Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyse the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customised advertisements based on the pages you visited previously and to analyse the effectiveness of the ad campaigns.

No cookies to display.

Leakage is our Best Weapon

Share Your Thoughts: Facebooktwitterlinkedin

Recently, experts gathered via a Firestorm Virtual Exercise to discuss the threat of violence facing our nation and world. The session featured Hart Brown, Firestorm COO as moderator with Jason Russell of SEC and Dr. George Vergolias of R3 Continuum as guests. We brought you a Q&A with Jason based upon the session. Today, we bring you a Q&A with Dr. Vergolias. In this Q&A, Dr. Vergolias discusses warning signs that, if identified, can prevent violent incidents from occurring, such as using the Firestorm predictive intelligence approach.

What is Leakage?

Dr. George Vergolias (GV): Leakage is when someone “leaks” or vocalizes harmful intentions prior to acting.

Karen Masullo, Firestorm Chief Intelligence Officer, has indicated that we have seen leakage in every situation of mass shooting or violence this year apart from the Las Vegas Shooting. How often is leakage identified?

(GV): Recent research indicates that in the last 20 years, nearly 95 percent of school shootings have had clear indications of leakage. In terms of lone wolf attacks, individuals indicated leakage 85 percent of the time.

Dr. George Vergolias PsyD, LP – Vice President and Medical Director | R3 Continuum

Where is leakage usually seen?

(GV): In more organized terrorist groups, we do not see leakage. They operate the way armies or special Ops operate; they do not speak unless they want the message spread.

The individual, who is a lone actor, wants to be heard, known and recognized as a champion or even a martyr for the cause. If I mean to hurt someone, I’m not going to tell said person. I’m not going to warn them. But, I may warn someone else by stating, “(Insert name) is going to get it on Monday morning.”

Leakage provides us the opportunity to begin tracking threats. We frequently see leakage in the school environment when younger individuals begin to act out on social media. Firestorm monitoring program examines 19 types of public social media platforms, plus a significant number of news, blogs, discussion boards and websites.

Related: Download the Infographic – 2017 Year in Crisis Review

How can we track threats?

(GV): We can track leakage through online social monitoring, or open-source intelligence monitoring. This methodology identifies publicly posted information and provides an understanding into the thoughts of individuals. There are different types of monitoring options.

One option is to virtually monitor on a 24/7 basis using software. In some cases, we utilize this methodology for specific individuals by monitoring detailed key words or phrases.

A second option of open-source intelligence monitoring is utilizing geography. A virtual net, or geofence, can be cast over an exact area, like a campus or building. Every public social media mention in that specific net will be captured for review with alerts created for threatening key words or phrases.

Once monitoring is established, a team must identify the messages and understand the context. Open-source intelligence monitoring is an incredibly powerful tool when dealing with threats. Many times, organizations receive minimal information on a potential threat. Open-source intelligence monitoring assists in filling in the gaps and provides additional insights to a person’s intent. We may even be able to prevent the event from occurring.

Leakage is our best weapon to prevent incidents of violence. Although complex, we must utilize social media as an identification tool if we are going to be effective in seeing issues before they occur.

Share Your Thoughts: Facebooktwitterlinkedin