structured assessment of historical data on violent attacks such as terrorist attacks).

Screening and selection process

All records identified in the search were imported into a reference management software (EndNote, version 21, Clarivate Analytics, Philadelphia, United States), where duplicates were removed. After screening titles and abstracts, the full text of potentially relevant studies was obtained. Full-text studies were screened by the first author (SA), and findings were discussed with fellow authors (EFDC & RO) to minimize the risk of bias. The remaining relevant studies were printed, read, and processed in the following order: (1) Inspecting the title and keywords of the study, (2) reading and highlighting central information in the abstract, (3) cross-checking the keywords, the used terminology, and the investigated population (4) screening the conclusions section, the methods section and outcome measures, (5) identifying and marking common themes, approaches, methods and shared references (cross-referencing), and finally (6) reading the whole text highlighting relevant parts (if applicable) and extracting relevant information. The screening process focused on the mentioned inclusion/ exclusion criteria. The final decision on studies to be included was based on discussion and consensus between all authors.

Data charting and items

Data charting included tabulating key information for structured documentation purposes. Due to the heterogeneity of methods, paradigms, and measures used in the different studies, data charting was reported in two steps: (1) a table giving a general overview, excluding the outcome measures, and (2) a table reporting the studies documenting the individual outcome measures. Items of interest included study characteristics (authors, country, participants), experimental methodology, type of threat (i.e., carrying a concealed firearm or unstable object, suicide bomb attack, impending criminal act), performance in threat assessment/identification task, and outcome measures (e.g., firearm detection tests, measurement of sensitivity to non-verbal cues or concealed firearm, risk estimates).

Results

The systematic search yielded 14,812 records. Duplicates (n = 2,849) were removed, and 1,553 records were excluded as not relevant to the research question (e.g., risk assessment in the context of injuries/ diseases/ therapy treatment). The titles and abstracts of the remaining 10,410 records were screened, and 20 full-text studies were assessed for eligibility. Fifteen studies were excluded, with reasons documented (Supplementary material 2), leaving four studies eligible to be included in the review (Blechko et al., 2008; Crundall and Eyre-Jackson, 2017; Sweet et al., 2023; Sweet et al., 2017) as outlined in Figure 1.

Figure 1
Flowchart illustrating the selection process for studies. On the left, records from databases and registers: 14,812 identified, 2,849 duplicates removed, 10,410 screened, 10,390 excluded, 20 reports sought, 20 assessed, 16 excluded, 4 included. On the right, other methods: zero records identified, reports sought, assessed, or excluded. Total studies included: four.

Figure 1. Prisma flow diagram.

Summary of included articles

Table 1 provides the characteristics of the four included studies. All included studies compared the ability of trained personnel (i.e., police officers, CCTV operators) and lay people (i.e., students, members of the public) to identify threats using video/motion analysis. However, given the differences in methodologies used, their findings will be reported separately.

Table 1
www.frontiersin.org

Table 1. Characteristics of included studies.

Sweet et al. (2017) systematically investigated the ability of officers (age = 40.53 ± 8.83 years; years of experience = 14.53 ± 9.40) and naïve control group participants (students ranging from 18 to 24 (19.12 ± 1.35) years of age) to detect concealed weapons in schematic video footage in three discriminative studies. In their first experiment, officers and naïve controls performed significantly better than chance in discriminating threat (Cohen’s d = 0.27 95% CI [0.08, 0.46], t (106) = 2.79, p < 0.001) by identifying a concealed handgun via a classic signal detection paradigm. In their second experiment, participants had to assess whether one of several individuals carrying a backpack was carrying a concealed unstable device. Both investigated groups performed better than chance (d = 0.47 95% CI [0.31, 0.63], t (103) = 5.74, p < 0.001). In their final experiment, participants were asked to choose between two individuals, deciding which one of the two was concealing an unstable device in their backpack. In this study, police officers and the naïve control group performed at chance level (pc = 0.50 95% CI [0.47, 0.53], t (103) = 0.11, p = 0.91). All three experiments included customized schematic video footage of different scenarios and lengths. The researchers varied the threat stimuli (i.e., firearm, improvised explosive device (IED)) and choice paradigms (classic signal paradigm, compound decision paradigm, two-alternative forced choice paradigm). While officers and naïve controls performed significantly better than chance in the first experiment, outcomes of the second and third experiment showed no significant differences between laypeople and police officers in identifying weapon concealment or threat detection in form of an IED (Sweet et al., 2017).

