22.02.2017 Views

AMOK

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

ANATOMY OF A SCHOOL ATTACK<br />

Pathway to Violence<br />

“A series of sequential steps – from its beginning with a felt grievance, to violent ideation, research<br />

and planning, specific preparations for violence, critical breaches of security or other boundaries, to a<br />

concluding attack –indicating that an individual is progressing towards an act of targeted violence”<br />

(Calhoun & Weston, 2003; Fein et al., 2002).<br />

1. IDEATION 2. OPERATIONAL<br />

PLANNING<br />

3. PRE-ATTACK<br />

PREPARATIONS<br />

4. EXECUTION<br />

5. POST-ATTACK /<br />

ESCAPE<br />

Motive evolves into violent intent:<br />

• STUDENT - Student perceives violence<br />

as justified revenge and as a final<br />

solution to their problems (E. Harris &<br />

D. Klebold, K. Kinkel, etc.).<br />

• INSIDER ADULT – Current/former<br />

school official rejected by school<br />

administration or community<br />

conceives of violence as a means<br />

of vengeance (Kehoe, S. Shumerth, A.<br />

Bishop, etc).<br />

• OUTSIDER ADULT – Individual<br />

motivated by a variety of possible<br />

factors (fascination with mass<br />

violence, mental illness, sexual<br />

compulsion, family issues, etc.)<br />

becomes obsessed with idea of school<br />

violence (D. Morrison, A. Lanza, C.C.<br />

Roberts IV, etc.)<br />

• TERRORIST – Terrorist group<br />

recognizes huge potential for<br />

emotional impact by attacking school<br />

or taking children, parents, and<br />

teachers hostage. (RSBCM, DFLP, Boko<br />

Haram, etc.)Personality disorder<br />

may/or may not be a factor fuelling<br />

escalation from MOTIVE TO INTENT<br />

• Time Span: Months to Years<br />

• Often begins as violent fantasies that<br />

frame the template for attack<br />

• Formally begins when perpetrator has<br />

committed to the idea of an attack.<br />

• Involves information gathering<br />

aimed at supporting an attack<br />

plan. (identification of targets,<br />

establishment of routines, etc.)<br />

• Research on tactics, weapons, IED<br />

making, etc. (Developing Capability)<br />

• Acquiring resources (weapons,<br />

explosives, etc.)<br />

• Time Span: Weeks to Years (months<br />

most commonly)<br />

• Usually begins when attack date<br />

is selected and the perpetrator is<br />

satisfied with the attack plan.<br />

• Participants may ‘disconnect’ from<br />

others at the school<br />

• Final mission-essential resources are<br />

acquired (if not already in possession)<br />

• Weapons prepared, bombs<br />

constructed, & other final<br />

preparations<br />

• Warnings to friends, social media<br />

statements<br />

• Duration: Days to Weeks<br />

• Assault launched<br />

• Often executed with intention of<br />

suicide as final resolution after<br />

damage is done.<br />

• Often terminates with suicide when<br />

perpetrator realizes responders have<br />

arrived or are breaching the facility.<br />

• If not suicide, killer may try to escape<br />

in a vehicle or go to another location<br />

to continue killing spree<br />

The Role of Warning Behaviors in Threat Assessment: An Exploration and Suggested Typology<br />

J. Reid Meloy, Ph.D.*, Jens Hoffmann, Ph.D.,†<br />

Angela Guldimann, M.A.,{ and David James, M.B., B.S., M.A.}

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!