SlideShare ist ein Scribd-Unternehmen logo
1 von 61
Downloaden Sie, um offline zu lesen
Terrorism in the Corporate
Setting
J. Reid Meloy, Ph.D., ABPP
Int:rsect 2018
San Diego, CA
May 23, 2018
YouTube HQ, April 3, 2018
Lone Terrorist (actor, offender)
• Research, planning, preparation, and
implementation of an act of terrorism
without any external command or control
• May operate in pairs, but usually alone
TRAP-18: Terrorist
Radicalization Assessment
Protocol
• What it is:
– A Structured Professional Judgment
Instrument (SPJ)
– Not a psychological test; an organizing
instrument for threat assessment and threat
management
TRAP-18:
Proximal Warning Behaviors (8)
Pathway
Fixation
Identification
Novel aggression
Energy burst
Leakage
Directly communicated threat
Last resort behavior
TRAP-18:
Distal Characteristics (10)
• Personal grievance and moral outrage
• Framed by an ideology
• Failure to affiliate
• Dependence on the virtual community
• Thwarting of occupational goals
TRAP-18:
Distal Characteristics (10)
• Changes in thinking and emotion
• Failure of sexual pair-bonding
• Mental disorder
• Creative and innovative
• History of criminal violence
Attack
Warning
Behaviors
Characteristics
TRAP-18 Manual
• Manual available from gifrinc.com
• Codesheets available from Dr. Meloy
– English, French, Spanish, Portuguese,
Norwegian, Swedish, Dutch, German, Danish,
and Arabic
TRAP-18:
Warning Behaviors
Pathway
Fixation
Identification
Novel aggression
Energy burst
Leakage
Directly communicated threat
Last resort behavior
Warning Behaviors
• Patterns of behavior rather than individual
risk factors: pattern analysis
• Origins in German gestalt psychology
(Wertheimer, Koffka, Kohler)
• Proximally related to violence
Gestalt Psychology
• Hw cn I rd ths wrds wtht ny vwls?
Pathway Warning Behavior
Any behavior that is part of research,
planning, preparation, or implementation
of an attack (Fein & Vossekuil, 1998,
1999; Calhoun & Weston, 2003)
Pathway to
Targeted or Intended Violence
The “Grievance”
Violent Ideation
Research & Planning the Attack
Pre-attack Preparation
Probing & Breaches
Attack
Adapted with permission from F.S. Calhoun and S.W. Weston (2003). Contemporary threat management:
A practical guide for identifying, assessing and managing individuals of violent intent.
© 2003 F.S. Calhoun and S.W. Weston. All rights reserved.
The Assassination of
Robert F. Kennedy, June 5,
1968
• Grievance—Kennedy votes for the purchase
of 50 Phantom fighter bombers by Israel (Jan.
9-10)
• Ideation—”RFK must die” in diary
• Research and Planning—vows to complete
the act before the first anniversary of the Six
Day War
• Tells a trash collector he is going to kill
Kennedy
• Preparation—begins practicing at a shooting
range with .22 revolver
• “My determination to eliminate RFK is
becoming…more of an unshakeable
obsession” (May 18)
• Breach—four stalking attempts (May 20, May
24, June 1, June 2)
• Practices rapid fire shooting at range, leaves at
5 p.m., June 4
• Eats dinner, goes to Ambassador Hotel in Los
Angeles, has four alcoholic drinks
• Hides in the pantry
• Attack--12:15 a.m., steps from behind a food
tray rack
• “Kennedy, you son of a bitch!!!”
• 8 rounds fired, three wounds
• Fatal wound in right hemisphere of cerebellum
• 77 people in pantry
• 5 others wounded
• Kennedy died 25 hours later
Fixation Warning Behavior
Any behavior that indicates an increasingly
pathological preoccupation with a person or a cause
(Mullen et al., 2009). It typically causes deterioration
of social and occupational functioning.
Malik Hasan
Pathological Fixation
• During psychiatric residency and fellowship (2003-2009)
at Walter Reed gave three presentations which focused
upon Muslims in the military, with no regard for the
psychiatric purpose of these talks.
• This disjuncture illustrates his fixation.
• His social and occupational life also was clearly
deteriorating.
Identification Warning Behavior
Any behavior that indicates a psychological desire to
be a “pseudocommando” (Dietz, 1986; Knoll, 2010),
have a “warrior mentality” (Hempel et al., 1999),
closely associate with weapons or other military or
law enforcement paraphernalia, identify with
previous attackers or assassins, or to identify
oneself as an agent to advance a particular cause or
belief system.
--Meloy JR, Mohandie K, Knoll J, Hoffmann J. (2015).
The concept of identification in threat assessment. Behavioral
Sciences and the Law. DOI: 10.1002/bsl.2166.
Anders Breivik
Identification
Proximal Warning Behaviors
Novel Aggression Warning
Behavior
An act of violence which appears unrelated to any
targeted violence pathway warning behavior which is
committed for the first time. It is typically done to
test the subject’s ability to carry out his or her act of
terrorist violence.
Larossi Abballa
Novel aggression
• Larossi Abballa, a 25 year old French citizen of
Moroccan descent, killed a police officer and his wife on
June 14, 2016 in their home in Magnanville, France.
The prosecutor said that Abballa appeared to be
operating on a general order from al-Baghdadi, the
leader of the Islamic State, to kill “miscreants at home
with their families” during Ramadan. Immediately
following the killings, he started a live Facebook chat
explaining his behavior while the couple’s toddler son
wandered in the background. He was subsequently
killed by the police when they entered the home.
Novel aggression
• “The first time Larossi Abballa appeared on the radar of
French terrorism investigators, the only act of violence
they could pin on him was killing bunnies. He had joined
a small group of men, all bent on waging jihad, on a trip
to a snowy forest in northern France five years ago,
when he was 19. There, they videotaped themselves
slaughtering the rabbits, bought so the men could grow
