Threat Assess Glossary Flashcards
Americans with Disabilities Act
1990; established legislation for civil rights of people with disabilities.
Administrative Action
Threat management strategy; disciplinary action to manage problem individuals, eg firing, suspension, barring from a location.
Calhoun & Weston 2009
Affective Violence
Impulsive, reactive, or emotional violence. Unplanned act in response to a perceived threat in the immediate environment
Meloy, 2006
Anchors
Factors that provide support or stability to a subject that is struggling, or represent reasons not to engage in targeted violence
De Becker, 1997
Approach Behavior
Type, frequency, and intensity of a subject’s attempts to be physically close to the target. Includes successful and unsuccessful attempts.
Arrest
Threat management intervention. Act of detaining someone in legal custody. Actual deprivation of liberty can be a physical detention for a short or prolonged period in response to a criminal charge.
Bureau of Justice Statistics 2011
Attack
Carrying out the intended violence against the target
Calhoun & Weston 2003
Attack Related Behaviors
Specific behaviors needed to launch an attack on a target, displayed as steps on the Pathway to Violence
Calhoun & Weston, 2009
Behavioral Indicator
Observable action that provides evidence that may be relevant to a TATM case.
Bulling et Al, 2008
Behavioral Threat Assessment
Threat assessment orientation based on the idea that the subject will exhibit identifiable behaviors indicating their intent to commit an act of targeted violence
Behaviors of Concern
Observable, identifiable behaviors that an individual exhibits while they are progressing on the pathway to violence
Black Swan Event
An event that is rare, predictable only in retrospect, with extreme impact
Meloy 2011, Talib 2007
Breach
Situation where usual security measures have been circumvented
Calhoun & Weston 2003
Bunkers
Linked to “Bunker Mentality,” in which an individual becomes defensive and surrounded by fortifications (real and virtual) to keep information in or detractors out. Can lead to an over or under estimation of risk.
Calhoun & Weston 2012
Case Dynamics
Continuous interaction between what is known and unknown in a particular case, and the evolving assessments used to determine the appropriate protective response at any given point in time.
Calhoun & Weston, 2012
Code of Ethics
Ethical code developed by ATAP outlining appropriate behavior and decision making in TATM
ATAP, 2010
Chain of Custody
Process used to document chronological history of evidence to maintain the security, integrity, and accountability of its handling
CirCon Factors
Circumstances, Content, and Contextual factors related to inappropriate communication or contact
Calhoun & Weston 2003
Civil Action
Orders issued by a court to convince a subject to stop threatening behaviors or stay away from a target, employed as a threat management intervention.
Calhoun & Weston 2003
Cognition
Thinking. Processes in the human mind involved in acquisition, storage, retrieval, and processing of information. People with poor cognition may have difficulty visualizing alternatives to violence and receiving assistance for grievances.
Cognitive Complexity
A person’s ability to perceive nuances or subtle differences. High cognitive complexity involves sensitivity to small changes in task, activity, behavior, or the environment. Sometimes called intuition or street smarts.
Scott, 1962
Communicative Channels
Mediums used to transmit messages. Refers to the ways that information about threatening individuals can be gained by TATM teams.
Calhoun & Weston 2013
Confidentiality
Process of safeguarding sensitive information, usually involving case intelligence or personal information. Sometimes framed as an individual’s right to keep their information private
Content factors
The information contained and conveyed in the words, style, and method of a threat
Contextual Factors
Situational factors. Situation and environment surrounding the subject or the target. Can be personal, organizational, or on a larger scale (economic climate, world news)
Scalora & Bulling 2007
Credible Threat
Threat, direct or veiled, thought to be real and not hypothetical. One test is the ability and intent of the entity posing the threat
De Becker 1997
Criminal Intelligence
Information collected, analyzed, or distributed for use in inhibiting or monitoring criminal activity
Cultural competence
Organizationally, behaviors, attitudes, and politics that make it possible for people to work effectively across cultures. In TATM, knowledge of cultural differences and ability to foresee how they may impact the case
Directly communicated threat
Unambiguous statement of threat to either the target or law enforcement detailing intention to commit an act of targeted violence
Meloy 2011
Domino Effect
In TATM, describes the tendency for the loss of one inhibitor to affect other aspects of a subject’s life and create a downward spiral
Calhoun & Weston 2012
Duty to Warn/Protect
Legal directive to MHPs in most states with a knowledge of possible act of harm directed at a third party, required to act reasonable to protect the individual from the threat. Stems from Tarasoff vs Regents of the University of CA
Empathy
Being able to recognize and feel what another is feeling, usually in a therapeutic context. Used to build rapport with a target or subject.
