CTM Stuff Flashcards
(40 cards)
Threat approach and attack behavior
are the products of discernible processes of thinking and behavior.
An individual’s motives and target selection are directly connected.
Precipitation may involve a personal/significant stressor
Threat Assessment
Movement of idea to action
Targeted violence is not random or spontaneous
Not all threats are created equal.
Key Foundational Assumptions
Emphasis dynamic factors (behavioral, clinical, situational) versus focus upon static factors
Idiographic or case - driven approach
Risk management instead of prediction
Potential victim and offender versus generalized considerations
Instrumental/Predatory violence
Grievance
Motive or reason compelling the act
Ideation
Settling upon the idea that violence is justified and necessary
Research and Planning
Going beyond the idea to figure out how to consummate the violence
Preparation
Obtaining the necessary equipment and taking other actions required to initiate the plan
Attack
Actual Physical attack/assault
Describe components and application of Structured Professional Judgement
Process Gather information Determine presence of the risk factors Determine formulation of violence risk Develop scenarios of violence
TA & Violence Risk Assessment Tools
Cawood Assessment & Intervention Grids
RAGE-V (ATAP)
HCR-20 version 3
WAVR-21 (Meloy & White)
Other Specialized Measures
Stalking Assessment & Management (SAM;Kroop, Hart & Lyon)
Stalking Risk Profile (SRP) MacKenzie, MeEwen, Pathe, James, Ogloff, Miullen
Spousal Assault Risk Assessment Guide - (SARA) Kropp,Hart, Webster, & Eaves
Contextual Factors
- Recent act of targeted violence? Recent threatening or violent events? (copy cat issue as well as instigation) Anniversary of significant event approaching?
Subject Factors
- Prior arrest record or prior harassment/threat-related activity? Problematic contacts with other agencies? Recent life stressors? Presence of mental illness symptoms
Behavioral Activity
Intensity of effort as indicated by: Leakage of intentions
Persistent threatening or concerning behavior
Accomplices sought or alleged
Report threat with a specific plan
Written plan/list
Weapon present or available
Rehearsal behavior
Intensity of Pursuit/Effort
Particularly noted in Public Figure threat research (Meloy, James, Scalora)
Superordinate variable looking at frequency and duration of communication, multiple means of communication, target dispersion
Potentially significant predictor of approach
Leakage
Leakage in the context of threat assessment is the communication to a 3rd party of an intent to do harm to a target (Meloy, 2011). Leakage occurs when a subject “intentionally or unintentionally reveals clues to feelings, thoughts, fantasies, attitudes or intentions that may signal an impending violent act” (O’Toole, 2000)
Motivational Factors
Nature of subject’s motivation? Help-seeking behavior? Motives driven by mental illness. Revenge/retaliation for perceived injustice or harm Bottom Line: The More Personal, The Higher The Concern(also called the intimacy Effect
Intimacy Effect
The predictive level of threats as pre-incident indicators of violence increased in proportion to the degree of intimacy between the subject and the target. Intimacy as perceived by subject
Apply Knowledge of Relevant Mental Health Risk Factors and Management (CONT)
Threatening Activity
1. All threats must be taken seriously
2.Generally literature notes little direct predictive relationship between direct threats and subsequent violence (Especially Political Figure lit)
However, more substantial relationship between direct threats and other types of violence (I.E. stalking and domestic violence)
Apply Knowledge of Relevant Mental Health Risk Factors and Management (CONT)
Re Threats of violence, Warren, Mullen & McEwan note the following in evaluating threats:
- All threats be taken seriously
- Assessment of risk of enactment and repetition (including how threat is delivered such as leakage & what threat represent
- Development of management approach of threatener that is risk-based
- Consideration of how current practices may aggravate situation
Threatening Language & Approach
based upon research ( Scalora, James), cases involving subject with:
- Obvious/serious mental illness and prior approach history
- Pose a significantly higher risk when threats are made
Electronic Communication: Recent Research
When threats present, electronically communicating subjects not as likely to approach, unless communication was part of a campaign with other forms of communication (e.g., phone, letters)
More threatening language
More likely to contain obscenity
Target Factors
Subject view target as responsible for current situation or difficulties?
Target media presence?/
High Profile?
Target Focus but contacts multiple entities (maintains focus of issue and motives across contacts)
Sometimes referred to as Fixation
Define elements of the RAGE-V
Triggers
- Pending perceived negative job event Rejection and abandonment Increase psychosis Civil (family court, child custody, (etc) or criminal justice system event(s) Disruption of support system Financial problems