used to the feel of killing” (R. Callimachi, New York
Times, June 22, 2016, p A1).
Energy Burst Warning Behavior
An increase in the frequency or variety of any noted
activities related to the target, even if the activities
themselves are relatively innocuous, usually in the
hours, days or weeks before the attack (Odgers et
al., 2009). Social media activity may increase or
decrease during this period of time.
Energy Burst Warning Behavior,
January 7-8, 2011
• Drops off 35 mm film at Walgreen’s evening of Jan. 7
before midnight
• Checks into Motel 6 shortly after midnight
• Searches web for “assassins” and “lethal injection”
• 0219 picks up photos, makes a purchase
Jared Loughner
• Leaves telephone message with friend
• 0412 posts to Myspace page photo of Glock 19 and
words, “Goodbye friends.”
• 0600 visits Walmart and Circle K stores
Energy Burst (cont’d)
• Unable to purchase ammunition at first Walmart,
purchases 9 mm full metal jacket ammo and diaper
bag at 0727
• Stopped by police officer for running a red light
• Confronted by father at home, runs away
• Returns to Circle K, gets a cab, goes to supermarket
where he insists on getting correct change for cab
ride
Energy Burst (cont’d)
• Sixteen minutes later, opens fire at 10:10, killing 6 and
wounding 13 people
• Tackled by 3 senior citizens when he attempts to
reload
Leakage Warning Behavior
The communication to a third party of an intent to do
harm to a target through an attack. The third party
may be an Internet audience and/or any social
media audience (Meloy & O’Toole, Behavioral
Sciences and the Law, 29:513-527, 2011).
Open Source Social Media
• “Greetings!....I am in USA now but we don’t have any
arms. But is it possible to commit ourselves as
dedicated martyrs anyway while here? What I’m saying
is to shoot Obama, and then get shot ourselves, will it
do? That will strike fear in the hearts of infidels.”
• Abdurasul Juraboev, Hilofatnews.com, Aug. 8, 2014
Federal District Court, Feb.,
2015
Last Resort Warning Behavior
Evidence of a “violent action imperative” or “time
imperative” (Mohandie & Duffy, 1999). It may be a
signal of desperation or distress. Often the result of
an unexpected triggering event, or one which is
anticipated, that involves a loss in love and/or work.
The subject believes he has no other choice and
must act now.
• “I have no choice. I am not in the position to, alone, go into the
ghetto and fight. I chose Charleston because it is most historic city in
my state, and at one time had the highest ratio of blacks to Whites in
the country. We have no skinheads, no real KKK, no one doing
anything but talking on the internet. Well someone has to have the
bravery to take it to the real world, and I guess that has to be me.”
Directly Communicated Threat
Warning Behavior
The communication of a direct threat to the target or
law enforcement beforehand.
Stockholm, Dec. 11, 2010
• “Now, your children—daughters and sisters—will die like
our brothers and sisters and children are dying…our
actions will speak for themselves. As long as you do not
end your war against Islam and the insult against the
prophet and your stupid support for that pig Vilks…”
Taimour al-Abdaly
• 28 year old Iraqi Sunni
• Emigrated to Sweden age 10
• Attended university in UK
• Detonated a car, and a few minutes later, blew himself
up with a pipe bomb 200 meters away
TRAP-18: Distal Characteristics
• Personal grievance and moral outrage
• Framed by an ideology
• Failure to affiliate with extremist or other group
• Dependence on the virtual community
• Thwarting of occupational goals
TRAP-18: Distal Characteristics
• Changes in thinking and emotion
• Failure of sexual pair-bonding
• Mental disorder
• Creative and innovative
• Criminal violence
Does TRAP-18 work in the
real world?
Validation studies
Published Research
• On website, drreidmeloy.com
• PDF available free for download
North American Lone Actor
Terrorists vs. Others of Concern
• Retrospective coding of attackers (n=33)
and comparative group (n=23) who were
successfully risk managed or false
positives upon investigation
• Unpublished data; currently being written
for submission to journal
• Moderate to large effect sizes
Correlates for Violence Risk
• Proximal warning behaviors
– Pathway
– Identification
– Energy burst
– Last resort
– Directly communicated threat (neg effect)
Correlates for Violence Risk
• Distal characteristics
– Ideology
– Changes in thinking and emotion
– Mental disorder (neg effect)
– Greater creativity and innovation
Monahan and Steadman, 1996
• Violent storms and violent people.
American Psychologist 51:931-938
• Watching—cluster of distal
characteristics> monitor the case
• Warning—one proximal warning
behavior> actively manage the case
• Code warning behaviors first
Current TRAP Operational Use
• CT investigators and analysts in US,
Canada, and various European countries
• No official endorsement due to proprietary
nature of TRAP-18
• Validation and pilot testing studies
currently ongoing in UK and USA
• Licensed to Multihealth Systems Inc.
TRAP-18: Proximal Warning
Behaviors
Pathway
Fixation
Identification
Novel aggression
Energy burst
Leakage
Directly communicated threat
Last resort behavior
TRAP-18: Distal Characteristics
• Personal grievance and moral outrage
• Framed by an ideology
• Failure to affiliate with actual group
• Dependence on the virtual community
• Thwarting of occupational goals
TRAP-18: Distal Characteristics
• Changes in thinking and emotion
• Failure of sexual pair-bonding
• Mental disorder
• Creative and innovative
• Criminal violence
Eric Hoffer, The True Believer,
1951
“The vanity of the selfless, even those
who practice utmost humility, is
boundless.”
Thank you
• reidmeloy@gmail.com
• @reidmeloy
• www.DrReidMeloy.com
• GIFRINC.COM

