Making Prevention a Reality: Identifying, Assessing, and Managing the Threat of Targeted Attacks

Total Page:16

File Type:pdf, Size:1020Kb

Making Prevention a Reality: Identifying, Assessing, and Managing the Threat of Targeted Attacks U. S. Department of Justice Federal Bureau of Investigation Making Prevention a Reality: Identifying, Assessing, and Managing the Threat of Targeted Attacks Behavioral Analysis Unit—National Center for the Analysis of Violent Crime Behavioral Threat Assessment Center National Center for the Analysis of Violent Crime Critical Incident Response Group Federal Bureau of Investigation ii AUTHORS This publication was authored by members of the Federal Bureau of Investigation’s Behavioral Analysis Unit: Molly Amman Karie A. Gibson Supervisory Special Agent Supervisory Special Agent Federal Bureau of Investigation Federal Bureau of Investigation Matthew Bowlin Sarah H. Griffin Special Agent Special Agent U.S. Capitol Police Naval Criminal Investigative Service Lesley Buckles Kirk Kennedy Crime Analyst Operational Psychologist Federal Bureau of Investigation Federal Bureau of Investigation Kevin C. Burton Cari J. Robins Unit Chief Supervisory Special Agent Federal Bureau of Investigation Federal Bureau of Investigation Kimberly F. Brunell Supervisory Special Agent Federal Bureau of Investigation iii Table of Contents Message from the FBI Director.................................................................................................................... vii Foreword ...................................................................................................................................................... ix Acknowledgments ......................................................................................................................................... x Introduction .................................................................................................................................................. 1 Chapter 1 Awareness: Initial Step Toward Change .................................................................................... 3 Violence is gender neutral ......................................................................................................................... 3 Diminishing the violent offender ............................................................................................................... 3 These offenders don’t “snap”—they decide ............................................................................................. 4 Threat assessment ........................................................................................................................................... 4 Research .................................................................................................................................................... 5 Barriers to successful engagement............................................................................................................ 6 Early recognition of barriers .................................................................................................................. 8 Self awareness ....................................................................................................................................... 8 Information sharing ............................................................................................................................... 9 Violence and mental illness ....................................................................................................................... 9 Behavior, not diagnosis ............................................................................................................................. 9 Chapter 2 Identification: An Essential Step for Threat Management ...................................................... 11 Low probability/high impact events ........................................................................................................ 11 Bystanders become upstanders .............................................................................................................. 11 Opportunities for identification .......................................................................................................... 13 Reporting and reporting mechanisms ................................................................................................. 14 Creating a culture of shared responsibility .......................................................................................... 14 Making a threat versus posing a threat ................................................................................................... 15 Intimacy effect ........................................................................................................................................ 16 Anonymous communicated threats ........................................................................................................ 18 Analysis of threatening communications ................................................................................................ 18 First Amendment protected speech .................................................................................................... 19 iv Chapter 3 Assessment: Analysis for Guiding Management...................................................................... 21 There are no “usual suspects” ................................................................................................................. 21 Data interpretation and weighting .......................................................................................................... 21 Bias .......................................................................................................................................................... 21 Triage versus 360° assessment ................................................................................................................ 23 Pathway to violence ................................................................................................................................ 24 The role played by mental illness ............................................................................................................ 25 The “person of concern” ......................................................................................................................... 28 Brittle people ....................................................................................................................................... 28 Conducting the assessment ..................................................................................................................... 29 Threat enhancers .................................................................................................................................... 29 Risk factors .......................................................................................................................................... 29 Warning behaviors .............................................................................................................................. 32 Indicators of potential imminence ...................................................................................................... 36 Triggers and stressors .......................................................................................................................... 37 Mitigators ................................................................................................................................................ 37 Level of concern ...................................................................................................................................... 39 Awareness of scrutiny ............................................................................................................................. 40 Targeting ................................................................................................................................................. 41 Relationship to grievance .................................................................................................................... 41 Relationship to psychosis .................................................................................................................... 42 Family, loved ones, caregivers ............................................................................................................. 42 Information gathering ............................................................................................................................. 43 Data sources ........................................................................................................................................ 45 Relevance of data ................................................................................................................................ 46 Interviews ................................................................................................................................................... 48 Records ................................................................................................................................................ 49 Open source ........................................................................................................................................ 49 Social media and the internet ............................................................................................................. 49 Chapter 4 Management: The Prevention Plan ......................................................................................... 51 Safety and caretaking .............................................................................................................................
