top of page

Proposal Page

That password is incorrect. Please try again.

Your password has expired. Please contact bethany@dprep.com for continued access.

Sample Training Schedules

CARE Team Training Agenda
Threat Training Agenda
Interventions Training Agenda

Trainings On Select Tuesdays, 11:00 - 12:30pm ET

CARE training overview
BIT Guide

DATE

TOPIC

SLIDES

August 30th

Core competencies for the CARE team

September 13

Initial risk assessment and case studies

September 27

Meeting logistics, process and flow

October 11

Growing and maturing the team

October 25

Core tenets of violence risk assessment

November 8

Interviewing skills, deception detection and bias & culture

November 22

From risk assessment to threat management

December 6

Case study application and report writing

January 10

Building connection and establishing a plan

January 24

Assessing risk and making a referral

February 7

Motivating the unmotivated

February 28

Growing and maturing the team

Moving Beyond the Red Flags:
Overcoming Obstacles and Managing Threat

Red Flags Outline

Program Outline

Red Flags Participant Guide

Participant Guide

Case Study

Case Study Guide

Part One: Defining the Problem

Part Two: Finding Solution

Resources & Suggested Reading

Back to School Safety Preparation
BIT Development Checklist
Social media basics p1
Beyond the Red Flags
Creating a Logistics Binder
Interventions Checklist
School Critical Incident Checklist
School Reunification Reference Guide
Assessing Risk Guide
Affective Violence Interview Sheet
Targeted Violence Interview Sheet
Suicide Interview Sheet

This work hypothesizes that the costuming and objectification of targets provide insight into the motivation for a rampage violence attack. These risk factors are then useful for members of behavioral intervention and threat assessment teams to observe as potential leakage prior to an attack. The article presents dozens of incidents of mass casualty shootings and highlights the targeting of women and the process of objectification of the targets. The clothing and accessories used by the attackers are investigated not only for their tactical significance, but also in affiliation with societal archetypes of antiheroes. In addition, the authors present a review of mass shooters who focused on female targets in an attempt to find a catharsis from their past negative experiences, irrational thoughts, and misogynistic philosophies.

Most of those who plan violent attacks communicate their intentions before the attacks via social media and written communication, either through unintentional ‘‘leakage’’ or intentionally through ‘‘legacy tokens’’ used to explain their motivations. These should be understood as part of their fantasy rehearsals in the aftermath of an attack. Additionally, searching for and attending to such messages provides an opportunity to intervene and thwart potential attacks. This article provides a framework for reviewing and understanding these messages and assessing them for potential lethality and dangerousness.

Two issues of importance for Behavioral Intervention and Threat Assessment Teams are the accessibility of the BIT/TAT site on the college website and what keywords to search for on social media in conjunction with the school name to get out ahead of potential threats. This article offers some suggestions to increase visibility and access to the BIT/TAT website and identify potential concerns by combing through social media for threatening language.

The VRAW2 is a newly created instrument used to assess emails, letters, or creative writing that contain direct threats or violent themes of concern. The article reviews the five factors and corresponding sub-factors used to assess the potential for threat. Scoring considerations and case examples are provided to illustrate how to score each of the sub-factors informing the overall factors. The VRAW2 is then discussed in context of the NaBITA Threat Assessment Tool and the Structured Interview for Violence Risk Assessment (SIVRA-35).

There is a pervasive assumption that mental illness equates to dangerousness and violence as it relates to mass shootings. The researchers examine the assumption and present a comprehensive literature review of how issues of mental illness impact violence and dangerousness. Many risk factors for violence are associated with mental health conditions, but they also occur in the absence of a diagnosis. A range of issues will be explored, including the unpredictability of bipolar disorder and schizophrenia, stress from mental health problems inhibiting emotional stability, and past inpatient hospitalizations for suicide attempts as they impact likelihood of committing targeted violence. Risk mitigation strategies will be presented following a review of the literature.