Weitere ähnliche Inhalte

Was ist angesagt?

Hillaryclintonvsdonaldtrumpempoweredpres 160130042256
Hillaryclintonvsdonaldtrumpempoweredpres 160130042256Hillaryclintonvsdonaldtrumpempoweredpres 160130042256
Hillaryclintonvsdonaldtrumpempoweredpres 160130042256Vera Kovaleva
 
Little brother presentation.5.30.13
Little brother presentation.5.30.13Little brother presentation.5.30.13
Little brother presentation.5.30.13Craig Tunks
 
Little Brother Scrapbook
Little Brother ScrapbookLittle Brother Scrapbook
Little Brother ScrapbookKyla Duncan
 
Guilt transfer in mass following
Guilt transfer in mass followingGuilt transfer in mass following
Guilt transfer in mass followingAshish Gour
 
Extortion and The D.C. Madam
Extortion and The D.C. MadamExtortion and The D.C. Madam
Extortion and The D.C. MadamMormons4justice
 
Prophet Muhammad will never honor Bomb-Robot nor ISIS
Prophet Muhammad will never honor Bomb-Robot nor ISISProphet Muhammad will never honor Bomb-Robot nor ISIS
Prophet Muhammad will never honor Bomb-Robot nor ISISallahcom
 
Hall Elizabeth Unit Four Globalization Of Serial Murder
Hall Elizabeth Unit Four Globalization Of Serial MurderHall Elizabeth Unit Four Globalization Of Serial Murder
Hall Elizabeth Unit Four Globalization Of Serial MurderElizabeth Hall
 
Clinton and Lewinsky
Clinton and LewinskyClinton and Lewinsky
Clinton and Lewinskyatrantham
 
Bill Clinton and Sex Scandals
Bill Clinton and Sex Scandals Bill Clinton and Sex Scandals
Bill Clinton and Sex Scandals atrantham
 
Criminal minds presentation
Criminal minds presentationCriminal minds presentation
Criminal minds presentationibull1
 
FailureofDiplomacy-Iran
FailureofDiplomacy-IranFailureofDiplomacy-Iran
FailureofDiplomacy-IranNeal Young
 
7 MEDIA AND CRIME POWERPOINT
7 MEDIA AND CRIME POWERPOINT7 MEDIA AND CRIME POWERPOINT
7 MEDIA AND CRIME POWERPOINTmattyp99
 
Hackers and Harm Reduction / 29c3 / CCC
Hackers and Harm Reduction /  29c3 / CCCHackers and Harm Reduction /  29c3 / CCC
Hackers and Harm Reduction / 29c3 / CCCviolet blue
 

Was ist angesagt? (17)

Hillaryclintonvsdonaldtrumpempoweredpres 160130042256
Hillaryclintonvsdonaldtrumpempoweredpres 160130042256Hillaryclintonvsdonaldtrumpempoweredpres 160130042256
Hillaryclintonvsdonaldtrumpempoweredpres 160130042256
 
Little brother presentation.5.30.13
Little brother presentation.5.30.13Little brother presentation.5.30.13
Little brother presentation.5.30.13
 
Little Brother Scrapbook
Little Brother ScrapbookLittle Brother Scrapbook
Little Brother Scrapbook
 
Guilt transfer in mass following
Guilt transfer in mass followingGuilt transfer in mass following
Guilt transfer in mass following
 
Extortion and The D.C. Madam
Extortion and The D.C. MadamExtortion and The D.C. Madam
Extortion and The D.C. Madam
 
Prophet Muhammad will never honor Bomb-Robot nor ISIS
Prophet Muhammad will never honor Bomb-Robot nor ISISProphet Muhammad will never honor Bomb-Robot nor ISIS
Prophet Muhammad will never honor Bomb-Robot nor ISIS
 
Hall Elizabeth Unit Four Globalization Of Serial Murder
Hall Elizabeth Unit Four Globalization Of Serial MurderHall Elizabeth Unit Four Globalization Of Serial Murder
Hall Elizabeth Unit Four Globalization Of Serial Murder
 
Essay on Bradley Manning
Essay on Bradley ManningEssay on Bradley Manning
Essay on Bradley Manning
 
Research gaps in Male-Directed sexual violence Part 1
Research gaps in Male-Directed sexual violence Part 1Research gaps in Male-Directed sexual violence Part 1
Research gaps in Male-Directed sexual violence Part 1
 
Lock Them Up!
Lock Them Up!Lock Them Up!
Lock Them Up!
 
