Where the Attack Cycle Intersects the Pathway to Violence - TorchStone Global (2024)

Where the Attack Cycle Intersects the Pathway to Violence - TorchStone Global (1)

Where the Attack Cycle Intersects the Pathway to Violence

Where the Attack Cycle Intersects the Pathway to Violence - TorchStone Global (2)

Where the Attack Cycle Intersects the Pathway to Violence

By TorchStone VP, Scott Stewart

May 13, 2020

I’ve written about how the concept of the attack cycle is a useful framework protective intelligence practitioners can use to understand, identify, and detect behaviors associated with an intentional or targeted attack. I’ve also discussed how the demands of the attack cycle require those planning an attack to conduct certain activities and the vulnerabilities to detection they leave themselves open to. Now I’d like to examine how the attack cycle intersects with another model for understanding the behavior and indicators assailants exhibit before an attack, known as The Pathway to Violence.

The Pathway to Violence

The concept of the “Pathway to Violence” was developed by Frederick Calhoun and Steve Weston in 2003. As I wrote in the piece on the attack cycle, people “don‘t just snap” and conduct a terrorist attack or other acts of targeted violence. Attacks are the result of a discernable process, a process Calhoun and Weston’s model divides into six steps.

Where the Attack Cycle Intersects the Pathway to Violence - TorchStone Global (3)

According to this model, the pathway leading to an attack begins with a grievance. Some grievances are personal in nature, such as the termination of employment, playground bullying or romantic rejection. Other grievances can be more general in nature, such as the white supremacist narrative that whites are being replaced by immigrants, or the jihadist narrative that Islam is under attack by “Jews and Crusaders.” In many cases, assailants often embrace these general narratives, making them quite personal. Grievances can also start out as a personal issue that festers and later becomes part of a more general grievance narrative. For example, a man who struggles in his relationships with women and who then begins to view those rejections through the prism of the misogynistic Incel grievance narrative.

Grievances can be exhibited by hostile, sarcastic or bitter speech directed toward the person’s perceived enemies, known as the out-group (although there are frequently multiple out ), inappropriate jokes, sketches and drawings, writings and other means of expression. The types of books read, websites visited, and social media channels and feeds participated in can also reflect the grievance. Hard looks and other nonverbal body language and hostile demeanor directed toward members of out-group(s) can also indicate a grievance. The person holding a grievance may also attempt to recruit other people they perceive to be members of their “in-group” to embrace their ideology. These recruitment attempts can be either overt or subtle depending on the person and grievance narrative.

In cases involving unstable individuals, grievances can sometimes be seemingly irrational or unreasonable. For example, a belief that another person or organization is controlling the aggrieved person’s mind, or that the person is the “real partner or spouse” of a celebrity.

The second step in the pathway to violence is violent ideation, in which the person holding a grievance begins to harbor thoughts or fantasies of hurting or killing the person they have a grievance against, or members of the out-group(s). For example, as mentioned above, a jihadist may hold the belief that Islam is under attack. This is a grievance. When jihadists begin to think about hurting or killing those they hold responsible for attacking Islam, such as the artists who drew inflammatory cartoons of the Prophet Mohammed, he has moved on to the ideation phase. Sometimes this ideation starts indirectly, e.g., “someone should kill them all,” and then later progresses to “I should kill them all.” It is not unusual for a potential attacker to share these thoughts, fantasies and attitudes with friends, colleagues or in online forums. When a person shares violent ideation that may signal an impending violent act, it is called “leakage.” Such leakage can occur in many forms, including conversations, utterances, threats, letters, emails, voice mails, manifestos, diaries, videos, etc.

I’d like to pause here to point out that like the attack cycle, the pathway to violence model must be considered an elastic rather than rigid guide. People move along the pathway at different paces, and in fact, most people do not progress through all the steps and conduct an attack. Many people with grievances never progress to violent ideation, and not everyone who fantasizes about conducting a violent act progresses to planning and preparing for one. Furthermore, the pathway is not a one-way street. Not everyone who begins to plan an attack follows through by executing the plan. People can deescalate, either through outside intervention or due to internal factors.

Once a potential attacker goes beyond mere ideation and decides to act, the pathway to violence then begins to intersect with the activities and behaviors associated with the attack cycle, to include target identification and selection, planning and preparation (training, weapons acquisition, etc.), and finally, deployment and attack. During these three phases of planning and research, preparation and probing and breaching, those planning an attack are vulnerable to detection by the target.

