Chapter 5. 'Threat Assessment': An         Approach To Prevent Targeted Violence.

Source: Internet.

Series: National Institute of Justice, Research in Action.
Published: September 1995, by Robert A. Fein, Consultant psychologist for the Secret Service.
Bryan Vossekuil, Assistent Special Agent in Charge, Intelligence Division.
Gwen A. Holden, Executive Vice President of the National Criminal Justice Association.

Investigative and operational techniques

Traditional law enforcement activities aim at apprehending and prosecuting perpetrators of violence after the commission of their crimes. In most circumstances, the primary responsibility of law enforcement professionals is to determine whether a crime has been committed, conduct an investigation to identify and apprehend the perpetrator, and gather evidence to assist prosecutors in a criminal trial. However, when police officers are presented with information and concern about a possible future violent crime, their responsibilities, authority, and investigative tools and approaches are less clear. "Threat assessment" is the term used to describe the set of investigative and operational techniques that can be used by law enforcement professionals to identify, assess, and manage the risks of targeted violence and its potential perpetrators.

"Making" versus "posing" a threat.

Individuals utter threats for many reasons, only some of which involve intention or capacity to commit a violent act. However, a person can present a grave threat without articulating it. The distinction between making and posing a threat is important:

o Some persons who make threats ultimately pose threats.
o Many persons who make threats do not pose threats.
o Some persons who pose threats never make threats.

Targeting the victim.

Postponing action until a threat has been made can detract attention from investigation of factors more relevant to the risk of violence, e.g, a potential perpetrator's selection of possible targets. Data from two recent studies suggest that at least some approachers--and attackers--of public officials/figures show an interest in more than one target. U.S. Secret Service experience indicates that a number of would-be Presidential assassins, such as Arthur Bremer and John Hinckley, considered several targets, and changed targets, before finally making an attack. Data on relationship stalking murders and workplace violence murders point to suicide, as well as homicide, as a possible outcome. These examples suggest that, in some cases, the perpetrator may ultimately become his or her own final target.

Legal sanctions

The threat of sanctions, such as a long prison sentence, may not deter a person who desperately desires revenge or is prepared to die to achieve his objective. Passage of enforceable laws that define and prohibit behaviors that could presage violent attacks is one important step in preventing such attacks. Forty-nine States have passed antistalking laws in the past 4 years, and the National Institute of Justice, together with the National Criminal Justice Association, published a model antistalking law. Additionally, authorities in some jurisdictions are reviewing various threat and harassment laws to determine whether they might apply to threat-of-violence situations. However, laws by themselves are unlikely to prevent stalking, workplace, or public figure-centered violence, unless law enforcement and security professionals know how to identify, evaluate, and manage persons at risk of committing these violent acts.

Fundamental principles of threat assessment.

Notwithstanding the growing importance of threat assessment for law enforcement and security professionals, systematic thinking and guidance in this area have been lacking. The law enforcement and security communities currently do not have clearly articulated processes or procedures to steer their actions when they are made aware of threat-of-violence subjects and situations. Without guidelines for making threat assessments, otherwise competent law enforcement professionals may be less thoughtful and thorough than they might be in handling such incidents. To fill the void, this report presents four fundamental principles that underlie threat assessment investigation and management. They are followed by a model and process for conducting comprehensive threat assessment investigations.

o Violence is a process, as well as an act. Violent behavior does not occur in a vacuum. Careful analysis of violent incidents shows that violent acts often are the culmination of long-developing, identifiable trails of problems, conflicts, disputes, and failures.

o Violence is the product of an inter-action among three factors:

  • The individual who takes violent action.
  • Stimulus or triggering conditions that lead the subject to see violence as an option, "way out," or solution to problems or life situation.
  • A setting that facilitates or permits the violence, or at least does not stop it from occurring.

o A key to investigation and resolution of threat assessment cases is identification of the subject's "attack-related" behaviors. Perpetrators of targeted acts of violence engage in discrete behaviors that precede and are linked to their attacks; they consider, plan, and prepare before engaging in violent actions.

o Threatening situations are more likely to be successfully investigated and managed if other agencies and systems--both within and outside law enforcement or security organizations--are recognized and used to help solve problems presented by a given case. Examples of such systems are those employed by prosecutors; courts; probation, corrections, social service, and mental health agencies; employee assistance programs; victim's assistance programs; and community groups.

