Threat Assess Glossary Flashcards

(139 cards)

1
Q

Americans with Disabilities Act

A

1990; established legislation for civil rights of people with disabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Administrative Action

A

Threat management strategy; disciplinary action to manage problem individuals, eg firing, suspension, barring from a location.
Calhoun & Weston 2009

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Affective Violence

A

Impulsive, reactive, or emotional violence. Unplanned act in response to a perceived threat in the immediate environment
Meloy, 2006

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Anchors

A

Factors that provide support or stability to a subject that is struggling, or represent reasons not to engage in targeted violence
De Becker, 1997

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Approach Behavior

A

Type, frequency, and intensity of a subject’s attempts to be physically close to the target. Includes successful and unsuccessful attempts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Arrest

A

Threat management intervention. Act of detaining someone in legal custody. Actual deprivation of liberty can be a physical detention for a short or prolonged period in response to a criminal charge.
Bureau of Justice Statistics 2011

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Attack

A

Carrying out the intended violence against the target
Calhoun & Weston 2003

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Attack Related Behaviors

A

Specific behaviors needed to launch an attack on a target, displayed as steps on the Pathway to Violence
Calhoun & Weston, 2009

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Behavioral Indicator

A

Observable action that provides evidence that may be relevant to a TATM case.
Bulling et Al, 2008

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Behavioral Threat Assessment

A

Threat assessment orientation based on the idea that the subject will exhibit identifiable behaviors indicating their intent to commit an act of targeted violence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Behaviors of Concern

A

Observable, identifiable behaviors that an individual exhibits while they are progressing on the pathway to violence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Black Swan Event

A

An event that is rare, predictable only in retrospect, with extreme impact
Meloy 2011, Talib 2007

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Breach

A

Situation where usual security measures have been circumvented
Calhoun & Weston 2003

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Bunkers

A

Linked to “Bunker Mentality,” in which an individual becomes defensive and surrounded by fortifications (real and virtual) to keep information in or detractors out. Can lead to an over or under estimation of risk.
Calhoun & Weston 2012

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Case Dynamics

A

Continuous interaction between what is known and unknown in a particular case, and the evolving assessments used to determine the appropriate protective response at any given point in time.
Calhoun & Weston, 2012

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Code of Ethics

A

Ethical code developed by ATAP outlining appropriate behavior and decision making in TATM
ATAP, 2010

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Chain of Custody

A

Process used to document chronological history of evidence to maintain the security, integrity, and accountability of its handling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

CirCon Factors

A

Circumstances, Content, and Contextual factors related to inappropriate communication or contact
Calhoun & Weston 2003

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Civil Action

A

Orders issued by a court to convince a subject to stop threatening behaviors or stay away from a target, employed as a threat management intervention.
Calhoun & Weston 2003

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Cognition

A

Thinking. Processes in the human mind involved in acquisition, storage, retrieval, and processing of information. People with poor cognition may have difficulty visualizing alternatives to violence and receiving assistance for grievances.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Cognitive Complexity

A

A person’s ability to perceive nuances or subtle differences. High cognitive complexity involves sensitivity to small changes in task, activity, behavior, or the environment. Sometimes called intuition or street smarts.
Scott, 1962

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Communicative Channels

A

Mediums used to transmit messages. Refers to the ways that information about threatening individuals can be gained by TATM teams.
Calhoun & Weston 2013

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Confidentiality

A

Process of safeguarding sensitive information, usually involving case intelligence or personal information. Sometimes framed as an individual’s right to keep their information private