While the pathway to violence model is most often associated with workplace violence, intimate partner violence, and school shootings, it also clearly applies to terrorist suspects. Governments have become increasingly competent at identifying and establishing contact with people in the earlier stages of the pathway to violence before they can get into contact with real terrorist facilitators. Because of this, the criminal complaints and indictments filed in connection with government sting operations targeting jihadists, anarchists and white supremacists provide a very clear view into the grievances and violent ideation of these suspects. Parents, community members, religious leaders and others have also come to understand the importance of spotting and reporting people holding grievances or who have begun to fantasize about conducting an attack. This realization is one of the big reasons the “see something, say something” approach has been successful in thwarting so many attacks.

Investigations into terrorist attacks also frequently provided ample evidence of grievances and violent ideation. But in most terrorist cases, the victim doesn’t have visibility into the grievances and ideation driving the attacker. Because of this, the victim’s first chance to detect attack related activity is when the planning phase of the pathway to violence begins – which is roughly analogous to the attack cycle.

In most cases, the victim or target of an attack will only be aware of the assailant’s grievance and violent ideation if they have contact with them. This contact can be in person or by letter, email, etc. The pathway to violence model is thus widely used for assessing threats related to workplace violence, stalkers, school shooters, etc. Monitoring these contacts or communications can help provide a way to assess where the subject is on the pathway to violence and progress along the pathway can serve as tripwires for action. People holding onto grievances must be taken seriously and carefully assessed and investigated to determine if they pose a potential threat. If possible, their communications should also be kept for later reference. If deemed necessary, strategies to protect the potential target or otherwise mitigate the threat should be developed and implemented.

As noted above, not every person with a grievance or who even begins to have violent ideation will become an attacker. Nevertheless, it is important to train the entire workforce about these concepts, and then establish a mechanism for reporting employees with deeply held extremist or other grievances, or who have exhibited leakage of violent ideation or that they are planning an attack.

This bring us back to the importance of protective intelligence teams. Protective intelligence teams play a critical role in helping companies stay “Left of Bang” by providing training to the workforce and other members of the security teams, assessing and investigating potential threats, watching for potential surveillance, or signs that the potential threat actor is progressing along the pathway to violence.

Where the Attack Cycle Intersects the Pathway to Violence - TorchStone Global (2024)

FAQs

Where the Attack Cycle Intersects the Pathway to Violence - TorchStone Global? ›

Once a potential attacker goes beyond mere ideation and decides to act, the pathway to violence then begins to intersect with the activities and behaviors associated with the attack cycle, to include target identification and selection, planning and preparation (training, weapons acquisition, etc.), and finally, ...

What are the stages of the pathway to violence? ›

The following graphic illustrates the “pathway to violence” typically taken by those who have engaged in school shootings and other acts of targeted violence: they start with an idea to do harm, develop a plan to carry it out, prepare by acquiring the means or capacity to do harm, and then implement the violent act.

What is the leakage pathway to violence? ›

“Leakage occurs when a person intentionally or unintentionally reveals clues to a third-party about feelings, thoughts, fantasies, attitudes or intentions that may signal the intent to commit a violent act.” Unfortunately, people may explain away these communications or not take them seriously when they occur.

What is probing and breaching in the pathway to violence? ›

Stage 5: Probing and Breaching

This might include where to commit the act, how to gain entry to commit the attack, or how to escape once the attack has been completed. Final surveillance may be conducted and the attacker(s) may also test plans at this stage.

What are the steps included in the popular model of progression of violence from grievance to attack? ›

One of several models proposed to describe a progression from grievance to attack. Steps include a highly personalized grievance, violent ideation, research and planning, specific preparations for violence, breaches of security or other boundaries, and attack.

How many steps are in the cycle of violence? ›

It helps those who have never experienced domestic violence understand that breaking the cycle of violence is much more complicated than just “getting out” or leaving. There are three phases in the cycle of violence: (1) Tension-Building Phase, (2) Acute or Crisis Phase, and (3) Calm or Honeymoon Phase.

What is the cycle of violence consist of? ›

The Cycle of Violence describes the pattern of abusive relationships. There are three distinct phases: tension building, explosion and false honeymoon. Tension Building This phase is often described by survivors as “walking on eggshells”.

Which of these is considered the first step in the pathways to violence model? ›

Attacks are the result of a discernable process, a process Calhoun and Weston's model divides into six steps. According to this model, the pathway leading to an attack begins with a grievance. Some grievances are personal in nature, such as the termination of employment, playground bullying or romantic rejection.

Who created the pathway to violence? ›

Behavior experts reference research conducted by Frederick Calhoun and Steve Weston's on threat management and further describes the six progressive steps that may be observable by colleagues.

What is the pathway to harm? ›

A pathway to harm is in effect a causal chain of events required for a harm to be realized [36,37].

What is interpretive violence? ›

Every act of violence begins as an act of interpretation. A perpetrator interprets another person as worthy of being destroyed. He or she interprets such destruction as a meaningful act.

