Politics

Utah’s threat-tracking model after a lawmaker assassination

threat-tracking unit – After political violence shocks the country, Misryoum looks at how Utah built a system to track threats—and what other states still lack.

Political violence is no longer an abstract risk for state lawmakers—it’s reshaping how legislatures operate and how public safety agencies prioritize protection.

The assassination of conservative activist Charlie Kirk in September, in Utah, sent shockwaves far beyond the campus where it happened.. In its immediate aftermath. Utah lawmakers reported an uptick in threats. underscoring a reality many state officials and law enforcement leaders have been wrestling with: when high-profile attacks occur. they don’t just change the headlines—they trigger a chain reaction of fear. retaliation threats. and copycat online messaging.

Utah, however, has spent years trying to get ahead of that chain reaction.. Nine years before Kirk’s killing, the state created a unit to identify and prevent violence against public officials.. Misryoum found that the state’s approach is structured and repeatable. built around a four-step process: the state receives and identifies reports of threats or concerning behavior. gathers the facts. assesses whether the individual poses a real physical threat. and then manages the risk through intervention and case management.

In the days after the assassination. Utah’s Department of Public Safety spokesperson Taylor Keys said the agency “regularly reviews” security measures and safety plans for lawmakers. and that it plans to keep updating protection using new technologies. training. and security features.. The message is clear: threat management can’t be a one-time response to an incident—it has to be an ongoing system that learns and adapts as the threat environment changes.

That’s where Misryoum sees the gap across the country.. Many state legislatures operate on part-time schedules. and many public safety agencies that might be expected to protect lawmakers are stretched thin.. Unlike the federal model—where the U.S.. Capitol Police routinely publishes assessments and tracks threats—many states lack standardized procedures for reporting threats. collecting data. and training personnel on a regular basis.

The result is a patchwork of responses.. Over the past year, several high-profile attacks have forced states to confront hard questions about preparedness.. When threats escalate after national stories—such as attacks involving governors or lawmakers—the underlying local systems determine whether officials feel supported or left to navigate danger alone.. Misryoum also notes that the burden can be uneven: women and younger legislators. who may already face hostility and institutional barriers. often experience harassment and threats at levels that make staying in office feel unsafe or unsustainable.

Research cited in the article points to a broader deterrent effect.. Reports referenced by Misryoum indicate that harassment. abuse. and violence are contributing factors in why women and younger lawmakers consider leaving office.. The political consequence is bigger than any single assailant: state legislatures shape policy for millions. and the pipeline into higher office is affected when people decide they can’t afford the personal risk.

For lawmakers who want security, the practical problem is that “threat” doesn’t always behave like a clean criminal case.. Some harassing or abrasive rhetoric can be argued as protected speech. which complicates enforcement and frustrates officials who believe the danger is real even when legal lines are murky.. Misryoum’s editorial takeaway is that this isn’t a reason to lower standards; it’s a reason to improve coordination. documentation. and evidence handling so that legitimate threats are treated seriously and consistently.

Law enforcement practices described by agencies in multiple states follow a similar basic structure—report immediately. preserve evidence. and avoid direct engagement with the person making threats.. Misryoum also highlights an important operational detail that rarely gets attention outside law enforcement circles: the value of collecting and keeping the full record. including emails. voicemails. and social media messages.. That evidence can be the difference between a vague warning and an actionable case.

But beyond the basics, the lack of shared data and standardized tracking remains a central weakness.. In contrast to the federal approach. where public threat assessments are published. most state agencies do not collect or publish comparable statistics.. Misryoum interprets the consequence as political and managerial: without reliable numbers and transparent threat assessments. it’s harder for agencies. legislatures. and lawmakers to measure what’s changing. what training works. and where resources are most needed.

The human side of this policy problem shows up in what lawmakers say they want most: preparation, protection, and support.. Some women lawmakers. as referenced in the reporting. describe spending thousands of dollars out of pocket for training because they don’t feel protected by institutional systems.. Misryoum views that as a democratic issue as much as a public safety one—security shouldn’t be treated as an individual expense for people trying to do public service.

Utah’s model offers a different direction: treat threats as a managed risk, not a series of isolated incidents.. As other states weigh adjustments—whether improving training. adopting new technologies. expanding protective intelligence roles. or creating response teams—the key question becomes whether reforms will be durable enough to outpace the speed of online radicalization and retaliation.. In a political climate where violence can spread fear in days and copycat behavior can follow quickly. the safest long-term strategy is building systems before crisis forces improvisation.