CTM Stuff Flashcards

1
Q

Threat approach and attack behavior

A

are the products of discernible processes of thinking and behavior.
An individual’s motives and target selection are directly connected.
Precipitation may involve a personal/significant stressor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Threat Assessment

A

Movement of idea to action
Targeted violence is not random or spontaneous
Not all threats are created equal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Key Foundational Assumptions

A

Emphasis dynamic factors (behavioral, clinical, situational) versus focus upon static factors
Idiographic or case - driven approach
Risk management instead of prediction
Potential victim and offender versus generalized considerations
Instrumental/Predatory violence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Grievance

A

Motive or reason compelling the act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Ideation

A

Settling upon the idea that violence is justified and necessary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Research and Planning

A

Going beyond the idea to figure out how to consummate the violence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Preparation

A

Obtaining the necessary equipment and taking other actions required to initiate the plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Attack

A

Actual Physical attack/assault

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Describe components and application of Structured Professional Judgement

A
Process
Gather information
Determine presence of the risk factors
Determine formulation of violence risk
Develop scenarios of violence
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

TA & Violence Risk Assessment Tools

A

Cawood Assessment & Intervention Grids
RAGE-V (ATAP)
HCR-20 version 3
WAVR-21 (Meloy & White)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Other Specialized Measures

A

Stalking Assessment & Management (SAM;Kroop, Hart & Lyon)
Stalking Risk Profile (SRP) MacKenzie, MeEwen, Pathe, James, Ogloff, Miullen
Spousal Assault Risk Assessment Guide - (SARA) Kropp,Hart, Webster, & Eaves

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Contextual Factors

A
  • Recent act of targeted violence? Recent threatening or violent events? (copy cat issue as well as instigation) Anniversary of significant event approaching?
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Subject Factors

A
  • Prior arrest record or prior harassment/threat-related activity? Problematic contacts with other agencies? Recent life stressors? Presence of mental illness symptoms
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Behavioral Activity

A

Intensity of effort as indicated by: Leakage of intentions
Persistent threatening or concerning behavior
Accomplices sought or alleged
Report threat with a specific plan
Written plan/list
Weapon present or available
Rehearsal behavior

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Intensity of Pursuit/Effort

A

Particularly noted in Public Figure threat research (Meloy, James, Scalora)
Superordinate variable looking at frequency and duration of communication, multiple means of communication, target dispersion
Potentially significant predictor of approach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Leakage

A

Leakage in the context of threat assessment is the communication to a 3rd party of an intent to do harm to a target (Meloy, 2011). Leakage occurs when a subject “intentionally or unintentionally reveals clues to feelings, thoughts, fantasies, attitudes or intentions that may signal an impending violent act” (O’Toole, 2000)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Motivational Factors

A

Nature of subject’s motivation? Help-seeking behavior? Motives driven by mental illness. Revenge/retaliation for perceived injustice or harm Bottom Line: The More Personal, The Higher The Concern(also called the intimacy Effect

18
Q

Intimacy Effect

A

The predictive level of threats as pre-incident indicators of violence increased in proportion to the degree of intimacy between the subject and the target. Intimacy as perceived by subject

19
Q

Apply Knowledge of Relevant Mental Health Risk Factors and Management (CONT)

A

Threatening Activity
1. All threats must be taken seriously
2.Generally literature notes little direct predictive relationship between direct threats and subsequent violence (Especially Political Figure lit)
However, more substantial relationship between direct threats and other types of violence (I.E. stalking and domestic violence)

20
Q

Apply Knowledge of Relevant Mental Health Risk Factors and Management (CONT)

A

Re Threats of violence, Warren, Mullen & McEwan note the following in evaluating threats:

  1. All threats be taken seriously
  2. Assessment of risk of enactment and repetition (including how threat is delivered such as leakage & what threat represent
  3. Development of management approach of threatener that is risk-based
  4. Consideration of how current practices may aggravate situation
21
Q

Threatening Language & Approach

A

based upon research ( Scalora, James), cases involving subject with:

