Threat Assess Glossary Flashcards

1
Q

Americans with Disabilities Act

A

1990; established legislation for civil rights of people with disabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Administrative Action

A

Threat management strategy; disciplinary action to manage problem individuals, eg firing, suspension, barring from a location.
Calhoun & Weston 2009

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Affective Violence

A

Impulsive, reactive, or emotional violence. Unplanned act in response to a perceived threat in the immediate environment
Meloy, 2006

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Anchors

A

Factors that provide support or stability to a subject that is struggling, or represent reasons not to engage in targeted violence
De Becker, 1997

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Approach Behavior

A

Type, frequency, and intensity of a subject’s attempts to be physically close to the target. Includes successful and unsuccessful attempts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Arrest

A

Threat management intervention. Act of detaining someone in legal custody. Actual deprivation of liberty can be a physical detention for a short or prolonged period in response to a criminal charge.
Bureau of Justice Statistics 2011

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Attack

A

Carrying out the intended violence against the target
Calhoun & Weston 2003

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Attack Related Behaviors

A

Specific behaviors needed to launch an attack on a target, displayed as steps on the Pathway to Violence
Calhoun & Weston, 2009

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Behavioral Indicator

A

Observable action that provides evidence that may be relevant to a TATM case.
Bulling et Al, 2008

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Behavioral Threat Assessment

A

Threat assessment orientation based on the idea that the subject will exhibit identifiable behaviors indicating their intent to commit an act of targeted violence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Behaviors of Concern

A

Observable, identifiable behaviors that an individual exhibits while they are progressing on the pathway to violence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Black Swan Event

A

An event that is rare, predictable only in retrospect, with extreme impact
Meloy 2011, Talib 2007

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Breach

A

Situation where usual security measures have been circumvented
Calhoun & Weston 2003

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Bunkers

A

Linked to “Bunker Mentality,” in which an individual becomes defensive and surrounded by fortifications (real and virtual) to keep information in or detractors out. Can lead to an over or under estimation of risk.
Calhoun & Weston 2012

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Case Dynamics

A

Continuous interaction between what is known and unknown in a particular case, and the evolving assessments used to determine the appropriate protective response at any given point in time.
Calhoun & Weston, 2012

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Code of Ethics

A

Ethical code developed by ATAP outlining appropriate behavior and decision making in TATM
ATAP, 2010

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Chain of Custody

A

Process used to document chronological history of evidence to maintain the security, integrity, and accountability of its handling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

CirCon Factors

A

Circumstances, Content, and Contextual factors related to inappropriate communication or contact
Calhoun & Weston 2003

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Civil Action

A

Orders issued by a court to convince a subject to stop threatening behaviors or stay away from a target, employed as a threat management intervention.
Calhoun & Weston 2003

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Cognition

A

Thinking. Processes in the human mind involved in acquisition, storage, retrieval, and processing of information. People with poor cognition may have difficulty visualizing alternatives to violence and receiving assistance for grievances.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Cognitive Complexity

A

A person’s ability to perceive nuances or subtle differences. High cognitive complexity involves sensitivity to small changes in task, activity, behavior, or the environment. Sometimes called intuition or street smarts.
Scott, 1962

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Communicative Channels

A

Mediums used to transmit messages. Refers to the ways that information about threatening individuals can be gained by TATM teams.
Calhoun & Weston 2013

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Confidentiality

A

Process of safeguarding sensitive information, usually involving case intelligence or personal information. Sometimes framed as an individual’s right to keep their information private

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Content factors

A

The information contained and conveyed in the words, style, and method of a threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Contextual Factors

A

Situational factors. Situation and environment surrounding the subject or the target. Can be personal, organizational, or on a larger scale (economic climate, world news)
Scalora & Bulling 2007

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Credible Threat

A

Threat, direct or veiled, thought to be real and not hypothetical. One test is the ability and intent of the entity posing the threat
De Becker 1997

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Criminal Intelligence

A

Information collected, analyzed, or distributed for use in inhibiting or monitoring criminal activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Cultural competence

A

Organizationally, behaviors, attitudes, and politics that make it possible for people to work effectively across cultures. In TATM, knowledge of cultural differences and ability to foresee how they may impact the case

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Directly communicated threat

A

Unambiguous statement of threat to either the target or law enforcement detailing intention to commit an act of targeted violence
Meloy 2011

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Domino Effect

A

In TATM, describes the tendency for the loss of one inhibitor to affect other aspects of a subject’s life and create a downward spiral
Calhoun & Weston 2012

