SlideShare une entreprise Scribd logo
1  sur  61
Télécharger pour lire hors ligne
Terrorism in the Corporate
Setting
J. Reid Meloy, Ph.D., ABPP
Int:rsect 2018
San Diego, CA
May 23, 2018
YouTube HQ, April 3, 2018
Lone Terrorist (actor, offender)
• Research, planning, preparation, and
implementation of an act of terrorism
without any external command or control
• May operate in pairs, but usually alone
TRAP-18: Terrorist
Radicalization Assessment
Protocol
• What it is:
– A Structured Professional Judgment
Instrument (SPJ)
– Not a psychological test; an organizing
instrument for threat assessment and threat
management
TRAP-18:
Proximal Warning Behaviors (8)
Pathway
Fixation
Identification
Novel aggression
Energy burst
Leakage
Directly communicated threat
Last resort behavior
TRAP-18:
Distal Characteristics (10)
• Personal grievance and moral outrage
• Framed by an ideology
• Failure to affiliate
• Dependence on the virtual community
• Thwarting of occupational goals
TRAP-18:
Distal Characteristics (10)
• Changes in thinking and emotion
• Failure of sexual pair-bonding
• Mental disorder
• Creative and innovative
• History of criminal violence
Attack
Warning
Behaviors
Characteristics
TRAP-18 Manual
• Manual available from gifrinc.com
• Codesheets available from Dr. Meloy
– English, French, Spanish, Portuguese,
Norwegian, Swedish, Dutch, German, Danish,
and Arabic
TRAP-18:
Warning Behaviors
Pathway
Fixation
Identification
Novel aggression
Energy burst
Leakage
Directly communicated threat
Last resort behavior
Warning Behaviors
• Patterns of behavior rather than individual
risk factors: pattern analysis
• Origins in German gestalt psychology
(Wertheimer, Koffka, Kohler)
• Proximally related to violence
Gestalt Psychology
• Hw cn I rd ths wrds wtht ny vwls?
Pathway Warning Behavior
Any behavior that is part of research,
planning, preparation, or implementation
of an attack (Fein & Vossekuil, 1998,
1999; Calhoun & Weston, 2003)
Pathway to
Targeted or Intended Violence
The “Grievance”
Violent Ideation
Research & Planning the Attack
Pre-attack Preparation
Probing & Breaches
Attack
Adapted with permission from F.S. Calhoun and S.W. Weston (2003). Contemporary threat management:
A practical guide for identifying, assessing and managing individuals of violent intent.
© 2003 F.S. Calhoun and S.W. Weston. All rights reserved.
The Assassination of
Robert F. Kennedy, June 5,
1968
• Grievance—Kennedy votes for the purchase
of 50 Phantom fighter bombers by Israel (Jan.
9-10)
• Ideation—”RFK must die” in diary
• Research and Planning—vows to complete
the act before the first anniversary of the Six
Day War
• Tells a trash collector he is going to kill
Kennedy
• Preparation—begins practicing at a shooting
range with .22 revolver
• “My determination to eliminate RFK is
becoming…more of an unshakeable
obsession” (May 18)
• Breach—four stalking attempts (May 20, May
24, June 1, June 2)
• Practices rapid fire shooting at range, leaves at
5 p.m., June 4
• Eats dinner, goes to Ambassador Hotel in Los
Angeles, has four alcoholic drinks
• Hides in the pantry
• Attack--12:15 a.m., steps from behind a food
tray rack
• “Kennedy, you son of a bitch!!!”
• 8 rounds fired, three wounds
• Fatal wound in right hemisphere of cerebellum
• 77 people in pantry
• 5 others wounded
• Kennedy died 25 hours later
Fixation Warning Behavior
Any behavior that indicates an increasingly
pathological preoccupation with a person or a cause
(Mullen et al., 2009). It typically causes deterioration
of social and occupational functioning.
Malik Hasan
Pathological Fixation
• During psychiatric residency and fellowship (2003-2009)
at Walter Reed gave three presentations which focused
upon Muslims in the military, with no regard for the
psychiatric purpose of these talks.
• This disjuncture illustrates his fixation.
• His social and occupational life also was clearly
deteriorating.
Identification Warning Behavior
Any behavior that indicates a psychological desire to
be a “pseudocommando” (Dietz, 1986; Knoll, 2010),
have a “warrior mentality” (Hempel et al., 1999),
closely associate with weapons or other military or
law enforcement paraphernalia, identify with
previous attackers or assassins, or to identify
oneself as an agent to advance a particular cause or
belief system.
--Meloy JR, Mohandie K, Knoll J, Hoffmann J. (2015).
The concept of identification in threat assessment. Behavioral
Sciences and the Law. DOI: 10.1002/bsl.2166.
Anders Breivik
Identification
Proximal Warning Behaviors
Novel Aggression Warning
Behavior
An act of violence which appears unrelated to any
targeted violence pathway warning behavior which is
committed for the first time. It is typically done to
test the subject’s ability to carry out his or her act of
terrorist violence.
Larossi Abballa
Novel aggression
• Larossi Abballa, a 25 year old French citizen of
Moroccan descent, killed a police officer and his wife on
June 14, 2016 in their home in Magnanville, France.
The prosecutor said that Abballa appeared to be
operating on a general order from al-Baghdadi, the
leader of the Islamic State, to kill “miscreants at home
with their families” during Ramadan. Immediately
following the killings, he started a live Facebook chat
explaining his behavior while the couple’s toddler son
wandered in the background. He was subsequently
killed by the police when they entered the home.
Novel aggression
• “The first time Larossi Abballa appeared on the radar of
French terrorism investigators, the only act of violence
they could pin on him was killing bunnies. He had joined
a small group of men, all bent on waging jihad, on a trip
to a snowy forest in northern France five years ago,
when he was 19. There, they videotaped themselves
slaughtering the rabbits, bought so the men could grow
