Transcripts For CSPAN3 Secret Service News Conference On 201

CSPAN3 Secret Service News Conference On 2018 Mass Attacks In Public Spaces Report July 14, 2024

Thank you, cathie. Good morning, everyone. Thank you for being here. Earlier today, the secret service and our National Threat assessment center, or ntac, as we call it, briefed nearly 400 of our Strategic Partners on its most recent report entitled mass attacks in public space s mass attacks in public space p for the calendar year 2018. As we all know its a matter of grave concern to everyone and especially those of us in Law Enforcement. Im certainly grateful to dhs acting secretary mcaleenan joining us today, showing his support, the secret Service Continue to bring attention to this critically important sujt. Back in the 1990s the secret service which by that point had long been involved in threat investigations and Threat Management embarked on a comprehensive study as to the thinking and behavior of persons who engaged in violence against Public Officials or public figures. The results of that study set the foundation for how our agency currently conducts its own threat assessments. Moreover, in the wake of the groundbreaking report that followed back then, ntac was established nrd ee ee eed in o conduct research, training, and deliver consultation in the areas of threat assessment and the prevention of all forms of targeted violence, whether or not they were endemic to the secret services mission. Since its inception, ntac has conducted numerous studies and disseminates information on how to prevent mass attacks in public spaces, schoolbased violence, attacks on government buildings, and attacks on highprofile targets. In a moment, im going to invite ntacs chief, dr. Lena alathari, up to provide further insights on this years report and efforts of ntac, but before i did, i wanted to cover some highlights that i think are worthy of note and would bear repeating. So this years maps report as we call it focuses on 27 incidents of mass violence. Were talk bing about incidents in which three or more people were injured or killed. Incidents that were carried out in public spaces between january and december of 2018. And among the 27 incidents, were talking about events that took place at workplaces, schools, and houses of worship. In addition, the report goes on to identify common themes in the backgrounds and behaviors of the attackers. For example, half of the attackers in this report were motivated by a grievance. Twothirds had a history of Mental Health challenges. Nearly all had recently experienced a significant stressor in their lives and likewise, nearly all had previously made threatening or alarming communications either directed toward somebody or made in the presence of others. While there is no single profile of a person who commits targeted violence, this report, like so many others published by ntac, aims to assist our partners to Law Enforcement, the education arena, and so many other broader stakeholders in the community and how to better understand some of the motivations behind mass attacks, as well as the causative factors. I commend the staff of ntac for their hard work. Im proud of what theyve accomplished and i encourage everyone to take advantage of the resources theyve created, the training they deliver and the consultation they provide. All that being said, id ask the chief of ntac, dr. Lena alathari, to come up and provide further information. Good afternoon. Thank you for coming. Im going to i know you just received the report and some of the talking points, so im going to take you through some of the findings of the report. Also, as to why the secret service in this space and some of the reports that we previously published. All of the information is available on the secretservice. Gov website. So as you can see in the first slide, these are the reports. As the director mentioned, the secret service has been analyzing incidents of targeted attacks for the past 20 years. From the beginning of the exceptional case study project that set the standard for how to do threat assessment investigations, and, in fact, it was that study that coined the term, targeted violence. Since then, weve kuconducted research on targeted violence, following the tragedy at columbine, we partnered with the department of education to study School Attacks based on the same methodology that the secret service uses to investigate and study threat cases and individuals who target Public Officials. The findings of that study, the safe school initiative, set the standard for conducting threat assessments in schools. Since then, weve continued as the Center Advanced its Research Mission to study other forms of targeted violence including attacks against government and attacks against public spaces such as the report that is the focus of todays presentation. I wanted to highlight a guide that we released last year enhancing School Safety using a threat assessment model. That guide we mass produced 80,000 copies and distributed to 40,000 schools nationwide. The guide set the standard for threat assessment in schools. To provide schools with actionable steps they can take to set threat assessment protocols and keep their community safe. If we go to the next slide, today were going to be talking about the mass attacks report including the mass attacks 2018 we released last year looking at incidents in 2017 and the next report, mass attacks 2019. If we could go to the next slide, please. One more. Thank you. So some of the findings from this report to highlight is that these incidents occurred all over the country. So there were 27 attacks that occurred in the calendar year 2018. These attacks occurred in 18 different states. Some of them are highprofile incidents such as the tragedy at parkland and santa fe, but others are lesser known incidents that may not have garnered as much Media Attention but no less tragic. If we advance