Recommended publications
  • Part Four - 'Made in America: Christian Fundamentalism' Transcript
    Part Four - 'Made in America: Christian Fundamentalism' Transcript Date: Wednesday, 10 November 2010 - 2:00PM Location: Barnard's Inn Hall 10 November 2010 Made in America Christian Fundamentalism Dr John A Dick Noam Chomsky: “We must bear in mind that the U.S. is a very fundamentalist society, perhaps more than any other society in the world – even more fundamentalist than Saudi Arabia or the Taliban. That's very surprising.” Overview: (1) Introduction (2) Five-stage evolution of fundamentalism in the United States (3) Features common to all fundamentalisms (4) What one does about fundamentalism INTRODUCTION: In 1980 the greatly respected American historian, George Marsden published Fundamentalism and American Culture, a history of the first decades of American fundamentalism. The book quickly rose to prominence, provoking new studies of American fundamentalism and contributing to a renewal of interest in American religious history. The book’s timing was fortunate, for it was published as a resurgent fundamentalism was becoming active in politics and society. The term “fundamentalism” was first applied in the 1920’s to Protestant movements in the United States that interpreted the Bible in an extreme and literal sense. In the United States, the term “fundamentalism” was first extended to other religious traditions around the time of the Iranian Revolution in 1978-79. In general all fundamentalist movements arise when traditional societies are forced to face a kind of social disintegration of their way of life, a loss of personal and group meaning and the introduction of new customs that lead to a loss of personal and group orientation.
    [Show full text]
  • Birth and Evolution of Korean Reality Show Formats
    Georgia State University ScholarWorks @ Georgia State University Film, Media & Theatre Dissertations School of Film, Media & Theatre Spring 5-6-2019 Dynamics of a Periphery TV Industry: Birth and Evolution of Korean Reality Show Formats Soo keung Jung [email protected] Follow this and additional works at: https://scholarworks.gsu.edu/fmt_dissertations Recommended Citation Jung, Soo keung, "Dynamics of a Periphery TV Industry: Birth and Evolution of Korean Reality Show Formats." Dissertation, Georgia State University, 2019. https://scholarworks.gsu.edu/fmt_dissertations/7 This Dissertation is brought to you for free and open access by the School of Film, Media & Theatre at ScholarWorks @ Georgia State University. It has been accepted for inclusion in Film, Media & Theatre Dissertations by an authorized administrator of ScholarWorks @ Georgia State University. For more information, please contact [email protected]. DYNAMICS OF A PERIPHERY TV INDUSTRY: BIRTH AND EVOLUTION OF KOREAN REALITY SHOW FORMATS by SOOKEUNG JUNG Under the Direction of Ethan Tussey and Sharon Shahaf, PhD ABSTRACT Television format, a tradable program package, has allowed Korean television the new opportunity to be recognized globally. The booming transnational production of Korean reality formats have transformed the production culture, aesthetics and structure of the local television. This study, using a historical and practical approach to the evolution of the Korean reality formats, examines the dynamic relations between producer, industry and text in the
    [Show full text]
  • Long-Term Missing Child Guide for Law Enforcement
    Long-term missing child guide for law enforcement: Strategies for finding long-term missing children Long-term missing child guide for law enforcement: Strategies for finding long-term missing children 2016 Edited by Robert G. Lowery, Jr., and Robert Hoever National Center for Missing & Exploited Children® www.missingkids.org 1-800-THE-LOST® or 1-800-843-5678 ORI VA007019W Copyright © 2016 National Center for Missing & Exploited Children. All rights reserved. This project was supported by Grant No. 2015-MC-CX-K001 awarded by the Office of Juvenile Justice and Delinquency Prevention, Office of Justice Programs, U.S. Department of Justice. This document is provided for informational purposes only and does not constitute legal advice or professional opinion about specific facts. Information provided in this document may not remain current or accurate, so recipients should use this document only as a starting point for their own independent research and analysis. If legal advice or other expert assistance is required, the services of a competent professional should be sought. Points of view or opinions in this document are those of the author and do not necessarily represent the official position or policies of the U.S. Department of Justice. CyberTipline®, National Center for Missing & Exploited Children®, 1-800-THE-LOST® and Project ALERT® are registered trademarks of the National Center for Missing & Exploited Children. LONG-TERM MISSING CHILD GUIDE FOR LAW ENFORCEMENT - 2 Contents Acknowledgments.....10 Letter from John Walsh.....15 Foreword by Patty Wetterling.....16 Chapter 1: Introduction by Robert G. Lowery, Jr......18 Quick reference.....18 We are finding more long-term missing children now.....19 Are we doing enough?.....21 Chapter 2: Overview of missing children cases by Robert G.