used to the feel of killing” (R. Callimachi, New York
Times, June 22, 2016, p A1).
Energy Burst Warning Behavior
An increase in the frequency or variety of any noted
activities related to the target, even if the activities
themselves are relatively innocuous, usually in the
hours, days or weeks before the attack (Odgers et
al., 2009). Social media activity may increase or
decrease during this period of time.
Energy Burst Warning Behavior,
January 7-8, 2011
• Drops off 35 mm film at Walgreen’s evening of Jan. 7
before midnight
• Checks into Motel 6 shortly after midnight
• Searches web for “assassins” and “lethal injection”
• 0219 picks up photos, makes a purchase
Jared Loughner
• Leaves telephone message with friend
• 0412 posts to Myspace page photo of Glock 19 and
words, “Goodbye friends.”
• 0600 visits Walmart and Circle K stores
Energy Burst (cont’d)
• Unable to purchase ammunition at first Walmart,
purchases 9 mm full metal jacket ammo and diaper
bag at 0727
• Stopped by police officer for running a red light
• Confronted by father at home, runs away
• Returns to Circle K, gets a cab, goes to supermarket
where he insists on getting correct change for cab
ride
Energy Burst (cont’d)
• Sixteen minutes later, opens fire at 10:10, killing 6 and
wounding 13 people
• Tackled by 3 senior citizens when he attempts to
reload
Leakage Warning Behavior
The communication to a third party of an intent to do
harm to a target through an attack. The third party
may be an Internet audience and/or any social
media audience (Meloy & O’Toole, Behavioral
Sciences and the Law, 29:513-527, 2011).
Open Source Social Media
• “Greetings!....I am in USA now but we don’t have any
arms. But is it possible to commit ourselves as
dedicated martyrs anyway while here? What I’m saying
is to shoot Obama, and then get shot ourselves, will it
do? That will strike fear in the hearts of infidels.”
• Abdurasul Juraboev, Hilofatnews.com, Aug. 8, 2014
Federal District Court, Feb.,
2015
Last Resort Warning Behavior
Evidence of a “violent action imperative” or “time
imperative” (Mohandie & Duffy, 1999). It may be a
signal of desperation or distress. Often the result of
an unexpected triggering event, or one which is
anticipated, that involves a loss in love and/or work.
The subject believes he has no other choice and
must act now.
• “I have no choice. I am not in the position to, alone, go into the
ghetto and fight. I chose Charleston because it is most historic city in
my state, and at one time had the highest ratio of blacks to Whites in
the country. We have no skinheads, no real KKK, no one doing
anything but talking on the internet. Well someone has to have the
bravery to take it to the real world, and I guess that has to be me.”
Directly Communicated Threat
Warning Behavior
The communication of a direct threat to the target or
law enforcement beforehand.
Stockholm, Dec. 11, 2010
• “Now, your children—daughters and sisters—will die like
our brothers and sisters and children are dying…our
actions will speak for themselves. As long as you do not
end your war against Islam and the insult against the
prophet and your stupid support for that pig Vilks…”
Taimour al-Abdaly
• 28 year old Iraqi Sunni
• Emigrated to Sweden age 10
• Attended university in UK
• Detonated a car, and a few minutes later, blew himself
up with a pipe bomb 200 meters away
TRAP-18: Distal Characteristics
• Personal grievance and moral outrage
• Framed by an ideology
• Failure to affiliate with extremist or other group
• Dependence on the virtual community
• Thwarting of occupational goals
TRAP-18: Distal Characteristics
• Changes in thinking and emotion
• Failure of sexual pair-bonding
• Mental disorder
• Creative and innovative
• Criminal violence
Does TRAP-18 work in the
real world?
Validation studies
Published Research
• On website, drreidmeloy.com
• PDF available free for download
North American Lone Actor
Terrorists vs. Others of Concern
• Retrospective coding of attackers (n=33)
and comparative group (n=23) who were
successfully risk managed or false
positives upon investigation
• Unpublished data; currently being written
for submission to journal
• Moderate to large effect sizes
Correlates for Violence Risk
• Proximal warning behaviors
– Pathway
– Identification
– Energy burst
– Last resort
– Directly communicated threat (neg effect)
Correlates for Violence Risk
• Distal characteristics
– Ideology
– Changes in thinking and emotion
– Mental disorder (neg effect)
– Greater creativity and innovation
Monahan and Steadman, 1996
• Violent storms and violent people.
American Psychologist 51:931-938
• Watching—cluster of distal
characteristics> monitor the case
• Warning—one proximal warning
behavior> actively manage the case
• Code warning behaviors first
Current TRAP Operational Use
• CT investigators and analysts in US,
Canada, and various European countries
• No official endorsement due to proprietary
nature of TRAP-18
• Validation and pilot testing studies
currently ongoing in UK and USA
• Licensed to Multihealth Systems Inc.
TRAP-18: Proximal Warning
Behaviors
Pathway
Fixation
Identification
Novel aggression
Energy burst
Leakage
Directly communicated threat
Last resort behavior
TRAP-18: Distal Characteristics
• Personal grievance and moral outrage
• Framed by an ideology
• Failure to affiliate with actual group
• Dependence on the virtual community
• Thwarting of occupational goals
TRAP-18: Distal Characteristics
• Changes in thinking and emotion
• Failure of sexual pair-bonding
• Mental disorder
• Creative and innovative
• Criminal violence
Eric Hoffer, The True Believer,
1951
“The vanity of the selfless, even those
who practice utmost humility, is
boundless.”
Thank you
• reidmeloy@gmail.com
• @reidmeloy
• www.DrReidMeloy.com
• GIFRINC.COM

