International Handbook of TA Flashcards
Two elements to a threat:
1) Perceived possibility of harm (potential danger)
2) A statement conveying an intention to cause harm (menacing utterance)
Three general elements to the management process:
1) Logistical - resources
2) Strategic - goals/priorities
3) Tactical - what ops are needed to carry out
Three principles of threat assessment and management
1) Usually the result of a discernable process
2) Usually an interaction among the attacker, past events, current situation, and target
3) Key is identifying attack-related behaviors
Systems theory
1) Equifinality - multiple factors leading to same outcome
2) Multifinality - One factor having multiple outcomes
Kinney’s model of workplace violence (Think Kinney needs TP for his PEA)
1) Traumatic experience
2) Perceptions that problems are unsolvable
3) Projection of all responsibility onto the situation
4) Egocentric frame of reference
5) Assumption that violence is the only way
White and Meloy’s five critical items to workplace violence
1) Motives for violence
2) HI/fantasies/fixation
3) Violent intentions/expressed threats
3) Weapons skill and access
4) Preattack planning and preparation
McKenzie’s Five risk factors of stalking
1) SI
2) HI
3) Psychosis
4) last resort
5) Psychopathy
Hoffman and Roshdi’s four-stage pathway to school shooting
1) Ongoing crisis
2) Emerging pattern of warning behavior
3) Inner world of the actors
4) Outside perspective showing how the perpetrator acts
O’Toole had how many levels of risk for school shootings based on which four elements?
Three levels of risk base on:
Specific, direct, detailed, plausibility
Cornell added to O’Toole’s levels of risk by adding which two elements?
1) Transient
2) Substantive
Motivational typologies of threats:
1) Schemer
2) Shocker
3) Signaler
4) Shielder
5) Screamer
This threatener’s intent is instrumental and to get others to comply to further own interest
Schemer
This type of threatener’s intent is to bring attention to himself via fear/anxiety by producing reactions in the target
Shocker
This type of threatener’s intent is promise future harm to target for perceived/actual harm caused and are committed to act violently
Signaler
This type of threatener’s intent is to ward off potential attacks by others by engaging in self-protection
Shielder
This type of threatener’s intent is catharsis of emotion than intent to act - they’re rarely committed but may be based on general anger
Screamer
Stalking victims who have been threatened have been found ____ times more likely to be assaulted
Three times more likely
The vast majority of threats in stalking situations are made by two types of stalkers:
1) Disgruntled former sexual partners
2) Vengeful stalkers
When interviewing a source it’s best to have a:
topic based convo rather than question-answer approach
In memory research .. Emotional experiences lead to:
better memory of central details but not necessarily more accuracy
When something isn’t true but presented as truth vs when someone resists or withholds informaiton
active vs passive deception
Strategic Use of Evidence technique of source interviewing
1) Gain cooperation
2) Allow them to provide info without knowing what info the interviewer holds
3) Slowly, relevant info is released in an unassuming way
4) When interviewer notices subject is lying, not immediately confronted
5) Disclosure strategies are used to challenge the narrative
Sharff Technique of source interviewing
- Collecting info while interviewee is unaware of their contributions to the investigator
- Subtly inviting subject to confirm/disconfirm assertions
- Pretend to have lots of info and what’s being discussed isn’t anything new
- Premise is on misperception by subject of what info the interviewer holds
PEACE model of source interviewing
P - Plan and prepare
E - Engage and explain
A - Personal Account
C - Closure
E - Evaluation
Personal injury law is aka
Tort Law
Tort feasor is aka
The defendant
Core elements of tort law
1) There was an existence of duty of care
2) Negligence in the performance of that duty or failure to act when required
3) Causal relationship between negligence and injury
- need proximate causation and damages
- damages must be proved
What is foreseeability in tort law?
When an ordinary person would or should know that harm could result from their negligence
Why has legal action against TA consultants failed when violence does end up occuring?
Absence of duty to the injured third party by the consultants. Protection is lost when there’s an advisory role.
Under the ADA, are substance use or personality disorders considered disabilities?
Yes.
Under the ADA what is a FFDE and what is it considered?
Fitness for duty evaluation and is considered a medical evaluation.
Four variations of the insanity defense:
1) M’Nuaghten test - as a result of SMI not capable of knowing nature and quality of actions were legally or morally wrong
2) Durham Rule - only used in new Hampshire
3) ALI Model Penal Code standard - defendant who lacks substantial capacity to appreciate the criminality of conduct or conform the conduct to the requirements of law
4) 18 USC Section 17 - standard in federal cases - unable to appreciate the nature and quality or wrongfulness of the actions bc of mental disease or defect
Which case set the precedent that a defendant is held in treatment until no longer mentally ill or dangerous
Jones v US
In stalking, a term to describe when one individual handles the case from beginning through post-sentencing
vertical prosecution
Precedent is established by
Appellate courts
An open source and ongoing tally that includes 115 mass shootings from 1982-2019
Mother Jones
Four types of workplace violence recognized by the National Institute of Occupational Safety and Health
1) Criminal intent - aka Type 1
2) Customer/client - aka Type 2
3) Worker on worker - aka Type 3
4) Personal relationship - aka Type 4
Assuming negative consequences for misconduct are effective risk mgmt strategies
Disciplinary drift
Shea described interview techniques in assessing suicide risk that if modified can be adapted to assess violence risk
1) Shame attenuation - do you find your boss is unfairly getting on your case?
