Making Prevention a Reality: Identifying, Assessing, and Managing the Threat of Targeted Attacks

Total Page:16

File Type:pdf, Size:1020Kb

Making Prevention a Reality: Identifying, Assessing, and Managing the Threat of Targeted Attacks U. S. Department of Justice Federal Bureau of Investigation Making Prevention a Reality: Identifying, Assessing, and Managing the Threat of Targeted Attacks Behavioral Analysis Unit—National Center for the Analysis of Violent Crime Behavioral Threat Assessment Center National Center for the Analysis of Violent Crime Critical Incident Response Group Federal Bureau of Investigation ii AUTHORS This publication was authored by members of the Federal Bureau of Investigation’s Behavioral Analysis Unit: Molly Amman Karie A. Gibson Supervisory Special Agent Supervisory Special Agent Federal Bureau of Investigation Federal Bureau of Investigation Matthew Bowlin Sarah H. Griffin Special Agent Special Agent U.S. Capitol Police Naval Criminal Investigative Service Lesley Buckles Kirk Kennedy Crime Analyst Operational Psychologist Federal Bureau of Investigation Federal Bureau of Investigation Kevin C. Burton Cari J. Robins Unit Chief Supervisory Special Agent Federal Bureau of Investigation Federal Bureau of Investigation Kimberly F. Brunell Supervisory Special Agent Federal Bureau of Investigation iii Table of Contents Message from the FBI Director.................................................................................................................... vii Foreword ...................................................................................................................................................... ix Acknowledgments ......................................................................................................................................... x Introduction .................................................................................................................................................. 1 Chapter 1 Awareness: Initial Step Toward Change .................................................................................... 3 Violence is gender neutral ......................................................................................................................... 3 Diminishing the violent offender ............................................................................................................... 3 These offenders don’t “snap”—they decide ............................................................................................. 4 Threat assessment ........................................................................................................................................... 4 Research .................................................................................................................................................... 5 Barriers to successful engagement............................................................................................................ 6 Early recognition of barriers .................................................................................................................. 8 Self awareness ....................................................................................................................................... 8 Information sharing ............................................................................................................................... 9 Violence and mental illness ....................................................................................................................... 9 Behavior, not diagnosis ............................................................................................................................. 9 Chapter 2 Identification: An Essential Step for Threat Management ...................................................... 11 Low probability/high impact events ........................................................................................................ 11 Bystanders become upstanders .............................................................................................................. 11 Opportunities for identification .......................................................................................................... 13 Reporting and reporting mechanisms ................................................................................................. 14 Creating a culture of shared responsibility .......................................................................................... 14 Making a threat versus posing a threat ................................................................................................... 15 Intimacy effect ........................................................................................................................................ 16 Anonymous communicated threats ........................................................................................................ 18 Analysis of threatening communications ................................................................................................ 18 First Amendment protected speech .................................................................................................... 19 iv Chapter 3 Assessment: Analysis for Guiding Management...................................................................... 21 There are no “usual suspects” ................................................................................................................. 21 Data interpretation and weighting .......................................................................................................... 21 Bias .......................................................................................................................................................... 21 Triage versus 360° assessment ................................................................................................................ 23 Pathway to violence ................................................................................................................................ 24 The role played by mental illness ............................................................................................................ 25 The “person of concern” ......................................................................................................................... 28 Brittle people ....................................................................................................................................... 28 Conducting the assessment ..................................................................................................................... 29 Threat enhancers .................................................................................................................................... 29 Risk factors .......................................................................................................................................... 29 Warning behaviors .............................................................................................................................. 32 Indicators of potential imminence ...................................................................................................... 36 Triggers and stressors .......................................................................................................................... 37 Mitigators ................................................................................................................................................ 37 Level of concern ...................................................................................................................................... 39 Awareness of scrutiny ............................................................................................................................. 40 Targeting ................................................................................................................................................. 41 Relationship to grievance .................................................................................................................... 41 Relationship to psychosis .................................................................................................................... 42 Family, loved ones, caregivers ............................................................................................................. 42 Information gathering ............................................................................................................................. 43 Data sources ........................................................................................................................................ 45 Relevance of data ................................................................................................................................ 46 Interviews ................................................................................................................................................... 48 Records ................................................................................................................................................ 49 Open source ........................................................................................................................................ 49 Social media and the internet ............................................................................................................. 49 Chapter 4 Management: The Prevention Plan ......................................................................................... 51 Safety and caretaking .............................................................................................................................