    [Show full text]
  • Duty-To-Protect.Pdf
    2 APA PRACTICE ORGANIZATION LEGAL ISSUES Duty to Protect A BRIEF HISTORY OF DUTY TO PROTECT In 1976, the California Supreme Court issued its decision in Tarasoff v. Regents of the University of Roles and Responsibilities for California after a patient carried out a threat to kill a Psychologists young woman. In that case, the court ruled: When a therapist determines, or pursuant to the ecent mass shootings heightened the focus on standards of his profession should determine, that widespread state laws that require or allow his patient presents a serious danger of violence psychologists and other mental health professionals R to another [person], he incurs an obligation to use to breach confidentiality in order to prevent harm by their reasonable care to protect the intended victim potentially violent patients. This article is intended to help against such danger . [This duty] may call for practitioners with the challenging task of applying these [the therapist] to warn the intended victim or duty to protect* laws in working with these individuals. others likely to apprise the victim of the danger, to notify the police, or take whatever other steps are Mandatory versus permissive laws reasonably necessary under the circumstances. Most psychologists think of duty to protect laws as those After the Tarasoff case, many states passed legislation that create a mandatory obligation to take action and impose defining a “duty to protect”* and the steps needed to liability for failing to carry out that duty. But there are closely discharge that duty. In other states, courts created a related laws that give psychologists discretion or permission duty to protect through case law.
    [Show full text]
  • Addressing Fundamentalism by Legal and Spiritual Means
    H UMAN R IGHTS & H UMAN W ELFARE Addressing Fundamentalism by Legal and Spiritual Means By Dan Wessner Religion and Humane Global Governance by Richard A. Falk. New York: Palgrave, 2001. 191 pp. Gender and Human Rights in Islam and International Law: Equal before Allah, Unequal before Man? by Shaheen Sardar Ali. The Hague: Kluwer Law International, 2000. 358 pp. Religious Fundamentalisms and the Human Rights of Women edited by Courtney W. Howland. New York: St. Martin’s Press, 1999. 326 pp. The Islamic Quest for Democracy, Pluralism, and Human Rights by Ahmad S. Moussalli. Gainesville: University Press of Florida, 2001. 226 pp. The post-Cold War era stands at a crossroads. Some sort of new world order or disorder is under construction. Our choice to move more toward multilateralism or unilateralism is informed well by inter-religious debate and international law. Both disciplines rightly challenge the “post- Enlightenment divide between religion and politics,” and reinvigorate a spiritual-legal dialogue once thought to be “irrelevant or substandard” (Falk: 1-8, 101). These disciplines can dissemble illusory walls between spiritual/sacred and material/modernist concerns, between realpolitik interests and ethical judgment (Kung 1998: 66). They place praxis and war-peace issues firmly in the context of a suffering humanity and world. Both warn as to how fundamentalism may subjugate peace and security to a demagogic, uncompromising quest. These disciplines also nurture a community of speech that continues to find its voice even as others resort to war. The four books considered in this essay respond to the rush and risk of unnecessary conflict wrought by fundamentalists.
    [Show full text]
  • The Globalization of K-Pop: the Interplay of External and Internal Forces
    THE GLOBALIZATION OF K-POP: THE INTERPLAY OF EXTERNAL AND INTERNAL FORCES Master Thesis presented by Hiu Yan Kong Furtwangen University MBA WS14/16 Matriculation Number 249536 May, 2016 Sworn Statement I hereby solemnly declare on my oath that the work presented has been carried out by me alone without any form of illicit assistance. All sources used have been fully quoted. (Signature, Date) Abstract This thesis aims to provide a comprehensive and systematic analysis about the growing popularity of Korean pop music (K-pop) worldwide in recent years. On one hand, the international expansion of K-pop can be understood as a result of the strategic planning and business execution that are created and carried out by the entertainment agencies. On the other hand, external circumstances such as the rise of social media also create a wide array of opportunities for K-pop to broaden its global appeal. The research explores the ways how the interplay between external circumstances and organizational strategies has jointly contributed to the global circulation of K-pop. The research starts with providing a general descriptive overview of K-pop. Following that, quantitative methods are applied to measure and assess the international recognition and global spread of K-pop. Next, a systematic approach is used to identify and analyze factors and forces that have important influences and implications on K-pop’s globalization. The analysis is carried out based on three levels of business environment which are macro, operating, and internal level. PEST analysis is applied to identify critical macro-environmental factors including political, economic, socio-cultural, and technological.