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Duty to Warn/Protect

A

Legal directive to MHPs in most states with a knowledge of possible act of harm directed at a third party, required to act reasonable to protect the individual from the threat. Stems from Tarasoff vs Regents of the University of CA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Empathy

A

Being able to recognize and feel what another is feeling, usually in a therapeutic context. Used to build rapport with a target or subject.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Energy burst

A

Part of the Pathway to Violence. Pre-attack increase in intensity (frequency or duration) or variety of other warning behaviors, signaling an attack is imminent
Meloy 2011

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Evidence Collection

A

Process of gathering, maintaining, and preserving evidence for use in investigation and prosecution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Evidence Preservation

A

Ensuring evidence is collected and maintained in a proper manner which will preserve its forensic value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Environmental Influences

A

The sum of background factors affecting the situation of both the subject and the target. This includes organizational or cultural factors that impact tolerance or reporting of behaviors on the pathway to violence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Extremist Violence

A

Violent action for which the impetus of the attack is born out of an ideological system, usually intended to enact some change or disrupt activities deemed unacceptable by followers of the ideology
Gerwehr & Hubbard 2007

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Fact Finding

A

Process of aquiring information and evidence to support accurate and complete assessment of risks and the best way to defuse them
Calhoun and Weston, 2009

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

FERPA

A

Family Education Rights and Privacy Act
Federal law that governs the gathering, maintenance, and accessibility of educational records. Schools need written permission from the student to release educational records to anyone other than the student. Schools may disclose records without consent to certain parties under certain conditions e.g., complying with a judicial order or subpoena, health and safety emergencies, and pursuant to specific State law

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Final Act Behavior

A

Pre-breach preparations made by the person(s) posing a threat right before the threat is carried out.
Calhoun & Weston 2009

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Fixation

A

Extreme preoccupation with something. Can be adaptive in the form of love or loyalty, but can cross into pathology when it involves a grievance, personal cause, or public figure
Meloy 2011

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Grievance

A

The cause of someone’s distress or reason for complaint/resentment; in TATM takes on additional meaning to include a highly personal meaning for the subject, often fueling their feeling of being wronged and translating into behaviors related to a sense of mission, destiny, loss, or desire for revenge
Calhoun & Weston 2003

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

HIPAA

A

Health Insurance Portability and Accountability Act
Required covered entities to protect individuals’ health records and other identifiable health information. Permits use and disclosure of protected health information for national priority purposes to law enforcement individuals under specific circumstances. Disclosure must be made to someone they believe can prevent or lessen a threat or to LE to identify or apprehend an escapee or violent criminal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Howlers

A

AKA Barkers
Individuals who, though they have inappropriate, bizarre, or threatening contact with the target, never intend on following a path to violence
Calhoun & Weston 2003, 2009

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Binder Howlers

A

Threaten to facilitate a personal relationship with the target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Celebrity-seeking Howlers

A

Threaten individuals because of their high public profile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Controller Howlers

A

Threaten as a means of control over the target, usually a partner or family member

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Copycat Howlers

A

Threaten as a reaction to other threats or reports of violence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Crusader Howlers

A

Threaten as a means to further a personal cause

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Deluded Howlers

A

Threaten as a result of a delusional relationship or potential relationship with the target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Delusional Howlers

A

Individuals for him delusional content plays a direct role in their role

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Dirty-Trickster Howlers

A

Threaten in order to implicate a third party as the perpetrator of the threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Habitual Howlers

A

Make threats on a continual basis, much like a hobby

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Impersonal Howlers

A

Threaten someone they do not know

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Intimidator Howlers

A

Threaten as a way of intimidating the target, who is typically a member of one of their social circles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Maintainer Howlers

A

Threaten as an attempt to continue a relationship which the target wishes to end

57
Q

Personal Howlers

A

Individuals who threaten someone they know

58
Q

Seeker Howlers

A

Individuals who threaten as a means to establish an intimate relationship with the target, even when the target has repeatedly rebuffed them

59
Q

Self-Defender Howlers

A

Individuals who threaten as a defensive reaction to a perceived threat or attack from the target

60
Q

Sinister Howlers

A

Individuals who threaten in order to scare the target

61
Q

Human on Human Violence

A

Deliberate actions taken by a human against another human with the intention of causing harm

62
Q

Hunters (Biters)

A

Individuals who intend to follow a path toward violence and behave in ways to further that goal
Calhoun & Weston 2003, 2009

63
Q

Ideation

A

Entertaining ideas specific to the utility and acceptability of violence as a means to address the subject’s particulate grievance
Calhoun & Weston 2003

