Skip to main content
Manifesto Assessment

This customizable template can be used to prepare your report using Indago.

Heather Perez avatar
Written by Heather Perez
Updated over 5 months ago

What is a Manifesto Assessment?

Understanding the attacker's motivations becomes crucial in the aftermath of an attack. A manifesto assessment is a deep dive into a written declaration, typically from an extremist or individual planning violence. By dissecting the language and content, analysts aim to understand the author's motivations, potential threats, and any underlying ideology.

Here's a breakdown of what a manifesto assessment entails:

  1. Content Analysis: Examining the manifesto's core message, grievances, and justifications for violence. This helps identify the attacker's cause and potential targets.

  2. Ideological Underpinnings: Understanding the attacker's message allows authorities to develop effective counter-narratives that challenge their ideology and discourage others from following a similar path.

  3. Threat Assessment: Analysis of manifestos refines threat assessment protocols by highlighting key indicators or warning signs present in an attacker's communication.

  4. Psychological Insights: While not always possible, analysts may glean insights into the attacker's mental state or emotional triggers. This can aid in threat assessment and potentially help identify similar individuals at risk of violence.

  5. Comparison and Trend Analysis: Manifestos are often compared to others to identify commonalities in ideology, tactics, or target selection. This helps authorities understand the evolving threat landscape and potential copycat attacks.


Using the Template

To use the template below, start by creating a new report. This will initiate the report generation process. Then, simply copy and paste the purpose, sections, and subsections to build your outline. Feel free to modify this template to suit your specific reporting needs.


Building Your Template

Purpose: This report aims to analyze the methodologies and Tactics, Techniques, and Procedures (TTPs) outlined in a mass shooter's manifesto to help develop effective countermeasures to mitigate future threats.

Outline Sections:

  1. Analysis of Motivations and Ideology

    1. Provide the ideological beliefs or motivations expressed in the manifesto.

    2. Provide any specific reasons mentioned for choosing the target location.

  2. Planning and Preparation

    1. In list format, provide any details about the planning phase of the attack.

    2. In list format, provide any references to reconnaissance or surveillance activities conducted prior to the attack.

  3. Weapon Acquisition and Selection

    1. Provide any information regarding the acquisition of weapons and ammunition.

    2. List any weapons mentioned and what criteria were used for their selection.

  4. Target Selection Criteria

    1. List the characteristics or features that made the chosen location a target.

    2. Are there specific demographics or groups that the shooter aimed to target?

  5. Tactics and Techniques

    1. List the tactical approaches and/or methods outlined for carrying out the attack.

    2. Provide descriptions of movement patterns, entry points, or specific areas within the target location.

  6. Security Exploits

    1. Provide any perceived security gaps or weaknesses at the target location.

    2. List any specific countermeasures or security protocols mentioned that the shooter planned to bypass.

  7. Communication and Propaganda

    1. Detail any methods for communicating or spreading the attacker's message before, during, or after the incident.

    2. Provide any references to using social media or other platforms to gain attention or recruit others.

  8. Psychological and Behavioral Indicators

    1. List any personal experiences or psychological factors the shooter cites as motivation for the attack.

    2. List any behavioral indicators or warning signs mentioned that could have been detected prior to the incident.

  9. Operational Support and Networks

    1. List any support networks or accomplices involved in the planning or execution of the attack.

    2. List any references to online communities or groups that influenced or supported the shooter.

  10. Escape and Aftermath Plans

    1. Provide plans, if any, outlined for escaping or surviving post-attack.

    2. List any strategies for dealing with law enforcement or evading capture.


Updated: 6 September 2024

Did this answer your question?