In a later series of studies, Sweet et al., compared the perception of patterns of movement and the detection of concealment in law enforcement officers and naïve observers with a different team of colleagues. They conducted a series of experiments using a Lens Model framework (Sweet et al., 2023). The goal of the first study was to investigate the ability of law enforcement officers to identify and articulate behavioral cues in videos indicating a person is carrying a concealed weapon or item. Participants (n = 120) were recruited for the first study. These participants included 50 law enforcement officers (25 females) and 70 students (30 females). Officers ranged in age from 24 to 62 (age = 38.00 ± 7.60 years) and had a mean of 12.38 (±9.68) years of experience. Student participants ranged in age from 18 to 43 years (age = 29.15 ± 3.25). All participants in this experiment showed poor ability to distinguish between individuals concealing a handkerchief and those who were not (Sweet et al., 2023), with officers being less accurate than laypersons (M = 0.19 and 0.51, SD = 0.94 and 1.05, respectively).

The second study used material from the experiment of (Sweet et al., 2017). Fifty-one law enforcement officers (female = 6) and 56 students (male = 37) participated. The officers ranged in age from 27 to 64 years (age = 40.53 ± 8.83 years) and had a mean of 14.53 (± 9.40) years of experience. Student participants ranged in age from 18–24 years (age = 19.12 ± 1.35 years).

Participants had difficulties in identifying specific diagnostic behaviors for concealment and furthermore struggled in detecting whether the concealed object was a firearm, an unstable device, or a handkerchief. In summary, their second study suggests that discriminating between individuals who are concealing and those who are not can hardly be obtained by focussing on a few reliable behavioral cues or movement patterns. The outcome revealed poor judgment capabilities for law enforcement and naïve observers. Recommendations include further research to enable empirically supported training for the accurate and appropriate articulation of relevant behaviors, allowing for the clear justification when searching individuals who carry concealed weapons (Sweet et al., 2023).

Blechko et al. (2008) conducted an experiment comparing CCTV operators’ and laypeople’s skills in detecting concealed carry of individuals (a firearm or an innocuous object / a bottle) by viewing CCTV footage. The assessments were conducted in two steps: (1) a profile of the nonverbal sensitivity test (PONS Test) as designed by Rosenthal and colleagues measured the participant’s ability to read body language (decoding silent, non-verbal behavioral cues), and (2) a firearm detection test investigating the participants’ skill in detecting handgun carrying by using modified CCTV footage (Rosenthal et al., 1979). The outcome of the PONS test analyzing overall movement was similar between laypersons and CCTV operators (0.72 ± 0.06 and 0.71 ± 0.06, respectively). Similarly, the sensitivity to detect concealed firearms was not significantly different between laypersons and CCTV operators (U = 16.00; r = −0.42; p = 0.105). Notably, this study identified a significant negative correlation between the emotional state of the observed individuals, particularly when demonstrating sensation-seeking behavior, and an observer’s sensitivity to detect concealment (rs = −0.60; n = 12; p = 0.040). Although their findings demonstrated average success in the detection task, their outcomes showed that the emotions experienced by the individual carrying a concealed firearm could support the detection of concealed carry (Blechko et al., 2008).

Crundall and Eyre-Jackson (2017) investigated if experienced police officers had a superior ability to detect impending criminal acts when compared to the general public. The researchers compared police officers (age = 36 ± 9.0 years, range 21–56 years, M = 10 years in service) and members of the general public (age = 35.76 ± 12.0 years, range 20–63 years) in their accuracy for discriminating criminal intent by watching CCTV footage. Participants were randomly assigned to one of the two tested video display conditions (freeze frame or occlusion). In addition, the data also included control clips containing no criminal actions. Overall, participants responded significantly slower to the control clips than the crime clips [F(1,54) = 12.81, MSe = 1.24 p < 0.05, control clips mean = 3.07 s; crime clips mean = 2.33 s]. A main effect regarding the participant group was found [F(1,54) = 4.2, MSe = 125.4, p < 0.05], with police officers performing significantly better than members of the general public (55.7% vs. 49.6%) and the officers having the fastest response time in correctly identifying crime clips [F(1,54) = 3.94, MSe = 1.24, p = 0.05]. Given this experimental setup (with clips being obscured prior to the criminal act), the researchers’ findings support those officers attended key components of the given scenes in an appropriate and timely way. Officers were significantly better and faster in the detection task than members of the public (Crundall and Eyre-Jackson, 2017).

