Threat Assess Glossary Flashcards
(139 cards)
Americans with Disabilities Act
1990; established legislation for civil rights of people with disabilities.
Administrative Action
Threat management strategy; disciplinary action to manage problem individuals, eg firing, suspension, barring from a location.
Calhoun & Weston 2009
Affective Violence
Impulsive, reactive, or emotional violence. Unplanned act in response to a perceived threat in the immediate environment
Meloy, 2006
Anchors
Factors that provide support or stability to a subject that is struggling, or represent reasons not to engage in targeted violence
De Becker, 1997
Approach Behavior
Type, frequency, and intensity of a subject’s attempts to be physically close to the target. Includes successful and unsuccessful attempts.
Arrest
Threat management intervention. Act of detaining someone in legal custody. Actual deprivation of liberty can be a physical detention for a short or prolonged period in response to a criminal charge.
Bureau of Justice Statistics 2011
Attack
Carrying out the intended violence against the target
Calhoun & Weston 2003
Attack Related Behaviors
Specific behaviors needed to launch an attack on a target, displayed as steps on the Pathway to Violence
Calhoun & Weston, 2009
Behavioral Indicator
Observable action that provides evidence that may be relevant to a TATM case.
Bulling et Al, 2008
Behavioral Threat Assessment
Threat assessment orientation based on the idea that the subject will exhibit identifiable behaviors indicating their intent to commit an act of targeted violence
Behaviors of Concern
Observable, identifiable behaviors that an individual exhibits while they are progressing on the pathway to violence
Black Swan Event
An event that is rare, predictable only in retrospect, with extreme impact
Meloy 2011, Talib 2007
Breach
Situation where usual security measures have been circumvented
Calhoun & Weston 2003
Bunkers
Linked to “Bunker Mentality,” in which an individual becomes defensive and surrounded by fortifications (real and virtual) to keep information in or detractors out. Can lead to an over or under estimation of risk.
Calhoun & Weston 2012
Case Dynamics
Continuous interaction between what is known and unknown in a particular case, and the evolving assessments used to determine the appropriate protective response at any given point in time.
Calhoun & Weston, 2012
Code of Ethics
Ethical code developed by ATAP outlining appropriate behavior and decision making in TATM
ATAP, 2010
Chain of Custody
Process used to document chronological history of evidence to maintain the security, integrity, and accountability of its handling
CirCon Factors
Circumstances, Content, and Contextual factors related to inappropriate communication or contact
Calhoun & Weston 2003
Civil Action
Orders issued by a court to convince a subject to stop threatening behaviors or stay away from a target, employed as a threat management intervention.
Calhoun & Weston 2003
Cognition
Thinking. Processes in the human mind involved in acquisition, storage, retrieval, and processing of information. People with poor cognition may have difficulty visualizing alternatives to violence and receiving assistance for grievances.
Cognitive Complexity
A person’s ability to perceive nuances or subtle differences. High cognitive complexity involves sensitivity to small changes in task, activity, behavior, or the environment. Sometimes called intuition or street smarts.
Scott, 1962
Communicative Channels
Mediums used to transmit messages. Refers to the ways that information about threatening individuals can be gained by TATM teams.
Calhoun & Weston 2013
Confidentiality
Process of safeguarding sensitive information, usually involving case intelligence or personal information. Sometimes framed as an individual’s right to keep their information private
Content factors
The information contained and conveyed in the words, style, and method of a threat