CTM Stuff Flashcards
Threat approach and attack behavior
are the products of discernible processes of thinking and behavior.
An individual’s motives and target selection are directly connected.
Precipitation may involve a personal/significant stressor
Threat Assessment
Movement of idea to action
Targeted violence is not random or spontaneous
Not all threats are created equal.
Key Foundational Assumptions
Emphasis dynamic factors (behavioral, clinical, situational) versus focus upon static factors
Idiographic or case - driven approach
Risk management instead of prediction
Potential victim and offender versus generalized considerations
Instrumental/Predatory violence
Grievance
Motive or reason compelling the act
Ideation
Settling upon the idea that violence is justified and necessary
Research and Planning
Going beyond the idea to figure out how to consummate the violence
Preparation
Obtaining the necessary equipment and taking other actions required to initiate the plan
Attack
Actual Physical attack/assault
Describe components and application of Structured Professional Judgement
Process Gather information Determine presence of the risk factors Determine formulation of violence risk Develop scenarios of violence
TA & Violence Risk Assessment Tools
Cawood Assessment & Intervention Grids
RAGE-V (ATAP)
HCR-20 version 3
WAVR-21 (Meloy & White)
Other Specialized Measures
Stalking Assessment & Management (SAM;Kroop, Hart & Lyon)
Stalking Risk Profile (SRP) MacKenzie, MeEwen, Pathe, James, Ogloff, Miullen
Spousal Assault Risk Assessment Guide - (SARA) Kropp,Hart, Webster, & Eaves
Contextual Factors
- Recent act of targeted violence? Recent threatening or violent events? (copy cat issue as well as instigation) Anniversary of significant event approaching?
Subject Factors
- Prior arrest record or prior harassment/threat-related activity? Problematic contacts with other agencies? Recent life stressors? Presence of mental illness symptoms
Behavioral Activity
Intensity of effort as indicated by: Leakage of intentions
Persistent threatening or concerning behavior
Accomplices sought or alleged
Report threat with a specific plan
Written plan/list
Weapon present or available
Rehearsal behavior
Intensity of Pursuit/Effort
Particularly noted in Public Figure threat research (Meloy, James, Scalora)
Superordinate variable looking at frequency and duration of communication, multiple means of communication, target dispersion
Potentially significant predictor of approach
Leakage
Leakage in the context of threat assessment is the communication to a 3rd party of an intent to do harm to a target (Meloy, 2011). Leakage occurs when a subject “intentionally or unintentionally reveals clues to feelings, thoughts, fantasies, attitudes or intentions that may signal an impending violent act” (O’Toole, 2000)