Energy burst
Part of the Pathway to Violence. Pre-attack increase in intensity (frequency or duration) or variety of other warning behaviors, signaling an attack is imminent
Meloy 2011
Evidence Collection
Process of gathering, maintaining, and preserving evidence for use in investigation and prosecution
Evidence Preservation
Ensuring evidence is collected and maintained in a proper manner which will preserve its forensic value
Environmental Influences
The sum of background factors affecting the situation of both the subject and the target. This includes organizational or cultural factors that impact tolerance or reporting of behaviors on the pathway to violence.
Extremist Violence
Violent action for which the impetus of the attack is born out of an ideological system, usually intended to enact some change or disrupt activities deemed unacceptable by followers of the ideology
Gerwehr & Hubbard 2007
Fact Finding
Process of aquiring information and evidence to support accurate and complete assessment of risks and the best way to defuse them
Calhoun and Weston, 2009
FERPA
Family Education Rights and Privacy Act
Federal law that governs the gathering, maintenance, and accessibility of educational records. Schools need written permission from the student to release educational records to anyone other than the student. Schools may disclose records without consent to certain parties under certain conditions e.g., complying with a judicial order or subpoena, health and safety emergencies, and pursuant to specific State law
Final Act Behavior
Pre-breach preparations made by the person(s) posing a threat right before the threat is carried out.
Calhoun & Weston 2009
Fixation
Extreme preoccupation with something. Can be adaptive in the form of love or loyalty, but can cross into pathology when it involves a grievance, personal cause, or public figure
Meloy 2011
Grievance
The cause of someone’s distress or reason for complaint/resentment; in TATM takes on additional meaning to include a highly personal meaning for the subject, often fueling their feeling of being wronged and translating into behaviors related to a sense of mission, destiny, loss, or desire for revenge
Calhoun & Weston 2003
HIPAA
Health Insurance Portability and Accountability Act
Required covered entities to protect individuals’ health records and other identifiable health information. Permits use and disclosure of protected health information for national priority purposes to law enforcement individuals under specific circumstances. Disclosure must be made to someone they believe can prevent or lessen a threat or to LE to identify or apprehend an escapee or violent criminal
Howlers
AKA Barkers
Individuals who, though they have inappropriate, bizarre, or threatening contact with the target, never intend on following a path to violence
Calhoun & Weston 2003, 2009
Binder Howlers
Threaten to facilitate a personal relationship with the target
Celebrity-seeking Howlers
Threaten individuals because of their high public profile
Controller Howlers
Threaten as a means of control over the target, usually a partner or family member
Copycat Howlers
Threaten as a reaction to other threats or reports of violence
Crusader Howlers
Threaten as a means to further a personal cause
Deluded Howlers
Threaten as a result of a delusional relationship or potential relationship with the target
Delusional Howlers
Individuals for him delusional content plays a direct role in their role
Dirty-Trickster Howlers
Threaten in order to implicate a third party as the perpetrator of the threats
Habitual Howlers
Make threats on a continual basis, much like a hobby
Impersonal Howlers
Threaten someone they do not know
Intimidator Howlers
Threaten as a way of intimidating the target, who is typically a member of one of their social circles
Maintainer Howlers
Threaten as an attempt to continue a relationship which the target wishes to end
Personal Howlers
Individuals who threaten someone they know
Seeker Howlers
Individuals who threaten as a means to establish an intimate relationship with the target, even when the target has repeatedly rebuffed them
Self-Defender Howlers
Individuals who threaten as a defensive reaction to a perceived threat or attack from the target
Sinister Howlers
Individuals who threaten in order to scare the target
Human on Human Violence
Deliberate actions taken by a human against another human with the intention of causing harm
Hunters (Biters)
Individuals who intend to follow a path toward violence and behave in ways to further that goal
Calhoun & Weston 2003, 2009
Ideation
Entertaining ideas specific to the utility and acceptability of violence as a means to address the subject’s particulate grievance
Calhoun & Weston 2003
Identification