Functions of a threat assessment program.

The three major functions of a threat assessment program are: identification of a potential perpetrator, assessment of the risks of violence posed by a given perpetrator at a given time, and management of both the subject and the risks that he or she presents to a given target.

Identifying the perpetrator.

The process of identifying a potential perpetrator involves:

  • defining criteria that could lead to a person becoming a subject of a threat assessment investigation;
  • determining the areas within the law enforcement or security organization that will be responsible for receiving information about possible subjects and conducting threat assessment investigations.
  • notifying those individuals and organizations that might come in contact with--or know of--potential subjects about the existence of a threat assessment program; and
  • educating notified individuals and organizations about the criteria for bringing a concern about potential violence to the attention of investigators.

Assessing the risks.

The second goal of a threat assessment program is to evaluate the risks persons under suspicion may pose to particular targets. Risk assessment involves two primary functions: investigation and evaluation.

Investigation.

The primary objective of a risk assessment investigation is to gather information on a subject and on potential targets. Multiple sources of information should be consulted to learn about a subject's behavior, interests, and state of mind at various points in time:

  • Personal interviews with the subject.
  • Material created or possessed by the subject, including journals and letters, and materials collected by the subject, such as books and magazines, that may relate to the investigation.
  • Persons who know or have known the subject, including family members, friends, coworkers, supervisors, neighbors, landlords, law enforcement officers, social service or mental health staff, and previous victims of unacceptable behavior (including violence) committed by the subject.

  • Record or archival information, including police, court, probation, and correctional records; mental health and social service records; and notes made by those aware of the subject's interest in a particular target, such as security personnel, managers, victims, or colleagues.

    At the beginning of a threat assessment investigation, it is important to secure detailed descriptions of the subject's behaviors and actions that prompted other persons to notice the subject. The kinds of information useful for threat assessment include data about overwhelmingly or unbearably stressful experiences and the subject's ability to cope at such times. Behavioral data about the subject's motives, intentions, and capacities is critical; of particular importance is information about attack-related behaviors:

    • The subject has expressed interest in possible targets, including particular, identifiable targets.

    • The subject has communicated with or about potential targets.

    • The subject has considered and/or attempted to harm self or others.

    • The subject has secured or practiced with weapons.

    • The subject has followed or approached potential targets, either with or without weapons, at events or occasions.

    Whether to interview the subject of a threat assessment investigation can be a key question; the decision depends on several factors:

    • The investigator's need for information.
    • The facts leading to initiation of investigation.>
    • The investigator's legal standing in relation to the subject.
    • The resources available to the investigator.
    • The investigator's training and experience in interviewing.
    • The stage of the investigation.
    • The investigator's strategy for resolving the case.

    A decision to interview a subject should be made on the basis of case facts. Generally, when there has been face-to-face contact between subject and target or the subject has communicated a threat to the target, an interview is a good idea. An interview under such circumstances may have several goals. It may signal that the subject's behavior has been noticed, permit the subject's story to be related to a third party, gather information that is the basis for corroboration, and provide an opportunity for communicating that the subject's behavior is unwelcome, unacceptable, and must cease.

    Any interview is a vehicle for gathering information about the subject that can be used to assess the threat that a subject poses and to manage that threat. Therefore, threat assessment interviews are most productive if they are conducted respectfully and professionally. The task of the investigator is twofold: to gather information about the subject's thinking, behavior patterns, and activities regarding the target(s) and to encourage change in the subject's behavior. By showing an interest in the subject's life that is neither unduly friendly nor harsh, an investigator can increase the likelihood of the interview's success.

    In some cases, however, an interview may intensify the subject's interest in the target or increase the risk of lethal behavior. For example, a subject who has written a letter to a celebrity professing undying love and formally proposing marriage, but who has engaged in no other known behavior in relation to the celebrity, may have his or her interest stimulated by an interview. Without an interview, the subject's interest may dissipate. Similarly, a desperate and suicidal subject, self-perceived as having been abandoned, who has been stalking a former partner, may sense that time is running out and be prompted by an interview to engage in more extreme behavior before "they put me away." In such a circumstance, the investigator may need to expend additional resources, perhaps increasing security for the target, arranging hospitalization or arrest of the subject, or monitoring or surveilling the subject. Subject interviews, therefore, should be considered and conducted within the context of overall investigative strategy.