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Content factors

A

The information contained and conveyed in the words, style, and method of a threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Contextual Factors
Situational factors. Situation and environment surrounding the subject or the target. Can be personal, organizational, or on a larger scale (economic climate, world news) Scalora & Bulling 2007
26
Credible Threat
Threat, direct or veiled, thought to be real and not hypothetical. One test is the ability and intent of the entity posing the threat De Becker 1997
27
Criminal Intelligence
Information collected, analyzed, or distributed for use in inhibiting or monitoring criminal activity
28
Cultural competence
Organizationally, behaviors, attitudes, and politics that make it possible for people to work effectively across cultures. In TATM, knowledge of cultural differences and ability to foresee how they may impact the case
29
Directly communicated threat
Unambiguous statement of threat to either the target or law enforcement detailing intention to commit an act of targeted violence Meloy 2011
30
Domino Effect
In TATM, describes the tendency for the loss of one inhibitor to affect other aspects of a subject’s life and create a downward spiral Calhoun & Weston 2012
31
Duty to Warn/Protect
Legal directive to MHPs in most states with a knowledge of possible act of harm directed at a third party, required to act reasonable to protect the individual from the threat. Stems from Tarasoff vs Regents of the University of CA
32
Empathy
Being able to recognize and feel what another is feeling, usually in a therapeutic context. Used to build rapport with a target or subject.
33
Energy burst
Part of the Pathway to Violence. Pre-attack increase in intensity (frequency or duration) or variety of other warning behaviors, signaling an attack is imminent Meloy 2011
34
Evidence Collection
Process of gathering, maintaining, and preserving evidence for use in investigation and prosecution
35
Evidence Preservation
Ensuring evidence is collected and maintained in a proper manner which will preserve its forensic value
36
Environmental Influences
The sum of background factors affecting the situation of both the subject and the target. This includes organizational or cultural factors that impact tolerance or reporting of behaviors on the pathway to violence.
37
Extremist Violence
Violent action for which the impetus of the attack is born out of an ideological system, usually intended to enact some change or disrupt activities deemed unacceptable by followers of the ideology Gerwehr & Hubbard 2007
38
Fact Finding
Process of aquiring information and evidence to support accurate and complete assessment of risks and the best way to defuse them Calhoun and Weston, 2009
39
FERPA
Family Education Rights and Privacy Act Federal law that governs the gathering, maintenance, and accessibility of educational records. Schools need written permission from the student to release educational records to anyone other than the student. Schools may disclose records without consent to certain parties under certain conditions e.g., complying with a judicial order or subpoena, health and safety emergencies, and pursuant to specific State law
40
Final Act Behavior
Pre-breach preparations made by the person(s) posing a threat right before the threat is carried out. Calhoun & Weston 2009
41
Fixation
Extreme preoccupation with something. Can be adaptive in the form of love or loyalty, but can cross into pathology when it involves a grievance, personal cause, or public figure Meloy 2011
42
Grievance
The cause of someone's distress or reason for complaint/resentment; in TATM takes on additional meaning to include a highly personal meaning for the subject, often fueling their feeling of being wronged and translating into behaviors related to a sense of mission, destiny, loss, or desire for revenge Calhoun & Weston 2003
43
HIPAA
Health Insurance Portability and Accountability Act Required covered entities to protect individuals' health records and other identifiable health information. Permits use and disclosure of protected health information for national priority purposes to law enforcement individuals under specific circumstances. Disclosure must be made to someone they believe can prevent or lessen a threat or to LE to identify or apprehend an escapee or violent criminal
44
Howlers
AKA Barkers Individuals who, though they have inappropriate, bizarre, or threatening contact with the target, never intend on following a path to violence Calhoun & Weston 2003, 2009
45
Binder Howlers
Threaten to facilitate a personal relationship with the target
46
Celebrity-seeking Howlers
Threaten individuals because of their high public profile
47
Controller Howlers
Threaten as a means of control over the target, usually a partner or family member
48
Copycat Howlers
Threaten as a reaction to other threats or reports of violence
49
Crusader Howlers
Threaten as a means to further a personal cause
50
Deluded Howlers
Threaten as a result of a delusional relationship or potential relationship with the target
51
Delusional Howlers
Individuals for him delusional content plays a direct role in their role
52
Dirty-Trickster Howlers
Threaten in order to implicate a third party as the perpetrator of the threats
53
Habitual Howlers
Make threats on a continual basis, much like a hobby
54
Impersonal Howlers
Threaten someone they do not know
55
Intimidator Howlers
Threaten as a way of intimidating the target, who is typically a member of one of their social circles
