AMOK
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
ANATOMY OF A SCHOOL ATTACK<br />
Pathway to Violence<br />
“A series of sequential steps – from its beginning with a felt grievance, to violent ideation, research<br />
and planning, specific preparations for violence, critical breaches of security or other boundaries, to a<br />
concluding attack –indicating that an individual is progressing towards an act of targeted violence”<br />
(Calhoun & Weston, 2003; Fein et al., 2002).<br />
1. IDEATION 2. OPERATIONAL<br />
PLANNING<br />
3. PRE-ATTACK<br />
PREPARATIONS<br />
4. EXECUTION<br />
5. POST-ATTACK /<br />
ESCAPE<br />
Motive evolves into violent intent:<br />
• STUDENT - Student perceives violence<br />
as justified revenge and as a final<br />
solution to their problems (E. Harris &<br />
D. Klebold, K. Kinkel, etc.).<br />
• INSIDER ADULT – Current/former<br />
school official rejected by school<br />
administration or community<br />
conceives of violence as a means<br />
of vengeance (Kehoe, S. Shumerth, A.<br />
Bishop, etc).<br />
• OUTSIDER ADULT – Individual<br />
motivated by a variety of possible<br />
factors (fascination with mass<br />
violence, mental illness, sexual<br />
compulsion, family issues, etc.)<br />
becomes obsessed with idea of school<br />
violence (D. Morrison, A. Lanza, C.C.<br />
Roberts IV, etc.)<br />
• TERRORIST – Terrorist group<br />
recognizes huge potential for<br />
emotional impact by attacking school<br />
or taking children, parents, and<br />
teachers hostage. (RSBCM, DFLP, Boko<br />
Haram, etc.)Personality disorder<br />
may/or may not be a factor fuelling<br />
escalation from MOTIVE TO INTENT<br />
• Time Span: Months to Years<br />
• Often begins as violent fantasies that<br />
frame the template for attack<br />
• Formally begins when perpetrator has<br />
committed to the idea of an attack.<br />
• Involves information gathering<br />
aimed at supporting an attack<br />
plan. (identification of targets,<br />
establishment of routines, etc.)<br />
• Research on tactics, weapons, IED<br />
making, etc. (Developing Capability)<br />
• Acquiring resources (weapons,<br />
explosives, etc.)<br />
• Time Span: Weeks to Years (months<br />
most commonly)<br />
• Usually begins when attack date<br />
is selected and the perpetrator is<br />
satisfied with the attack plan.<br />
• Participants may ‘disconnect’ from<br />
others at the school<br />
• Final mission-essential resources are<br />
acquired (if not already in possession)<br />
• Weapons prepared, bombs<br />
constructed, & other final<br />
preparations<br />
• Warnings to friends, social media<br />
statements<br />
• Duration: Days to Weeks<br />
• Assault launched<br />
• Often executed with intention of<br />
suicide as final resolution after<br />
damage is done.<br />
• Often terminates with suicide when<br />
perpetrator realizes responders have<br />
arrived or are breaching the facility.<br />
• If not suicide, killer may try to escape<br />
in a vehicle or go to another location<br />
to continue killing spree<br />
The Role of Warning Behaviors in Threat Assessment: An Exploration and Suggested Typology<br />
J. Reid Meloy, Ph.D.*, Jens Hoffmann, Ph.D.,†<br />
Angela Guldimann, M.A.,{ and David James, M.B., B.S., M.A.}