the slides. These are the sites, the most common sites that were targeted were place os s of work. That doesnt include just corporations and retail. That also includes hospitals, clinic, any place where we work, including a government agency. Some of the target locations were open spaces. So those occurred on sidewalks, parking lot, and other areas where there are common spaces, and as you can see, we also included three School Attacks, santa fe is the one i mentioned. There was another School Attack in North Carolina and then the parkland tragedy. So there were three high schools targeted in this timeframe. In last years report, we actually also had some elementary schools. This year, we had three high schools and a house of worship which is the tree of synagogue attack. If you advance to the next slide. So this is why we highlight the focus of our trainings on threat assessment and prevention. We know from studying these incidents that these attacks end very rapidly. As you can see, over half the attacks ended in five minutes or less. There were some attacks that did end in longer period of time, and those are really an aberrati aberration. We know that Law Enforcement response and active shooter drills are really important, but what is even more important, we want to be able to identify these individuals before they embark on that path that gets them to think violence is an option. So if you can see some of the resolution of how these go ahead. Thats fine. How these incidents ended, over half the subjects departed on their own or committed suicide. There were some incidents in which the weapon became inoperable. That, of course, includes vehicle attacks because there were some vehicle attacks in this timeframe. And two were the result of bystander intervention. One was the wafflehouse standing in which an unarmed bystander restrained the individual. Then in the last attack, the attacker just stopped on his own and tried to blend in wbut he ws discovered. Moving on to the next slide. Lets talk a little bit about the backgrounds of the perpetrators. Every report that we produce not only looks at incidents and tactics but most importantly it looks at the individuals who carried out these attacks to understand why and what behavior indicators they may have exhibited. In this report the majority were male. Almost all were male except for two. Last years report, they were all male. The average age, as you can see, the youngest was 15. That was a 15yearold sophomore that carried out an attack against their school. The oldest was 64 years old. The age ranges varied. About half had historiies of criminal history and that included violent and nonviolent crimes. And also over a third had histories of Domestic Violence. And when we tagged the cases that had Domestic Violence history, this was not just disturbance calls or emotional abuse, it was actually physically violent behavior or brandishing a weapon, so they had pretty quite serious and expene extense if histories of Domestic Violence. Moving on, in terms of symptoms of Mental Illness, we had the majority of the symptoms that we saw were depressive symptoms, paranoia, delusions and hallucinations. Those were common symptoms we see as an agency in terms of people who become fix saated on issue or cause. Twothird had Mental Health problems that deeply impacted their relationships. For some of them, it contributed to the motive of why they carried out the attack. In terms of motives, over half, and we saw this in last years mass attacks report, were retaliating for a perceived wrong that they felt was done to them related to domestic issues. So it was a grievance with a spouse or an intimate partner. It was related to workplace issues such as being fired, passed over for promotion, or other disgruntled issues related to the work environment. Or it was personal issues such as losing a video game competition because there was one attacker that targeted that. Or getting into an argument with a manager of a Retail Establishment and then coming back and carrying out a mass attack. So as you can see, the motives varied. Only two incidents had an actual ideological component to their motive and that was an antiabortion perpetrator who carried out an attack against a planned parenthood clinic and also the attack at the synagogue stemming from white supremacist beliefs. Moving on. So why do we study these incidents . For us as an agency, for the secret service, our numberone mission is to mitigate harm to any of our protected interests. And we work very closely with Community Partners to do so. But in terms of the National Threat assessment center, as the director mentioned, we have a congressional authorization to our mission. Not only to enhance our own agencys security and protective mission, but also the communities. In terms of preventing attacks against schools, preventing attacks against workplaces, and so on. So the key mission to that is identifying individuals early on before they get that idea to carry out an attack. So if you move through this, the u. S. Secret Service Threat Assessment model for the last 20 years has been refined to adapted to prevent Workplace Violence, School Shootings and other attacks in the community. The first step of that model, we want to be able to identify individuals. So similar to how we identify individual, we want to be able to identify these individuals in the community. Moving on. Okay. So this is how they come to our attention. How do people raise concern about someone who might be at risk of engaging in an attack or someone who might just be i illiciting concerning behavior . They selfidentify, bring attention to themselves, they email for us, theyd show up at a protected site or the white house, or we get it from our partners, our partners in the community, federal, state, and local agencies, Mental Health professionals, local agencies that might be dealing with that individual, then they raise