56
Maintainer Howlers
Threaten as an attempt to continue a relationship which the target wishes to end
57
Personal Howlers
Individuals who threaten someone they know
58
Seeker Howlers
Individuals who threaten as a means to establish an intimate relationship with the target, even when the target has repeatedly rebuffed them
59
Self-Defender Howlers
Individuals who threaten as a defensive reaction to a perceived threat or attack from the target
60
Sinister Howlers
Individuals who threaten in order to scare the target
61
Human on Human Violence
Deliberate actions taken by a human against another human with the intention of causing harm
62
Hunters (Biters)
Individuals who intend to follow a path toward violence and behave in ways to further that goal Calhoun & Weston 2003, 2009
63
Ideation
Entertaining ideas specific to the utility and acceptability of violence as a means to address the subject's particulate grievance Calhoun & Weston 2003
64
Identification
Thoughts of the necessity and utility of violence by a subject that are made evident through behaviors like researching previous attackers and collecting, practicing, and fantasizing about weapons Meloy 2011
65
Impromptu Violence
Act of spontaneous violence often sparked by situational or contextual triggers Calhoun & Weston 2003, 2009
66
Inappropriate Communication/Contact
Contact or communication with the target that is unwanted and intended by the subject to further the motives behind the threatening behavior. May be perceived by the target as intimidation, harassment, threatening, or out of context Calhoun & Weston 2009
67
Information Analysis
Careful consideration of converging evidence in a case to ascertain the level of threat posed and progress toward violence
68
Information Gathering
Process of obtaining information from all available sources to inform the analysis and decision making in threat assessment Fein & Vossekuil 1998
69
Information Sharing
Facilitation of the flow of information among entities responsible for a case so that all parties have access to current, relevant information on which to base decision making DoD 2007
70
Information Silos
Information not shared across disciplines or agencies is referred to as being in a "silo." Also refers to information or knowledge that is kept separate, tightly controlled and not shared. When information about a threat or potentially threatening situation is not shared appropriately it can inhibit attempts to assess or manage it Calhoun & Weston 2012
71
Inhibitors
Anything that serves to decrease the likelihood that a subject's behavior will escalate to an act of targeted violence; sometimes referred to as buffers Calhoun & Weston 2003
72
Insider Threat
An individual with access to a facility or organization who uses that access to disrupt or cause harm to the organization or others involved with that organization Cappelli 2005
73
Intended Violence
Violent acts which meet the following criteria: intent to commit the act, selecting an attack mode that ensures injury, death, or property damage, and a motive that does not profit the attacker Calhoun & Weston 2003
74
Interrogation
Purposeful questioning of a subject to obtain accurate, useful, and timely information relevant to an investigation Boetig & Bellmer 2008
75
Intervention
An action or process that has the effect of modifying behavior, thinking, or emotions. In TATM, the action taken in the implementation of a threat management strategy Calhoun & Weston 2003
76
Intervention/Inhibitor Dichotomy
Disciplinary actions toward a subject are often required in TATM to ensure a target's safety, however, confrontational interventions can also negatively affect subject's well-being. The relationship between the subject's well-being can be described as a dichotomy in some situations, because each impacts the other and often suggest different threat management decisions. Calhoun & Weston 2012
77
Intervention Synergy
The Case Dynamic intensified by the stimulus of what the threat manager or target does or does not do in response to the threat situations Calhoun & Weston 2012
78
Intervention Vectors
Similar in concept to intervention strategies, it is the range of levels of confrontation with the subject of a threat management case Calhoun & Weston 2003
79
Interview Approaches
Strategies to engage a subject in the interview in order to elicit information
80
Interview Strategy
Plan for the goals and approaches to an interview ie, deciding what information will be sought, how the subject will be redirected, where the interview will take place, etc Calhoun & Weston 2003
81
Intimacy
Real or perceived close personal relationship sometimes accompanied by physical or sexual contact
82
Intimacy Effect
The closer the interpersonal relationship (degree of intimacy) between the threatener (subject) and the threatened (target), the greater the likelihood of threats being carried out. This intimacy is based upon the subject's perception of the relationship which may be delusional and completely unknown to the target Calhoun & Weston 2003
83
Investigation
The active process of seeking out and finding information relevant to a threat assessment case
84
Investigative Interview
Any verbal interaction between a law enforcement officer and a civilian for which the purpose is gathering information Boetig & Bellmer 2008
85
JACA