64
Q

Identification

A

Thoughts of the necessity and utility of violence by a subject that are made evident through behaviors like researching previous attackers and collecting, practicing, and fantasizing about weapons
Meloy 2011

65
Q

Impromptu Violence

A

Act of spontaneous violence often sparked by situational or contextual triggers
Calhoun & Weston 2003, 2009

66
Q

Inappropriate Communication/Contact

A

Contact or communication with the target that is unwanted and intended by the subject to further the motives behind the threatening behavior. May be perceived by the target as intimidation, harassment, threatening, or out of context
Calhoun & Weston 2009

67
Q

Information Analysis

A

Careful consideration of converging evidence in a case to ascertain the level of threat posed and progress toward violence

68
Q

Information Gathering

A

Process of obtaining information from all available sources to inform the analysis and decision making in threat assessment
Fein & Vossekuil 1998

69
Q

Information Sharing

A

Facilitation of the flow of information among entities responsible for a case so that all parties have access to current, relevant information on which to base decision making
DoD 2007

70
Q

Information Silos

A

Information not shared across disciplines or agencies is referred to as being in a “silo.” Also refers to information or knowledge that is kept separate, tightly controlled and not shared. When information about a threat or potentially threatening situation is not shared appropriately it can inhibit attempts to assess or manage it
Calhoun & Weston 2012

71
Q

Inhibitors

A

Anything that serves to decrease the likelihood that a subject’s behavior will escalate to an act of targeted violence; sometimes referred to as buffers
Calhoun & Weston 2003

72
Q

Insider Threat

A

An individual with access to a facility or organization who uses that access to disrupt or cause harm to the organization or others involved with that organization
Cappelli 2005

73
Q

Intended Violence

A

Violent acts which meet the following criteria: intent to commit the act, selecting an attack mode that ensures injury, death, or property damage, and a motive that does not profit the attacker
Calhoun & Weston 2003

74
Q

Interrogation

A

Purposeful questioning of a subject to obtain accurate, useful, and timely information relevant to an investigation
Boetig & Bellmer 2008

75
Q

Intervention

A

An action or process that has the effect of modifying behavior, thinking, or emotions. In TATM, the action taken in the implementation of a threat management strategy
Calhoun & Weston 2003

76
Q

Intervention/Inhibitor Dichotomy

A

Disciplinary actions toward a subject are often required in TATM to ensure a target’s safety, however, confrontational interventions can also negatively affect subject’s well-being. The relationship between the subject’s well-being can be described as a dichotomy in some situations, because each impacts the other and often suggest different threat management decisions.
Calhoun & Weston 2012

77
Q

Intervention Synergy

A

The Case Dynamic intensified by the stimulus of what the threat manager or target does or does not do in response to the threat situations
Calhoun & Weston 2012

78
Q

Intervention Vectors

A

Similar in concept to intervention strategies, it is the range of levels of confrontation with the subject of a threat management case
Calhoun & Weston 2003

79
Q

Interview Approaches

A

Strategies to engage a subject in the interview in order to elicit information

80
Q

Interview Strategy

A

Plan for the goals and approaches to an interview ie, deciding what information will be sought, how the subject will be redirected, where the interview will take place, etc
Calhoun & Weston 2003

81
Q

Intimacy

A

Real or perceived close personal relationship sometimes accompanied by physical or sexual contact

82
Q

Intimacy Effect

A

The closer the interpersonal relationship (degree of intimacy) between the threatener (subject) and the threatened (target), the greater the likelihood of threats being carried out. This intimacy is based upon the subject’s perception of the relationship which may be delusional and completely unknown to the target
Calhoun & Weston 2003

83
Q

Investigation

A

The active process of seeking out and finding information relevant to a threat assessment case

84
Q

Investigative Interview

A

Any verbal interaction between a law enforcement officer and a civilian for which the purpose is gathering information
Boetig & Bellmer 2008

85
Q

JACA

A

Justification, Alternatives, Consequences, Ability
This acronym suggests four questions that can help determine level of threat posed by a subject
Justification: Does the person feel justified in using violent means?
Alternatives: Does the subject perceive they have alternatives to rectify their grievance?
Consequences: How salient are the consequences of this activity for the subject?
Ability: Does the subject believe they have the ability to carry out intended violence?

