The Role of Leakage and Warning Behaviors

The Role of Leakage and Warning Behaviors

DOI: 10.4018/978-1-7998-3916-3.ch005
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

This chapter considers ways to detect mass shootings before they occur. It focuses on the role of leakage in prevention, whereby the communication of an intention to do harm can be used to assess the nature and viability of a mass shooting occurring. Eleven case studies of mass shootings are used to assess leakage and other warning signs displayed prior to these attacks. Documented are possible types of leakages, audiences for leakages, ways leakages were communicated, and other types of warning behaviors. Findings from interviews with threat assessment experts are also discussed in relation to the role leakage plays. It is hoped this chapter will go some way to informing risk and threat assessment procedures, which will be discussed in more detail in the subsequent chapters.
Chapter Preview
Top

Introduction

One of the key warning behaviors preceding and, in certain cases, predicting an act of mass violence is “leakage.” This phenomenon may be defined as the “communication to a third party [another person] of an intent to do harm to a target” (Meloy & O’Toole, 2011, p. 2). It is more subtle than making a direct threat against a target; yet, it still conveys an intent to cause harm. Coupled with any other available evidence, leakage can be used to assess the nature of the threat. “Leakage of their plans to third parties” was one of the eight warning behaviors theorized in Meloy and O’Toole’s (2011) typology model1, which was devised as part of their review of school shooters in the United States and Germany. Aside from this warning behavior, the other proposed activities in the typology are the following: Pathway Warning Behavior, i.e. actions that signal the commencement of preparations for an attack; Fixation on the idea of carrying out an attack; Identification with other school shooters; Novel Aggression relating to violence other than the shooting; Energy Burst in the form of increased frequency of activities relating to the attack; Last Resort signaling desperation or distress and offering one final chance for things to change; Direct Threat of an attack. This chapter will firstly address the warning behavior of leakage in the typology. A sample of case studies will be examined, looking at the leakage displayed, which format it was in and to whom it was communicated. The chapter will then assess whether the remaining warning behaviors in Meloy and O’Toole’s (2011) typology were present in the same sample. Also discussed are the thoughts and experiences of interviewees working in the threat assessment field. These insights are useful for detailing real life experiences of leakage and other warning behaviors.

Eleven case studies were selected to assess leakage and the other warning behaviors in Meloy and O’Toole’s (2011) typology. The eleven incidents took place from 1986 through to 2019, giving a broad indication of the forms leakage took prior to and after the growth of the internet. These were selected from the list of worst mass shootings in the United States (CNN, 2020), whereby worst is defined in this context as the ones with the greatest death toll. A caveat to this is the original intention was to include the ten worst mass shootings on the list. The tenth case was the University of Texas shooting which resulted in sixteen deaths in 1966. The decision was reached to drop this incident, however, for several reasons. Firstly, due to it occurring over fifty years ago, it was difficult to locate relevant news media articles. Secondly, the presence of a brain tumor found in the perpetrator post-mortem may have played a part in his actions to a degree. The post-mortem was specifically requested by the perpetrator within his suicide note, presumably to explain why he was driven to act this way. Whilst it cannot be determined to what degree this influenced him, the worry was it may distort the overall results of the leakage inquiry. To that end, the decision was reached to include the next deadliest shooting on this list (CNN, 2020). Both the San Bernadino (2015) and Edmond Post Office (1986) attacks came joint eleventh on this list, with a death toll2 of fourteen people. Both of these shootings are included in the final collection of case studies.

Four participants were interviewed for this chapter, selected for their experience and knowledge of the threat assessment process:

  • Heilit Biehl, a threat assessment coordinator in Adams 12 Five Star Schools, a K-123 school district. This role which requires her to travel between schools in the region;

  • John-Nicolletti, one of the founders of Nicolletti-Flater Associates, which is a threat assessment and emergency management consultancy firm;

  • Stephen Brock and Melissa Reeves, the lead authors of the Prevent, Reaffirm, Evaluate, Provide and Respond, Examine (PREPaRE) School Crisis Prevention and Intervention curriculum. Melissa Reeves is also a Senior Consultant with SIGMA Threat Management Associates (SIGMATMA) and Associate Professor at Winthrop University; whilst Stephen Brock is currently affiliated to California State University (CSU), Sacramento, where he is a professor and school psychology program coordinator.

Interviewees were questioned about the role of leakage and other warning behaviors prior to mass shootings.

Key Terms in this Chapter

Typology: This is a way to categorize and organize potential indicators of violence, listing those behaviors that may make an individual more susceptible to an increased or accelerated risk of violence.

Contagion Effect: This is the phenomenon whereby a high-profile act of violence can result in many more threats and acts of violence.

Leakage: The communication of an intention to carry out harm to a target to others, which may be written, verbal, or some other form of expression (e.g., drawing).

Upstanders: Those who are in receipt of leakage reporting what they have been told to authorities or someone else in a position to take action.

Leakings: Instances where offences are announced prior to them being carried out.

Bystanders: Those who are the audience of the leakage communicated by the attacker (e.g., friends, family members, colleague, classmates, neighbors, an online community or acquaintances).

Warning Behaviors: These are potential behavioral indicators of an attack, such as making preparations to carry out a mass shooting.

Complete Chapter List

Search this Book:
Reset