1 / 72

BASIC THREAT & RISK ASSESSMENT OVERVIEW LEVEL TWO – ERASE STRATEGY

BASIC THREAT & RISK ASSESSMENT OVERVIEW LEVEL TWO – ERASE STRATEGY. ACKNOWLEDGEMENTS.

Download Presentation

BASIC THREAT & RISK ASSESSMENT OVERVIEW LEVEL TWO – ERASE STRATEGY

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. BASIC THREAT & RISK ASSESSMENT OVERVIEW LEVEL TWO – ERASE STRATEGY

  2. ACKNOWLEDGEMENTS The Canadian Centre For Threat Assessment & Trauma Response and Safer Schools Together is dedicated to ensuring safe and caring school communities and would like to acknowledge the BC Ministry of Education for its commitment in preventing bullying and ensuring safe and caring school communities by initiating the ERASE Bullying strategy (Expect Respect and a Safe Education).

  3. HISTORICAL OVERVIEW OF THREAT ASSESSMENT IN CANADA The Taber Response Project Photograph by: Calgary Herald Archive • The Taber School shooting occurred on April 28, 1999, just eight days after the Columbine School shooting in Colorado. Trauma response initiatives, headed by J. Kevin Cameron, Executive Director of CCTATR, led to the Alberta Government identifying the need to further examine incidents of this scope. Mr. Cameron was seconded by the Alberta Government and so began his investigation into not only trauma but eventually threat assessment. Consultations with U.S. sites that experienced school shootings • The findings from these consultations shaped the field of Violence Threat/Risk Assessment and Trauma Response from that point forward.

  4. EVOLUTION/DEVELOPMENT OF VIOLENCE THREAT/RISK ASSESSMENT • The field of Violence Threat/Risk Assessment is a relatively new field. • As with any new field, there is an evolutionary process that it experiences. • We are now in the 9th edition of the Protocol.The British Columbia Ministry of Education’s adaptation of the Level Two Training Guide has become the 5th edition of the training manual.

  5. Threat Assessment has been referred to as the “missing link” in violence prevention. It is the process of deliberately trying to connect the dots or data that paints the picture that someone is moving on a pathway towards serious violence before the violent act occurs.All threats must be taken seriously and assessed in a timely manner.

  6. VTRA’s four basic steps include:  • Identifying worrisome or threatening behaviour. • Using a multi-disciplinary team to conduct a • violence threat risk assessment. • Determining if a threat maker actually poses a risk. • Intervening appropriately.

  7. UNI-DIMENSIONAL ASSESSMENTS - are the plague of the violence threat/risk assessment world. • They can occur when one person of any professional background such as mental health, policing, or school administration chooses to interview the individual in question without validating the interview data, and without investigating history regarding past violence, suicide attempts, or other factors. • It is important to avoid uni-dimensional assessments because they do not provide an accurate and comprehensive understanding of the potential level of risk.

  8. MULTI-DISCIPLINARY ASSESSMENTS - are required to determine accurate levels of risk and appropriate intervention. • A multi-disciplinary assessment brings together groups of professionals from diverse disciplines to provide comprehensive assessment data and contextual variables. This allows you to determine an accurate level of risk and appropriate intervention strategy.

  9. APPLICATION OF VTRA *Every school should have a Stage I VTRA team and every school district should have a district-wide team or personnel who can parachute in on school cases when extra support is required. *The district VTRA team leader (principal or designate) must be notified of all activations of the Stage I or II protocol. *The team is focused on collecting readily available data through a locker check, police check, and student file/record review that indicates the threat maker has “engaged in behaviour consistent with their threat. • COMMITTEE AND TEAMS • VTRA Committees and Protocol Development • Step 1: • A multi-disciplinary VTRA Committee must be developed to follow the guidelines set out in the district/regional protocol. VTRA Committees should be minimally represented by the following and/or their designate. • Step 2: VTRA Team Development: •  a) Stage I VTRA Teams (sometimes referred to as the school/police team) • b) School District/Division level VTRA team • c) Stage II VTRA teams

  10. APPLICATION OF VTRA Stage I - VTRA Team Leadership and Team Activation Once the Stage I team is activated, leadership is shared and the team collaboratively decides initial steps that need to be taken for immediate data collection and any immediate risk-reducing interventions. • School principals are responsible for disciplinary measures that may need to be taken to ensure the overall safety of students and staff. • Police are responsible for determining if a parallel investigation focusing on the criminal aspect of the case will go forward while addressing public safety concerns.

