CTM Stuff Flashcards

(40 cards)

1
Q

Threat approach and attack behavior

A

are the products of discernible processes of thinking and behavior.
An individual’s motives and target selection are directly connected.
Precipitation may involve a personal/significant stressor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Threat Assessment

A

Movement of idea to action
Targeted violence is not random or spontaneous
Not all threats are created equal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Key Foundational Assumptions

A

Emphasis dynamic factors (behavioral, clinical, situational) versus focus upon static factors
Idiographic or case - driven approach
Risk management instead of prediction
Potential victim and offender versus generalized considerations
Instrumental/Predatory violence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Grievance

A

Motive or reason compelling the act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Ideation

A

Settling upon the idea that violence is justified and necessary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Research and Planning

A

Going beyond the idea to figure out how to consummate the violence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Preparation

A

Obtaining the necessary equipment and taking other actions required to initiate the plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Attack

A

Actual Physical attack/assault

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Describe components and application of Structured Professional Judgement

A
Process
Gather information
Determine presence of the risk factors
Determine formulation of violence risk
Develop scenarios of violence
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

TA & Violence Risk Assessment Tools

A

Cawood Assessment & Intervention Grids
RAGE-V (ATAP)
HCR-20 version 3
WAVR-21 (Meloy & White)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Other Specialized Measures

A

Stalking Assessment & Management (SAM;Kroop, Hart & Lyon)
Stalking Risk Profile (SRP) MacKenzie, MeEwen, Pathe, James, Ogloff, Miullen
Spousal Assault Risk Assessment Guide - (SARA) Kropp,Hart, Webster, & Eaves

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Contextual Factors

A
  • Recent act of targeted violence? Recent threatening or violent events? (copy cat issue as well as instigation) Anniversary of significant event approaching?
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Subject Factors

A
  • Prior arrest record or prior harassment/threat-related activity? Problematic contacts with other agencies? Recent life stressors? Presence of mental illness symptoms
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Behavioral Activity

A

Intensity of effort as indicated by: Leakage of intentions
Persistent threatening or concerning behavior
Accomplices sought or alleged
Report threat with a specific plan
Written plan/list
Weapon present or available
Rehearsal behavior

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Intensity of Pursuit/Effort

A

Particularly noted in Public Figure threat research (Meloy, James, Scalora)
Superordinate variable looking at frequency and duration of communication, multiple means of communication, target dispersion
Potentially significant predictor of approach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Leakage

A

Leakage in the context of threat assessment is the communication to a 3rd party of an intent to do harm to a target (Meloy, 2011). Leakage occurs when a subject “intentionally or unintentionally reveals clues to feelings, thoughts, fantasies, attitudes or intentions that may signal an impending violent act” (O’Toole, 2000)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Motivational Factors

A

Nature of subject’s motivation? Help-seeking behavior? Motives driven by mental illness. Revenge/retaliation for perceived injustice or harm Bottom Line: The More Personal, The Higher The Concern(also called the intimacy Effect

18
Q

Intimacy Effect

A

The predictive level of threats as pre-incident indicators of violence increased in proportion to the degree of intimacy between the subject and the target. Intimacy as perceived by subject

19
Q

Apply Knowledge of Relevant Mental Health Risk Factors and Management (CONT)

A

Threatening Activity
1. All threats must be taken seriously
2.Generally literature notes little direct predictive relationship between direct threats and subsequent violence (Especially Political Figure lit)
However, more substantial relationship between direct threats and other types of violence (I.E. stalking and domestic violence)

20
Q

Apply Knowledge of Relevant Mental Health Risk Factors and Management (CONT)

A

Re Threats of violence, Warren, Mullen & McEwan note the following in evaluating threats:

  1. All threats be taken seriously
  2. Assessment of risk of enactment and repetition (including how threat is delivered such as leakage & what threat represent
  3. Development of management approach of threatener that is risk-based
  4. Consideration of how current practices may aggravate situation
21
Q

Threatening Language & Approach

A

based upon research ( Scalora, James), cases involving subject with:

  1. Obvious/serious mental illness and prior approach history
  2. Pose a significantly higher risk when threats are made
22
Q

Electronic Communication: Recent Research

A

When threats present, electronically communicating subjects not as likely to approach, unless communication was part of a campaign with other forms of communication (e.g., phone, letters)
More threatening language
More likely to contain obscenity

23
Q

Target Factors

A

Subject view target as responsible for current situation or difficulties?
Target media presence?/
High Profile?
Target Focus but contacts multiple entities (maintains focus of issue and motives across contacts)
Sometimes referred to as Fixation

24
Q

Define elements of the RAGE-V

Triggers

A
- Pending perceived negative job event
Rejection and abandonment
Increase psychosis
Civil (family court, child custody, (etc) or criminal justice system event(s)
Disruption of support system
Financial problems
25
Inhibitors
Treatment availability, utilization, and past receptivity Other social support Spiritual or religious beliefs opposing violence Connectedness and healthy affectional bonds
26
Risk factors
``` Weapons use Motivational factors drug use Head Trauma Criminal history History of mental illness Perception of injustice ```
27
Process variables
``` Approach behavior Evidence of escalation deteriorating mental state Diminishing inhibitions inability or limited view or ability to pursue other option ```
28
Describe relationship of risk factors, triggers, inhibitors and process variables to threat behavior
- Mental health - Role and limits of treatment - Development level - Links to medical condition - Group behavior
29
Summarize ley literature in the field of TA/TM
Understand seminal works and their contribution to the field Able to define key terms
30
Sample Definitions RAGE - V
Commitment - in this content refers to involuntary or less than voluntary hospitalization for psychological problems. Hospitalization occurs when someone poses a danger to themselves or others
31
Inevitability
The belief that no matter what action one takes the course of events will not change
32
Mitigation Strategies
Implementation of measures to lessen or eliminate the occurrence or impact of an incident of potential violence
33
Protective Inhibitors
beliefs, relationships, injuries, lack of resources, or abilities that can limit whether a person is likely to follow through with dangerous conduct
34
Dynamic Assessment Process
Assess Threat, Choose Intervention, Implement Intervention, and Monitor and Evaluate
35
Key Components of management Process
1. Recognize need for threat management process 2. Assign responsibilities of monitoring to persons trained in TA 3. Liaison with appropriate parties related to protectees to facilitate tracking 4. Need for incident tracking system & documentation 5. Liaison with other agencies 6. Use consistent and valid TA methods 7. Apply TA strategies flexibly and intelligently (Calhoun & Weston 2009)
36
Risk management Issues: Accountability
1. A multidisciplinary focus 2. Need for collateral contacts 3. Coordination of information 4. Need for agreements re: nature of how information from sources will be obtained, maintained and shared across parties
37
Practical Issues
1. need to designate a Point of Contact for team members to share information re subject 2. Need a Point of Contact for subject to liaison with to avoid mix messages or confusion allowing for rapport building clarity of message avoid parties being played off against each other
38
Identify types of threat management strategies
Administrative actions Active and passive monitoring arrest and prosecution Understand the cause and effect of implementing the most appropriate strategies to prevent harm
39
Identify current tools, their use and limitations in TA/TM
- Assessor must avoid sole reliance on checklist/instruments/tool - Assessor must be trained and qualified on relevant instrument or tool - Instrumentation utilization must be reliable and valid as well as appropriate for the issue at hand - Assessor must be aware of the limitations of any instrumentation utilized - Assessor must stay current with new developments and outdated versions
40
Understand the appropriate use of additional assessment methods in TA/TM
- Fitness for duty | - Mental health evaluation