Clinton and Lewinsky
Clinton and LewinskyClinton and Lewinsky
Clinton and Lewinsky
 
12 steps to_id-dt
12 steps to_id-dt12 steps to_id-dt
12 steps to_id-dt
 
Bill Clinton and Sex Scandals
Bill Clinton and Sex Scandals Bill Clinton and Sex Scandals
Bill Clinton and Sex Scandals
 
Criminal minds presentation
Criminal minds presentationCriminal minds presentation
Criminal minds presentation
 
FailureofDiplomacy-Iran
FailureofDiplomacy-IranFailureofDiplomacy-Iran
FailureofDiplomacy-Iran
 
7 MEDIA AND CRIME POWERPOINT
7 MEDIA AND CRIME POWERPOINT7 MEDIA AND CRIME POWERPOINT
7 MEDIA AND CRIME POWERPOINT
 
Hackers and Harm Reduction / 29c3 / CCC
Hackers and Harm Reduction /  29c3 / CCCHackers and Harm Reduction /  29c3 / CCC
Hackers and Harm Reduction / 29c3 / CCC
 

Ähnlich wie Terrorism in a Corporate Setting

Robert Lobit, Leon White, cylvania allen-pringleEthical Scrapb.docx
Robert Lobit, Leon White, cylvania allen-pringleEthical Scrapb.docxRobert Lobit, Leon White, cylvania allen-pringleEthical Scrapb.docx
Robert Lobit, Leon White, cylvania allen-pringleEthical Scrapb.docxjoellemurphey
 
Maggie James Non-Fiction
Maggie James Non-FictionMaggie James Non-Fiction
Maggie James Non-Fiction14mjames
 
ASSIGNMENTSPersuasive Speech written outPersuasive speech o.docx
ASSIGNMENTSPersuasive Speech written outPersuasive speech o.docxASSIGNMENTSPersuasive Speech written outPersuasive speech o.docx
ASSIGNMENTSPersuasive Speech written outPersuasive speech o.docxrock73
 
Persuasion of Hate
Persuasion of HatePersuasion of Hate
Persuasion of HateJmclea01
 
Pollock ethics 8e_ch14
Pollock ethics 8e_ch14Pollock ethics 8e_ch14
Pollock ethics 8e_ch14windleh
 
Psychopath Investigator
Psychopath InvestigatorPsychopath Investigator
Psychopath InvestigatorGeoff Simmons
 
Session 5 youth crime the media.2016
Session 5  youth crime  the media.2016Session 5  youth crime  the media.2016
Session 5 youth crime the media.2016Nathan Loynes
 
Notes on capital punishment content package (2013)
Notes on capital punishment content package (2013)Notes on capital punishment content package (2013)
Notes on capital punishment content package (2013)pepperleejy
 
Serial Murder Investigation
Serial Murder Investigation Serial Murder Investigation
Serial Murder Investigation Darren Dake
 
4.4.24 Black Radicalism and Government Repression.pptx
4.4.24 Black Radicalism and Government Repression.pptx4.4.24 Black Radicalism and Government Repression.pptx
4.4.24 Black Radicalism and Government Repression.pptxmary850239
 
Deviance7ISBN 1-256-36957-8Society The Basics.docx
Deviance7ISBN 1-256-36957-8Society The Basics.docxDeviance7ISBN 1-256-36957-8Society The Basics.docx
Deviance7ISBN 1-256-36957-8Society The Basics.docxduketjoy27252
 
Internet and the Law: Protecting Yourself Against Online Abuse - Dr. Emily La...
Internet and the Law: Protecting Yourself Against Online Abuse - Dr. Emily La...Internet and the Law: Protecting Yourself Against Online Abuse - Dr. Emily La...
Internet and the Law: Protecting Yourself Against Online Abuse - Dr. Emily La...University of Calgary
 

Ähnlich wie Terrorism in a Corporate Setting (15)

Robert Lobit, Leon White, cylvania allen-pringleEthical Scrapb.docx
Robert Lobit, Leon White, cylvania allen-pringleEthical Scrapb.docxRobert Lobit, Leon White, cylvania allen-pringleEthical Scrapb.docx
Robert Lobit, Leon White, cylvania allen-pringleEthical Scrapb.docx
 
Maggie James Non-Fiction
Maggie James Non-FictionMaggie James Non-Fiction
Maggie James Non-Fiction
 
Chapter4
Chapter4Chapter4
Chapter4
 
ASSIGNMENTSPersuasive Speech written outPersuasive speech o.docx
ASSIGNMENTSPersuasive Speech written outPersuasive speech o.docxASSIGNMENTSPersuasive Speech written outPersuasive speech o.docx
ASSIGNMENTSPersuasive Speech written outPersuasive speech o.docx
 
Persuasion of Hate
Persuasion of HatePersuasion of Hate
Persuasion of Hate
 
From Outrage to Action on Anti-Semitism.pdf
From Outrage to Action on Anti-Semitism.pdfFrom Outrage to Action on Anti-Semitism.pdf
From Outrage to Action on Anti-Semitism.pdf
 
HViolence
HViolenceHViolence
HViolence
 
Pollock ethics 8e_ch14
Pollock ethics 8e_ch14Pollock ethics 8e_ch14
Pollock ethics 8e_ch14
 
Psychopath Investigator
Psychopath InvestigatorPsychopath Investigator
Psychopath Investigator
 