Contenu connexe

Tendances

Little brother presentation.5.30.13
Little brother presentation.5.30.13Little brother presentation.5.30.13
Little brother presentation.5.30.13
Craig Tunks
 
Little Brother Scrapbook
Little Brother ScrapbookLittle Brother Scrapbook
Little Brother Scrapbook
Kyla Duncan
 
Hall Elizabeth Unit Four Globalization Of Serial Murder
Hall Elizabeth Unit Four Globalization Of Serial MurderHall Elizabeth Unit Four Globalization Of Serial Murder
Hall Elizabeth Unit Four Globalization Of Serial Murder
Elizabeth Hall
 
Bill Clinton and Sex Scandals
Bill Clinton and Sex Scandals Bill Clinton and Sex Scandals
Bill Clinton and Sex Scandals
atrantham
 
Criminal minds presentation
Criminal minds presentationCriminal minds presentation
Criminal minds presentation
ibull1
 
FailureofDiplomacy-Iran
FailureofDiplomacy-IranFailureofDiplomacy-Iran
FailureofDiplomacy-Iran
Neal Young
 
7 MEDIA AND CRIME POWERPOINT
7 MEDIA AND CRIME POWERPOINT7 MEDIA AND CRIME POWERPOINT
7 MEDIA AND CRIME POWERPOINT
mattyp99
 

Tendances (17)

Hillaryclintonvsdonaldtrumpempoweredpres 160130042256
Hillaryclintonvsdonaldtrumpempoweredpres 160130042256Hillaryclintonvsdonaldtrumpempoweredpres 160130042256
Hillaryclintonvsdonaldtrumpempoweredpres 160130042256
 
Little brother presentation.5.30.13
Little brother presentation.5.30.13Little brother presentation.5.30.13
Little brother presentation.5.30.13
 
Little Brother Scrapbook
Little Brother ScrapbookLittle Brother Scrapbook
Little Brother Scrapbook
 
Guilt transfer in mass following
Guilt transfer in mass followingGuilt transfer in mass following
Guilt transfer in mass following
 
Extortion and The D.C. Madam
Extortion and The D.C. MadamExtortion and The D.C. Madam
Extortion and The D.C. Madam
 