  1. Obvious/serious mental illness and prior approach history
  2. Pose a significantly higher risk when threats are made
22
Q

Electronic Communication: Recent Research

A

When threats present, electronically communicating subjects not as likely to approach, unless communication was part of a campaign with other forms of communication (e.g., phone, letters)
More threatening language
More likely to contain obscenity

23
Q

Target Factors

A

Subject view target as responsible for current situation or difficulties?
Target media presence?/
High Profile?
Target Focus but contacts multiple entities (maintains focus of issue and motives across contacts)
Sometimes referred to as Fixation

24
Q

Define elements of the RAGE-V

Triggers

A
- Pending perceived negative job event
Rejection and abandonment
Increase psychosis
Civil (family court, child custody, (etc) or criminal justice system event(s)
Disruption of support system
Financial problems
25
Q

Inhibitors

A

Treatment availability, utilization, and past receptivity
Other social support
Spiritual or religious beliefs opposing violence
Connectedness and healthy affectional bonds

26
Q

Risk factors

A
Weapons use
Motivational factors
drug use
Head Trauma 
Criminal history
History of mental illness
Perception of injustice
27
Q

Process variables

A
Approach behavior
Evidence of escalation
deteriorating mental state
Diminishing inhibitions
inability or limited view or ability to pursue other option
28
Q

Describe relationship of risk factors, triggers, inhibitors and process variables to threat behavior

A
  • Mental health - Role and limits of treatment
  • Development level
  • Links to medical condition
  • Group behavior
29
Q

Summarize ley literature in the field of TA/TM

A

Understand seminal works and their contribution to the field

Able to define key terms

30
Q

Sample Definitions RAGE - V

A

Commitment - in this content refers to involuntary or less than voluntary hospitalization for psychological problems. Hospitalization occurs when someone poses a danger to themselves or others

31
Q

Inevitability

A

The belief that no matter what action one takes the course of events will not change

32
Q

Mitigation Strategies

A

Implementation of measures to lessen or eliminate the occurrence or impact of an incident of potential violence

33
Q

Protective Inhibitors

A

beliefs, relationships, injuries, lack of resources, or abilities that can limit whether a person is likely to follow through with dangerous conduct

34
Q

Dynamic Assessment Process

A

Assess Threat, Choose Intervention, Implement Intervention, and Monitor and Evaluate

35
Q

Key Components of management Process

A
  1. Recognize need for threat management process
  2. Assign responsibilities of monitoring to persons trained in TA
  3. Liaison with appropriate parties related to protectees to facilitate tracking
  4. Need for incident tracking system & documentation
  5. Liaison with other agencies
  6. Use consistent and valid TA methods
  7. Apply TA strategies flexibly and intelligently (Calhoun & Weston 2009)
36
Q

Risk management Issues: Accountability

A
  1. A multidisciplinary focus
  2. Need for collateral contacts
  3. Coordination of information
  4. Need for agreements re: nature of how information from sources will be obtained, maintained and shared across parties
37
Q

Practical Issues

A
  1. need to designate a Point of Contact for team members to share information re subject
  2. Need a Point of Contact for subject to liaison with to avoid mix messages or confusion
    allowing for rapport building
    clarity of message
    avoid parties being played off against each other
38
Q

Identify types of threat management strategies

A

Administrative actions
Active and passive monitoring
arrest and prosecution

Understand the cause and effect of implementing the most appropriate strategies to prevent harm

39
Q

Identify current tools, their use and limitations in TA/TM

A
  • Assessor must avoid sole reliance on checklist/instruments/tool
  • Assessor must be trained and qualified on relevant instrument or tool
  • Instrumentation utilization must be reliable and valid as well as appropriate for the issue at hand
  • Assessor must be aware of the limitations of any instrumentation utilized
  • Assessor must stay current with new developments and outdated versions
40
Q

Understand the appropriate use of additional assessment methods in TA/TM

A
  • Fitness for duty

- Mental health evaluation