Session 5 youth crime the media.2016
Session 5  youth crime  the media.2016Session 5  youth crime  the media.2016
Session 5 youth crime the media.2016
 
Notes on capital punishment content package (2013)
Notes on capital punishment content package (2013)Notes on capital punishment content package (2013)
Notes on capital punishment content package (2013)
 
Serial Murder Investigation
Serial Murder Investigation Serial Murder Investigation
Serial Murder Investigation
 
4.4.24 Black Radicalism and Government Repression.pptx
4.4.24 Black Radicalism and Government Repression.pptx4.4.24 Black Radicalism and Government Repression.pptx
4.4.24 Black Radicalism and Government Repression.pptx
 
Deviance7ISBN 1-256-36957-8Society The Basics.docx
Deviance7ISBN 1-256-36957-8Society The Basics.docxDeviance7ISBN 1-256-36957-8Society The Basics.docx
Deviance7ISBN 1-256-36957-8Society The Basics.docx
 
Internet and the Law: Protecting Yourself Against Online Abuse - Dr. Emily La...
Internet and the Law: Protecting Yourself Against Online Abuse - Dr. Emily La...Internet and the Law: Protecting Yourself Against Online Abuse - Dr. Emily La...
Internet and the Law: Protecting Yourself Against Online Abuse - Dr. Emily La...
 

Mehr von Resolver Inc.

How to Prove the Value of Security Investments
How to Prove the Value of Security InvestmentsHow to Prove the Value of Security Investments
How to Prove the Value of Security InvestmentsResolver Inc.
 
ERM Benchmarking Survey Results
ERM Benchmarking Survey ResultsERM Benchmarking Survey Results
ERM Benchmarking Survey ResultsResolver Inc.
 
Best Practices and ROI for Risk-based Vulnerability Management
Best Practices and ROI for Risk-based Vulnerability ManagementBest Practices and ROI for Risk-based Vulnerability Management
Best Practices and ROI for Risk-based Vulnerability ManagementResolver Inc.
 
Taking a Data-Driven Approach to Business Continuity
Taking a Data-Driven Approach to Business ContinuityTaking a Data-Driven Approach to Business Continuity
Taking a Data-Driven Approach to Business ContinuityResolver Inc.
 
Reporting to the Board on Corporate Compliance
Reporting to the Board on Corporate ComplianceReporting to the Board on Corporate Compliance
Reporting to the Board on Corporate ComplianceResolver Inc.
 
An Intro to Resolver's Compliance Application
An Intro to Resolver's Compliance ApplicationAn Intro to Resolver's Compliance Application
An Intro to Resolver's Compliance ApplicationResolver Inc.
 
Information Security Best Practices: Keeping Your Company's Data Safe
Information Security Best Practices: Keeping Your Company's Data SafeInformation Security Best Practices: Keeping Your Company's Data Safe
Information Security Best Practices: Keeping Your Company's Data SafeResolver Inc.
 
Security Trends: From "Silos" to Integrated Risk Management
Security Trends: From "Silos" to Integrated Risk ManagementSecurity Trends: From "Silos" to Integrated Risk Management
Security Trends: From "Silos" to Integrated Risk ManagementResolver Inc.
 
Modelling your Business Processes with Resolver Core
Modelling your Business Processes with Resolver CoreModelling your Business Processes with Resolver Core
Modelling your Business Processes with Resolver CoreResolver Inc.
 
How Resolver Uses Resolver
How Resolver Uses ResolverHow Resolver Uses Resolver
How Resolver Uses ResolverResolver Inc.
 
Scammed: Defend Against Social Engineering
Scammed: Defend Against Social EngineeringScammed: Defend Against Social Engineering
Scammed: Defend Against Social EngineeringResolver Inc.
 
A Peek at adidas Group's Integrated Risk & Security Management Strategy
A Peek at adidas Group's Integrated Risk & Security Management StrategyA Peek at adidas Group's Integrated Risk & Security Management Strategy
A Peek at adidas Group's Integrated Risk & Security Management StrategyResolver Inc.
 
An Intro to Resolver's Resilience Application
An Intro to Resolver's Resilience ApplicationAn Intro to Resolver's Resilience Application
An Intro to Resolver's Resilience ApplicationResolver Inc.
 
Data Driven Risk Assessment
Data Driven Risk AssessmentData Driven Risk Assessment
Data Driven Risk AssessmentResolver Inc.
 
How to Achieve a Fully Integrated Approach to Business Resilience
How to Achieve a Fully Integrated Approach to Business ResilienceHow to Achieve a Fully Integrated Approach to Business Resilience
How to Achieve a Fully Integrated Approach to Business ResilienceResolver Inc.
 
An Intro to Resolver's Risk Application
An Intro to Resolver's Risk ApplicationAn Intro to Resolver's Risk Application
An Intro to Resolver's Risk ApplicationResolver Inc.
 
Keeping Your Data Clean
Keeping Your Data CleanKeeping Your Data Clean
Keeping Your Data CleanResolver Inc.
 
Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...
Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...
Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...Resolver Inc.
 
An Intro to Resolver's InfoSec Application (RiskVision)
An Intro to Resolver's InfoSec Application (RiskVision)An Intro to Resolver's InfoSec Application (RiskVision)
An Intro to Resolver's InfoSec Application (RiskVision)Resolver Inc.
 