Prophet Muhammad will never honor Bomb-Robot nor ISIS
Prophet Muhammad will never honor Bomb-Robot nor ISISProphet Muhammad will never honor Bomb-Robot nor ISIS
Prophet Muhammad will never honor Bomb-Robot nor ISIS
 
Hall Elizabeth Unit Four Globalization Of Serial Murder
Hall Elizabeth Unit Four Globalization Of Serial MurderHall Elizabeth Unit Four Globalization Of Serial Murder
Hall Elizabeth Unit Four Globalization Of Serial Murder
 
Essay on Bradley Manning
Essay on Bradley ManningEssay on Bradley Manning
Essay on Bradley Manning
 
Research gaps in Male-Directed sexual violence Part 1
Research gaps in Male-Directed sexual violence Part 1Research gaps in Male-Directed sexual violence Part 1
Research gaps in Male-Directed sexual violence Part 1
 
Lock Them Up!
Lock Them Up!Lock Them Up!
Lock Them Up!
 
Clinton and Lewinsky
Clinton and LewinskyClinton and Lewinsky
Clinton and Lewinsky
 
12 steps to_id-dt
12 steps to_id-dt12 steps to_id-dt
12 steps to_id-dt
 
Bill Clinton and Sex Scandals
Bill Clinton and Sex Scandals Bill Clinton and Sex Scandals
Bill Clinton and Sex Scandals
 
Criminal minds presentation
Criminal minds presentationCriminal minds presentation
Criminal minds presentation
 
FailureofDiplomacy-Iran
FailureofDiplomacy-IranFailureofDiplomacy-Iran
FailureofDiplomacy-Iran
 
7 MEDIA AND CRIME POWERPOINT
7 MEDIA AND CRIME POWERPOINT7 MEDIA AND CRIME POWERPOINT
7 MEDIA AND CRIME POWERPOINT
 
Hackers and Harm Reduction / 29c3 / CCC
Hackers and Harm Reduction /  29c3 / CCCHackers and Harm Reduction /  29c3 / CCC
Hackers and Harm Reduction / 29c3 / CCC
 

Similaire à Terrorism in a Corporate Setting

Robert Lobit, Leon White, cylvania allen-pringleEthical Scrapb.docx
Robert Lobit, Leon White, cylvania allen-pringleEthical Scrapb.docxRobert Lobit, Leon White, cylvania allen-pringleEthical Scrapb.docx
Robert Lobit, Leon White, cylvania allen-pringleEthical Scrapb.docx
joellemurphey
 
Maggie James Non-Fiction
Maggie James Non-FictionMaggie James Non-Fiction
Maggie James Non-Fiction
14mjames
 
ASSIGNMENTSPersuasive Speech written outPersuasive speech o.docx
ASSIGNMENTSPersuasive Speech written outPersuasive speech o.docxASSIGNMENTSPersuasive Speech written outPersuasive speech o.docx
ASSIGNMENTSPersuasive Speech written outPersuasive speech o.docx
rock73
 
Persuasion of Hate
Persuasion of HatePersuasion of Hate
Persuasion of Hate
Jmclea01
 
Pollock ethics 8e_ch14
Pollock ethics 8e_ch14Pollock ethics 8e_ch14
Pollock ethics 8e_ch14
windleh
 
Psychopath Investigator
Psychopath InvestigatorPsychopath Investigator
Psychopath Investigator
Geoff Simmons
 
Notes on capital punishment content package (2013)
Notes on capital punishment content package (2013)Notes on capital punishment content package (2013)
Notes on capital punishment content package (2013)
pepperleejy
 
4.4.24 Black Radicalism and Government Repression.pptx
4.4.24 Black Radicalism and Government Repression.pptx4.4.24 Black Radicalism and Government Repression.pptx
4.4.24 Black Radicalism and Government Repression.pptx
mary850239
 
Deviance7ISBN 1-256-36957-8Society The Basics.docx
Deviance7ISBN 1-256-36957-8Society The Basics.docxDeviance7ISBN 1-256-36957-8Society The Basics.docx
Deviance7ISBN 1-256-36957-8Society The Basics.docx
duketjoy27252
 

Similaire à Terrorism in a Corporate Setting (15)

Robert Lobit, Leon White, cylvania allen-pringleEthical Scrapb.docx
Robert Lobit, Leon White, cylvania allen-pringleEthical Scrapb.docxRobert Lobit, Leon White, cylvania allen-pringleEthical Scrapb.docx
Robert Lobit, Leon White, cylvania allen-pringleEthical Scrapb.docx
 
Maggie James Non-Fiction
Maggie James Non-FictionMaggie James Non-Fiction
Maggie James Non-Fiction
 
