2011
DOI: 10.1002/bsl.986
|View full text |Cite
|
Sign up to set email alerts
|

The Concept of Leakage in Threat Assessment

Abstract: Leakage in the context of threat assessment is the communication to a third party of an intent to do harm to a target. Third parties are usually other people, but the means of communication vary, and include letters, diaries, journals, blogs, videos on the internet, emails, voice mails, and other social media forms of transmission. Leakage is a type of warning behavior that typically infers a preoccupation with the target, and may signal the research, planning, and implementation of an attack. Nomothetic data … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

4
181
0
2

Year Published

2013
2013
2021
2021

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 155 publications
(187 citation statements)
references
References 25 publications
4
181
0
2
Order By: Relevance
“…Operational security includes behaviors that lone actors deliberately engage in to minimize their chances of detection while planning or preparing an attack. Leakage behavior, as defined by Meloy and O'Toole, refers to the behavior of (would‐be) lone actors who intentionally or unintentionally divulge their motivation or capability to commit acts of violence, thus providing opportunities for early detection and intervention .…”
Section: Resultsmentioning
confidence: 99%
“…Operational security includes behaviors that lone actors deliberately engage in to minimize their chances of detection while planning or preparing an attack. Leakage behavior, as defined by Meloy and O'Toole, refers to the behavior of (would‐be) lone actors who intentionally or unintentionally divulge their motivation or capability to commit acts of violence, thus providing opportunities for early detection and intervention .…”
Section: Resultsmentioning
confidence: 99%
“…The existing research on both school shootings and terrorism indicates that the perpetrator’s redefinition of self from victim to self-perceived avenger is associated with self-empowerment for violent action. The perpetrator increasingly moves into a phase of clandestine planning characterized by a state of tension between secret private rituals and public intimation (leakage) (Gill, 2015; Meloy & O’Toole, 2011; Meloy, Mohandie, Knoll, & Hoffmann, 2015). Many investigators have been able to reconstruct different trigger events after which the perpetrator might view the act of violence as necessary, justified, inevitable, and meaningful (Corner & Gill, 2015; Heitmeyer, Böckler, & Seeger 2013; Meloy & Gill, 2016).…”
Section: Demonstrative Targeted Violence: a Sensitive Conceptmentioning
confidence: 99%
“…Alongside secret planning and private rituals, the new self-concept is also expressed outwardly and reflected in visibly altered behavior, for which the term leakage (also leaking) has become established (Meloy & O’Toole, 2011; O’Toole, 1999; cf. Bondü & Scheithauer, 2014b).…”
Section: Clandestine Planningmentioning
confidence: 99%
“…Identification, and its observable correlates, has emerged as one important warning behavior in threat assessment for targeted or intended violence (Meloy, ; Meloy & O'Toole, ; Meloy, Hoffmann, Guldimann, & James, ; Meloy, Hoffmann, Roshdi, Glaz‐Ocik, & Guldimann, 2014). It has been identified as one of eight superordinate patterns of warning behaviors, which may indicate dynamic and accelerating risk of targeted violence across a variety of domains, such as school shootings, mass murder, public figure attacks and assassinations, and terrorist acts.…”
Section: Identification In Threat Assessmentmentioning
confidence: 99%