    Information about the target.

    A man who, over days and weeks, has been following a secretary whom he met once, but with whom he has no relationship, appears to have picked out a potential target. An employee, fired by a manager whom he blames for discriminating against him and causing the breakup of his family, has told former coworkers that he will "get even"; once again, a potential target appears to have been selected. To prevent violence, the threat assessment investigator requires information on the targeted individual. Relevant questions about the target might include:

    • Are potential targets identifiable, or does it appear that the subject, if considering violence, has not yet selected targets for possible attack?

    • Is the potential target well known to the subject? Is the subject acquainted with a targeted individual's work and personal lifestyle, patterns of living, daily comings and goings?

    • Is the potential target vulnerable to an attack? Does the targeted individual have the resources to arrange for physical security? What might change in the target's lifestyle or living arrangements that could make attack by the subject more difficult or less likely, e.g., is the targeted individual planning to move, spend more time at home, or take a new job?

    • Is the target afraid of the subject? Is the targeted individual's degree of fear shared by family, friends, and/or colleagues?

    • How sophisticated or naive is the targeted individual about the need for caution? How able is the individual to communicate a clear and consistent "I want no contact with you" message to the subject?

    Evaluation

    A 2-stage process is suggested to evaluate information gathered about the subject and the potential target(s). In the first stage, information is evaluated for evidence of conditions and behaviors that would be consistent with an attack. The second stage of evaluation seeks to determine whether the subject appears to be moving toward or away from an attack. After analyzing the available data, the threat assessor is left with these questions:

    • Does it appear more or less likely that violent action will be directed by the subject against the target(s)? What specific information and reasoning lead to this conclusion?

    • How close is the subject to attempting an attack? What thresholds, if any, have been crossed (e.g., has the subject violated court orders, made a will, given away personal items, expressed willingness to die or to be incarcerated)?

    • What might change in the subject's life to increase or decrease the risk of violence? What might change in the target's situation to increase or decrease the risk of violence?

    Case management

    The first component of threat assessment case management involves developing a plan that moves the subject away from regarding violence against the target as a viable option. Such a plan is likely to draw on resources from systems within the threat assessment unit's parent organization, as well as those outside it. The second component is plan implementation. The best developed and supported case management plan will be of little use in preventing violence if the plan is not implemented and monitored. The plan must remain flexible to accommodate changes in the subject's life and circumstances. The final management component is formal closing of the case.

    Case plan development.

    Once an evaluator determines that a given subject presents a risk of violence to a targeted individual, the next task is to develop a plan to manage the subject and the risk. The evaluator then proceeds to identify those internal and external systems that may be helpful in managing the problems presented by the subject. In certain situations, such as those in which the subject has been stalking an identifiable target in a jurisdiction that has an enforceable and effective anti-stalking law, the best way to prevent violence and minimize harm to the targeted individual may be to prosecute the case vigorously. A good relationship between threat assessment investigators and prosecutors can influence the priority assigned to the case and the extent to which prosecutorial and judicial processes facilitate its resolution. Such relationships also may affect the court's disposition of the case, including sentencing of a convicted offender. Even conviction and imprisonment, however, do not guarantee that the target will be safe from the subject. If the subject has been unable or unwilling to let go of the idea of a relationship with the target, or if the subject attributes the pains and misfortunes of his or her life to the targeted individual, it may make sense to consider strategies by which the subject is encouraged to change the direction, or intensity, of his interest. A subject engaged in activities that bring success and satisfaction is less likely to remain preoccupied with a failed relationship. Family, friends, neighbors, or associates may play a role in suggesting and supporting changes in the subject's thinking and behavior. In addition, mental health and social service staff may be of great assistance in aiding the subject to formulate more appropriate goals and develop skills and strengths that are likely to result in life successes.

    At least one aspect of a case management plan concerns the target. If the subject is to be prohibited from contact with the target, the target needs to understand what to do (i.e., whom to call and how to contact the official handling the case) if the subject initiates direct or indirect contact.

    Case management implementation.

    The most carefully crafted plan will have little effect if it remains in the investigator's files and is not translated into action.