Chapter4
Chapter4Chapter4
Chapter4
 
ASSIGNMENTSPersuasive Speech written outPersuasive speech o.docx
ASSIGNMENTSPersuasive Speech written outPersuasive speech o.docxASSIGNMENTSPersuasive Speech written outPersuasive speech o.docx
ASSIGNMENTSPersuasive Speech written outPersuasive speech o.docx
 
Persuasion of Hate
Persuasion of HatePersuasion of Hate
Persuasion of Hate
 
From Outrage to Action on Anti-Semitism.pdf
From Outrage to Action on Anti-Semitism.pdfFrom Outrage to Action on Anti-Semitism.pdf
From Outrage to Action on Anti-Semitism.pdf
 
HViolence
HViolenceHViolence
HViolence
 
Pollock ethics 8e_ch14
Pollock ethics 8e_ch14Pollock ethics 8e_ch14
Pollock ethics 8e_ch14
 
Psychopath Investigator
Psychopath InvestigatorPsychopath Investigator
Psychopath Investigator
 
Session 5 youth crime the media.2016
Session 5  youth crime  the media.2016Session 5  youth crime  the media.2016
Session 5 youth crime the media.2016
 
Notes on capital punishment content package (2013)
Notes on capital punishment content package (2013)Notes on capital punishment content package (2013)
Notes on capital punishment content package (2013)
 
Serial Murder Investigation
Serial Murder Investigation Serial Murder Investigation
Serial Murder Investigation
 
4.4.24 Black Radicalism and Government Repression.pptx
4.4.24 Black Radicalism and Government Repression.pptx4.4.24 Black Radicalism and Government Repression.pptx
4.4.24 Black Radicalism and Government Repression.pptx
 
Deviance7ISBN 1-256-36957-8Society The Basics.docx
Deviance7ISBN 1-256-36957-8Society The Basics.docxDeviance7ISBN 1-256-36957-8Society The Basics.docx
Deviance7ISBN 1-256-36957-8Society The Basics.docx
 
Internet and the Law: Protecting Yourself Against Online Abuse - Dr. Emily La...
Internet and the Law: Protecting Yourself Against Online Abuse - Dr. Emily La...Internet and the Law: Protecting Yourself Against Online Abuse - Dr. Emily La...
Internet and the Law: Protecting Yourself Against Online Abuse - Dr. Emily La...
 

Plus de Resolver Inc.

Plus de Resolver Inc. (20)

How to Prove the Value of Security Investments
How to Prove the Value of Security InvestmentsHow to Prove the Value of Security Investments
How to Prove the Value of Security Investments
 
ERM Benchmarking Survey Results
ERM Benchmarking Survey ResultsERM Benchmarking Survey Results
ERM Benchmarking Survey Results
 
Best Practices and ROI for Risk-based Vulnerability Management
Best Practices and ROI for Risk-based Vulnerability ManagementBest Practices and ROI for Risk-based Vulnerability Management
Best Practices and ROI for Risk-based Vulnerability Management
 
Taking a Data-Driven Approach to Business Continuity
Taking a Data-Driven Approach to Business ContinuityTaking a Data-Driven Approach to Business Continuity
Taking a Data-Driven Approach to Business Continuity
 
Reporting to the Board on Corporate Compliance
Reporting to the Board on Corporate ComplianceReporting to the Board on Corporate Compliance
Reporting to the Board on Corporate Compliance
 
An Intro to Resolver's Compliance Application
An Intro to Resolver's Compliance ApplicationAn Intro to Resolver's Compliance Application
An Intro to Resolver's Compliance Application
 
Information Security Best Practices: Keeping Your Company's Data Safe
Information Security Best Practices: Keeping Your Company's Data SafeInformation Security Best Practices: Keeping Your Company's Data Safe
Information Security Best Practices: Keeping Your Company's Data Safe
 
Security Trends: From "Silos" to Integrated Risk Management
Security Trends: From "Silos" to Integrated Risk ManagementSecurity Trends: From "Silos" to Integrated Risk Management
Security Trends: From "Silos" to Integrated Risk Management
 
Modelling your Business Processes with Resolver Core
Modelling your Business Processes with Resolver CoreModelling your Business Processes with Resolver Core
Modelling your Business Processes with Resolver Core
 
How Resolver Uses Resolver
How Resolver Uses ResolverHow Resolver Uses Resolver
How Resolver Uses Resolver
 
Scammed: Defend Against Social Engineering
Scammed: Defend Against Social EngineeringScammed: Defend Against Social Engineering
Scammed: Defend Against Social Engineering
 