Thoughts of the necessity and utility of violence by a subject that are made evident through behaviors like researching previous attackers and collecting, practicing, and fantasizing about weapons
Meloy 2011
Impromptu Violence
Act of spontaneous violence often sparked by situational or contextual triggers
Calhoun & Weston 2003, 2009
Inappropriate Communication/Contact
Contact or communication with the target that is unwanted and intended by the subject to further the motives behind the threatening behavior. May be perceived by the target as intimidation, harassment, threatening, or out of context
Calhoun & Weston 2009
Information Analysis
Careful consideration of converging evidence in a case to ascertain the level of threat posed and progress toward violence
Information Gathering
Process of obtaining information from all available sources to inform the analysis and decision making in threat assessment
Fein & Vossekuil 1998
Information Sharing
Facilitation of the flow of information among entities responsible for a case so that all parties have access to current, relevant information on which to base decision making
DoD 2007
Information Silos
Information not shared across disciplines or agencies is referred to as being in a “silo.” Also refers to information or knowledge that is kept separate, tightly controlled and not shared. When information about a threat or potentially threatening situation is not shared appropriately it can inhibit attempts to assess or manage it
Calhoun & Weston 2012
Inhibitors
Anything that serves to decrease the likelihood that a subject’s behavior will escalate to an act of targeted violence; sometimes referred to as buffers
Calhoun & Weston 2003
Insider Threat
An individual with access to a facility or organization who uses that access to disrupt or cause harm to the organization or others involved with that organization
Cappelli 2005
Intended Violence
Violent acts which meet the following criteria: intent to commit the act, selecting an attack mode that ensures injury, death, or property damage, and a motive that does not profit the attacker
Calhoun & Weston 2003
Interrogation
Purposeful questioning of a subject to obtain accurate, useful, and timely information relevant to an investigation
Boetig & Bellmer 2008
Intervention
An action or process that has the effect of modifying behavior, thinking, or emotions. In TATM, the action taken in the implementation of a threat management strategy
Calhoun & Weston 2003
Intervention/Inhibitor Dichotomy
Disciplinary actions toward a subject are often required in TATM to ensure a target’s safety, however, confrontational interventions can also negatively affect subject’s well-being. The relationship between the subject’s well-being can be described as a dichotomy in some situations, because each impacts the other and often suggest different threat management decisions.
Calhoun & Weston 2012
Intervention Synergy
The Case Dynamic intensified by the stimulus of what the threat manager or target does or does not do in response to the threat situations
Calhoun & Weston 2012
Intervention Vectors
Similar in concept to intervention strategies, it is the range of levels of confrontation with the subject of a threat management case
Calhoun & Weston 2003
Interview Approaches
Strategies to engage a subject in the interview in order to elicit information
Interview Strategy
Plan for the goals and approaches to an interview ie, deciding what information will be sought, how the subject will be redirected, where the interview will take place, etc
Calhoun & Weston 2003
Intimacy
Real or perceived close personal relationship sometimes accompanied by physical or sexual contact
Intimacy Effect
The closer the interpersonal relationship (degree of intimacy) between the threatener (subject) and the threatened (target), the greater the likelihood of threats being carried out. This intimacy is based upon the subject’s perception of the relationship which may be delusional and completely unknown to the target
Calhoun & Weston 2003
Investigation
The active process of seeking out and finding information relevant to a threat assessment case
Investigative Interview
Any verbal interaction between a law enforcement officer and a civilian for which the purpose is gathering information
Boetig & Bellmer 2008
JACA
Justification, Alternatives, Consequences, Ability
This acronym suggests four questions that can help determine level of threat posed by a subject
Justification: Does the person feel justified in using violent means?
Alternatives: Does the subject perceive they have alternatives to rectify their grievance?
Consequences: How salient are the consequences of this activity for the subject?
Ability: Does the subject believe they have the ability to carry out intended violence?
