Threat Assessment Glossary Flashcards
Americans with Disabilities Act (ADA)
The Americans with Disabilities Act of 1990 established comprehensive legislation covering civil rights for people with disabilities. It is published in the United States Code and is often referred to by the titles and chapters of the code that contain the law. More information about the ADA is available at http://www.ada.gov
Administrative Action
A threat management intervention involving the use of disciplinary action within an organization or structure to manage problem individuals (e.g., firing, withholding services, suspension, barring from a particular location or activity; Calhoun & Weston, 2009).
Affective Violence
Affective violence, sometimes called impulsive, emotional or reactive violence, is an unplanned act of violence that occurs in response to a perceived threat in the immediate environment (Meloy, 2006).
Anchors
Anchors are factors that provide stability – in threat assessment, anchors could be used to provide support or stability to a subject who is struggling or represent reasons that an individual would not engage in targeted violence (de Becker, 1997).
Approach Behavior
This refers to the type, frequency and intensity of the subject’s attempts to be physically proximal (close) to the target. Approach behavior includes successful and unsuccessful attempts to approach the target.
Arrest
An arrest can be a threat management intervention. It is the act of detaining someone in legal custody, usually be a law enforcement officer. The actual deprivation of a person’s liberty can be physical detention for a short or prolonged period of time in response to a criminal charge. (Bureau of Justice Statistics, 2011)
Attack
Carrying out (or attempting to carry out) the intended violence against the target (Calhoun & Weston, 2003).
Attack Related Behaviors
Specific behaviors that are needed in order to launch a physical assault on a target – These behaviors are displayed as steps on the pathway to violence (Calhoun & Weston, 2009).
Behavioral Indicator
An observable action that provides evidence of an underlying element that may be relevant to a threat assessment and management case – for example, a subject’s actions (e.g., talking to him/herself) might lead the threat assessor to believe the person has a mental health disorder that influences the level of threat posed by that individual (Bulling et al., 2008).
Behavioral Threat Assessment
Threat assessment orientation based on the idea that the subject will exhibit identifiable behaviors indicating the intent to commit an act of targeted of violence.
Behaviors of Concern
Behaviors of concern are the observable, identifiable behaviors that an individual exhibits while they are progressing on the pathway of violence.
Black Swan Event
An event that is rare, predictable only in retrospect, with extreme impacts (Meloy, 2011; Talib, 2007).
Breach
The word breach is commonly used when referring to a gap or break. In threat assessment contexts, this usually refers to a situation where usual security measures have been circumvented (Calhoun & Weston, 2003).
Bunkers
The use of the term “bunker” is linked to the common use of the phrase “bunker mentality” in which an individual or group becomes defensive and surrounded by fortifications (real and virtual) to keep information in or detractors out. Adopting a bunker mentality in threat assessment can lead to under or over estimation of risk (Calhoun & Weston, 2012).
Case Dynamics
The continuous interaction between what is known and unknown in a particular case, and the evolving assessments used to determine the appropriate protective response at any given point in time (Calhoun & Weston, 2012).
Code of Ethics
Refers to the ethical code developed by the Association of Threat Assessment Professionals outlining appropriate behavior and decision making in threat assessment and management (Association of Threat Assessment Professionals, 2010).
Chain of Custody
This is a process used to document the chronological history of evidence to maintain the security, integrity and accountability of its handling.
CirCon Factors
“CirCon” is an acronym for “circumstances, content and contextual factors” related to a subject’s inappropriate communication or contact (Calhoun & Weston, 2003).
Civil Action
Civil actions are orders issued by a court to convince the subject to stop threatening behaviors or stay away from the target, periodically employed as a threat management intervention (e.g., restraining, stay away, protective orders) (Calhoun & Weston, 2009).
Cognition
The simplest definition of cognition is thinking; in more complex terms it is the processes in the human mind involved in acquisition, storage, retrieval and processing of information. Individuals with poor cognition may have difficulty visualizing alternatives to violence and receiving assistance for grievances.