Recommended publications
  • Long-Term Missing Child Guide for Law Enforcement
    Long-term missing child guide for law enforcement: Strategies for finding long-term missing children Long-term missing child guide for law enforcement: Strategies for finding long-term missing children 2016 Edited by Robert G. Lowery, Jr., and Robert Hoever National Center for Missing & Exploited Children® www.missingkids.org 1-800-THE-LOST® or 1-800-843-5678 ORI VA007019W Copyright © 2016 National Center for Missing & Exploited Children. All rights reserved. This project was supported by Grant No. 2015-MC-CX-K001 awarded by the Office of Juvenile Justice and Delinquency Prevention, Office of Justice Programs, U.S. Department of Justice. This document is provided for informational purposes only and does not constitute legal advice or professional opinion about specific facts. Information provided in this document may not remain current or accurate, so recipients should use this document only as a starting point for their own independent research and analysis. If legal advice or other expert assistance is required, the services of a competent professional should be sought. Points of view or opinions in this document are those of the author and do not necessarily represent the official position or policies of the U.S. Department of Justice. CyberTipline®, National Center for Missing & Exploited Children®, 1-800-THE-LOST® and Project ALERT® are registered trademarks of the National Center for Missing & Exploited Children. LONG-TERM MISSING CHILD GUIDE FOR LAW ENFORCEMENT - 2 Contents Acknowledgments.....10 Letter from John Walsh.....15 Foreword by Patty Wetterling.....16 Chapter 1: Introduction by Robert G. Lowery, Jr......18 Quick reference.....18 We are finding more long-term missing children now.....19 Are we doing enough?.....21 Chapter 2: Overview of missing children cases by Robert G.
    [Show full text]
  • Behavioral Science Unit
    Behavioral Science Unit Behavioral Science Unit (BSU) was one of the original instructional components of the FBI's Training Division at Quantico, Virginia. Its mission was to develop and provide programs of training, research, and consultation in the behavioral andsocial sciences for the Federal Bureau of Investigation and law enforcement community that would improve or enhance their administration, operational effectiveness, and understanding of violent crime. The BSU was established in 1972 at the FBI Academy, and was disbanded in 2014. Through its legacy of training, research, and consultation activities, the BSU developed techniques, tactics, and procedures that have become a staple of behavioral-based programs that support the law enforcement, intelligence, and military communities. It is here where the term "serial killer" was coined and where criminal investigative analysis and "profiling" were developed. Many of these programs eventually developed into stand-alone programs, units, and centers such as the National Center for the Analysis of Violent Crime (NCAVC), Behavioral Analysis Unit (BAU), Undercover Safeguard Unit, Crisis Negotiation Unit, Hostage Rescue Team, and Employee Assistance Unit. The mission of the BSU was to be the premier unit for developing and facilitating relevant programs of training, research, and consultation in the behavioral sciences for the FBI workforce, including the law enforcement, intelligence, and military communities that will improve their effectiveness in furtherance of the strategic priorities of the FBI. This is accomplished through the creation of innovative bodies of knowledge in specialty areas and applied research on significant behavioral science issues for use in training and consultation in support of academic, program, and operational matters.