A Peek at adidas Group's Integrated Risk & Security Management Strategy
A Peek at adidas Group's Integrated Risk & Security Management StrategyA Peek at adidas Group's Integrated Risk & Security Management Strategy
A Peek at adidas Group's Integrated Risk & Security Management Strategy
 
An Intro to Resolver's Resilience Application
An Intro to Resolver's Resilience ApplicationAn Intro to Resolver's Resilience Application
An Intro to Resolver's Resilience Application
 
Data Driven Risk Assessment
Data Driven Risk AssessmentData Driven Risk Assessment
Data Driven Risk Assessment
 
How to Achieve a Fully Integrated Approach to Business Resilience
How to Achieve a Fully Integrated Approach to Business ResilienceHow to Achieve a Fully Integrated Approach to Business Resilience
How to Achieve a Fully Integrated Approach to Business Resilience
 
An Intro to Resolver's Risk Application
An Intro to Resolver's Risk ApplicationAn Intro to Resolver's Risk Application
An Intro to Resolver's Risk Application
 
Keeping Your Data Clean
Keeping Your Data CleanKeeping Your Data Clean
Keeping Your Data Clean
 
Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...
Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...
Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...
 
An Intro to Resolver's InfoSec Application (RiskVision)
An Intro to Resolver's InfoSec Application (RiskVision)An Intro to Resolver's InfoSec Application (RiskVision)
An Intro to Resolver's InfoSec Application (RiskVision)
 
Leveraging Change Leadership to Find Success in your IRM Program
Leveraging Change Leadership to Find Success in your IRM ProgramLeveraging Change Leadership to Find Success in your IRM Program
Leveraging Change Leadership to Find Success in your IRM Program
 

Dernier

AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
VictorSzoltysek
 

Dernier (20)

Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfPayment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
BUS PASS MANGEMENT SYSTEM USING PHP.pptx
BUS PASS MANGEMENT SYSTEM USING PHP.pptxBUS PASS MANGEMENT SYSTEM USING PHP.pptx
BUS PASS MANGEMENT SYSTEM USING PHP.pptx
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
Pharm-D Biostatistics and Research methodology
Pharm-D Biostatistics and Research methodologyPharm-D Biostatistics and Research methodology
Pharm-D Biostatistics and Research methodology
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 
LEVEL 5 - SESSION 1 2023 (1).pptx - PDF 123456
LEVEL 5   - SESSION 1 2023 (1).pptx - PDF 123456LEVEL 5   - SESSION 1 2023 (1).pptx - PDF 123456
LEVEL 5 - SESSION 1 2023 (1).pptx - PDF 123456
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
 
10 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 202410 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 2024
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdf
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 