In summary, the four presented studies (Blechko et al., 2008; Crundall and Eyre-Jackson, 2017; Sweet et al., 2023; Sweet et al., 2017) investigated the ability of trained personnel (police officers and CCTV operators) to detect threats in the form of concealed firearms or objects alongside control groups of students and members of the general public. A common finding in the four studies was that most participants performed at chance level with trained personnel not performing much better than laypeople in detecting concealed objects or threats (Blechko et al., 2008; Sweet et al., 2017; Sweet et al., 2023). In only one study police officers outperformed lay people significantly (Crundall and Eyre-Jackson, 2017).

Although all studies used videos as stimuli, it must be noted that the four included studies used a variety of paradigms, materials, and methods in their investigations which impede comparability. The volume of evidence from these studies suggests that there is a major need for original and interventional research in this field.

Discussion

This scoping review aimed to identify literature and summarize knowledge about threat identification by human observers, explore common themes and challenges in this topic, and identify gaps in the literature to guide future research in threat identification. The current research focus, identified in this review, was on threat identification based on video material (i.e., CCTV footage) rather than investigating the human skill of acute ad hoc threat detection. The terminology and methodologies used across the studies were inconsistent, making comprehensive comparisons, volume of evidence summation, and direct transfer of outcomes to practice problematic.

Little systematic research was identified in this review that was specifically conducted on analyzing the performance of human detection tasks when aiming to identify threats. While threat assessment is typically conducted by trained experts in clinical settings prior to or after a critical incident (Meloy et al., 2012). Underpinned by the fact that human observers have been shown to be good at recognizing biological movement patterns (Johansson, 1973), the assessment of an imminent threat must be done in the field to provide ecologically valid results. Furthermore, performing well under extreme pressure is an essential requirement for law enforcement officers (Heusler and Sutter, 2020). Thus, officers must be able to recognize critical visual information (Fallon et al., 2014) and assess and react immediately according to an emerging situation (Murray et al., 2024). Vickers and Lewinski (2012) demonstrated that the ability to control gaze and focus of attention under threat result in better shooting accuracy, decision making, and firing speed. While this demonstrates that gaze control and focus of attention under threat are crucial, mechanisms behind how these are maintained during life-threatening situations still needs to be elucidated. Law enforcement officers have been victims of targeted violence, which makes a re-evaluation of traditional practices necessary (Harris and Lurigio, 2012). While some research does suggest that there is a difference in the nonverbal behavior of non-offenders and offenders (Koller et al., 2015), whereby criminal investigators were able to recognize thieves prior to them committing a crime, the scientific examination of the movement patterns and behaviors of attackers that occur immediately before, during, or after an attack is lacking (Dias et al., 2020; Konstantinidis et al., 2021; Tisserand et al., 2017; Stefanidis et al., 2019; Dimitropoulos et al., 2021; Brunye et al., 2014). The nature of policing duties yields a call for evidence-based, objective, and describable behavior patterns to train and support law enforcement officers in using a more diagnostic approach to detect threats, like the concealment of objects or weapons (Sweet et al., 2023). However, the volume of evidence to inform such training for police officers (and security officers) is limited.

The observation and analysis of behavior is a complex area to investigate, with numerous factors to consider and as such, it is an area that should not be neglected in favor of Artificial Intelligence (AI). As such, further research investigating and formalizing an approach to identify movement patterns and behaviors of attackers that occur immediately before, during, or after an attack is needed. Once these factors have been established and validated, officers and AI programs can be trained using a systematic and evidence-based approach.

Limitations

A limitation to this review was the scarcity of finding sufficient peer-reviewed, published research studies investigating this field to provide “best practice guidelines” for this framework to train threat assessment. The diversity of frameworks, forms of tasks and methodologies applied inhibits direct comparability of research outcomes. While critical for establishing evidence-based best practice, the inability to review and cite grey literature of classified documents (anticipated given this field of research, where security and safety issues are inevitably involved), limits broader knowledge development. A second-order impact of this security and safety limitation means that work may not be shared across agencies, thus limiting the cohesive development of an evidence-based system through which to inform training, be it for officers or AI programs.