  11. Stage 1 - Data Collection and Immediate Risk-Reducing Intervention Stage I VTRA Teams must include the following three professionals and others as the team or committee deems appropriate on a continuous or case-by-case basis. • School Principal and/or designate • Clinician (e.g. psychologist, counsellor, social worker) • Police of Jurisdiction • Stage II (consultation and/or information sharing phase) • Other

  12. LEVELS OF RISK • Lowcategorization of risk does not imply no risk, but indicates the individualis at little risk for violence, and monitoring of the matter may be appropriate. • Mediumcategorization of risk indicates the individualis at an elevated risk for violence, and the measures currently in place or further measures, including monitoring, are required in an effort to manage the individual’s future risk. • Highcategorization of risk indicates the individualis at high or imminent risk for violence, and immediate intervention is required to prevent an act of violence from occurring.

  13. Stage II - Comprehensive Risk Evaluation Stage II involves a multi-disciplinary risk evaluation which often includes some or all of the following: • police-based threat-assessment units • psychology, psychiatry, mental health, child protection, youth probation, and others Stage II is focused on further data collection beyond the initial data set obtained by the Stage I Team and as such, the Stage II members are charged, in collaboration with the Stage I Team, with the formal risk assessment and evaluation which may include the use of tests and measures.

  14. RISK ASSESSMENT Note: After the initial level of risk is assessed and immediate risk-reducing interventions have occurred, a further risk assessment may be required. • Risk Assessment is the process of determining if an individual may pose a further risk to a known or unknown target or targets in an unknown period of time. • a more comprehensive evaluation of all risk-reducing and risk-enhancing factors affecting the student. It determines long-term interventions and treatment goals. • conducted by professionals who have completed advanced threat/risk assessments.

  15. Stage III -Longer Term Treatment Planning • Stage III requires reconvening all the Stage I and II team members who are involved in the case for the development and implementation of a comprehensive multi-disciplinary intervention, and to determine a follow-up date for case review. • The agency that will take the lead at this point is the one that is the most appropriate at the time: every case on its own merit! • In complex cases, one agency may take the initial lead, but after stabilization another may assume the leadership/coordinating role.

  16. DETERMINING WHEN TO ACTIVATE A VIOLENCE THREAT/RISKASSESSMENT IMMEDIATE RISK SITUATIONS These situations include armed intruders inside the building or on the periphery who pose a risk to some target or targets, or active shooter and attacker scenarios. When immediate risk is identified, the principal will: • contact the police and take steps to ensure the safety of all school members (e.g. perimeter lockdown, full-scale lockdown, and other protective measures). In these cases, a threat is posed and the matter is one of immediate police intervention and protective school response.

  17. AUTOMATIC STAGE I VTRA ACTIVATION FOR: • Serious violence or violence with intent to harm or kill • Verbal/written threats to kill others which are “clear, direct, and plausible” • Internet website / threats to kill others • Bullying - verbal, physical, cyber, and social via repeated patterns of behaviour and victimization

  18. AUTOMATIC STAGE I VTRA ACTIVATION FOR: • Possession of weapons including replicas • Bomb threats and making and/or detonating explosive devices • Fire setting • Sexual intimidation or assault • Gang-related intimidation and violence

  19. Note: Criminal Charges • In cases of violence or criminal acts, the police officer on the V-TRA team has “first call” as to whether charges will be laid. • If the officer chooses not to proceed with criminal charges, Stage I will continue. • If charges are laid, the officer of the V-TRA team often will refer it to another member so that they may stay on the team and participate in the Stage I process. • An investigation does not prevent the remaining members from continuing the Stage I process. • Collaboration will continue among the members, not withstanding each member has his/her own “jurisdiction”.

  20. WORRISOME BEHAVIOURS Those that cause concern for members of the school community that may indicate a student is moving towards engaging in serious violent behaviour. This could include: • drawing pictures • writing stories in class • making vague statements that do not, of themselves, constitute “uttering threats” as defined by law, but are cause of concern for some members of the school community because of their violent content. The majority of high-risk behaviour, from Kindergarten to Grade 12, falls into this category.