Cognitive Complexity
This is a psychological construct that refers to a person’s ability to perceive nuances or subtle differences. A person who has high cognitive complexity is sensitive to small changes in a task, activity, behavior or the environment while someone with low cognitive complexity is less likely to detect these differences. Sometimes this is referred to as intuition or street smarts. A person may have high cognitive complexity but little formal education (Scott, 1962).
Communication Channels
The mediums used to transmit messages are referred to as “communication channels.” Threat assessment uses this phrase when referring to the ways that information about threatening individuals can be gained by threat assessment teams (Calhoun & Weston, 2012).
Confidentiality
Confidentiality refers to the process of safeguarding sensitive information, usually involving case intelligence or personal information. Confidentiality is sometimes framed as an individual’s right to have their personal information kept private.
Content Factors
The information contained and conveyed in the words, style and method of a threat.
Contextual Factors
Sometimes referred to as situational factors. In threat assessment the context refers to the situation and environment surrounding the subject or the target. These can be personal, organizational or on a larger scale (e.g., economic climate, world news, etc.; Scalora & Bulling, 2007).
Credible Threat
A threat, direct or veiled, that is thought to be real, not just hypothetical. One test of whether a threat is credible is the ability and intent of the entity posing the threat (de Becker, 1997).
Criminal Intelligence
This phrase refers to any information which is collected, analyzed or distributed for use in inhibiting or monitoring criminal activity (International Association of Chiefs of Police National Law Enforcement Policy Center, 1998).
Cultural Competence
Organizationally, this is a set of behaviors, attitudes and policies that make it possible for people to work effectively across cultures. In threat assessment, it is having knowledge of culture differences and the ability to foresee how those differences may impact the investigation, analysis, or management of a case (US Department of Health & Human Service, 2005).
Directly Communicated Threat
This is an unambiguous statement of threat to either the target or law enforcement detailing intention to commit an act of targeted violence (Meloy, 2011).
Domino Effect
This phrase is used generally when referring to the cumulative effect an event can have when it initiates a succession of similar events. In threat assessment and management it is often used to describe the tendency for the loss of one inhibitor to affect other aspects of a subject’s life and create a downward spiral where other inhibitors are compromised as well (Calhoun & Weston, 2012).
Duty to Warn/Protect
Legal directive to mental health professionals in most states with knowledge of a possible act of harm by someone in their care directed at a third party that they are required to act reasonably to protect the potential victim from the threat. This stems from a US Supreme Court decision in the 1970’s (Tarasoff v. Regents of the University of California) that established the professional’s duty to provide warning as a way to protect the third party from danger.
Empathy
In mental health empathy typically means being able to recognize and feel what another is feeling, usually in a therapeutic context. In threat assessment empathy is often used as a way to build rapport with the target or subject.
Energy Burst
A subject may have what is termed an “energy burst” as part of the pathway to violence. This is a pre‐attack increase in intensity (frequency and/or duration) or variety of warning behaviors, usually indicating an attack is imminent (Meloy, 2011).
Evidence Collection
The process of gathering, maintaining and preserving evidence for use in investigation and prosecution.
Environmental Influences
The sum of background factors (peer group, security, access to weapons, etc.) affecting the situation of both the subject and the target. This includes organizational or cultural factors that impact tolerance or reporting of behaviors on the pathway to violence.
Extremist Violence
Violent action for which the impetus of the attack is born out of an ideological system, usually intended to enact some change or disrupt activities deemed unacceptable by followers of that ideology (Gerwehr & Hubbard, 2007).
Fact Finding
Process of acquiring information and evidence (about the target, the subject, contacts, communication, past and present behavior, context) to support accurate and complete assessment of risks and the best way to defuse them (Calhoun & Weston, 2009).
FERPA
Acronym for “Family Education Rights and Privacy Act” – This federal law (20 U.S.C. § 1232g; 34 CFR Part 99) governs the gathering, maintenance and accessibility of educational records. Schools need written permission from the student to release educational records to anyone other than the student. Schools may disclose records, without consent, to certain parties under specific conditions including: complying with a judicial order or lawfully issued subpoena; to appropriate officials in cases of health and safety emergencies; and to State and local authorities, within a juvenile justice system, pursuant to specific State law.