Back to School Safety Preparation

D-Prep Safety

These suggestions will help keep your campus safe in the event of an emergency.

Cover of Beyond Initial Response: Using the National Incident Management System Incident Command System

Beyond Initial Response: Using the National Incident Management System Incident Command System

Tim Deal

Responders have to be ready to carry out their Incident Command System position-specific responsibilities and to be effective they have to know how to operate as part of an ICS organization. This book provides readers the confidence, knowledge and assurance that are required to successfully play as part of an incident management team.

CPTED for Houses of Worship

D-Prep Safety

Learn some tips for how crime prevention through environmental design (CPTED) principles can help protect your house of worship.

Cover of Catastrophe and Social Change: Based Upon a Sociological Study of the Halifax Disaster

Catastrophe and Social Change: Based Upon a Sociological Study of the Halifax Disaster

Samuel Henry Prince

This book offers an observational study of the social impact caused by the Halifax disaster, where 1,782 people were killed in an explosion on a cargo ship, and the relief efforts following the event. In it, Prince follows the event from the nature of the catastrophe, through the disintegration of social order, and ending with the rebuilding of the effected communities.

Creating a Logistics Resource Binder for Your K-12 School

D-Prep Safety

In the event of a disaster, you will need obtain the resources and services the
school community will need in the immediate aftermath of the event. This helpful guide will give you guidance and advice in setting up your school's logistics binder.

Cover of Disasters by Design: A Reassessment of Natural Hazards in the United States

Disasters by Design: A Reassessment of Natural Hazards in the United States

Dennis S. Mileti

Disasters by Design provides an alternative and sustainable way to view, study, and manage hazards in the United States that would result in disaster-resilient communities, higher environmental quality, inter- and intragenerational equity, economic sustainability, and improved quality of life as well as an overview of what is known about natural hazards, disasters, recovery, and mitigation.

Cover of Full-Rip 9.0: The Next Big Earthquake in the Pacific Northwest

Full-Rip 9.0: The Next Big Earthquake in the Pacific Northwest

Sandi Doughton

Meet the scientists who are dedicated to understanding the way the earth moves and what patterns can be identified and how prepared (or not) people are. With a 100% chance of a mega-quake hitting the Pacific Northwest, this fascinating book reports on the scientists who are trying to understand when, where, and just how big The Big One will be.

Cover of Left of Bang: How the Marine Corps’ Combat Hunter Program Can Save Your Life

Left of Bang: How the Marine Corps’ Combat Hunter Program Can Save Your Life

Patrick Van Horne, Jason Riley, & Shawn Coyne

Is there a way to listen to your inner protector more and to increase your sensitivity to threats before they happen? General James Mattis asked this question and issued a directive to operationalize the Marine Corps’ Combat Hunter program, a comprehensive and no-nonsense approach to heightening each and every one of our gifts of fear.

School Safety Best Practices

Pikmykid with Dr. Brian Van Brunt, Pat Bhava, and Jeff Solomon

Pikmykid invited three experts to offer their insights and strategies in a panel discussion. Discover the following featured highlights of what Jeff Solomon, Dr. Brian Van Brunt, Director of Behavior & Threat Management at D-Prep, and Pat Bhava, CEO of Pikmykid consider school safety best practices and how you can implement them starting… today!

Cover of The Checklist Manifesto: How to Get Things Right

The Checklist Manifesto: How to Get Things Right

Atul Gawande

Gawande shows what the simple idea of the checklist reveals about the complexity of our lives and how we can deal with it. He examines checklists in aviation, construction, and investing, but focuses on medicine, where checklists mandating simple measures like hand washing have dramatically reduced hospital-caused infections and other complications.

Cover of The Gift of Fear: Survival Signals that Protect Us from Violence

The Gift of Fear: Survival Signals that Protect Us from Violence

Gavin de Becker

De Becker offers specific ways to protect yourself and those you love, including how to act when approached by a stranger, when you should fear someone close to you, what to do if you are being stalked, how to uncover the source of anonymous threats or phone calls, the biggest mistake you can make with a threatening person, and more.