  21. WORRISOME BEHAVIOURS When in Doubt Check It Out! In many cases, following up on Worrisome Behaviours results in good early intervention measures. There are also cases where a little data leads to a lot and what seems like a minor case can quickly evolve to the formal activation of the VTRA team.

  22. First Hypothesis in Threat Assessment:“It is a cry for help!”

  23. THREE PRIMARY HYPOTHESES IN VTRA One: Is it a conscious or unconscious “Cry for help”? • Why would someone consciously or unconsciously give pre-incident signs or indicators? Two: Conspiracy of two or more! Who else knows about it? Who else is involved? • Pairing   • Virtual Pairing   • Leakage

  24. THREE PRIMARY HYPOTHESES IN VTRA Three: Is there any evidence of fluidity? • Fluidity refers to the way a person can move from thoughts of homicide to thoughts of suicide and is also referred to as psychological shifting.Fluidity is important because the first hypothesis in a VTRA is that the threat is a cry for help.

  25. IMPLICATIONSIf we only assess in the homicidal domain, or fail to assess at all, because the threat maker is non-traditional, we miss an opportunity to intervene.In some cases we may run the risk of the student residing in the suicidal domain and completing a suicide.

  26. SERIOUS VIOLENCE IS EVOLUTIONARY An individual who engages in serious violence does not spontaneously make the decision to harm someone. In some way, the individual’s thoughts, feelings, and behaviours moved them closer to the act before the act was committed. An individual who has never conceived of committing a serious violent act does not suddenly assault or kill someone. No one just snaps. • There are signs that indicate that an individual is moving along a pathway to violence.

  27. EVOLUTION OF VIOLENCE: KEY CONCEPTS Pathway to Violence The pathway to serious violence is not a straight line. As an individual moves along a pathway to violence, that person is influenced by a large number of factors. The individual’s motivation will fluctuate, as will the emotional state. It is vital that the VTRA team be aware of these fluctuations and assesses the person’s behaviour over a period of time.

  28. Serious violence is an evolutionary process no one just snaps.Everyone moves along a “Pathway of Justification”.Suspensionof the student without TA often adds to the justification process.The biggest problem in the aftermath of high-profile violence is “under reaction”to often blatant indicators someone is moving on a pathway to serious violence.First hypothesis in threat assessment“It’s a cry for help”!The pathway to serious violence is not a straight line.“Good kid with no history of violence”is the quote that kills. KEY POINTS REVIEW

  29. KEY FACTORS/CHARACTERISTICS TO BE CONSIDERED WHEN ASSESSING VIOLENCE: Dehumanization: • the process that allows a person to emotionally, psychologically, and cognitively distance themselves from the nature of the act. Frequency/Intensity/Recency (FIR): • the factors to be tracked when a change in baseline behaviour is noted. Empty Vessel: • An individual who is not connected to a healthy mature adult will search for people or things to identify with. “What are they filling themselves up with?”

  30. EMPTY VESSELS Do not allow yourself to be fooled by first looks. • The individual is well liked, comes from a good family, is a good student, etc. • Mere portrayal of these images does not indicate connectedness. • There may be a much different story going on than what is being portrayed on the outside. • If we can determine that there is a lack of connection, the next question we ask is “What are they filling themselves up with?”

  31. Empty Vessels What are They Filling Themselves Up With? KEY POINT: (Imitators vs. Innovators) Most threat makers are Imitators, not Innovators. • If we do not give them anything to fill themselves up with, they will find it themselves. • Is what they are filling themselves up with going to influence their violence potential?

  32. Our children will be what they fill themselves up with. • Movies • Media • Games • Writings • Drawings • Music

  33. GIRL VIOLENCE “Violence and Bullying in girls can be subtle, but still requires response.” • Girls are often overlooked as we believe most violence occurs with boys. • Females seem to indulge more in emotional or social bullying. A girl who has significant power and influence in school or social settings can become a puppet master. While boys or girls can be puppet masters, the majority of puppet masters are female.