Justification, Alternatives, Consequences, Ability This acronym suggests four questions that can help determine level of threat posed by a subject Justification: Does the person feel justified in using violent means? Alternatives: Does the subject perceive they have alternatives to rectify their grievance? Consequences: How salient are the consequences of this activity for the subject? Ability: Does the subject believe they have the ability to carry out intended violence?
86
Last Resort
The subject's decision to end their life can lead to an act of targeted violence as a means of attaining fame or martyrdom in addition to their suicide attempt Meloy 2011
87
Leakage
An accidental or gradual escape, in TATM refers to when a subject shares information with a third party that reveals clues related to their thinking, planning, or execution of an act of targeted violence O'Toole 2000
88
Liability
Legal responsibility or obligation related to professional actions or inactions
89
Mental Health Commitment
"Civil Commitment" - legal action that forces an individual into mental health care. Jurisdictions differ in the legal definitions and criteria for commitment, but generally 2 criteria must be met: 1) the person must have a mental disorder, and 2) the mental disorder contributes to dangerousness that the subject exhibits by actions or threats to themselves or others
90
Mood disorders
Disorders that include prolonged excessive emotion. Symptoms can include clouded judgement along with other symptoms
91
Depression
Can be a major mental disorder or a short-term, reactive state. Symptoms include sadness, loss of interest/pleasure, sleep disturbance, weight change, psychomotor disturbance, fatigue, feelings of worthlessness, cognitive disturbance, and recurring thoughts of death. Associated with suicide.
92
Mania
Clinically, mania is a period in which an individual experiences elevated, expanded, or irritable mood and gradiosity, decreased sleep, increase in verbal communication, distractability, increase in activity or psychomotor agitation, and excessive involvement in pleasurable activities
93
Personality Disorders
Characterized by unhealthy patterns or thinking and behavior. There are several types, most concerning in TATM is borderline, narcissistic, and paranoid
94
Borderline Personality Disorder
Often characterized by desperate attempts to avoid abandonment, a pattern of frequent unstable relationships, unstable self-image, impulsive behavior across multiple domains
95
Narcissistic Personality Disorder
Clinically characterized as having a grandiose sense of importance, a belief in being special or unique, fantasies of excessive intelligence, power, beauty, etc, a sense of entitlement, exploitative of those around them, need for admiration, arrogance, envious of others, lacking in empathy and superior attitude/behavior
96
Paranoid Personality Disorder
Unwarranted suspicion that others are harming them in some way, questioning of loyalty of those around them, bearing of grudges, reluctance to trust or confide in others for fear of exploitation and perceiving of threats or sleights when none are present
97
Thought Disorder
Mental disorders that include a variety of symptoms related to a disruption in the ability to communicate or think clearly. Delusion and Hallucination are of key concern in TATM
98
Delusion
Incorrect belief that is caused by thought disturbance, can be of a number of different types including grandiose, jealous, persecutory, somatic, and erotomanic
99
Hallucination
Any sensory experience that is perceived by someone to be occurring externally for which there is no stimulus present. These can take the form of any perceptual experience from any sense.
100
Active Monitoring
Threat management interventions that are dynamic and involve real time observation of a subject's behavior and/or movement through means such as surveillance
101
Passive Monitoring
Threat management interventions that involve the use of non-invasive methods of tracking subject's behavior, such as third party reports on conduct
102
Multidisciplinary Team
A group of professionals from different disciplines assembled to provide their perspectives and expertise in the fulfillment of a function such as TATM
103
Mypoic Management
Style of management that focuses on short-term goals with immediate payoffs at the expense of strategies with superior but distant payoffs Mizik 2010, Calhoun & Weston 2012
104
Novel Aggression
New acts of violence committed by the subject unrelated to their planned act of targeted violence
105
Opportunistic Violence
Acts of violence involving general or non-specific slection of victim Calhoun & Weston 2003
106
Overt Threat
Threat of a direct nature, describing a future possible act against the target O'Toole 2000
107
Pathway to Violence
Series of sequential steps which indicate that an individual is progressing towards an act of targeted violence Calhou & Weston 2003 Fein & Vossekuil
108
Physical Security
Sum of the physical protective measures designed to detect, mitigate, or eliminate a threat
109
Predatory Violence
An act that is planned by the attacker and does not involve reactive emotional components or an imminent threat to the attacker. Sometimes referred to as instrumental, premeditated, proactive, or cold-blooded
110
Preparation
Behaviors associated with this include acquiring weapons, assembling equipment, arranging transportation, observing significant dates, rehearsing, conducting final act behaviors, or costuming
111
Protective Fact Finding
Process of gathering detailed information surrounding an inappropriate communication or contact, including background on the subject, current behaviors, links to the target, and triggers for the communication - this information is used to create safety plans for the target Calhoun & Weston 2006