    [Show full text]
  • A FBI Program, Resource, and Service Guide for Chiefs and Sheriffs
    A FBI Program, Resource, and Service Guide for Chiefs and Sheriffs “The most effective weapon against crime is cooperation…. The efforts of all law enforcement agencies with the support and understanding of the American people.” J. Edgar Hoover Law Enforcement Executives: The FBI, Office of Law Enforcement Coordination, in partnership with law enforcement association executive staff, board members, and members in addition to FBI executive management, have collaborated with one another regarding FBI products, services, and resources a Chief of Police, Commissioner, Superintendent, Director, Sheriff, or other law enforcement executives may want or need to know about. We invite you, our state, local, tribal, and campus law enforcement partners to sit down and have a leisurely conversation with your FBI Assistant Director or Special Agent in Charge about these and other FBI capabilities at your earliest convenience. The FBI, Office of Law Enforcement Coordination has categorized the FBI programs, services, and resources into the following five categories: 1. Crisis Response 2. Investigative Assistance 3. Forensic Support 4. Intelligence and Information Sharing 5. Training The FBI, Office of Law Enforcement Coordination, encourages you to review these FBI products, services, and resources which may be available to state, local, tribal, and campus law enforcement partners in addition to collaborating with your FBI Assistant Director or local Special Agent in Charge in your area of responsibility to promote new or enhance existing relationships
    [Show full text]
  • The FBI's Counterterrorism Program
    U.S. Department of Justice Federal Bureau of Investigation Report to the National Commission on Terrorist Attacks upon the United States: The FBI’s Counterterrorism Program Since September 2001 April 14, 2004 Report to The National Commission on Terrorist Attacks upon the United States The FBI’s Counterterrorism Program Since September 2001 TABLETABLE OF OFCONTENTS CONTENTS I EXECUTIVE SUMMARY....................................................................11 II FBI ORGANIZATIONAL CHART................................................. 3 III TIMELINE OF SIGNIFICANT REFORMS AND INITIATIVES SINCE 9/11/01.......................................................... 4 IV INTRODUCTION......................................................................................66 V PRIORITIZATION....................................................................................77 The New Priorities.........................................................................................77 1 Protect the United States from Terrorist Attack..........................................77 2 Protect the United States Against Foreign Intelligence Operations and Espionage........................................................................................77 3 Protect the United States Against Cyber-based Attacks and High-Technology Crimes..................................................................88 4 Combat Public Corruption at all Levels.......................................................88 5 Protect Civil Rights......................................................................................88
    [Show full text]
  • Counter-Terrorism Reference Curriculum
    COUNTER-TERRORISM REFERENCE CURRICULUM CTRC Academic Project Leads & Editors Dr. Sajjan M. Gohel, International Security Director Asia Pacific Foundation Visiting Teacher, London School of Economics & Political Science [email protected] & [email protected] Dr. Peter Forster, Associate Professor Penn State University [email protected] PfPC Reference Curriculum Lead Editors: Dr. David C. Emelifeonwu Senior Staff Officer, Educational Engagements Canadian Defence Academy Associate Professor Royal Military College of Canada Department of National Defence [email protected] Dr. Gary Rauchfuss Director, Records Management Training Program National Archives and Records Administration [email protected] Layout Coordinator / Distribution: Gabriella Lurwig-Gendarme NATO International Staff [email protected] Graphics & Printing — ISBN XXXX 2010-19 NATO COUNTER-TERRORISM REFERENCE CURRICULUM Published May 2020 2 FOREWORD “With guns you can kill terrorists, with education you can kill terrorism.” — Malala Yousafzai, Pakistani activist for female education and Nobel Prize laureate NATO’s counter-terrorism efforts have been at the forefront of three consecutive NATO Summits, including the recent 2019 Leaders’ Meeting in London, with the clear political imperative for the Alliance to address a persistent global threat that knows no border, nationality or religion. NATO’s determination and solidarity in fighting the evolving challenge posed by terrorism has constantly increased since the Alliance invoked its collective defence clause for the first time in response to the terrorist attacks of 11 September 2001 on the United States of America. NATO has gained much experience in countering terrorism from its missions and operations. However, NATO cannot defeat terrorism on its own. Fortunately, we do not stand alone.