Terrorism in a Corporate Setting

  • 1. Terrorism in the Corporate Setting J. Reid Meloy, Ph.D., ABPP Int:rsect 2018 San Diego, CA May 23, 2018
  • 3. Lone Terrorist (actor, offender) • Research, planning, preparation, and implementation of an act of terrorism without any external command or control • May operate in pairs, but usually alone
  • 4. TRAP-18: Terrorist Radicalization Assessment Protocol • What it is: – A Structured Professional Judgment Instrument (SPJ) – Not a psychological test; an organizing instrument for threat assessment and threat management
  • 5. TRAP-18: Proximal Warning Behaviors (8) Pathway Fixation Identification Novel aggression Energy burst Leakage Directly communicated threat Last resort behavior
  • 6. TRAP-18: Distal Characteristics (10) • Personal grievance and moral outrage • Framed by an ideology • Failure to affiliate • Dependence on the virtual community • Thwarting of occupational goals
  • 7. TRAP-18: Distal Characteristics (10) • Changes in thinking and emotion • Failure of sexual pair-bonding • Mental disorder • Creative and innovative • History of criminal violence
  • 9. TRAP-18 Manual • Manual available from gifrinc.com • Codesheets available from Dr. Meloy – English, French, Spanish, Portuguese, Norwegian, Swedish, Dutch, German, Danish, and Arabic
  • 10. TRAP-18: Warning Behaviors Pathway Fixation Identification Novel aggression Energy burst Leakage Directly communicated threat Last resort behavior
  • 11. Warning Behaviors • Patterns of behavior rather than individual risk factors: pattern analysis • Origins in German gestalt psychology (Wertheimer, Koffka, Kohler) • Proximally related to violence
  • 12. Gestalt Psychology • Hw cn I rd ths wrds wtht ny vwls?
  • 13. Pathway Warning Behavior Any behavior that is part of research, planning, preparation, or implementation of an attack (Fein & Vossekuil, 1998, 1999; Calhoun & Weston, 2003)
  • 14. Pathway to Targeted or Intended Violence The “Grievance” Violent Ideation Research & Planning the Attack Pre-attack Preparation Probing & Breaches Attack Adapted with permission from F.S. Calhoun and S.W. Weston (2003). Contemporary threat management: A practical guide for identifying, assessing and managing individuals of violent intent. © 2003 F.S. Calhoun and S.W. Weston. All rights reserved.
  • 15.
  • 16. The Assassination of Robert F. Kennedy, June 5, 1968 • Grievance—Kennedy votes for the purchase of 50 Phantom fighter bombers by Israel (Jan. 9-10) • Ideation—”RFK must die” in diary • Research and Planning—vows to complete the act before the first anniversary of the Six Day War
  • 17. • Tells a trash collector he is going to kill Kennedy • Preparation—begins practicing at a shooting range with .22 revolver • “My determination to eliminate RFK is becoming…more of an unshakeable obsession” (May 18)
  • 18. • Breach—four stalking attempts (May 20, May 24, June 1, June 2) • Practices rapid fire shooting at range, leaves at 5 p.m., June 4 • Eats dinner, goes to Ambassador Hotel in Los Angeles, has four alcoholic drinks • Hides in the pantry
  • 19. • Attack--12:15 a.m., steps from behind a food tray rack • “Kennedy, you son of a bitch!!!” • 8 rounds fired, three wounds • Fatal wound in right hemisphere of cerebellum
  • 20. • 77 people in pantry • 5 others wounded • Kennedy died 25 hours later
  • 21. Fixation Warning Behavior Any behavior that indicates an increasingly pathological preoccupation with a person or a cause (Mullen et al., 2009). It typically causes deterioration of social and occupational functioning.
  • 23. Pathological Fixation • During psychiatric residency and fellowship (2003-2009) at Walter Reed gave three presentations which focused upon Muslims in the military, with no regard for the psychiatric purpose of these talks. • This disjuncture illustrates his fixation. • His social and occupational life also was clearly deteriorating.
  • 24. Identification Warning Behavior Any behavior that indicates a psychological desire to be a “pseudocommando” (Dietz, 1986; Knoll, 2010), have a “warrior mentality” (Hempel et al., 1999), closely associate with weapons or other military or law enforcement paraphernalia, identify with previous attackers or assassins, or to identify oneself as an agent to advance a particular cause or belief system. --Meloy JR, Mohandie K, Knoll J, Hoffmann J. (2015). The concept of identification in threat assessment. Behavioral Sciences and the Law. DOI: 10.1002/bsl.2166.
  • 25.
  • 28. Novel Aggression Warning Behavior An act of violence which appears unrelated to any targeted violence pathway warning behavior which is committed for the first time. It is typically done to test the subject’s ability to carry out his or her act of terrorist violence.
  • 30. Novel aggression • Larossi Abballa, a 25 year old French citizen of Moroccan descent, killed a police officer and his wife on June 14, 2016 in their home in Magnanville, France. The prosecutor said that Abballa appeared to be operating on a general order from al-Baghdadi, the leader of the Islamic State, to kill “miscreants at home with their families” during Ramadan. Immediately following the killings, he started a live Facebook chat explaining his behavior while the couple’s toddler son wandered in the background. He was subsequently killed by the police when they entered the home.
  • 31. Novel aggression • “The first time Larossi Abballa appeared on the radar of French terrorism investigators, the only act of violence they could pin on him was killing bunnies. He had joined a small group of men, all bent on waging jihad, on a trip to a snowy forest in northern France five years ago, when he was 19. There, they videotaped themselves slaughtering the rabbits, bought so the men could grow used to the feel of killing” (R. Callimachi, New York Times, June 22, 2016, p A1).