Cover of The Unthinkable: Who Survives When Disaster Strikes — and Why

The Unthinkable: Who Survives When Disaster Strikes — and Why

Amanda Ripley

By combining the stories of survivors with research into how the brain works under extreme duress, this inspiring mix of narrative, science and participatory journalism reveals how human fear circuits and crowd dynamics work, why our instincts sometimes misfire in modern calamities, and how we can do much, much better.

Active Shooter Incidents in the United States in 2022

U.S. Department of Justice

This report is part of a series of FBI active shooter-related products published since September 2014. These reports are not intended to explore all facets of active shooter incidents but rather intended to provide law enforcement officers, other first responders, corporations, educators, and the public with a baseline understanding of active shooter incidents.

Cover of Averting Targeted School Violence: A U.S. Secret Service Analysis of Plots against schools

Averting Targeted School Violence: A U.S. Secret Service Analysis of Plots against schools

National Threat Assessment Center (NTAC)

Understanding cases of averted violence allows officials and researchers the ability to study where violence reduction principles worked and stopped an attack from moving from idea to action. This study included 67 averted attacks occurring from 2006 to 2018. The report stresses the importance of identifying risk factors like bullying, access to firearms, and grievances prior to criminal action.

Debunking the Myths: Mental Illness and Mass Shootings

Drs. Brian Van Brunt and Lisa Pescara-Kovach

There is a pervasive assumption that mental illness equates to dangerousness and violence as it relates to mass shootings. The researchers examine the assumption and present a comprehensive literature review of how issues of mental illness impact violence and dangerousness. Many risk factors for violence are associated with mental health conditions, but they also occur in the absence of a diagnosis. A range of issues will be explored, including the unpredictability of bipolar disorder and schizophrenia, stress from mental health problems inhibiting emotional stability, and past inpatient hospitalizations for suicide attempts as they impact likelihood of committing targeted violence. Risk mitigation strategies will be presented following a review of the literature.

Five Facts About Mass Shootings in K-12 Schools

National Institute of Justice

Preventing mass shootings in the United States, particularly those occurring in school settings, is an important priority for families, government leaders and officials, public safety agencies,
mental health professionals, educators, and local communities. What does the evidence say about how to detect, prevent, and respond to these tragic events? Here’s what we’ve learned through NIJ-sponsored research,

Cover of School Shooters: Understanding High School, College, and Adult Perpetrators

School Shooters: Understanding High School, College, and Adult Perpetrators

Peter Langman

Langman takes a look at 48 national and international cases of school shootings in order to dispel the myths, explore the motives, and expose the realities of preventing school shootings from happening in the future, including identifying at risk individuals and helping them to seek help before it’s too late.

The Contagion Effect as it Relates to Public Mass Shootings and Suicides

Dr. Lisa Pescara-Kovach and Dr. MJ Raleigh

This article demonstrates the impact of media on public mass shootings and suicides with special attention to sensationalized media coverage such as the Columbine attack, Virginia Tech, and Mandalay Bay shootings, as well as the Netflix series, Thirteen Reasons Why. The authors provide relevant research and advice to assist Behavioral Intervention Teams (BITs) toward reducing the risk of copycat public mass shootings and suicides by being more intentional regarding communication and coverage related to these events. Experts in the field of threat assessment have long understood the effect of media attention on high fatality mass shootings. These highly publicized, greatly sensationalized shootings often inspire and motivate at-risk individuals to perpetrate similar acts to achieve greater notoriety. Such shootings and suicides that include graphic details by media sources increase the likelihood of similar violence. Just as media details of a public mass shooting provide a recipe for a copycat incident, so do sensationalized details of suicide. High-profile celebrity suicides and graphic fictional suicides have been a trigger for copycat suicides for decades. Predicting and/or reducing copycat incidents is a central focus of Behavioral Intervention Teams (BITs). Research and guidance in this article serves to assist members in understanding what should be avoided to reduce contagion effects and copycat behavior.

