TAM Flashcards
Factors that provide stability; in threat assessment, can be used to provide support or stability to a subject who is struggling or represent reasons that an individual would not engage in targeted violence
Anchors
This refers to the type, frequency and intensity of the subject’s attempts to be physically proximal (close) to the target…includes successful and unsuccessful attempts to approach the target.
Approach behavior
the act of detaining someone in legal custody, usually by a law enforcement officer. The actual deprivation of a person’s liberty can be physical detention for a short or prolonged period of time in response to a criminal charge.
Arrest
Specific behaviors that are needed in order to launch a physical assault on a target. These behaviors are displayed as steps on the pathway to violence
Attack-related behaviors
An observable action that provides evidence of an underlying element that may be relevant to a threat assessment and management case.. a subject’s actions (e.g., talking to himself or herself) might lead the threat assessor to believe the person has a mental health disorder that influences the level of threat posed by that individual
Behavioral indicator
Threat assessment orientation based on the idea that the subject will exhibit identifiable behaviors indicating the intent to commit an act of targeted of violence
Behavioral Threat Assessment
observable, identifiable behaviors that an individual exhibits while he or she is progressing on the pathway of violence
Behaviors of concern
An event that is rare, predictable only in retrospect, with extreme impacts
Black swan event
A gap or break… a situation where usual security measures have been circumvented
Breach
When an individual or group becomes defensive and surrounded by fortifications (real and virtual) to keep information in or detractors out…can lead to under- or overestimation of risk
Bunkers
The continuous interaction between what is known and unknown in a particular case, and the evolving assessments used to determine the appropriate protective response at any given point in time
Situation/case dynamics
In addition to known and unknown elements in case dynamics, this includes the intervention implemented by the assessor.
intervention strategy
This is a process used to document the chronological history of evidence to maintain
the security, integrity and accountability of its handling.
Chain of custody
“Circumstances, content and contextual factors” related to a subject’s inappropriate communication or contact
CirCon Factors
Orders issued by a court to convince the subject to stop threatening behaviors or stay away from the target and are periodically employed as a threat
management intervention (e.g., restraining, stay-away, protective orders)
Civil actions
Thinking; in more complex terms, it is the processes in the human mind involved in acquisition, storage, retrieval and processing of information.
Cognition
Ability to perceive nuances or subtle differences. If high in this trait, usually sensitive to small changes in a task, activity, behavior or the environment; Sometimes referred to as intuition or street smarts. A person may have high this trait even with little formal education
Cognitive complexity
The media used to transmit messages are referred to as ___________________.
Threat assessment uses this phrase when referring to the ways that information
about threatening individuals can be gained by threat assessment teams
Communication channels
Safeguarding sensitive information, usually involving case intelligence or personal information.
Confidentiality
The information contained and conveyed in the words, style and method of a threat
Content factors
The situation and environment surrounding the subject or the target. These can be personal, organizational, or on a larger scale (e.g., economic climate, world
news, etc.).
Contextual
A threat, direct or veiled, that is thought to be real, not just hypothetical. One test of whether a threat is ______ is the ability and intent of the entity posing the threat
Credible threat
Any information which is collected, analyzed, or distributed for use in inhibiting or monitoring criminal activity.
Criminal intelligence
Set of behaviors, attitudes, and policies that make it possible for people to work effectively across cultures. In threat assessment, it is having knowledge of differences and the ability to foresee how those differences may impact the investigation, analysis, or management of a case.
Cultural competence
This is an unambiguous statement of threat to either the target or law enforcement detailing intention to commit an act of targeted violence
Directly communicated threat
The cumulative effect an event can have when it initiates a succession of similar event. Used to describe the tendency for the loss of one inhibitor to affect other aspects of a subject’s life and create a downward spiral where other inhibitors are compromised as well.
Domino Effect
This is a preattack increase in intensity (frequency and/or duration) or variety of warning behaviors, usually indicating an attack is imminent
Energy burst
The sum of background factors (peer group, security, access to weapons, etc.) affecting the situation of both the subject and the target. This includes organizational or cultural factors that impact tolerance or reporting of behaviors on the pathway to violence
Environmental influences
Violent action for which the impetus of the attack is born out of an ideological system, usually intended to enact some change or disrupt activities deemed unacceptable by followers of that ideology
Extremist violence
Process of acquiring information and evidence (about the target, the subject, contacts, communication, past and present behavior, context) to support accurate and complete assessment of risks and the best way to defuse them
Fact finding
Governs the gathering, maintenance, and accessibility of educational records. Schools need written permission from the student to release educational records to anyone other than the student.