  34. VTRA and Bullying Prevention The foundation of the VTRA model as relates to both violence prevention and bullying prevention is the emphasis on school dynamics. Naturally Open schools consistently work to be emotionally connected to each other in respectful ways that include healthy staff-to-staff relations, student-to-staff relations, and parent-school relations. When these exist there is an increased openness by concerned students and bystanders to report to adults when someone is in need. Naturally Closed schools or Traumatically Closed schools may be so emotionally disconnected that they see nothing until it is too late, or view their role in bullying prevention as insignificant or unnecessary as they state that, “bullying has been around for years and always will be.” The VTRA model assists schools in identifying and preventing the extreme acts of bullying that are becoming far too common in this generation.

  35. CYBER-BULLYING Cyber-bullying is not limited to girls, but we see more girls engaging in cyber-bullying behaviour. • increasing and becoming more concerning every year • online attacks are increasingly clever and creative The simple way to define this behaviour would be to call it what it is: social assassination.

  36. SOCIAL ASSASSINATION Using YouTube, Facebook, MySpace, Twitter, blogs, forums, and other such sites to attack the character and reputation of others. ( Hate Contracts ) Technology(mobile devices including iPhones or other smart phones): • can facilitate bullying, exclusion, and social isolation • allow youth to access social networking sites anytime they wish and send picture and video messages • Technology is a true gift for cowards who bully. • They don’t have to look at their victims and they don’t have to deal with immediate, negative reactions from bystanders.

  37. LOCKER AND BEDROOM DYNAMICS • In hundreds of cases in Canada we have found the evidence of planning in either the threat maker’s locker at school, their bedroom at home, or both. • In some cases, such as the 1999 Taber School Shooting, the evidence was found too late, after the violence had occurred. But in most cases, the evidence has been uncovered during the formal violence threat/risk assessment (VTRA) and intervention process, and before violence or more serious violence could continue.

  38. HUMAN TARGET SELECTION Primary factors that influence the magnitude of school shootings and other traumatic events include: Human Target Selection: • Justification • Current target or targets • History of violence/human target selection If we understand the threat maker’s history of violence and who that violence has been directed at, we can more easily determine if there is a “clear and discernible pattern of offending” and a higher likelihood to act out against a specific human target.

  39. SITE SELECTION Site Selection: • conscious or unconscious belief that the site is the cause of all their pain, and therefore a justifiable target • belief that they are less likely to get caught • site of opportunity Site selection can be placed on a continuum - from psychological fusion to the site on one end, and site of opportunity on the other.

  40. Critical Periods: Ground Zero and Impact Zone Predictable time frames for increased threat-making and threat-related behaviours • Critical Period 1 – two weeks post incident • Critical Period 2 – 1 month prior to Christmas • Critical Period 3 – the anniversary of the incident within the impact zone • Critical Period 4 – when we are caught in the impact zone of another incident (parallel process) • Critical Period 5 –unique to each school and community system

  41. SYSTEMS THEORY • views trauma intervention as a complex and comprehensive process. • requires schools and communities to address the trauma context by looking at: • structure • function • history • provides insight into how different systems respond to trauma. • assists multi-disciplinary VTRA teams to assess high-risk behaviour from both a behavioural and a systems perspective.

  42. UNDERSTANDING THE SCHOOL AS A SYSTEM Respond • refers to the emotional/behaviouralresponse to the crisis or traumatic event System • refers to the relationship dynamics between the school administration, staff, students, parents and others within the formal organization

  43. UNDERSTANDING THE SCHOOL AS A SYSTEM Not all school systems respond in the same way. Multiple schools exposed to identical traumatic stimuli can respond in dramatically different ways. Before attempting to provide support to a school, crisis responders should be acutely aware of the following: • Trauma history of the school • School’s pre-trauma functioning • Leadership structure of the school • Information-sharing process between administration, staff, students, and parents • School’s attitude to the crisis response team • School’s beliefs and expectations about recovery

  44. TES Model: Types of Systems Naturally Open School Systems Naturally Closed School Systems Traumatically Open School Systems Traumatically Closed School Systems

  45. VIOLENCE THREAT/RISK ASSESSMENT & MANAGEMENT

  46. FACTORS IN THREAT ASSESSMENT A team must have as many details as possible in order to effectively evaluate a threat. (Stage I Threat Assessment Report Form). • If the threat is “clear, direct and plausible”,the Stage I protocol should be activated. Always work from the leading hypothesis that most threats are a cry for help.

More Related