2) Normalization - Many people tell me how angry they are with the unfairness. What’s it like for you?
3) Denial of the specific - Asking questions in a series about a topic vs general question
4) Symptom amplification - Counteracts tendencies to downplay the frequency or degree of concerning behaviors.
Increasing the number of people an individual of concern is fixated on or threatening
Target dispersion
A study by Cornell and colleagues (2018) found what about threats made by students among elementary, middle, and high school?
Those in 4th and 5th grade were less likely to be considered serious compared to middle and high school. Threats by older students more likely to be classified as serious and more likely to be attempted.
The Salem-Keizer Student Threat Assessment System (STAS) is a process that beings with _____ and is followed by _______. This uses how many teams and for what?
Begins with identifying students where there is a risk for aggression, followed by an assessment of the seriousness of the risk. Two teams: one for less serious threats and one in the community for more serious threats.
A Canadian school threat assessment model…the VTRA
Violence Threat Risk Assessment: involve a stage 1 intervention for immediate implementation and a stage 2 for long-term services.
The German Networks Against School Shootings program focuses school threat assessment on:
psychosocial crises
What’s the CSTAG school threat assessment model? Who comprises the team and how what are the steps?
Comprehensive School Threat Assessment Guidelines. Relies on school-based multidisciplinary teams to distinguish transient from substantive threats.
Step 1 - Gather info and determine if it is a threat
Step 2 - Consider credibility/seriousness
Step 3 - Teams respond to substantive threats which require protective action. If threat exceeds a fight, and includes a threat to kill, use a weapon, steps 4 and 5 are activated.
Step 4 - Three additional actions
(a) screened for MH services (b) law enf invest (c) integrate findings from a & b
Step 5 - Implement and monitor safety plan from step 4
The CSTAG has been recognized as
evidence based practice
Research shows that the optimal size of multidisciplinary teams in the range of ___ to ___ members. Fewer than ___ and more than ___ limit knowledge and compromise productivity, respectively.
5 to 9
Fewer than 5…more than 9
The STEP model to identifying potential indicators of concern
S - Subject’s behaviors, traits, and characteristics
T - Target’s vulnerabilities
E - Environment that facilitates, permits, or doesn’t discourage violence
P - Precipitating events
If the STEP process highlights potential for team involvement, utilize:
1) Subject based strategies
2) Target based strategies
Third Restatement of Torts, Sections 40-41
40 - Duties based on a special relationship with the injured person
41 - Duties based on a special relationship with the subject posing the risk
Third Restatement of Torts, Sections 42-43
42 & 43 - Duties based on undertakings - a person who assumes responsibility to provide services to another (such as to implement a case mgmt strategy) has a duty to provide reasonable care if (a) the failure to exercise such care increases the risk of physical harm beyond that which existed prior OR (b) the person to whom the services are rendered relies on the team member exercising reasonable care in the undertaking…these duties are aka “gratuitous undertakings”
In which court case did the court hold that postsecondary schools have a duty to keep students safe from foreseeable criminal assaults while they’re engaged as part of the school’s curriculum/services
Rosen v Regents of the Univ of California
In which court case did the supreme court hold that a univ has a special relationship with a student and corresponding duty to take reasonable measures to prevent his or her suicide
Dzung Duy Nguyen v Massachusetts’s Institute of Technology
Public figure stalkers are more likely to target ____ over ____
politicians over corporate figures
The attacks by public figure stalkers are more often ___ & ___ than ___ & ___
direct and interpersonal than indirect and from a distance
Letter writers who threatened politicians are _____ likely to approach the politican
less likely
In a study by Meloy and Amman, politicians were more likely attacked during ____ hours, usually at the ____, rather than at _____and in ____ areas
Daytime hours, at the workplace rather than at public events and in open areas.
In a study by Meloy and Amman, politicians were more likely attacked during ____ hours, usually at the ____, rather than at _____and in ____ areas
Daytime hours, at the workplace rather than at public events and in open areas.
Compared to other groups of public figures, politicians have an ____ risk of being attacked.
Increased risk
Leets, de Becker, and Giles studied letters from stalkers to celebrities and found that the _____ of expectations was most significant in discerning those who:
reasonableness….those who didn’t pursue from those who did
Coined by Meloy, this means when the stalker believes a debt is owed to them by the celebrity equal to the amount and time the stalker has invested
entitled reciprocity
The average stalking period of celebrities is around ______ months,
25-26 months
Two significant predictors of a physical approach by a stalker towards a celebrity
1) escalation - nine fold increase in likelihood to approach
2) police intervention - approaches decreased by half