concern. Members of the community. Obviously, now with the advent of technology, theres a lot of postings on social media website, game forums, chat rooms, even comments on aing a or displaying a really significant inappropriate interest in one of our agencys protectees and thats what would cause us to launch an investigation to assess whether this person really poses a threat. Similar to in the community. A lot of schools are now being very proactive. A lot of communities and states are putting threat assessment programs and protocols in place so people can report concerning individuals, so that person can get the help they need before they become to think of violence as an option. Moving on to the next slide. Now that weve identified the individual, the next phase of these threat assessment programs and objectives is to be able to gather information from multiple sources to assess does this person pose a risk of harm and what kind of risk do they pose . So we use a Systems Approach. What we call our investigations are proactive. Its our number one investigative mission. So the minute we find out about somebody, we want to be out there gathering information. For the most part, the individual is going to be the first person that were going to interview because we want to find out why did they engage there the behavior that elicited concern . And what are they trying to achieve . Then we contact the individuals around them and do a whole of community holistic approach to prevention. Were talking to families. Were talking to coworkers. We want to be able to understand what is the situation in life that caused that person to illicit concern . Same in a School Threat assessment environment. Same in a company that has a Workplace Violence prevention program. You want to be gathering information about an individual from multiple sources to get a clear picture of whats going on in their life. Because we know that some people may act differently at work. They may act differently in the home. So you want to be able to gather a perspective on that person and corroborate that information from multiple sources. Moving on. Keep going. So some of these investigating things that we look for, what should someone be doing when they get someone in the Community Whos of concern . What should they be looking for . These key themes to investigations have been part of our investigative protocols for 20 years. Since the exceptional case study project was first initiated by the agency in the late 1990s. Since then, due to the number of reports and the number of attacks that we studied, from out there doing trainings for the community, from identifying best practices, weve identified a number of new themes that are part now of our investigative protocol. That includes behavior changes, the persons environment. Can we advance the slide, please . Yeah. Behavior changes in the person one back. Thank you. Whether that person is engaged in behavior changes because were seeing these behaviors in the new incidents of attacks that were studying, are they having interpersonal difficulties with coworkers, family members, schools, other students and so on at the school . Are they having failed aspirations . Has there been Significant Impact from having a failed aspiration on their life . Weve seen that quite significantly in the report that we released today in terms of perceived failures and what this individual was going through. Are there a lack of consequences to some of the behaviors . Some of these individuals have illicited concern for behavior that was quite concerning but they may not have illicited the consequences to reprimand that. Maybe they did not the person did not want to press charges against them. Or maybe in a workplace environment, theyve been causing a lot of conflicts with coworkers, threatening them, but a manager is not acting on that. So these are type of things that weve seen lately in some of these incidents. Obviously, hindsight is 20 20 for us to understand these incidents, but this is why were out there training on this because we want to provide the community with what behaviors that might illicit concern. And the behavior s are not necessarily indicative of violence. For us at the secret service, we advocate early intervention. Identifying these behaviors that may set a low threshold of concern. So sudden or dramatic changes in behavior, maybe more absenteeism, not showing to work. Maybe their rhetoric. Maybe theyre accessing sites that are more violent prone. Before it gets to the sort of the obvious concern in behavioral planning, purchasing a weapon. We want to identify individuals early to deter them off that path. Advance to the next slide. So once weve collected all this information, then you want to do an assessment of risk. And when we assess someone who comes to our attention, sometimes we dont think really theyre a risk to our protected interest, but our investigation may uncover a risk to a school. Maybe theyre making comments about a neighbor theyre disgruntled with. Maybe theyre making comments about their manager and workplace. So we want to make sure that we are communicating our concerns to the local to the local police department. So our field Office Agents who carry out these assessments and investigations work very closely with our Law Enforcement partners. If we do decide that there is a risk, then we need to manage that risk. So we want to find out what can we do to create a situation thats less prone to violence . What can we do to lessen an impact of whats going on in that persons life, and what can we do to take away the motive they may have for engaging in a harmful act . Each case is different. Each case is individualized. We need to make sure were garnering our resources to address which is why we work so closely with families and those around the individual. Advance to the next slide, please. These are some Management Strategies we use as an a

© 2025 Vimarsana