Vulnerability, radicalisation and proportionate concern

Radicalisation is a process by which someone may be drawn into supporting terrorism or extremist violence. Concern increases when worrying behaviour, clear vulnerability and potential for harm appear together.
Vulnerability can take different forms
A person may be vulnerable because they are isolated, grieving, angry, frightened, exploited, bullied, traumatised, coerced or searching for belonging. Online influence can amplify these vulnerabilities, especially if someone spends increasing time in closed groups or consumes material that praises violence.
Vulnerability is not blame, inevitability or a sign of weakness. It indicates someone may be more open to influence or pressure. The safeguarding response should be proportionate, factual and supportive.
1 in 5 Recent Terrorism Arrests Are Children | Online Safety for Parents
Concern may increase when you notice
- Rapid worrying change in language, behaviour, relationships or routine contact with the practice.
- Fixation on violence, martyrdom, weapons, revenge or praise for attacks.
- Online influence where family, carers or the person describe exposure to harmful material or groups.
- Isolation or withdrawal combined with increasingly extreme or threatening statements.
- Coercion or exploitation, including pressure from another person or group.
- Family or carer worry about sudden changes, secrecy, fear or planned action.
Proportionate concern uses context
One comment rarely tells the whole story. A distressed remark, a strong political view, a religious statement or an unusual interest does not on its own create a Prevent concern. The question is whether there are factual signs of vulnerability, influence, harm, coercion or support for violence that require safeguarding advice.
Reception staff do not need to resolve that uncertainty. If information feels significant, pass it to the safeguarding route so a trained person can decide what happens next.
Proportionate concern comes from factual behaviour, context and vulnerability, not from one isolated assumption.