Family and Education Rights and Privacy Act (FERPA)
Exceptions to FERPA
To comply with a judicial order or lawfully issued subpoena, to appropriate officials in cases of health and safety emergencies, and to state and local authorities, within a juvenile justice system, pursuant to specific state law. Observations or interactions with students.
Prebreach preparations made by the person(s) posing a threat right before the threat is carried out. This can include acts like disseminating reasons for the attack or executing a last will and testament
Final act behavior
Exceptions to HIPAA
The Privacy Rule permits use and disclosure of protected health information, without an individual’s authorization or permission, for national priority purposes to law enforcement officials under specific circumstances (See 45 C.F.R. § 164.512). Disclosure must also be made to someone believed to be able to prevent or lessen a threat or to law enforcement if the information is needed to identify or apprehend an escapee or violent criminal.
Individuals who threaten to facilitate a personal relationship with the target; express infatuations/obsessions
Binder howler
Individuals who are motivated to threaten individuals because of their high public profile.
Celebrity-seeking Howlers..this is an impersonal sinister type of howler
Individuals who threaten as means of control over the target, usually a partner or family member.
Controller Howler..this is a personal sinister type of howler
Individuals who threaten as a reaction to other threats or reports of violence.
Copycat Howlers…this is an impersonal sinister type of howler
Individuals who threaten as a means to further a personal cause.
Crusader Howlers…this is an impersonal sinister type of howler
Individuals who threaten as a result of delusional relationship (or potential relationship) with the target.
Deluded Howlers…a personal binder type of howler….
Individuals for whom delusional content plays a direct role in their threats They don’t want a relationship but the delusions are causing threats.
Delusional Howlers…this is an impersonal sinister type of howler
Individuals who threaten in order to implicate a third party as the perpetrator of the threats.
Dirty-trickster Howlers…this is a personal sinister type of howler
Individuals who make threats on a continual basis, much like a hobby
Habitual Howlers…impersonal sinister type of howler
Individuals who threaten someone they do not know.
Impersonal Howlers
Individuals who threaten as a way of intimidating the target, who is typically a member of one of their social circles (e.g. supervisor, coworker, teacher, classmate).
Intimidator Howlers..this is a personal sinister type of howler
Individuals who threaten as an attempt to continue a relationship that the target wishes to end it.
Maintainer Howlers…a personal binder type of howler….different from Seeker bc a maintainer wants to CONTINUE a relationship that’s ended and seeker wants to ESTABLISH one
Individuals who threaten someone they know - seek to control targets - physical intimidation
Personal Howlers
Individuals who threaten as a means to establish an intimate relationship with the target, even when the target has repeatedly rebuffed them.
Seeker Howlers….a personal binder type of howler….different from Maintainer bc a maintainer wants to CONTINUE a relationship that’s ended and seeker wants to ESTABLISH one
Individuals who are just happy to communicate - the communications forge the relationship - seek to become lover, relative, or friend of a public figure
Relationship howler…a type of impersonal binder
Individuals who have a mental illness and believe that the public figure sends them messages through their daily activities or destiny will bring them together
Delusory howler…a type of impersonal binder
Individuals who don’t realize the inappropriateness of their communication with the target
Callow howler…this is a type of impersonal binder
Individuals who threaten as a defensive reaction to a perceived threat or attack from the target.
Self-defender Howlers….this is an impersonal sinister type of binder
Individuals who threaten in order to scare, cause anxiety, or intimidate the target
Sinister Howlers
Deliberate actions taken by a human against another human with the intention of causing harm.
Human-on-Human Violence
Individuals who intend to follow a path toward violence and behave in ways to further that goal
Hunters (aka biters)
Individuals who, though they have inappropriate, bizarre or threatening contact with the target, never intend on following a path to violence
Howlers (aka Barkers)
Entertaining ideas specific to the utility and acceptability of violence as a means to address the subject’s particular grievance
Ideation
Thoughts of the necessity and utility of violence by a subject that are made evident through behaviors such as researching previous attackers and collecting, practicing, and fantasizing about weapons
Identification
This is an act of spontaneous violence often sparked by situational or contextual triggers
Impromptu violence
Contact or communication with the target that is unwanted and intended by the subject to further the motives behind the threatening behavior. Contact can be written, verbal, or behavioral in nature and delivered in a variety of ways. These may be perceived by the target as intimidation, harassment, threatening, or out of context
Inappropriate Communication or Contact
Careful consideration of converging evidence in a case to ascertain the level of threat posed and progress toward violence.
Information Analysis
Process of obtaining information from all available sources to inform the analysis and decision making in a threat assessment
Information Gathering