Final act behavior
Pre‐breach preparations made by the person(s) posing a threat right before the threat is carried out. This can include acts like disseminating reasons for the attack or executing a last will and testament (Calhoun & Weston, 2009).
Fixation
A fixation is generally an extreme preoccupation with something, be it another person, an activity or an idea. It can be adaptive in the form of romantic love, parental love or loyalty, but can also cross into pathology when it involves a grievance, personal cause or a public figure (Meloy, 2011).
Grievance
A grievance is generally defined as the cause of someone’s distress or reason for complaint/resentment; in threat assessment contexts it takes on additional meaning to include a highly personal meaning for the subject, often fueling their feeling of being wronged and translating into behaviors related to a sense of mission, destiny, loss or desire for revenge (Calhoun & Weston, 2003).
HIPAA
Acronym for Health Insurance Portability and Accountability Act – The HIPAA Privacy Rule requires covered entities to protect individuals’ health records and other identifiable health information. Of primary importance to threat assessment professionals is the security, accountability and confidentiality of medical records covered by this act. The Privacy Rule permits use and disclosure of protected health information, without an individual’s authorization or permission, for national priority purposes to law enforcement officials under specific circumstances (See 45 C.F.R. § 164.512). Disclosure must also be made to someone they believe can prevent or lessen a threat or to law enforcement if the information is needed to identify or apprehend an escapee or violent criminal.
Howlers (AKA Barkers)
Howlers are individual who, though they have inappropriate, bizarre or threatening contact with the target, never intend on following a path to violence (Calhoun & Weston, 2003; Calhoun & Weston, 2009).
Howler Types: (Calhoun & Weston, 2009).
o Binder Howlers
o Celebrity‐seeking Howlers
o Controller Howlers
o Copycat Howlers
o Crusader Howlers
o Deluded Howlers
o Delusional Howlers
o Dirty‐trickster Howlers
o Habitual Howlers
o Impersonal Howlers
o Intimidator Howlers
o Maintainer Howlers
o Personal Howlers
o Seeker Howlers
o Self‐defender Howlers
o Sinister Howlers
Individuals who threaten to facilitate a personal relationship with the target.
o Binder Howlers
Individuals who are motivated to threaten individuals because of their high public profile.
o Celebrity‐seeking Howlers
Individuals who threaten as means of control over the target, usually a partner or family member.
o Controller Howlers
Individuals who threaten as a reaction to other threats or reports of violence.
o Copycat Howlers
Individuals who threaten as a means to further a personal cause.
o Crusader Howlers
Individuals who threaten as a result of delusional relationship (or potential relationship) with the target.
o Deluded Howlers
Individuals for whom delusional content plays a direct role in their threats
o Delusional Howlers
Individuals who threaten in order to implicate a third party as the perpetrator of the threats.
o Dirty‐trickster Howlers
Individuals who make threats on a continual basis, much like a hobby.
o Habitual Howlers
Individuals who threaten someone they do not know.
o Impersonal Howlers
Individuals who threaten as a way of intimidating the target who is typically a member of one of their social circles (e.g. supervisor, coworker, teacher, classmate).
o Intimidator Howlers
Individuals who threaten as an attempt to continue a relationship which the target wishes to end.
o Maintainer Howlers
Individuals who threaten someone they know.
o Personal Howlers
Individuals who threaten as a means to establish an intimate relationship with the target, even when the target has repeatedly rebuffed them.
o Seeker Howlers
Individuals who threaten as a defensive reaction to a perceived threat or attack from the target.
o Self‐defender Howlers
Individuals who threaten in order to scare the target.
o Sinister Howlers
Human on human violence
Deliberate actions taken by a human against another human with the intention of causing harm.
Hunters (AKA Biters)
Hunters are individuals who intend to follow a path toward violence and behave in ways to further that goal (Calhoun & Weston, 2003; Calhoun & Weston, 2009).
Ideation
The Merriam‐Webster dictionary defines ideation as “the capacity for or the act of forming or entertaining ideas.” In threat assessment contexts, this term takes on the added meaning of entertaining ideas specific to the utility and acceptability of violence as a means to address the subject’s particular grievance (Calhoun & Weston, 2003).