86
Q

Last Resort

A

The subject’s decision to end their life can lead to an act of targeted violence as a means of attaining fame or martyrdom in addition to their suicide attempt
Meloy 2011

87
Q

Leakage

A

An accidental or gradual escape, in TATM refers to when a subject shares information with a third party that reveals clues related to their thinking, planning, or execution of an act of targeted violence
O’Toole 2000

88
Q

Liability

A

Legal responsibility or obligation related to professional actions or inactions

89
Q

Mental Health Commitment

A

“Civil Commitment” - legal action that forces an individual into mental health care. Jurisdictions differ in the legal definitions and criteria for commitment, but generally 2 criteria must be met: 1) the person must have a mental disorder, and 2) the mental disorder contributes to dangerousness that the subject exhibits by actions or threats to themselves or others

90
Q

Mood disorders

A

Disorders that include prolonged excessive emotion. Symptoms can include clouded judgement along with other symptoms

91
Q

Depression

A

Can be a major mental disorder or a short-term, reactive state. Symptoms include sadness, loss of interest/pleasure, sleep disturbance, weight change, psychomotor disturbance, fatigue, feelings of worthlessness, cognitive disturbance, and recurring thoughts of death. Associated with suicide.

92
Q

Mania

A

Clinically, mania is a period in which an individual experiences elevated, expanded, or irritable mood and gradiosity, decreased sleep, increase in verbal communication, distractability, increase in activity or psychomotor agitation, and excessive involvement in pleasurable activities

93
Q

Personality Disorders

A

Characterized by unhealthy patterns or thinking and behavior. There are several types, most concerning in TATM is borderline, narcissistic, and paranoid

94
Q

Borderline Personality Disorder

A

Often characterized by desperate attempts to avoid abandonment, a pattern of frequent unstable relationships, unstable self-image, impulsive behavior across multiple domains

95
Q

Narcissistic Personality Disorder

A

Clinically characterized as having a grandiose sense of importance, a belief in being special or unique, fantasies of excessive intelligence, power, beauty, etc, a sense of entitlement, exploitative of those around them, need for admiration, arrogance, envious of others, lacking in empathy and superior attitude/behavior

96
Q

Paranoid Personality Disorder

A

Unwarranted suspicion that others are harming them in some way, questioning of loyalty of those around them, bearing of grudges, reluctance to trust or confide in others for fear of exploitation and perceiving of threats or sleights when none are present

97
Q

Thought Disorder

A

Mental disorders that include a variety of symptoms related to a disruption in the ability to communicate or think clearly. Delusion and Hallucination are of key concern in TATM

98
Q

Delusion

A

Incorrect belief that is caused by thought disturbance, can be of a number of different types including grandiose, jealous, persecutory, somatic, and erotomanic

99
Q

Hallucination

A

Any sensory experience that is perceived by someone to be occurring externally for which there is no stimulus present. These can take the form of any perceptual experience from any sense.

100
Q

Active Monitoring

A

Threat management interventions that are dynamic and involve real time observation of a subject’s behavior and/or movement through means such as surveillance

101
Q

Passive Monitoring

A

Threat management interventions that involve the use of non-invasive methods of tracking subject’s behavior, such as third party reports on conduct

102
Q

Multidisciplinary Team

A

A group of professionals from different disciplines assembled to provide their perspectives and expertise in the fulfillment of a function such as TATM

103
Q

Mypoic Management

A

Style of management that focuses on short-term goals with immediate payoffs at the expense of strategies with superior but distant payoffs
Mizik 2010, Calhoun & Weston 2012

104
Q

Novel Aggression

A

New acts of violence committed by the subject unrelated to their planned act of targeted violence

105
Q

Opportunistic Violence

A

Acts of violence involving general or non-specific slection of victim
Calhoun & Weston 2003

106
Q

Overt Threat

A

Threat of a direct nature, describing a future possible act against the target
O’Toole 2000

107
Q

Pathway to Violence

A

Series of sequential steps which indicate that an individual is progressing towards an act of targeted violence
Calhou & Weston 2003
Fein & Vossekuil

108
Q

Physical Security

A

Sum of the physical protective measures designed to detect, mitigate, or eliminate a threat

109
Q

Predatory Violence

A

An act that is planned by the attacker and does not involve reactive emotional components or an imminent threat to the attacker. Sometimes referred to as instrumental, premeditated, proactive, or cold-blooded

110
Q

Preparation

A

Behaviors associated with this include acquiring weapons, assembling equipment, arranging transportation, observing significant dates, rehearsing, conducting final act behaviors, or costuming

111
Q

Protective Fact Finding

A

Process of gathering detailed information surrounding an inappropriate communication or contact, including background on the subject, current behaviors, links to the target, and triggers for the communication - this information is used to create safety plans for the target
Calhoun & Weston 2006

112
Q

Proportionate Responses

A

Strategies that employ measures comparable to the level of risk presented by the subject
Gardam 1993, Calhoun & Weston 2003