Conclusion

Aiming to obtain the ‘street-level’ safety of an officer, training to identify threats as soon as possible is crucial when wanting to mitigate an immediate threat. Findings from the four studies informing this scoping review, include a diversity of approaches and outcomes, demonstrate a clear shortage of research in this area through which to build a volume of evidence to support best practice training. Research into this gap is necessary to assist in the prevention of life-threatening attacks on officers and larger-scale attacks on the community by individuals, as well as create more safety for presumable offenders. A focus on scenario-based experimental settings and detection tasks on real-life video footage could produce more transferable outcomes. To enhance future training and elevate the chances for safety for all involved, understanding the behaviors and movement patterns occurring prior to an attack needs to be at the core of future research interests. Interdisciplinary research projects should aim to answer questions like: What are the key movement patterns visible when carrying concealed? How can these patterns be described and explained? Consistency in methodology and research approach across a larger series of studies would support reliable and valid outcomes and enable the comparison of findings across the field. Structured basic research would furthermore facilitate the application of findings into AI-based systems. Stakeholders, scholars and practitioners aiming to understand the relevant behaviors related to immediate threats would benefit from this type of future research.

Data availability statement

The raw data supporting the conclusions of this article will be made available by the authors, without undue reservation, if requested.

Author contributions

SA: Conceptualization, Data curation, Formal analysis, Investigation, Methodology, Project administration, Resources, Software, Validation, Visualization, Writing – original draft, Writing – review & editing. C-CC: Methodology, Supervision, Writing – review & editing, Funding acquisition. RO: Conceptualization, Investigation, Methodology, Project administration, Supervision, Validation, Writing – review & editing. EC: Conceptualization, Data curation, Formal analysis, Investigation, Methodology, Project administration, Software, Supervision, Validation, Visualization, Writing – review & editing, Resources.

Funding

The author(s) declare that no financial support was received for the research and/or publication of this article.

Conflict of interest

The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.

Generative AI statement

The authors declare that no Gen AI was used in the creation of this manuscript.

Any alternative text (alt text) provided alongside figures in this article has been generated by Frontiers with the support of artificial intelligence and reasonable efforts have been made to ensure accuracy, including review by the authors wherever possible. If you identify any issues, please contact us.

Publisher’s note

All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.

Supplementary material

The Supplementary material for this article can be found online at: https://www.frontiersin.org/articles/10.3389/fpsyg.2025.1627066/full#supplementary-material

References

Abi-Nader, D., Harb, H., Jaber, A., Mansour, A., Osswald, C., Mostafa, N., et al. (2025). Marie: one-stage object detection mechanism for real-time identifying of firearms. Comput. Model. Eng. Sci. 142, 279–298. doi: 10.32604/cmes.2024.056816

Crossref Full Text | Google Scholar

Aikins, D. E., Martin, D. J., and Morgan, C. III. (2010). Decreased respiratory sinus arrhythmia in individuals with deceptive intent. Psychophysiology 47, 633–636. doi: 10.1111/j.1469-8986.2010.00976.x

PubMed Abstract | Crossref Full Text | Google Scholar

Amman, M., and Mackizer, M. (2017). A crisis threat assessment: the boy in the bunker. J. Threat Assess. Manag. 4, 77–97. doi: 10.1037/tam0000081

Crossref Full Text | Google Scholar

Baumgartner, F. R., Epp, D. A., and Shoub, K. (2018). Suspect citizens: What 20 million traffic stops tell us about policing and race. Cambridge, UK: Cambridge University Press.

Google Scholar

Berardini, D., Migliorelli, L., Galdelli, A., and Marín-Jiménez, M. J. (2025). Edge artificial intelligence and super-resolution for enhanced weapon detection in video surveillance. Eng. Appl. Artif. Intell. 140:109684. doi: 10.1016/j.engappai.2024.109684

Crossref Full Text | Google Scholar

Bierie, D. M. (2017). Assault of police. Crime Delinq. 63, 899–925. doi: 10.1177/0011128715574977

Crossref Full Text | Google Scholar

Blechko, A., Darker, I., and Gale, A. (2008) Skills in detecting gun carrying from CCTV. 2008 42nd Annual IEEE International Carnahan Conference on Security Technology. IEEE, 265–271.