    [Show full text]
  • Federal Resources on Missing and Exploited Children Rolodex
    U.S. Department of Defense U.S. Department of Defense Army Family Advocacy Program Air Force Family Advocacy Program Army Family Advocacy Program Air Force Family Advocacy Program Army Family Advocacy Program Manager Chief, Family Advocacy Division HQDA, CFSC–FPA HQ AFMSA/SGOF Department of the Army 2664 Flight Nurse Road, Building 801 4700 King Street, Fourth Floor Brooks City Base, TX 78235–5254 Alexandria, VA 22302–4418 Phone: 703–681–7393 Phone: 210–536–2031 Fax: 703–681–7239 Fax: 210–536–9032 U.S. Department of Defense U.S. Department of Defense Navy Family Advocacy Program Marine Corps Family Advocacy Program Navy Family Advocacy Program Marine Corps Family Advocacy Program Fleet & Family Support Programs Marine Corps Family Advocacy Program Manager Personnel Support Department (N2) Marine & Family Services Branch Commander, Navy Installations (CNI) Headquarters USMC 2713 Mitscher Road SW., Suite 300 3280 Russell Road Anacostia Annex, DC 20373–5802 Quantico, VA 22134–5009 Phone: 202–433–4593 Phone: 703–784–9546 Fax: 202–433–0481 Fax: 703–784–9825 U.S. Department of Defense U.S. Department of Defense Army Legal Assistance Air Force Legal Assistance Army Legal Assistance Air Force Legal Assistance Legal Assistance Policy Division Air Force Legal Services Agency Office of the Judge Advocate General AFLSA/JACA 1777 North Kent Street, Ninth Floor 1420 Air Force Pentagon, Room 5C263 Arlington, VA 22209 Washington, DC 20330–1420 Phone: 703–588–6708 Phone: 202–697–0413 U.S. Department of Defense U.S. Department of Defense Navy Legal Assistance Marine Corps Legal Assistance Navy Legal Assistance Marine Corps Legal Assistance Naval Legal Assistance Command Commandant of the Marine Corps Department of the Navy Headquarters, USMC (Code JAL) 1322 Patterson Street SE., Suite 3000 3000 Marine Corps Pentagon Washington Navy Yard Washington, DC 20350–3000 Washington, DC 20374–5016 Phone: 703–614–1266 Phone: 202–685–5190 U.S.
    [Show full text]
  • COINTELPRO - Wikipedia, the Free Encyclopedia Page 1 of 8
    COINTELPRO - Wikipedia, the free encyclopedia Page 1 of 8 COINTELPRO From Wikipedia, the free encyclopedia COINTELPRO (Counter Intelligence Program) was a program of the United States Federal Bureau of Investigation aimed at investigating and disrupting dissident political organizations within the United States. Although covert operations have been employed throughout FBI history, the formal COINTELPRO operations of 1956-1971 were broadly targeted against organizations that were (at the time) considered to have politically radical elements, ranging from those whose stated goal was the violent overthrow of the U.S. government (such as the Weathermen) to non-violent civil rights groups such as Martin Luther King Jr.'s Southern Christian Leadership Conference to violent racist and segregationist groups like the Ku Klux Klan and the American Nazi Party. The founding document of COINTELPRO directed FBI agents to "expose, disrupt, misdirect, discredit, or otherwise neutralize" the activities of these movements and their leaders. Federal Bureau of Investigation Contents 1 History 2 Methods 3 Illegal surveillance 4 Further reading 4.1 Books 4.2 Articles Fidelity, Bravery, Integrity 4.3 U.S. Government reports Director: Robert Mueller 5 See also Department: Justice 6 Endnotes 7 External links Divisions: 7.1 Documentary FBI Academy 7.2 Websites FBI Laboratory Criminal Justice Information Services 7.3 Articles 7.4 U.S. Government reports Major units: Behavioral Analysis Unit (BAU) Critical Incident Response Group (CIRG) History Counterterrorism Division (CTD) Law Enforcement Bulletin Unit (LEBU) Hostage Rescue Team (HRT) COINTELPRO began in 1956 and was designed to "increase Joint Terrorism Task Force (JTTF) factionalism, cause disruption and win defections" inside the National Security Service (NSS) Communist Party U.S.A.