    [Show full text]
  • Behavioral Science Unit
    Behavioral Science Unit Behavioral Science Unit (BSU) was one of the original instructional components of the FBI's Training Division at Quantico, Virginia. Its mission was to develop and provide programs of training, research, and consultation in the behavioral andsocial sciences for the Federal Bureau of Investigation and law enforcement community that would improve or enhance their administration, operational effectiveness, and understanding of violent crime. The BSU was established in 1972 at the FBI Academy, and was disbanded in 2014. Through its legacy of training, research, and consultation activities, the BSU developed techniques, tactics, and procedures that have become a staple of behavioral-based programs that support the law enforcement, intelligence, and military communities. It is here where the term "serial killer" was coined and where criminal investigative analysis and "profiling" were developed. Many of these programs eventually developed into stand-alone programs, units, and centers such as the National Center for the Analysis of Violent Crime (NCAVC), Behavioral Analysis Unit (BAU), Undercover Safeguard Unit, Crisis Negotiation Unit, Hostage Rescue Team, and Employee Assistance Unit. The mission of the BSU was to be the premier unit for developing and facilitating relevant programs of training, research, and consultation in the behavioral sciences for the FBI workforce, including the law enforcement, intelligence, and military communities that will improve their effectiveness in furtherance of the strategic priorities of the FBI. This is accomplished through the creation of innovative bodies of knowledge in specialty areas and applied research on significant behavioral science issues for use in training and consultation in support of academic, program, and operational matters.
    [Show full text]
  • The Pennsylvania State University Schreyer Honors College
    THE PENNSYLVANIA STATE UNIVERSITY SCHREYER HONORS COLLEGE DEPARTMENT OF ENGLISH FEAR OF WORKING-CLASS AGENCY IN THE VICTORIAN INDUSTRIAL NOVEL ADAM BIVENS SPRING 2018 A thesis submitted in partial fulfillment of the requirements for a baccalaureate degree in English with honors in English Reviewed and approved* by the following: Elizabeth Womack Assistant Professor of English Thesis Supervisor Paul deGategno Professor of English Honors Adviser * Signatures are on file in the Schreyer Honors College. i ABSTRACT This work examines the Victorian Industrial novel as a genre of literature that reflects the middle-class biases of influential authors like Charles Dickens and Elizabeth Gaskell, who cater to middle-class readers by simultaneously sympathizing with the poor and admonishing any efforts of the working class to express political agency that challenge the social order. As such, the Victorian Industrial novel routinely depicts trade unionism in a negative light as an ineffective means to secure socioeconomic gains that is often led by charismatic demagogues who manipulate naïve working people to engage in violent practices with the purpose of intimidating workers. The Victorian Industrial novel also acts as an agent of reactionary politics, reinforcing fears of mob violence and the looming threat of revolutionary uprising in England as had occurred throughout Europe in 1848. The novels display a stubborn refusal to link social ills to their material causes, opting instead to endorse temporary and idealist solutions like paternalism, liberal reformism, and marriage between class members as panaceæ for class antagonisms, thereby decontextualizing the root of the problem through the implication that all poor relations between the worker and employer, the proletariat and the bourgeoisie, can be attributed to a breakdown in communication and understanding.
    [Show full text]
  • 9/11 Report”), July 2, 2004, Pp
    Final FM.1pp 7/17/04 5:25 PM Page i THE 9/11 COMMISSION REPORT Final FM.1pp 7/17/04 5:25 PM Page v CONTENTS List of Illustrations and Tables ix Member List xi Staff List xiii–xiv Preface xv 1. “WE HAVE SOME PLANES” 1 1.1 Inside the Four Flights 1 1.2 Improvising a Homeland Defense 14 1.3 National Crisis Management 35 2. THE FOUNDATION OF THE NEW TERRORISM 47 2.1 A Declaration of War 47 2.2 Bin Ladin’s Appeal in the Islamic World 48 2.3 The Rise of Bin Ladin and al Qaeda (1988–1992) 55 2.4 Building an Organization, Declaring War on the United States (1992–1996) 59 2.5 Al Qaeda’s Renewal in Afghanistan (1996–1998) 63 3. COUNTERTERRORISM EVOLVES 71 3.1 From the Old Terrorism to the New: The First World Trade Center Bombing 71 3.2 Adaptation—and Nonadaptation— ...in the Law Enforcement Community 73 3.3 . and in the Federal Aviation Administration 82 3.4 . and in the Intelligence Community 86 v Final FM.1pp 7/17/04 5:25 PM Page vi 3.5 . and in the State Department and the Defense Department 93 3.6 . and in the White House 98 3.7 . and in the Congress 102 4. RESPONSES TO AL QAEDA’S INITIAL ASSAULTS 108 4.1 Before the Bombings in Kenya and Tanzania 108 4.2 Crisis:August 1998 115 4.3 Diplomacy 121 4.4 Covert Action 126 4.5 Searching for Fresh Options 134 5.