Google Scholar

Brunye, T. T., Howe, J. L., and Mahoney, C. R. (2014). Seeing the crowd for the bomber: spontaneous threat perception from static and randomly moving crowd simulations. J. Exp. Psychol. Appl. 20, 303–322. doi: 10.1037/xap0000029

PubMed Abstract | Crossref Full Text | Google Scholar

Challacombe, D. J., and Lucas, P. A. (2019). Postdicting violence with sovereign citizen actors: an exploratory test of the Trap-18. J. Threat Assess. Manag. 6, 51–59. doi: 10.1037/tam0000105

Crossref Full Text | Google Scholar

Clark, J. M., Sanders, S., Carter, M., Honeyman, D., Cleo, G., Auld, Y., et al. (2020). Improving the translation of search strategies using the polyglot search translator: a randomized controlled trial. J. Med. Libr. Assoc. 108, 195–207. doi: 10.5195/jmla.2020.834

PubMed Abstract | Crossref Full Text | Google Scholar

Cohen, C. J., Morelli, F., and Scott, K. A. (2008) A surveillance system for the recognition of intent within individuals and crowds. 2008 IEEE Conference on Technologies for Homeland Security, IEEE, 559–565.

Google Scholar

Covington, M. W., Huff-Corzine, L., and Corzine, J. (2014). Battered police: risk factors for violence against law enforcement officers. Violence Vict. 29, 34–52. doi: 10.1891/0886-6708.VV-D-12-00022

PubMed Abstract | Crossref Full Text | Google Scholar

Crundall, D., and Eyre-Jackson, L. (2017). Predicting criminal incidents on the basis of non-verbal behaviour: the role of experience. Secur. J. 30, 703–716. doi: 10.1057/sj.2015.33

Crossref Full Text | Google Scholar

Darker, I., Gale, A., Ward, L., and Blechko, A. (2007) Can CCTV reliably detect gun crime? 2007 41st Annual IEEE International Carnahan Conference on Security Technology, IEEE, pp. 264–271.

Google Scholar

Debnath, R., and Bhowmik, M. K. (2021). A comprehensive survey on computer vision based concepts, methodologies, analysis and applications for automatic gun/knife detection. J. Vis. Commun. Image Represent. 78:103165. doi: 10.1016/j.jvcir.2021.103165

Crossref Full Text | Google Scholar

Den Heyer, G. (2023). “Assaults on police officers: A review of the predictors” in Police use of force: Global perspectives and policy implications. eds. J. F. Albrecht, D. K. Das, and D. O. Das Cham, Switzerland: Springer Nature Switzerland. 233–264. doi: 10.1007/978-3-031-22705-9_12

Crossref Full Text | Google Scholar

Den Heyer, G. (2024). “Examining assaults on police officers: an international review of the factors that influence the occurrence of these attacks” in Special Topics in Policing: Critical Issues and Global Perspectives, volume 1. eds. J. F. Albrecht and G. den Heyer Cham, Switzerland: Springer Nature Switzerland 233–264. doi: 10.1007/978-3-031-56347-8_2

Crossref Full Text | Google Scholar

Dias, S. B., Grammatikopoulou, A., Diniz, J. A., Dimitropoulos, K., Grammalidis, N., Zilidou, V., et al. (2020). Innovative Parkinson's disease patients' motor skills assessment: the i-prognosis paradigm. Front. Comput. Sci. 2:20. doi: 10.3389/fcomp.2020.00020

Crossref Full Text | Google Scholar

Dimitropoulos, K., Daras, P., Manitsaris, S., Fol Leymarie, F., and Calinon, S. (2021). Artificial intelligence and human movement in industries and creation. Frontiers Media Sa 8. doi: 10.3389/frobt.2021.712521

PubMed Abstract | Crossref Full Text | Google Scholar

Fallon, C. K., Panganiban, A. R., Wohleber, R., Matthews, G., Kustubayeva, A. M., and Roberts, R. (2014). Emotional intelligence, cognitive ability and information search in tactical decision-making. Pers. Individ. Differ. 65, 24–29. doi: 10.1016/j.paid.2014.01.029

Crossref Full Text | Google Scholar

FBI (2024). Federal Bureau of Investigation. Crime data explorer. National law enforcement officers killed and assaulted infographic. Available online at: https://www.fbi.gov/news/press-releases/fbi-releases-officers-killed-and-assaulted-in-the-line-of-duty-2023-special-report-and-law-enforcement-employee-counts (Accessed February 26, 2025)

Google Scholar

Guldimann, A., and Meloy, J. R. (2020). Assessing the threat of lone-actor terrorism: the reliability and validity of the Trap-18. Forens. Psychiatr. Psychol. Kriminol. 14, 158–166. doi: 10.1007/s11757-020-00596-y