112
Proportionate Responses
Strategies that employ measures comparable to the level of risk presented by the subject Gardam 1993, Calhoun & Weston 2003
113
Psychopathy
Condition in which a specific combination of personality and behavioral factors exist. These factors include a superficiality and charming aspect, unreliability, lack of remorse, insight or affective reaction, dysfunction in interpersonal relationships, anti-social and dangerous/risky behavior and lack of life planning Meloy 2001
114
Radicalization
Conversion of follower of a legitimate belief system to an extremist ideology based on that system, often with the intent of using them to commit or support a future act of violence Silber & Bhatt 2007
115
Rapport Building
Establishing a sense of connection between the interviewer and interviewee to facilitate communication and information sharing Keats 1993
116
Redirection
Technique of refocusing the subject's attention away from the target and toward another person, organization, or activity Calhoun & Weston 2003
117
Referral
Process of sending an individual to another professional with the proper expertise to address the particular situation
118
Research and Planning
Seeking information about a target to facilitate an attack. Can include surveillance of the target, internet searches, testing security around the target, researching methods of attack Calhoun & Weston 2003
119
Risk Assessment
A process through which options for decreasing risk are considered along with the potential outcomes associated with their implementation, both positive and negative Haimes 2004
120
Scope of Practice
Recognizing the limits of knowledge, experience and capabilities one possesses and only performing functions with the boundaries of professional training and duties
121
Stalking
A cluster of behaviors including unwanted communication, approach, or other contact, usually intended to threaten, harass, coerce or intimidate the target into meeting the demands of the perpetrator.
122
Subject Interview
A threat management intervention that involves direct contact with the subject and may or may not include questioning. The subject interview can have many different purposes including information gathering, refocusing, or redirecting the subject and warning or confronting the subject Calhoun & Weston 2009
123
Substance Abuse
A maladaptive pattern of substance use leading to clinically significant impairment or distress as manifested in one+ of the following: failure to fulfill obligations, use of substances in hazardous situations, recurrent substance related legal troubles, or continued use despite frequent interpersonal difficulties related to use. Often has an impact on the subject's impulse control and may contribute to erosion of inhibitors
124
Surveillance
Actively but unobtrusively observing a subject to gather information about their activities and whereabouts
125
Tail Risk
Probabilities of risk at the extreme ends of a normal distribution. Targeted violence has a very low rate of occurrence, however the risk should not be underestimated based on statistical probability that it will or will not happen Meloy 2011
126
Take No Further Action At This Time
A deliberate, justified decision to assign a case inactive status Calhoun & Weston 2009
127
Target
A person, object, or place that is the aim of an attack. The point of fixation for intended violence
128
Targeted Violence
Violence incidents involving an identified subject who possesses intent and potential to cause harm to an identifiable target
129
Terrorism
Act of violence or threats of violence used to further the agenda of the perpetrator while causing fear and psyschological distress
130
Third Party Control or Monitoring
Using a reliable third party to exercise control over the subject or unobtrusively monitor their behavior Calhoun & Weston 2009
131
Threat Assessment
A fact-based method of assessment that focuses on an individual's patterns of thinking and behavior to determine whether, and to what extent, they are moving toward an attack
132
Threat/Control Override
A condition in which the individual believes they are not in control of their actions, but is instead being commanded by an outside force Link & Stueve, 1994
133
Threat Management
Managing a subject's behavior through interventions and strategies designs to disrupt or prevent an act of targeted violence
134
Threat Management Process
Entirety of the steps taken to identify, assess, managing a threat assessment case. This includes developing, implementing, and monitoring a thorough plan unique to each subject and situation that includes protective measures for intended target
135
Threat Management Strategy
A coordinated plan of direct or indirect interventions with the subject that, based on current information regarding level of threat posed, is designed to defuse the risk in a given situation at a particular point in time
136
Threat Management Team
A cross functional, multidisciplinary team approach to assist in assessing threat management plans. The team meets regularly, and as needed in crisis situations, to review potential and active threat cases
137
Threat Manager
The person who has primary responsibility for initiating, investigating, assessing and managing in threat cases. This person should have experience and training in TATM
138
Triggers
An event or action that initiates a response of some type. In TATM, initiates action on the part of the subject, moving them along the path to violence. Identifying triggers is part of the threat assessment process
139