What is breaching in law enforcement? ›

Door breaching is a process used by military, police, or emergency services to force open closed or locked doors.

What are the indicators of pathway to violence? ›

Hostile feelings of injustice or perceived wrongdoing. Drug and alcohol abuse. Marginalization or distancing from friends and colleagues. Changes in performance at work.

What are the three primary pathways to violence? ›

Most individuals begin their pathway to violence process in one or more of the three key areas— ideology, social relations or criminal activity.

What is the first step in recognizing the cycle of violence? ›

Phase 1-Tension Building

In the first phase, tension builds in the relationship. Victims report their partners becoming increasingly irritable, frustrated, and unable to cope with every-day stresses. The abuser may lash out at the victim at this time, but generally stops and becomes apologetic.

What are the stages of aggression and violence? ›

  • Phase 1: Triggering event.
  • Phase 2: Escalation.
  • Phase 3: Crisis.
  • Phase 4: Recovery.
  • Phase 5: Post-crisis depression.

What are the three pathways to crime? ›

Each pathway represents conceptually similar behaviors that unfold over time. They include conflict with authority (defiance and running away), covert actions (lying and stealing), and overt actions (aggression and violent behavior).

What are the stages of victim cycle? ›

This cycle often involves periods of tension-building, explosive incidents, reconciliation, and calm. Recognizing these stages can empower victims and their support networks to take action.

What is the cycle of violence in health? ›

According to the AHA/ACHI Hospital Approaches to Interrupt the Cycle of Violence guide, exposure to violence significantly increases the likelihood of an individual being a perpetrator of violence or experiencing repeated violent injury in the future, creating an ongoing cycle of violence.

Top Articles
Pick 3 - Play and Check Winning Numbers
Sunset Inn And Suites Clinton Il Reservations
Average Jonas Wife
Joi Databas
Dannys U Pull - Self-Service Automotive Recycling
Wordscapes Level 5130 Answers
Celebrity Extra
Atvs For Sale By Owner Craigslist
Workday Latech Edu
Rabbits Foot Osrs
Gameday Red Sox
Directions To Lubbock
Bustle Daily Horoscope
Comenity Credit Card Guide 2024: Things To Know And Alternatives
Pwc Transparency Report
Best Fare Finder Avanti
Darksteel Plate Deepwoken
Kris Carolla Obituary
Available Training - Acadis® Portal
How do I get into solitude sewers Restoring Order? - Gamers Wiki
Accident On May River Road Today
What Is Vioc On Credit Card Statement
Transactions (zipForm Edition) | Lone Wolf | Real Estate Forms Software
Popular Chinese Restaurant in Rome Closing After 37 Years
Dwc Qme Database
Morse Road Bmv Hours
kvoa.com | News 4 Tucson
پنل کاربری سایت همسریابی هلو
Hellraiser 3 Parents Guide
Claio Rotisserie Menu
27 Fantastic Things to do in Lynchburg, Virginia - Happy To Be Virginia
John Deere 44 Snowblower Parts Manual
Pokémon Unbound Starters
Schooology Fcps
Ehome America Coupon Code
Bursar.okstate.edu
King Soopers Cashiers Check
Song That Goes Yeah Yeah Yeah Yeah Sounds Like Mgmt
RFK Jr., in Glendale, says he's under investigation for 'collecting a whale specimen'
Banana Republic Rewards Login
RALEY MEDICAL | Oklahoma Department of Rehabilitation Services
Elisabeth Shue breaks silence about her top-secret 'Cobra Kai' appearance
Deshuesadero El Pulpo
Ohio Road Construction Map
Ts In Baton Rouge
5103 Liberty Ave, North Bergen, NJ 07047 - MLS 240018284 - Coldwell Banker
El Patron Menu Bardstown Ky
Aaca Not Mine
Free Carnival-themed Google Slides & PowerPoint templates
Coors Field Seats In The Shade
Latest Posts
Article information

Author: Rev. Leonie Wyman

Last Updated:

Views: 5997

Rating: 4.9 / 5 (59 voted)

Reviews: 82% of readers found this page helpful

Author information

Name: Rev. Leonie Wyman

Birthday: 1993-07-01

Address: Suite 763 6272 Lang Bypass, New Xochitlport, VT 72704-3308

Phone: +22014484519944

Job: Banking Officer

Hobby: Sailing, Gaming, Basketball, Calligraphy, Mycology, Astronomy, Juggling

Introduction: My name is Rev. Leonie Wyman, I am a colorful, tasty, splendid, fair, witty, gorgeous, splendid person who loves writing and wants to share my knowledge and understanding with you.