Leveraging Change Leadership to Find Success in your IRM Program
Leveraging Change Leadership to Find Success in your IRM ProgramLeveraging Change Leadership to Find Success in your IRM Program
Leveraging Change Leadership to Find Success in your IRM ProgramResolver Inc.
 

Mehr von Resolver Inc. (20)

How to Prove the Value of Security Investments
How to Prove the Value of Security InvestmentsHow to Prove the Value of Security Investments
How to Prove the Value of Security Investments
 
ERM Benchmarking Survey Results
ERM Benchmarking Survey ResultsERM Benchmarking Survey Results
ERM Benchmarking Survey Results
 
Best Practices and ROI for Risk-based Vulnerability Management
Best Practices and ROI for Risk-based Vulnerability ManagementBest Practices and ROI for Risk-based Vulnerability Management
Best Practices and ROI for Risk-based Vulnerability Management
 
Taking a Data-Driven Approach to Business Continuity
Taking a Data-Driven Approach to Business ContinuityTaking a Data-Driven Approach to Business Continuity
Taking a Data-Driven Approach to Business Continuity
 
Reporting to the Board on Corporate Compliance
Reporting to the Board on Corporate ComplianceReporting to the Board on Corporate Compliance
Reporting to the Board on Corporate Compliance
 
An Intro to Resolver's Compliance Application
An Intro to Resolver's Compliance ApplicationAn Intro to Resolver's Compliance Application
An Intro to Resolver's Compliance Application
 
Information Security Best Practices: Keeping Your Company's Data Safe
Information Security Best Practices: Keeping Your Company's Data SafeInformation Security Best Practices: Keeping Your Company's Data Safe
Information Security Best Practices: Keeping Your Company's Data Safe
 
Security Trends: From "Silos" to Integrated Risk Management
Security Trends: From "Silos" to Integrated Risk ManagementSecurity Trends: From "Silos" to Integrated Risk Management
Security Trends: From "Silos" to Integrated Risk Management
 
Modelling your Business Processes with Resolver Core
Modelling your Business Processes with Resolver CoreModelling your Business Processes with Resolver Core
Modelling your Business Processes with Resolver Core
 
How Resolver Uses Resolver
How Resolver Uses ResolverHow Resolver Uses Resolver
How Resolver Uses Resolver
 
Scammed: Defend Against Social Engineering
Scammed: Defend Against Social EngineeringScammed: Defend Against Social Engineering
Scammed: Defend Against Social Engineering
 
A Peek at adidas Group's Integrated Risk & Security Management Strategy
A Peek at adidas Group's Integrated Risk & Security Management StrategyA Peek at adidas Group's Integrated Risk & Security Management Strategy
A Peek at adidas Group's Integrated Risk & Security Management Strategy
 
An Intro to Resolver's Resilience Application
An Intro to Resolver's Resilience ApplicationAn Intro to Resolver's Resilience Application
An Intro to Resolver's Resilience Application
 
Data Driven Risk Assessment
Data Driven Risk AssessmentData Driven Risk Assessment
Data Driven Risk Assessment
 
How to Achieve a Fully Integrated Approach to Business Resilience
How to Achieve a Fully Integrated Approach to Business ResilienceHow to Achieve a Fully Integrated Approach to Business Resilience
How to Achieve a Fully Integrated Approach to Business Resilience
 
An Intro to Resolver's Risk Application
An Intro to Resolver's Risk ApplicationAn Intro to Resolver's Risk Application
An Intro to Resolver's Risk Application
 
Keeping Your Data Clean
Keeping Your Data CleanKeeping Your Data Clean
Keeping Your Data Clean
 
Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...
Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...
Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...
 
An Intro to Resolver's InfoSec Application (RiskVision)
An Intro to Resolver's InfoSec Application (RiskVision)An Intro to Resolver's InfoSec Application (RiskVision)
An Intro to Resolver's InfoSec Application (RiskVision)
 
Leveraging Change Leadership to Find Success in your IRM Program
Leveraging Change Leadership to Find Success in your IRM ProgramLeveraging Change Leadership to Find Success in your IRM Program
Leveraging Change Leadership to Find Success in your IRM Program
 

Kürzlich hochgeladen

%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...masabamasaba
 
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfPayment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfkalichargn70th171
 
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...masabamasaba
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisamasabamasaba
 
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...SelfMade bd
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...panagenda
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...masabamasaba
 
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionOnePlan Solutions
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...masabamasaba
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...Shane Coughlan
 
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park %in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park masabamasaba
 
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2
 
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyviewmasabamasaba
 
WSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2
 
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfonteinmasabamasaba
 
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...Bert Jan Schrijver
 
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...Jittipong Loespradit
 
Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareJim McKeeth
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 

Kürzlich hochgeladen (20)

%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfPayment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
 
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
 
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park %in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
 
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
 
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
 
WSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go Platformless
 
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
 
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
 
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
 
Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK Software
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 

