Threat Assessment and Management Strategies
eBook - ePub

Threat Assessment and Management Strategies

Identifying the Howlers and Hunters, Second Edition

  1. 279 pages
  2. English
  3. ePUB (mobile friendly)
  4. Available on iOS & Android
eBook - ePub

Threat Assessment and Management Strategies

Identifying the Howlers and Hunters, Second Edition

Book details
Book preview
Table of contents
Citations

About This Book

The field of threat assessment and the research surrounding it have exploded since the first edition of Threat Assessment and Management Strategies: Identifying the Howlers and Hunters. To reflect those changes, this second edition contains more than 100 new pages of material, including several new chapters, charts, and illustrations, as well as up

Frequently asked questions

Simply head over to the account section in settings and click on ā€œCancel Subscriptionā€ - itā€™s as simple as that. After you cancel, your membership will stay active for the remainder of the time youā€™ve paid for. Learn more here.
At the moment all of our mobile-responsive ePub books are available to download via the app. Most of our PDFs are also available to download and we're working on making the final remaining ones downloadable now. Learn more here.
Both plans give you full access to the library and all of Perlegoā€™s features. The only differences are the price and subscription period: With the annual plan youā€™ll save around 30% compared to 12 months on the monthly plan.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, weā€™ve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes, you can access Threat Assessment and Management Strategies by Frederick S. Calhoun, Stephen W. Weston J.D. in PDF and/or ePUB format, as well as other popular books in Computer Science & Cyber Security. We have over one million books available in our catalogue for you to explore.

Information

Publisher
Routledge
Year
2017
ISBN
9781498788267
Edition
2
Section II

Identifying the Howlers and Hunters

Chapter 5

Introducing Hunters versus Howlers

We live in a time of heightened security concerns. Magnetometers, x-ray machines, surveillance cameras, bomb dogs, explosive trace detection machines, security guards, specially treated windows, vehicle barricades, vehicle searches, and countless other physical security countermeasures have become so commonplace that they now fit seamlessly into our environment and our daily lives. Corporations have been forced to accept liability for providing their employees a secure workplace. Police officers routinely patrol public schools while school staffs conduct not just fire drills but also emergency drills to prepare students in the event of an active shooter.* Public figures and public officials surround themselves with security details. Having a bodyguard is no longer a status symbol, but a protective necessity. The emphasis on security even reaches into peopleā€™s intimate lives. Nowadays, most jurisdictions no longer tolerate spousal abuse. The police response to domestic disturbance calls now requires arresting at least one of the spouses if the responding officers detect any evidence of physical injury to either spouse. Not even celebrities are immune. In April 2014, New Canaan, Connecticut, police arrested singer-songwriter Paul Simon and his wife, another singer and both Grammy winners, on domestic violence charges after the couple had a fight at their home.ā€  Security concerns touch everyone where they live, work, and play.
The United States, indeed the entire world, reached this state of affairs partly in response to attacks from terrorists, both foreign and domestic. However, policymakers began recognizing the need for increased security more than 3 decades ago, long before the threat of terrorism reached its current level. Violence serves many masters, not just those who use it for political, religious, or ideological goals. Indeed, the increased need for good security directly results from the increased use of violence by all sorts of individuals seeking different purposes. During just 10 days in November 2005 selected randomly, several incidents occurred that illustrate the scope of the problem:
  • On November 12, Christopher Millis, despondent over the breakup of his marriage, first tried to set fire to several police cars parked at a Salem, Oregon, police station, then drove to the home of a neighbor with whom he had had a long-running dispute. Arriving at the neighborā€™s house, Millis shot at the neighborā€™s car. Millis drove back into town and crashed his pickup through the front entrance of the county courthouse. He held police officers at bay for several hours before they shot him.ā€”
  • On November 13, 18-year-old David Ludwig killed the parents of his 14-year-old girlfriend, then fled the scene with her. They drove from her home in Lancaster, Pennsylvania, to Belleville, Indiana before police identified the car and forced them to stop. He confessed to intentionally killing the parents because they forbade him from seeing their daughter. She confessed to willingly going with him.Ā§
  • On November 20, Dominick Maldonado sent a text message to his former girlfriend announcing, ā€œToday is the day that the world will know my anger.ā€ As he entered the Tacoma, Washington, shopping mall, he telephoned police and told them to ā€œjust follow the screamsā€ to find him. Then he opened fire, wounding six shoppers and holding four people hostage for 4 hours before surrendering. The ex-girlfriend thought he had been on Ecstasy.Ā¶
  • On November 21, school officials at Northern Valley Regional High School in Old Tappan, New Jersey, closed the school for a day in response to an instant message one of their students had received over the previous weekend. The message, sent from an ex-student now living in the former Soviet Union, said, ā€œI just bought my new Glock handgun and you better watch out.ā€ The instant messenger added, ā€œEverybody at [the high school] ought to be careful.ā€ The message also mentioned attacking the high school. Despite the vast distance between Kazakhstan and New York, officials refused to take any chances.**
  • On November 23, Joseph Cobb returned to H&M Wagner and Sons in Anne Arundel County, Maryland. He had been fired from there a couple of weeks earlier. Upon entering the building, he ran into Raymond Himes, whom he immediately shot in the arm. Cobb then went directly to his former supervisorā€™s office. He shouted a profanity at the supervisor, then shot him twice in the stomach. After that, Cobb left the building. Once outside, he killed himself. His two victims survived. ā€œThe incident appeared to highlight the issue of workplace violence, which began to attract national attention about 20 years ago,ā€ the Washington Post report of the incident noted, ā€œIt has become a major concern for advocates of worker safety.ā€ā€ ā€ 
Neither time nor season lessened the violence. Five months later, we took another 10-day period during which various newspapers reported the following acts of violence:
  • On April 9, 2006, Brian L. Patterson, beating Omar Gonzalez by 8 years, scaled the iron fence surrounding the White House and ran toward the mansion, screaming, ā€œI am a victim of terrorism.ā€ Secret Service agents and uniformed guards gave chase with guns drawn, finally cornering him near the row of cameras set up for the daily White House news reports. ā€œI have intelligence information for the president,ā€ Patterson told his pursuers, ā€œIā€™m not afraid of you.ā€ The April 9 incident was the fourth time Patterson had gotten onto the White House grounds.ā€”ā€”
  • On April 14, in Buffalo, New York, Craig Lynch, a convicted car thief living at a halfway house for recently released prisoners, killed Sister Klimczak, the nun who had run the halfway house for 16 years. Lynch had been paroled 3 months earlier. When Sister Klimczak caught Lynch in her room, he strangled and hit her. Once she was dead, Lynch borrowed a car from a relative and took the body to a shed behind a vacant house near his motherā€™s home. He buried her there in a shallow grave.Ā§Ā§
  • On April 14 in Purcell, Oklahoma, police arrested Kevin Underwood for the first-degree murder of a 10-year-old girl. Underwood led police to a closet in his apartment where he had stuffed the body in a plastic t...

Table of contents

  1. Preface to the First Edition
  2. Preface to the Second Edition
  3. About the Authors
  4. Section I: Threat Assessment and Management Strategies
  5. II: Identifying the Howlers and Hunters
  6. Appendix: When Should Threats Be Seen as Indicative of Future Violence? Threats, Intended Violence, and the Intimacy Effect