Crossref Full Text | Google Scholar

Harris, A. J., and Lurigio, A. J. (2012). Threat assessment and law enforcement practice. J. Police Crisis Negot. 12, 51–68. doi: 10.1080/15332586.2012.645375

Crossref Full Text | Google Scholar

Heusler, B., and Sutter, C. (2020). Gaze control in law enforcement: comparing a tactical police unit to patrol officers. J. Police Crim. Psychol. 33, 777–793. doi: 10.1007/s11896-020-09412-z

Crossref Full Text | Google Scholar

Johansson, G. (1973). Visual perception of biological motion and a model for its analysis. Percept. Psychophys. 14, 201–211. doi: 10.3758/BF03212378

Crossref Full Text | Google Scholar

Johnson, L. A. (2019). Understanding assaults against police officers: A study of conflict escalation in police encounters with the public. Leeds, UK: Doctoral dissertation, University of Leeds.

Google Scholar

Kleygrewe, L., Oudejans, R. R., Koedijk, M., and Hutter, R. (2022). Police training in practice: organization and delivery according to European law enforcement agencies. Front. Psychol. 12. doi: 10.3389/fpsyg.2021.798067

PubMed Abstract | Crossref Full Text | Google Scholar

Koller, C. I., Wetter, O. E., and Hofer, F. (2015). What is suspicious when trying to be inconspicuous? Criminal intentions inferred from nonverbal behavioral cues. Perception 44, 679–708. doi: 10.1177/0301006615594271

PubMed Abstract | Crossref Full Text | Google Scholar

Konstantinidis, D., Dimitropoulos, K., and Daras, P. (2021) Towards real-time generalized ergonomic risk assessment for the prevention of musculoskeletal disorders. The 14th Pervasive Technologies Related to Assistive Environments Conference, 466–472.

Google Scholar

Marchak, F. M. (2013). Detecting false intent using eye blink measures. Front. Psychol. 4:736. doi: 10.3389/fpsyg.2013.00736

PubMed Abstract | Crossref Full Text | Google Scholar

Meloy, J. R., Goodwill, A., Clemmow, C., and Gill, P. (2021). Time sequencing the Trap-18 indicators. J. Threat Assess. Manag. 8, 1–19. doi: 10.1037/tam0000157

Crossref Full Text | Google Scholar

Meloy, R. J., Hoffmann, J., Guldimann, A., and James, D. (2012). The role of warning behaviors in threat assessment: an exploration and suggested typology. Behav. Sci. Law 30, 256–279. doi: 10.1002/bsl.999

Crossref Full Text | Google Scholar

Murray, N. P., Lewinski, W., Sandri Heidner, G., Lawton, J., and Horn, R. (2024). Gaze control and tactical decision-making under stress in active-duty police officers during a live use-of-force response. J. Mot. Behav. 56, 30–41. doi: 10.1080/00222895.2023.2229946

PubMed Abstract | Crossref Full Text | Google Scholar

Nguyen, T. L., Scalora, M. J., and Bulling, D. (2024) Behavioral threat assessment and management programs: Practitioner-informed baseline capabilities. A technical report published by the National Counterterrorism Innovation Technology, and Education (NCITE) Center. Omaha: NE. Available online at: https://digitalcommons.unomaha.edu/cgi/viewcontent.cgi?article=1098&context=ncitereportsresearch

Google Scholar

Orr, R., Hinton, B., Wilson, A., Pope, R., and Dawes, J. (2020). Investigating the routine dispatch tasks performed by police officers. Safety 6:54. doi: 10.3390/safety6040054

Crossref Full Text | Google Scholar

Page, M. J., Mckenzie, J. E., Bossuyt, P. M., Boutron, I., Hoffmann, T. C., Mulrow, C. D., et al. (2021). The PRISMA 2020 statement: an updated guideline for reporting systematic reviews. BMJ 372, 1–9. doi: 10.1136/bmj.n71

Crossref Full Text | Google Scholar

Pisati, R., Astya, R., and Chauhan, P. (2024) A profound review of AI-driven crime detection in CCTV videos. 2024 Sixth International Conference on Computational Intelligence and Communication Technologies (CCICT), IEEE, 193–199.

Google Scholar

Pratihar, P., and Yadav, A. K. (2014). Detection techniques for human safety from concealed weapon and harmful. Int. Rev. Appl. Eng. Res. 4, 71–76.