Terrorism in a Corporate Setting

  • 1. Terrorism in the Corporate Setting J. Reid Meloy, Ph.D., ABPP Int:rsect 2018 San Diego, CA May 23, 2018
  • 3. Lone Terrorist (actor, offender) • Research, planning, preparation, and implementation of an act of terrorism without any external command or control • May operate in pairs, but usually alone
  • 4. TRAP-18: Terrorist Radicalization Assessment Protocol • What it is: – A Structured Professional Judgment Instrument (SPJ) – Not a psychological test; an organizing instrument for threat assessment and threat management
  • 5. TRAP-18: Proximal Warning Behaviors (8) Pathway Fixation Identification Novel aggression Energy burst Leakage Directly communicated threat Last resort behavior
  • 6. TRAP-18: Distal Characteristics (10) • Personal grievance and moral outrage • Framed by an ideology • Failure to affiliate • Dependence on the virtual community • Thwarting of occupational goals
  • 7. TRAP-18: Distal Characteristics (10) • Changes in thinking and emotion • Failure of sexual pair-bonding • Mental disorder • Creative and innovative • History of criminal violence
  • 9. TRAP-18 Manual • Manual available from gifrinc.com • Codesheets available from Dr. Meloy – English, French, Spanish, Portuguese, Norwegian, Swedish, Dutch, German, Danish, and Arabic
  • 10. TRAP-18: Warning Behaviors Pathway Fixation Identification Novel aggression Energy burst Leakage Directly communicated threat Last resort behavior
  • 11. Warning Behaviors • Patterns of behavior rather than individual risk factors: pattern analysis • Origins in German gestalt psychology (Wertheimer, Koffka, Kohler) • Proximally related to violence
  • 12. Gestalt Psychology • Hw cn I rd ths wrds wtht ny vwls?
  • 13. Pathway Warning Behavior Any behavior that is part of research, planning, preparation, or implementation of an attack (Fein & Vossekuil, 1998, 1999; Calhoun & Weston, 2003)
  • 14. Pathway to Targeted or Intended Violence The “Grievance” Violent Ideation Research & Planning the Attack Pre-attack Preparation Probing & Breaches Attack Adapted with permission from F.S. Calhoun and S.W. Weston (2003). Contemporary threat management: A practical guide for identifying, assessing and managing individuals of violent intent. © 2003 F.S. Calhoun and S.W. Weston. All rights reserved.
  • 15.
  • 16. The Assassination of Robert F. Kennedy, June 5, 1968 • Grievance—Kennedy votes for the purchase of 50 Phantom fighter bombers by Israel (Jan. 9-10) • Ideation—”RFK must die” in diary • Research and Planning—vows to complete the act before the first anniversary of the Six Day War
  • 17. • Tells a trash collector he is going to kill Kennedy • Preparation—begins practicing at a shooting range with .22 revolver • “My determination to eliminate RFK is becoming…more of an unshakeable obsession” (May 18)
  • 18. • Breach—four stalking attempts (May 20, May 24, June 1, June 2) • Practices rapid fire shooting at range, leaves at 5 p.m., June 4 • Eats dinner, goes to Ambassador Hotel in Los Angeles, has four alcoholic drinks • Hides in the pantry
  • 19. • Attack--12:15 a.m., steps from behind a food tray rack • “Kennedy, you son of a bitch!!!” • 8 rounds fired, three wounds • Fatal wound in right hemisphere of cerebellum
  • 20. • 77 people in pantry • 5 others wounded • Kennedy died 25 hours later
  • 21. Fixation Warning Behavior Any behavior that indicates an increasingly pathological preoccupation with a person or a cause (Mullen et al., 2009). It typically causes deterioration of social and occupational functioning.
  • 23. Pathological Fixation • During psychiatric residency and fellowship (2003-2009) at Walter Reed gave three presentations which focused upon Muslims in the military, with no regard for the psychiatric purpose of these talks. • This disjuncture illustrates his fixation. • His social and occupational life also was clearly deteriorating.
  • 24. Identification Warning Behavior Any behavior that indicates a psychological desire to be a “pseudocommando” (Dietz, 1986; Knoll, 2010), have a “warrior mentality” (Hempel et al., 1999), closely associate with weapons or other military or law enforcement paraphernalia, identify with previous attackers or assassins, or to identify oneself as an agent to advance a particular cause or belief system. --Meloy JR, Mohandie K, Knoll J, Hoffmann J. (2015). The concept of identification in threat assessment. Behavioral Sciences and the Law. DOI: 10.1002/bsl.2166.
  • 25.
  • 28. Novel Aggression Warning Behavior An act of violence which appears unrelated to any targeted violence pathway warning behavior which is committed for the first time. It is typically done to test the subject’s ability to carry out his or her act of terrorist violence.
  • 30. Novel aggression • Larossi Abballa, a 25 year old French citizen of Moroccan descent, killed a police officer and his wife on June 14, 2016 in their home in Magnanville, France. The prosecutor said that Abballa appeared to be operating on a general order from al-Baghdadi, the leader of the Islamic State, to kill “miscreants at home with their families” during Ramadan. Immediately following the killings, he started a live Facebook chat explaining his behavior while the couple’s toddler son wandered in the background. He was subsequently killed by the police when they entered the home.
  • 31. Novel aggression • “The first time Larossi Abballa appeared on the radar of French terrorism investigators, the only act of violence they could pin on him was killing bunnies. He had joined a small group of men, all bent on waging jihad, on a trip to a snowy forest in northern France five years ago, when he was 19. There, they videotaped themselves slaughtering the rabbits, bought so the men could grow used to the feel of killing” (R. Callimachi, New York Times, June 22, 2016, p A1).