    [Show full text]
  • Serialmurder-Pathwaysforinvestigations.Pdf
    Behavioral Analysis Unit 4 National Center for the Analysis of Violent Crime Critical Incident Response Group Federal Bureau of Investigation i AUTHORS Robert J. Morton Supervisory Special Agent National Center for the Analysis of Violent Crime Federal Bureau of Investigation Jennifer M. Tillman Crime Analyst National Center for the Analysis of Violent Crime Federal Bureau of Investigation Stephanie J. Gaines ORISE Research Analyst National Center for the Analysis of Violent Crime Federal Bureau of Investigation ii Contents Message from the Director . iv Acknowledgements . v Foreword . vi National Center for the Analysis of Violent Crime . viii Organization of Monograph . 1 I . Introduction . 3 II . Study Parameters and Results . 9 III . Serial Murder Investigations . 23 IV . Body Disposal Pathways . 28 V. Offenders Who Used Same Body Disposal Scenarios . 31 VI . Offenders Who Changed Pathways . 39 VII . Serial Sexual Murders . 42 VIII . Serial Prostitute Murders . 49 IX . Serial Same Sex Murders . 55 X . Multiple Motivations . 60 Bibliography . 66 Biographical Information of Authors . 68 iii Message from the Director Every day, law enforcement officers across America are called to respond to homicides . Each case is tragic . Each one means someone has lost a spouse, a parent, a sibling, or a child . Few cases, however, are more dev- astating and perplexing as serial murder . These multiple victim crimes may span days, months, or even years, and can cross numerous jurisdictions . Often the relationship between suspect and victim is difficult to discern, and the motive may remain a mys- tery . Investigators may have little to go on other than evidence at the crime scene where the murder victim is found .
    [Show full text]
  • FBI Terms and Resources (Pdf)
    FBI and Law Enforcement Terms and Acronyms Compiled by CJ Lyons (For more law enforcement and forensic extras go to: http://CJLyons.net/extras) AN=Aryan Nation ASAC = Assistant Special Agent in Charge ATL = Attempt To Locate BOLO = Be On the Lookout BOP= Bureau of Prisons Butner FCI = Butner Federal Correctional Institution, located in Butner, NC CODIS= Combined DNA Index System EAP = Employee Assistance Program FAST = Fugitive Apprehension Strike Team FATS= Firearms Tactical Simulation, a video/virtual training program designed to simulate real-life tactical situations Hogan's Alley = collection of streets and buildings used for training exercises HRT=Hostage Rescue Team, the FBI's elite SWAT team ICE = Immigration and Customs Enforcement Innocent Images = multi-agency program designed to locate and trace victims of child pornography JTTF= Joint Counter-Terrorism Taskforce Jefferson Hall = main dormitory and classroom area of the FBI Academy LEO = Law Enforcement Officer NAT = New Agent in Training NCIC= National Crime Information Center NCMEC=National Center for Missing and Exploited Children OMG= Outlaw Motorcycle Gang OPR=Office of Professional Responsibility Quantico = FBI Training Academy, also home to National Police Academy, the FBI National Forensic Lab, DEA training academy and other federal law enforcement facilities SAC= Special Agent in Charge SHU=Special Housing Unit Simunition = non-lethal ammunition used in training exercises SIS=Special Investigative Services SSA = Supervisory Special Agent Title 18 = US Code of Justice,
    [Show full text]
  • Predicting Violent Behavior
    TASK FORCE REPORT: Predicting Violent Behavior August 2012 This report is a product of the Defense Science Board (DSB). The DSB is a Federal Advisory Committee established to provide independent advice to the Secretary of Defense. Statements, opinions, conclusions, and recommendations in this report do not necessarily represent the official position of the Department of Defense. The DSB Task Force on Resilient Military Systems and the Advanced Cyber Threat completed its information gathering in February 2012. This report is UNCLASSIFIED and releasable to the public. DEFENSE SCIENCE BOARD | DEPARTMENT OF DEFENSE Table of Contents Table of Contents ............................................................................................................................ iv List of Tables and Figures ................................................................................................................ vi 1.0 Executive Summary ................................................................................................................... 1 1.1 Introduction .................................................................................................................. 1 1.2 Terms of Reference and Task Force Membership ........................................................ 1 1.3 Overall Conclusions ....................................................................................................... 2 1.4 Targeted Violence ........................................................................................................
