CTM Stuff Flashcards
Threat approach and attack behavior
are the products of discernible processes of thinking and behavior.
An individual’s motives and target selection are directly connected.
Precipitation may involve a personal/significant stressor
Threat Assessment
Movement of idea to action
Targeted violence is not random or spontaneous
Not all threats are created equal.
Key Foundational Assumptions
Emphasis dynamic factors (behavioral, clinical, situational) versus focus upon static factors
Idiographic or case - driven approach
Risk management instead of prediction
Potential victim and offender versus generalized considerations
Instrumental/Predatory violence
Grievance
Motive or reason compelling the act
Ideation
Settling upon the idea that violence is justified and necessary
Research and Planning
Going beyond the idea to figure out how to consummate the violence
Preparation
Obtaining the necessary equipment and taking other actions required to initiate the plan
Attack
Actual Physical attack/assault
Describe components and application of Structured Professional Judgement
Process Gather information Determine presence of the risk factors Determine formulation of violence risk Develop scenarios of violence
TA & Violence Risk Assessment Tools
Cawood Assessment & Intervention Grids
RAGE-V (ATAP)
HCR-20 version 3
WAVR-21 (Meloy & White)
Other Specialized Measures
Stalking Assessment & Management (SAM;Kroop, Hart & Lyon)
Stalking Risk Profile (SRP) MacKenzie, MeEwen, Pathe, James, Ogloff, Miullen
Spousal Assault Risk Assessment Guide - (SARA) Kropp,Hart, Webster, & Eaves
Contextual Factors
- Recent act of targeted violence? Recent threatening or violent events? (copy cat issue as well as instigation) Anniversary of significant event approaching?
Subject Factors
- Prior arrest record or prior harassment/threat-related activity? Problematic contacts with other agencies? Recent life stressors? Presence of mental illness symptoms
Behavioral Activity
Intensity of effort as indicated by: Leakage of intentions
Persistent threatening or concerning behavior
Accomplices sought or alleged
Report threat with a specific plan
Written plan/list
Weapon present or available
Rehearsal behavior
Intensity of Pursuit/Effort
Particularly noted in Public Figure threat research (Meloy, James, Scalora)
Superordinate variable looking at frequency and duration of communication, multiple means of communication, target dispersion
Potentially significant predictor of approach
Leakage
Leakage in the context of threat assessment is the communication to a 3rd party of an intent to do harm to a target (Meloy, 2011). Leakage occurs when a subject “intentionally or unintentionally reveals clues to feelings, thoughts, fantasies, attitudes or intentions that may signal an impending violent act” (O’Toole, 2000)
Motivational Factors
Nature of subject’s motivation? Help-seeking behavior? Motives driven by mental illness. Revenge/retaliation for perceived injustice or harm Bottom Line: The More Personal, The Higher The Concern(also called the intimacy Effect
Intimacy Effect
The predictive level of threats as pre-incident indicators of violence increased in proportion to the degree of intimacy between the subject and the target. Intimacy as perceived by subject
Apply Knowledge of Relevant Mental Health Risk Factors and Management (CONT)
Threatening Activity
1. All threats must be taken seriously
2.Generally literature notes little direct predictive relationship between direct threats and subsequent violence (Especially Political Figure lit)
However, more substantial relationship between direct threats and other types of violence (I.E. stalking and domestic violence)
Apply Knowledge of Relevant Mental Health Risk Factors and Management (CONT)
Re Threats of violence, Warren, Mullen & McEwan note the following in evaluating threats:
- All threats be taken seriously
- Assessment of risk of enactment and repetition (including how threat is delivered such as leakage & what threat represent
- Development of management approach of threatener that is risk-based
- Consideration of how current practices may aggravate situation
Threatening Language & Approach
based upon research ( Scalora, James), cases involving subject with:
- Obvious/serious mental illness and prior approach history
- Pose a significantly higher risk when threats are made
Electronic Communication: Recent Research
When threats present, electronically communicating subjects not as likely to approach, unless communication was part of a campaign with other forms of communication (e.g., phone, letters)
More threatening language
More likely to contain obscenity
Target Factors
Subject view target as responsible for current situation or difficulties?
Target media presence?/
High Profile?
Target Focus but contacts multiple entities (maintains focus of issue and motives across contacts)
Sometimes referred to as Fixation
Define elements of the RAGE-V
Triggers
- Pending perceived negative job event Rejection and abandonment Increase psychosis Civil (family court, child custody, (etc) or criminal justice system event(s) Disruption of support system Financial problems
Inhibitors
Treatment availability, utilization, and past receptivity
Other social support
Spiritual or religious beliefs opposing violence
Connectedness and healthy affectional bonds
Risk factors
Weapons use Motivational factors drug use Head Trauma Criminal history History of mental illness Perception of injustice
Process variables
Approach behavior Evidence of escalation deteriorating mental state Diminishing inhibitions inability or limited view or ability to pursue other option
Describe relationship of risk factors, triggers, inhibitors and process variables to threat behavior
- Mental health - Role and limits of treatment
- Development level
- Links to medical condition
- Group behavior
Summarize ley literature in the field of TA/TM
Understand seminal works and their contribution to the field
Able to define key terms
Sample Definitions RAGE - V
Commitment - in this content refers to involuntary or less than voluntary hospitalization for psychological problems. Hospitalization occurs when someone poses a danger to themselves or others
Inevitability
The belief that no matter what action one takes the course of events will not change
Mitigation Strategies
Implementation of measures to lessen or eliminate the occurrence or impact of an incident of potential violence
Protective Inhibitors
beliefs, relationships, injuries, lack of resources, or abilities that can limit whether a person is likely to follow through with dangerous conduct
Dynamic Assessment Process
Assess Threat, Choose Intervention, Implement Intervention, and Monitor and Evaluate
Key Components of management Process
- Recognize need for threat management process
- Assign responsibilities of monitoring to persons trained in TA
- Liaison with appropriate parties related to protectees to facilitate tracking
- Need for incident tracking system & documentation
- Liaison with other agencies
- Use consistent and valid TA methods
- Apply TA strategies flexibly and intelligently (Calhoun & Weston 2009)
Risk management Issues: Accountability
- A multidisciplinary focus
- Need for collateral contacts
- Coordination of information
- Need for agreements re: nature of how information from sources will be obtained, maintained and shared across parties
Practical Issues
- need to designate a Point of Contact for team members to share information re subject
- Need a Point of Contact for subject to liaison with to avoid mix messages or confusion
allowing for rapport building
clarity of message
avoid parties being played off against each other
Identify types of threat management strategies
Administrative actions
Active and passive monitoring
arrest and prosecution
Understand the cause and effect of implementing the most appropriate strategies to prevent harm
Identify current tools, their use and limitations in TA/TM
- Assessor must avoid sole reliance on checklist/instruments/tool
- Assessor must be trained and qualified on relevant instrument or tool
- Instrumentation utilization must be reliable and valid as well as appropriate for the issue at hand
- Assessor must be aware of the limitations of any instrumentation utilized
- Assessor must stay current with new developments and outdated versions
Understand the appropriate use of additional assessment methods in TA/TM
- Fitness for duty
- Mental health evaluation