113
Q

Psychopathy

A

Condition in which a specific combination of personality and behavioral factors exist. These factors include a superficiality and charming aspect, unreliability, lack of remorse, insight or affective reaction, dysfunction in interpersonal relationships, anti-social and dangerous/risky behavior and lack of life planning
Meloy 2001

114
Q

Radicalization

A

Conversion of follower of a legitimate belief system to an extremist ideology based on that system, often with the intent of using them to commit or support a future act of violence
Silber & Bhatt 2007

115
Q

Rapport Building

A

Establishing a sense of connection between the interviewer and interviewee to facilitate communication and information sharing
Keats 1993

116
Q

Redirection

A

Technique of refocusing the subject’s attention away from the target and toward another person, organization, or activity
Calhoun & Weston 2003

117
Q

Referral

A

Process of sending an individual to another professional with the proper expertise to address the particular situation

118
Q

Research and Planning

A

Seeking information about a target to facilitate an attack. Can include surveillance of the target, internet searches, testing security around the target, researching methods of attack
Calhoun & Weston 2003

119
Q

Risk Assessment

A

A process through which options for decreasing risk are considered along with the potential outcomes associated with their implementation, both positive and negative
Haimes 2004

120
Q

Scope of Practice

A

Recognizing the limits of knowledge, experience and capabilities one possesses and only performing functions with the boundaries of professional training and duties

121
Q

Stalking

A

A cluster of behaviors including unwanted communication, approach, or other contact, usually intended to threaten, harass, coerce or intimidate the target into meeting the demands of the perpetrator.

122
Q

Subject Interview

A

A threat management intervention that involves direct contact with the subject and may or may not include questioning. The subject interview can have many different purposes including information gathering, refocusing, or redirecting the subject and warning or confronting the subject
Calhoun & Weston 2009

123
Q

Substance Abuse

A

A maladaptive pattern of substance use leading to clinically significant impairment or distress as manifested in one+ of the following: failure to fulfill obligations, use of substances in hazardous situations, recurrent substance related legal troubles, or continued use despite frequent interpersonal difficulties related to use. Often has an impact on the subject’s impulse control and may contribute to erosion of inhibitors

124
Q

Surveillance

A

Actively but unobtrusively observing a subject to gather information about their activities and whereabouts

125
Q

Tail Risk

A

Probabilities of risk at the extreme ends of a normal distribution. Targeted violence has a very low rate of occurrence, however the risk should not be underestimated based on statistical probability that it will or will not happen
Meloy 2011

126
Q

Take No Further Action At This Time

A

A deliberate, justified decision to assign a case inactive status
Calhoun & Weston 2009

127
Q

Target

A

A person, object, or place that is the aim of an attack. The point of fixation for intended violence

128
Q

Targeted Violence

A

Violence incidents involving an identified subject who possesses intent and potential to cause harm to an identifiable target

129
Q

Terrorism

A

Act of violence or threats of violence used to further the agenda of the perpetrator while causing fear and psyschological distress

130
Q

Third Party Control or Monitoring

A

Using a reliable third party to exercise control over the subject or unobtrusively monitor their behavior
Calhoun & Weston 2009

131
Q

Threat Assessment

A

A fact-based method of assessment that focuses on an individual’s patterns of thinking and behavior to determine whether, and to what extent, they are moving toward an attack

132
Q

Threat/Control Override

A

A condition in which the individual believes they are not in control of their actions, but is instead being commanded by an outside force
Link & Stueve, 1994

133
Q

Threat Management

A

Managing a subject’s behavior through interventions and strategies designs to disrupt or prevent an act of targeted violence

134
Q

Threat Management Process

A

Entirety of the steps taken to identify, assess, managing a threat assessment case. This includes developing, implementing, and monitoring a thorough plan unique to each subject and situation that includes protective measures for intended target

135
Q

Threat Management Strategy

A

A coordinated plan of direct or indirect interventions with the subject that, based on current information regarding level of threat posed, is designed to defuse the risk in a given situation at a particular point in time

136
Q

Threat Management Team

A

A cross functional, multidisciplinary team approach to assist in assessing threat management plans. The team meets regularly, and as needed in crisis situations, to review potential and active threat cases

137
Q

Threat Manager

A

The person who has primary responsibility for initiating, investigating, assessing and managing in threat cases. This person should have experience and training in TATM

138
Q

Triggers

A

An event or action that initiates a response of some type. In TATM, initiates action on the part of the subject, moving them along the path to violence. Identifying triggers is part of the threat assessment process