  • 32. Energy Burst Warning Behavior An increase in the frequency or variety of any noted activities related to the target, even if the activities themselves are relatively innocuous, usually in the hours, days or weeks before the attack (Odgers et al., 2009). Social media activity may increase or decrease during this period of time.
  • 33.
  • 34. Energy Burst Warning Behavior, January 7-8, 2011 • Drops off 35 mm film at Walgreen’s evening of Jan. 7 before midnight • Checks into Motel 6 shortly after midnight • Searches web for “assassins” and “lethal injection” • 0219 picks up photos, makes a purchase
  • 35. Jared Loughner • Leaves telephone message with friend • 0412 posts to Myspace page photo of Glock 19 and words, “Goodbye friends.” • 0600 visits Walmart and Circle K stores
  • 36. Energy Burst (cont’d) • Unable to purchase ammunition at first Walmart, purchases 9 mm full metal jacket ammo and diaper bag at 0727 • Stopped by police officer for running a red light • Confronted by father at home, runs away • Returns to Circle K, gets a cab, goes to supermarket where he insists on getting correct change for cab ride
  • 37. Energy Burst (cont’d) • Sixteen minutes later, opens fire at 10:10, killing 6 and wounding 13 people • Tackled by 3 senior citizens when he attempts to reload
  • 38. Leakage Warning Behavior The communication to a third party of an intent to do harm to a target through an attack. The third party may be an Internet audience and/or any social media audience (Meloy & O’Toole, Behavioral Sciences and the Law, 29:513-527, 2011).
  • 39. Open Source Social Media • “Greetings!....I am in USA now but we don’t have any arms. But is it possible to commit ourselves as dedicated martyrs anyway while here? What I’m saying is to shoot Obama, and then get shot ourselves, will it do? That will strike fear in the hearts of infidels.” • Abdurasul Juraboev, Hilofatnews.com, Aug. 8, 2014
  • 41. Last Resort Warning Behavior Evidence of a “violent action imperative” or “time imperative” (Mohandie & Duffy, 1999). It may be a signal of desperation or distress. Often the result of an unexpected triggering event, or one which is anticipated, that involves a loss in love and/or work. The subject believes he has no other choice and must act now.
  • 42. • “I have no choice. I am not in the position to, alone, go into the ghetto and fight. I chose Charleston because it is most historic city in my state, and at one time had the highest ratio of blacks to Whites in the country. We have no skinheads, no real KKK, no one doing anything but talking on the internet. Well someone has to have the bravery to take it to the real world, and I guess that has to be me.”
  • 43. Directly Communicated Threat Warning Behavior The communication of a direct threat to the target or law enforcement beforehand.
  • 44. Stockholm, Dec. 11, 2010 • “Now, your children—daughters and sisters—will die like our brothers and sisters and children are dying…our actions will speak for themselves. As long as you do not end your war against Islam and the insult against the prophet and your stupid support for that pig Vilks…”
  • 45. Taimour al-Abdaly • 28 year old Iraqi Sunni • Emigrated to Sweden age 10 • Attended university in UK • Detonated a car, and a few minutes later, blew himself up with a pipe bomb 200 meters away
  • 46.
  • 47. TRAP-18: Distal Characteristics • Personal grievance and moral outrage • Framed by an ideology • Failure to affiliate with extremist or other group • Dependence on the virtual community • Thwarting of occupational goals
  • 48. TRAP-18: Distal Characteristics • Changes in thinking and emotion • Failure of sexual pair-bonding • Mental disorder • Creative and innovative • Criminal violence
  • 49. Does TRAP-18 work in the real world? Validation studies
  • 50. Published Research • On website, drreidmeloy.com • PDF available free for download
  • 51. North American Lone Actor Terrorists vs. Others of Concern • Retrospective coding of attackers (n=33) and comparative group (n=23) who were successfully risk managed or false positives upon investigation • Unpublished data; currently being written for submission to journal • Moderate to large effect sizes
  • 52. Correlates for Violence Risk • Proximal warning behaviors – Pathway – Identification – Energy burst – Last resort – Directly communicated threat (neg effect)
  • 53. Correlates for Violence Risk • Distal characteristics – Ideology – Changes in thinking and emotion – Mental disorder (neg effect) – Greater creativity and innovation
  • 54. Monahan and Steadman, 1996 • Violent storms and violent people. American Psychologist 51:931-938 • Watching—cluster of distal characteristics> monitor the case • Warning—one proximal warning behavior> actively manage the case • Code warning behaviors first
  • 55. Current TRAP Operational Use • CT investigators and analysts in US, Canada, and various European countries • No official endorsement due to proprietary nature of TRAP-18 • Validation and pilot testing studies currently ongoing in UK and USA • Licensed to Multihealth Systems Inc.
  • 56. TRAP-18: Proximal Warning Behaviors Pathway Fixation Identification Novel aggression Energy burst Leakage Directly communicated threat Last resort behavior
  • 57. TRAP-18: Distal Characteristics • Personal grievance and moral outrage • Framed by an ideology • Failure to affiliate with actual group • Dependence on the virtual community • Thwarting of occupational goals
  • 58. TRAP-18: Distal Characteristics • Changes in thinking and emotion • Failure of sexual pair-bonding • Mental disorder • Creative and innovative • Criminal violence
  • 59. Eric Hoffer, The True Believer, 1951 “The vanity of the selfless, even those who practice utmost humility, is boundless.”
  • 60.
  • 61. Thank you • reidmeloy@gmail.com • @reidmeloy • www.DrReidMeloy.com • GIFRINC.COM