    [Show full text]
  • Page Left Intentionally Blank This Magazine Is Best Viewed with the Pages in Pairs, Side by Side (View Menu, Page Display, Two- Up), Zooming in to See Details
    Page left intentionally blank This magazine is best viewed with the pages in pairs, side by side (View menu, page display, two- up), zooming in to see details. Odd numbered pages should be on the right. the MindAlso, Hunter we The interview ForensicTeacher Magazine in Winter 2011 $5.952 US/$6.95 Can www.theforensicteacher.com the MindAlso, Hunter we interview 3 www.theforensicteacher.com The Forensic Teacher • Winter 2011 The Volume 6, Number 18, Winter 2011 The Forensic Teacher Magazine is published quarterly, and is owned by Wide Open Minds Educational Services, LLC. Our mailing address is P.O. Box 5263, Wilmington, DE 19808. Please see inside for more information. ForensicTeacher Magazine Articles 8 Teaching Moments By Ted Yeshion, Ph.D. What happens when good people meet bad science? 10 Interview By Mark Feil, Ed.D. John Douglas was the inspiration for one of the main characters in Silence of the Lambs, he started the FBI’s Behavioral Science Unit, and he’s made a career out of getting inside criminals’ heads. He talked to us about a lot of things, including how forensics teachers can make lessons more real. 44 Trial by Fire By David Grann. 24 Setting the stage Todd Willingham claimed he didn’t set the fire that Do you decorate your classroom to put students in a killed his family. Even before his execution experts forensic frame of mind? We’ll show you how some folks were pointing out the junk science at his trial. do it. 58 The Dark Side of the DA 26 The Work of an Innocence By Maurice Kirkwood.
    [Show full text]
  • National Best Practices for Implementing and Sustaining a Cold Case Investigation Unit U.S
    U.S. Department of Justice Office of Justice Programs National Institute of Justice National Best Practices for Implementing and Sustaining a Cold Case Investigation Unit U.S. Department of Justice Office of Justice Programs 810 Seventh St. N.W. Washington, DC 20531 David B. Muhlhausen, Ph.D. Director, National Institute of Justice This and other publications and products of the National Institute of Justice can be found at: National Institute of Justice Strengthen Science • Advance Justice NIJ.ojp.gov Office of Justice Programs Building Solutions • Supporting Communities • Advancing Justice O J P.gov The National Institute of Justice is the research, development, and evaluation agency of the U.S. Department of Justice. NIJ’s mission is to advance scientific research, development, and evaluation to enhance the administration of justice and public safety. The National Institute of Justice is a component of the Office of Justice Programs, which also includes the Bureau of Justice Assistance; the Bureau of Justice Statistics; the Office for Victims of Crime; the Office of Juvenile Justice and Delinquency Prevention; and the Office of Sex Offender Sentencing, Monitoring, Apprehending, Registering, and Tracking. Opinions or conclusions expressed in this paper are those of the authors and do not necessarily reflect the official position or policies of the U.S. Department of Justice. Cover Photo Sources: ©Nikada/iStockphoto, ©Photographee.eu/Shutterstock, Inc., ©spxChrome/iStockphoto, ©Prath/Shutterstock, Inc., ©FatCamera/Shutterstock, Inc., and ©focal point/Shutterstock, Inc. Interior Photo Sources: ©alengo/iStockphoto, ©Fer Gregory/Shutterstock, Inc., ©Rena Schild/Shutterstock, Inc., ©Prath/Shutterstock, Inc., ©K.Chuansakul/Shutterstock, Inc., ©Myroslav Orshak/Shutterstock, Inc., ©Zolnierek/Shutterstock, Inc., ©allstars/Shutterstock, Inc., ©smolaw/Shutterstock, Inc., ©Olga Krasavina/Shutterstock, Inc., and ©focal point/Shutterstock, Inc.
    [Show full text]