    [Show full text]
  • Report on the Arapahoe High School Shooting
    REPORT ON THE ARAPAHOE HIGH SCHOOL SHOOTING: Lessons Learned on Information Sharing, Threat Assessment, and Systems Integrity Sarah Goodrum, Ph.D. William Woodward, M.P.A. University of Northern Colorado University of Colorado Boulder January 18, 2016 Report on the Arapahoe High School Shooting: Lessons Learned on Information Sharing, Threat Assessment, and Systems Integrity1 Presented to and Colorado SB 15-214: Committee on School Safety and Youth in Crisis In compliance with JAG No. 2015-0665A, In re the arbitration of: Michael and Desiree Davis, Claimants and Littleton Public School District, Respondent William Woodward, M.P.A. Center for the Study and Prevention of Violence University of Colorado Boulder Boulder, CO 80302 Sarah Goodrum, Ph.D. Department of Criminal Justice University of Northern Colorado Greeley, CO 80639 January 18, 2016 1 The project was funded by a grant the Arapahoe High School Community Fund Honoring Claire Davis, a donor-advised fund of The Denver Foundation. Report design by Rachel Kennedy, Center for the Study & Prevention of Violence. DEDICATION This report is dedicated to Claire Davis, and her parents, Michael and Desiree Davis. A MESSAGE FROM MICHAEL & DESIREE DAVIS As we write this dedication page, almost two years after our daughter died from the gunshot wounds she suffered at a Colorado high school on December 13, 2013, we are reminded of the God-given gift of life that we all share. One year ago, on the first anniversary of the tragedy that took this gift away from our daughter, we were contemplating what we would say to the students and families that gathered at the school to remember our daughter.
    [Show full text]
  • A FBI Program, Resource, and Service Guide for Chiefs and Sheriffs
    A FBI Program, Resource, and Service Guide for Chiefs and Sheriffs “The most effective weapon against crime is cooperation…. The efforts of all law enforcement agencies with the support and understanding of the American people.” J. Edgar Hoover Law Enforcement Executives: The FBI, Office of Law Enforcement Coordination, in partnership with law enforcement association executive staff, board members, and members in addition to FBI executive management, have collaborated with one another regarding FBI products, services, and resources a Chief of Police, Commissioner, Superintendent, Director, Sheriff, or other law enforcement executives may want or need to know about. We invite you, our state, local, tribal, and campus law enforcement partners to sit down and have a leisurely conversation with your FBI Assistant Director or Special Agent in Charge about these and other FBI capabilities at your earliest convenience. The FBI, Office of Law Enforcement Coordination has categorized the FBI programs, services, and resources into the following five categories: 1. Crisis Response 2. Investigative Assistance 3. Forensic Support 4. Intelligence and Information Sharing 5. Training The FBI, Office of Law Enforcement Coordination, encourages you to review these FBI products, services, and resources which may be available to state, local, tribal, and campus law enforcement partners in addition to collaborating with your FBI Assistant Director or local Special Agent in Charge in your area of responsibility to promote new or enhance existing relationships
    [Show full text]
  • Shooting Alone: the Pre-Attack Experiences and Behaviors of U.S
    1 Shooting Alone: The Pre-Attack Experiences and Behaviors of U.S. Solo Mass Murderers12 Authors Paul Gill, PhD. Department of Security and Crime Science University College London James Silver, ABD. Center for Terrorism and Security Studies University of Massachusetts Lowell John Horgan, PhD. Global Studies Institute and Department of Psychology Georgia State University Emily Corner, MSc ABD. Department of Security and Crime Science University College London 1 This research is supported by Award No. 2013-ZA-BX-0002, awarded by the National Institute of Justice, Office of Justice Programs, U.S. Department of Justice. The opinions, findings, and conclusions or recommendations expressed in this document are those of the authors and do not necessarily reflect those of the Department of Justice. 2 Aspects of this paper have previously been presented at the American Society of Criminology Annual Meeting in Washington DC, November 2015. 2 Abstract: This paper outlines the socio-demographic, developmental, antecedent attack, attack preparation and commission properties of 115 mass murderers between 1990 and 2014. The results indicate that mass murderer attacks are usually the culmination of a complex mix of personal, political and social drivers that crystalize at the same time to drive the individual down the path of violent action. We specifically focus upon areas related to prior criminal engagement, leakage and attack location familiarity. Whether the violence comes to fruition is usually a combination of the availability and vulnerability of suitable targets that suit the heady mix of personal and political grievances and the individual’s capability to engage in an attack from both a psychological and technical capability standpoint.
    [Show full text]