Last Resort
The subject’s decision to end their life can lead to an act of targeted violence as a means of attaining fame or martyrdom in addition to their suicide attempt
Meloy 2011
Leakage
An accidental or gradual escape, in TATM refers to when a subject shares information with a third party that reveals clues related to their thinking, planning, or execution of an act of targeted violence
O’Toole 2000
Liability
Legal responsibility or obligation related to professional actions or inactions
Mental Health Commitment
“Civil Commitment” - legal action that forces an individual into mental health care. Jurisdictions differ in the legal definitions and criteria for commitment, but generally 2 criteria must be met: 1) the person must have a mental disorder, and 2) the mental disorder contributes to dangerousness that the subject exhibits by actions or threats to themselves or others
Mood disorders
Disorders that include prolonged excessive emotion. Symptoms can include clouded judgement along with other symptoms
Depression
Can be a major mental disorder or a short-term, reactive state. Symptoms include sadness, loss of interest/pleasure, sleep disturbance, weight change, psychomotor disturbance, fatigue, feelings of worthlessness, cognitive disturbance, and recurring thoughts of death. Associated with suicide.
Mania
Clinically, mania is a period in which an individual experiences elevated, expanded, or irritable mood and gradiosity, decreased sleep, increase in verbal communication, distractability, increase in activity or psychomotor agitation, and excessive involvement in pleasurable activities
Personality Disorders
Characterized by unhealthy patterns or thinking and behavior. There are several types, most concerning in TATM is borderline, narcissistic, and paranoid
Borderline Personality Disorder
Often characterized by desperate attempts to avoid abandonment, a pattern of frequent unstable relationships, unstable self-image, impulsive behavior across multiple domains
Narcissistic Personality Disorder
Clinically characterized as having a grandiose sense of importance, a belief in being special or unique, fantasies of excessive intelligence, power, beauty, etc, a sense of entitlement, exploitative of those around them, need for admiration, arrogance, envious of others, lacking in empathy and superior attitude/behavior
Paranoid Personality Disorder
Unwarranted suspicion that others are harming them in some way, questioning of loyalty of those around them, bearing of grudges, reluctance to trust or confide in others for fear of exploitation and perceiving of threats or sleights when none are present
Thought Disorder
Mental disorders that include a variety of symptoms related to a disruption in the ability to communicate or think clearly. Delusion and Hallucination are of key concern in TATM
Delusion
Incorrect belief that is caused by thought disturbance, can be of a number of different types including grandiose, jealous, persecutory, somatic, and erotomanic
Hallucination
Any sensory experience that is perceived by someone to be occurring externally for which there is no stimulus present. These can take the form of any perceptual experience from any sense.
Active Monitoring
Threat management interventions that are dynamic and involve real time observation of a subject’s behavior and/or movement through means such as surveillance
Passive Monitoring
Threat management interventions that involve the use of non-invasive methods of tracking subject’s behavior, such as third party reports on conduct
Multidisciplinary Team
A group of professionals from different disciplines assembled to provide their perspectives and expertise in the fulfillment of a function such as TATM
Mypoic Management
Style of management that focuses on short-term goals with immediate payoffs at the expense of strategies with superior but distant payoffs
Mizik 2010, Calhoun & Weston 2012
Novel Aggression
New acts of violence committed by the subject unrelated to their planned act of targeted violence
Opportunistic Violence
Acts of violence involving general or non-specific slection of victim
Calhoun & Weston 2003
Overt Threat
Threat of a direct nature, describing a future possible act against the target
O’Toole 2000
Pathway to Violence
Series of sequential steps which indicate that an individual is progressing towards an act of targeted violence
Calhou & Weston 2003
Fein & Vossekuil
Physical Security
Sum of the physical protective measures designed to detect, mitigate, or eliminate a threat
Predatory Violence
An act that is planned by the attacker and does not involve reactive emotional components or an imminent threat to the attacker. Sometimes referred to as instrumental, premeditated, proactive, or cold-blooded
Preparation
Behaviors associated with this include acquiring weapons, assembling equipment, arranging transportation, observing significant dates, rehearsing, conducting final act behaviors, or costuming
Protective Fact Finding
Process of gathering detailed information surrounding an inappropriate communication or contact, including background on the subject, current behaviors, links to the target, and triggers for the communication - this information is used to create safety plans for the target
Calhoun & Weston 2006
Proportionate Responses
Strategies that employ measures comparable to the level of risk presented by the subject