    Although no procedures or techniques can guarantee that a subject of comprehensive threat assessment will not attempt violent action toward a target, two activities are known to help reduce the risk of violence, and, in the instance of a bad outcome, assist the threat assessment team in any post-incident review.

    First, documentation of data and reasoning at every stage of a threat assessment investigation is essential. Undocumented or poorly documented information-gathering and analysis are suspect in and of themselves, and they provide little foundation for review or for efforts to learn from- -and improve on--experience. Without clear documentation, investigators are left with only their recollections, which can be both partial and faulty and are subject to criticism as retrospective reconstruction. A carefully and comprehensively documented record may be criticized for imperfect data-gathering or flawed analysis, but such a record also demonstrates both thoughtfulness and good faith--critical questions in any postincident review.

    Second, consultation at every major stage of the threat assessment process can be a significant case management tool. Consultants may be members of the threat assessment unit or external experts. To be effective, a consultant should be knowledgeable in areas relevant to the case and be known and trusted by the investigators. For example, in a case where a subject has a history of diagnosed mental disorders and the primary investigator is unfamiliar with mental health language and concepts used in the records, an expert in psychology or psychiatry can provide invaluable insight and advice.

    In addition to providing special expertise, consultants may notice and ask about questions in a case that remain to be explored or answered. Even proficient investigators are occasionally vulnerable to "missing the forest for the trees." A consultant, such as a fellow threat assessment specialist who has not been involved with the case, may offer a comment that can redirect or sharpen an ongoing investigation. In the event of a bad outcome, use and documentation of consultant expertise may demonstrate that the threat assessment team sought additional perspectives and ideas and did not get stuck with "tunnel vision."

    Closing the case.

    The final task of threat assessment case management is closing the case. When a threat assessor determines that the subject has moved far enough away from possible violent action toward the target to no longer cause appreciable concern, the case can be considered for closing. At this time, it may be important to ask:

    • What has changed in the subject's life that appears to lessen the likelihood that the subject is interested in or will attempt violent action toward the target?

    • Which components of the case management plan seemed to affect the subject's thinking or capacity to initiate violent action, and to what extent?

    • What life circumstances might occur that would again put the subject at increased risk of contemplating, planning, or attempting violent action toward the original target or other potential targets?

    • Are there supports in place (or that can be developed) that will be known and available to the subject at a future time when the subject is again at risk of moving toward violent behavior?

    While social commentators and analysts may debate the myriad reasons that lead to growing national concern about targeted violence, law enforcement and security organizations are increasingly being called on to examine individual situations and make judgments and determinations about the risks of violence that one person might present to an identifiable target. In cases related to stalking behaviors, workplace violence, attacks on public officials and figures, and other situations where targeted violence is a possibility, comprehensive and carefully conducted threat assessment investigations can safeguard potential targets, deter potential attackers, and serve the public.

    Dietz, P.E. and D.A. Martell, "Mentally Disordered Offenders in Pursuit of Celebrities and Politicians," National Institute of Justice, Washington, D.C., 1989, 83-NI-AX-0005;

    Dietz, P.E., D.B. Matthews, D.A. Martell, T.M. Stewart, D.R. Hrouda and J. Warren, 'Threatening'. Inappropriate Letters to Members of the United States Congress," Journal of Forensic Sciences, 36 (September 5, 1991):1445-1468;

    Dietz, P.E., D.B. Matthews, C. Van Duyne, D.A. Martell, C.D.H. Parry, T.M. Stewart, J. Warren and J.D. Crowder, "Threatening and Otherwise Inappropriate Letters to Hollywood Celebrities," Journal of Forensic Sciences, 36 (January 1, 1991):185-209;

    Fein, R.A. and B. Vossekuil, "The Secret Service Exceptional Case Study Project: An Examination of Violence Against Public Officials and Public Figures," National Institute of Justice, study in progress, 92-CX-0013.

    National Criminal Justice Association, Project to Develop a Model Anti-Stalking Code for States,

    The National Institute of Justice is a component of the Office of Justice Programs, which also includes the Bureau of Justice Assistance, Bureau of Justice Statistics, Office of Juvenile Justice and Delinquency Prevention, and the Office for Victims of Crime. Points of view in this document are those of the authors and do not necessarily reflect the official position of the U.S. Department of Justice.