  • 32. Energy Burst Warning Behavior An increase in the frequency or variety of any noted activities related to the target, even if the activities themselves are relatively innocuous, usually in the hours, days or weeks before the attack (Odgers et al., 2009). Social media activity may increase or decrease during this period of time.
  • 33.
  • 34. Energy Burst Warning Behavior, January 7-8, 2011 • Drops off 35 mm film at Walgreen’s evening of Jan. 7 before midnight • Checks into Motel 6 shortly after midnight • Searches web for “assassins” and “lethal injection” • 0219 picks up photos, makes a purchase
  • 35. Jared Loughner • Leaves telephone message with friend • 0412 posts to Myspace page photo of Glock 19 and words, “Goodbye friends.” • 0600 visits Walmart and Circle K stores
  • 36. Energy Burst (cont’d) • Unable to purchase ammunition at first Walmart, purchases 9 mm full metal jacket ammo and diaper bag at 0727 • Stopped by police officer for running a red light • Confronted by father at home, runs away • Returns to Circle K, gets a cab, goes to supermarket where he insists on getting correct change for cab ride
  • 37. Energy Burst (cont’d) • Sixteen minutes later, opens fire at 10:10, killing 6 and wounding 13 people • Tackled by 3 senior citizens when he attempts to reload
  • 38. Leakage Warning Behavior The communication to a third party of an intent to do harm to a target through an attack. The third party may be an Internet audience and/or any social media audience (Meloy & O’Toole, Behavioral Sciences and the Law, 29:513-527, 2011).
  • 39. Open Source Social Media • “Greetings!....I am in USA now but we don’t have any arms. But is it possible to commit ourselves as dedicated martyrs anyway while here? What I’m saying is to shoot Obama, and then get shot ourselves, will it do? That will strike fear in the hearts of infidels.” • Abdurasul Juraboev, Hilofatnews.com, Aug. 8, 2014
  • 41. Last Resort Warning Behavior Evidence of a “violent action imperative” or “time imperative” (Mohandie & Duffy, 1999). It may be a signal of desperation or distress. Often the result of an unexpected triggering event, or one which is anticipated, that involves a loss in love and/or work. The subject believes he has no other choice and must act now.
  • 42. • “I have no choice. I am not in the position to, alone, go into the ghetto and fight. I chose Charleston because it is most historic city in my state, and at one time had the highest ratio of blacks to Whites in the country. We have no skinheads, no real KKK, no one doing anything but talking on the internet. Well someone has to have the bravery to take it to the real world, and I guess that has to be me.”
  • 43. Directly Communicated Threat Warning Behavior The communication of a direct threat to the target or law enforcement beforehand.
  • 44. Stockholm, Dec. 11, 2010 • “Now, your children—daughters and sisters—will die like our brothers and sisters and children are dying…our actions will speak for themselves. As long as you do not end your war against Islam and the insult against the prophet and your stupid support for that pig Vilks…”
  • 45. Taimour al-Abdaly • 28 year old Iraqi Sunni • Emigrated to Sweden age 10 • Attended university in UK • Detonated a car, and a few minutes later, blew himself up with a pipe bomb 200 meters away
  • 46.
  • 47. TRAP-18: Distal Characteristics • Personal grievance and moral outrage • Framed by an ideology • Failure to affiliate with extremist or other group • Dependence on the virtual community • Thwarting of occupational goals
  • 48. TRAP-18: Distal Characteristics • Changes in thinking and emotion • Failure of sexual pair-bonding • Mental disorder • Creative and innovative • Criminal violence
  • 49. Does TRAP-18 work in the real world? Validation studies
  • 50. Published Research • On website, drreidmeloy.com • PDF available free for download
  • 51. North American Lone Actor Terrorists vs. Others of Concern • Retrospective coding of attackers (n=33) and comparative group (n=23) who were successfully risk managed or false positives upon investigation • Unpublished data; currently being written for submission to journal • Moderate to large effect sizes
  • 52. Correlates for Violence Risk • Proximal warning behaviors – Pathway – Identification – Energy burst – Last resort – Directly communicated threat (neg effect)
  • 53. Correlates for Violence Risk • Distal characteristics – Ideology – Changes in thinking and emotion – Mental disorder (neg effect) – Greater creativity and innovation
  • 54. Monahan and Steadman, 1996 • Violent storms and violent people. American Psychologist 51:931-938 • Watching—cluster of distal characteristics> monitor the case • Warning—one proximal warning behavior> actively manage the case • Code warning behaviors first
  • 55. Current TRAP Operational Use • CT investigators and analysts in US, Canada, and various European countries • No official endorsement due to proprietary nature of TRAP-18 • Validation and pilot testing studies currently ongoing in UK and USA • Licensed to Multihealth Systems Inc.
  • 56. TRAP-18: Proximal Warning Behaviors Pathway Fixation Identification Novel aggression Energy burst Leakage Directly communicated threat Last resort behavior
  • 57. TRAP-18: Distal Characteristics • Personal grievance and moral outrage • Framed by an ideology • Failure to affiliate with actual group • Dependence on the virtual community • Thwarting of occupational goals
  • 58. TRAP-18: Distal Characteristics • Changes in thinking and emotion • Failure of sexual pair-bonding • Mental disorder • Creative and innovative • Criminal violence
  • 59. Eric Hoffer, The True Believer, 1951 “The vanity of the selfless, even those who practice utmost humility, is boundless.”
  • 60.
  • 61. Thank you • reidmeloy@gmail.com • @reidmeloy • www.DrReidMeloy.com • GIFRINC.COM