Abstract
Abstract
Most of those who plan violent attacks communicate their intentions before the attacks via social media and written communication, either through unintentional “leakage” or intentionally through “legacy tokens” used to explain their motivations. These should be understood as part of their fantasy rehearsals in the aftermath of an attack. Additionally, searching for and attending to such messages provides an opportunity to intervene and thwart potential attacks. This article provides a framework for reviewing and understanding these messages and assessing them for potential lethality and dangerousness.
Get full access to this article
View all access options for this article.