Google Scholar

Rosenthal, R., Hall, J. A., Dimatteo, M. R., Rogers, P. L., and Archer, D. (1979). Sensitivity to nonverbal communication: The Pons test. Baltimore, MD: Johns Hopkins University Press.

Google Scholar

Schouten, R., and Brennan, D. V. (2016). Targeted violence against law enforcement officers. Behav. Sci. Law 34, 608–621. doi: 10.1002/bsl.2256

PubMed Abstract | Crossref Full Text | Google Scholar

Shortland, N., Thompson, L., and Alison, L. (2020). Police perfection: examining the effect of trait maximization on police decision-making. Front. Psychol. 11:1817. doi: 10.3389/fpsyg.2020.01817

PubMed Abstract | Crossref Full Text | Google Scholar

Stefanidis, K., Psaltis, A., Apostolakis, K. C., Dimitropoulos, K., and Daras, P. (2019). Learning prosocial skills through multiadaptive games: a case study. J. Comput. Educ. 6, 167–190. doi: 10.1007/s40692-019-00134-8

Crossref Full Text | Google Scholar

Sweet, D. M., Meissner, C. A., and Atkinson, D. J. (2017). Assessing law enforcement performance in behavior-based threat detection tasks involving a concealed weapon or device. Law Hum. Behav. 41, 411–421. doi: 10.1037/lhb0000243

Crossref Full Text | Google Scholar

Sweet, D. M., Quigley-Mcbride, A., Meissner, C. A., and Ringstad, K. (2023). Perceptions of movement patterns and concealment detection in naive observers and law enforcement officers: a lens model analysis. Crim. Justice Behav. 50, 351–373. doi: 10.1177/00938548221140360

Crossref Full Text | Google Scholar

Tiesman, H. M., Gwilliam, M., Konda, S., Rojek, J., and Marsh, S. (2018). Nonfatal injuries to law enforcement officers: a rise in assaults. Am. J. Prev. Med. 54, 503–509. doi: 10.1016/j.amepre.2017.12.005

PubMed Abstract | Crossref Full Text | Google Scholar

Tisserand, Y., Magnenat-Thalmann, N., Unzueta, L., Linaza, M. T., Ahmadi, A., O’connor, N. E., et al. (2017). “Preservation and gamification of traditional sports” in Mixed reality and gamification for cultural heritage. eds. M. Ioannides, N. Magnenat-Thalmann, and G. Papagiannakis (Cham: Springer International Publishing).

Google Scholar

Vickers, J. N., and Lewinski, W. (2012). Performing under pressure: gaze control, decision making and shooting performance of elite and rookie police officers. Hum. Mov. Sci. 31, 101–117. doi: 10.1016/j.humov.2011.04.004

PubMed Abstract | Crossref Full Text | Google Scholar

Yadav, P., Gupta, N., and Sharma, P. K. (2025). WeaponVision Ai: a software for strengthening surveillance through deep learning in real-time automated weapon detection. Int. J. Inf. Technol. 17, 1717–1727. doi: 10.1007/s41870-024-02375-y

Crossref Full Text | Google Scholar

Yee, N., Matheson, S., Korobanova, D., Large, M., Nielssen, O., Carr, V., et al. (2020). A meta-analysis of the relationship between psychosis and any type of criminal offending, in both men and women. Schizophr. Res. 220, 16–24. doi: 10.1016/j.schres.2020.04.009

PubMed Abstract | Crossref Full Text | Google Scholar

Keywords: concealed carry, detection, law enforcement, perception, non-verbal communication

Citation: Adiarte S, Carbon C-C, Orr R and Canetti EFD (2025) The critical role of threat detection and movement behavior assessment: Identifying key concepts, research scope, and gaps—a scoping review. Front. Psychol. 16:1627066. doi: 10.3389/fpsyg.2025.1627066

Received: 19 May 2025; Accepted: 19 August 2025;
Published: 01 October 2025.

Edited by:

Nathan Brooks, New Zealand Police, New Zealand

Reviewed by:

Nicole Jones, North Carolina State Bureau of Investigation, United States
Bruno Dias, Key Operational Insights, LLC, United States

Copyright © 2025 Adiarte, Carbon, Orr and Canetti. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.

*Correspondence: Claus-Christian Carbon, Y2NjQHVuaS1iYW1iZXJnLmRl

Disclaimer: All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.