Gardam 1993, Calhoun & Weston 2003
Psychopathy
Condition in which a specific combination of personality and behavioral factors exist. These factors include a superficiality and charming aspect, unreliability, lack of remorse, insight or affective reaction, dysfunction in interpersonal relationships, anti-social and dangerous/risky behavior and lack of life planning
Meloy 2001
Radicalization
Conversion of follower of a legitimate belief system to an extremist ideology based on that system, often with the intent of using them to commit or support a future act of violence
Silber & Bhatt 2007
Rapport Building
Establishing a sense of connection between the interviewer and interviewee to facilitate communication and information sharing
Keats 1993
Redirection
Technique of refocusing the subject’s attention away from the target and toward another person, organization, or activity
Calhoun & Weston 2003
Referral
Process of sending an individual to another professional with the proper expertise to address the particular situation
Research and Planning
Seeking information about a target to facilitate an attack. Can include surveillance of the target, internet searches, testing security around the target, researching methods of attack
Calhoun & Weston 2003
Risk Assessment
A process through which options for decreasing risk are considered along with the potential outcomes associated with their implementation, both positive and negative
Haimes 2004
Scope of Practice
Recognizing the limits of knowledge, experience and capabilities one possesses and only performing functions with the boundaries of professional training and duties
Stalking
A cluster of behaviors including unwanted communication, approach, or other contact, usually intended to threaten, harass, coerce or intimidate the target into meeting the demands of the perpetrator.
Subject Interview
A threat management intervention that involves direct contact with the subject and may or may not include questioning. The subject interview can have many different purposes including information gathering, refocusing, or redirecting the subject and warning or confronting the subject
Calhoun & Weston 2009
Substance Abuse
A maladaptive pattern of substance use leading to clinically significant impairment or distress as manifested in one+ of the following: failure to fulfill obligations, use of substances in hazardous situations, recurrent substance related legal troubles, or continued use despite frequent interpersonal difficulties related to use. Often has an impact on the subject’s impulse control and may contribute to erosion of inhibitors
Surveillance
Actively but unobtrusively observing a subject to gather information about their activities and whereabouts
Tail Risk
Probabilities of risk at the extreme ends of a normal distribution. Targeted violence has a very low rate of occurrence, however the risk should not be underestimated based on statistical probability that it will or will not happen
Meloy 2011
Take No Further Action At This Time
A deliberate, justified decision to assign a case inactive status
Calhoun & Weston 2009
Target
A person, object, or place that is the aim of an attack. The point of fixation for intended violence
Targeted Violence
Violence incidents involving an identified subject who possesses intent and potential to cause harm to an identifiable target
Terrorism
Act of violence or threats of violence used to further the agenda of the perpetrator while causing fear and psyschological distress
Third Party Control or Monitoring
Using a reliable third party to exercise control over the subject or unobtrusively monitor their behavior
Calhoun & Weston 2009
Threat Assessment
A fact-based method of assessment that focuses on an individual’s patterns of thinking and behavior to determine whether, and to what extent, they are moving toward an attack
Threat/Control Override
A condition in which the individual believes they are not in control of their actions, but is instead being commanded by an outside force
Link & Stueve, 1994
Threat Management
Managing a subject’s behavior through interventions and strategies designs to disrupt or prevent an act of targeted violence
Threat Management Process
Entirety of the steps taken to identify, assess, managing a threat assessment case. This includes developing, implementing, and monitoring a thorough plan unique to each subject and situation that includes protective measures for intended target
Threat Management Strategy
A coordinated plan of direct or indirect interventions with the subject that, based on current information regarding level of threat posed, is designed to defuse the risk in a given situation at a particular point in time
Threat Management Team
A cross functional, multidisciplinary team approach to assist in assessing threat management plans. The team meets regularly, and as needed in crisis situations, to review potential and active threat cases
Threat Manager
The person who has primary responsibility for initiating, investigating, assessing and managing in threat cases. This person should have experience and training in TATM
Triggers
An event or action that initiates a response of some type. In TATM, initiates action on the part of the subject, moving them along the path to violence. Identifying triggers is part of the threat assessment process