Trigger Points: Inside the Mission to Stop Mass Shootings in America

Mark Follman

As Follman examines threat-assessment work throughout the country, he goes inside the FBI’s elite Behavioral Analysis Unit and immerses in an Oregon school district’s innovative violence-prevention program, the first such comprehensive system to prioritize helping kids and avoid relying on punitive measures. With its focus squarely on progress, the story delves into consequential tragedies and others averted, revealing the dangers of cultural misunderstanding and media sensationalism along the way. Ultimately, Follman shows how the nation could adopt the techniques of behavioral threat assessment more broadly, with powerful potential to save lives.

Cover of Why Kids Kill: Inside the Minds of School Shooters

Why Kids Kill: Inside the Minds of School Shooters

Peter Langman

In this breakthrough analysis, Dr. Peter Langman presents the psychological causes of school shootings and offers unprecedented insight into why certain teens exhibit the potential to kill. He shows how to identify early signs of possible violence and offers preventative measures that parents and educators can take to protect their communities.

Cover of An Educator’s Guide to Assessing Threats in Student Writing

An Educator’s Guide to Assessing Threats in Student Writing

Brian Van Brunt, W. Scott Lewis & Jeffrey H. Solomon

Based on research from the threat-assessment community and drawing from the collective fields of law enforcement, law, and psychology, the authors expand on evidence-based practices to help student affairs staff and K-12 educators best assess the validity of these communications and develop intervention and management plans.

Cover of Assessing Threat in Written Communications, Social Media, and Creative Writing

Assessing Threat in Written Communications, Social Media, and Creative Writing

Dr. Brian Van Brunt

Most of those who plan violent attacks communicate their intentions before the attacks via social media and written communication, either through unintentional ‘‘leakage’’ or intentionally through ‘‘legacy tokens’’ used to explain their motivations. Most attackers share this information prior to the attack as a fantasy rehearsal to gauge the reaction and level of the attention that will come to them after the actual attack.

Averting Targeted School Violence: A U.S. Secret Service Analysis of Plots against schools

National Threat Assessment Center (NTAC)

Understanding cases of averted violence allows officials and researchers the ability to study where violence reduction principles worked and stopped an attack from moving from idea to action. This study included 67 averted attacks occurring from 2006 to 2018. The report stresses the importance of identifying risk factors like bullying, access to firearms, and grievances prior to criminal action.

Before the Interview: Get Context

D-Prep Safety

This helpful guide offers suggestions for getting context before an interview.

Beyond the Red Flags

Brian Van Brunt, Ed.D. and Amy Murphy, Ph.D.

Early identification of red flags and at-risk behavior is a research-based best practice in the prevention of targeted violence. This article expands on this foundational concept and describes how to fill gaps in targeted violence prevention by moving beyond red flags. The authors describe five critical concepts related to behavioral intervention and threat assessment work in schools, workplaces, and communities that are commonly missed or underutilized.

Beyond the Red Flags: Overcoming Obstacles and Managing Threat

D-Prep Safety

When it comes to preventing violence, it is not enough to just know and recognize the red flags. We need to advance the research-based work of collaborative teams, avoid the singular focus on target hardening or mental health diagnosis, increase the use of threat or violence risk assessments over psychological assessments, incorporate red teaming into processes to identify vulnerabilities, and commit to continuous risk assessments and ongoing threat management.

Cover of Dangerous Instincts: Use an FBI Profiler's Tactics to Avoid Unsafe Situations

Dangerous Instincts: Use an FBI Profiler's Tactics to Avoid Unsafe Situations

Mary Ellen O’Toole & Alisa Bowman

Using the SMART method, which O’Toole developed and used at the FBI, we can confidently know how to Respond to a threat in any situation, hire someone who will work inside your home like a contractor or housekeeper, figure out whether a prospective employee is a safe bet, know whom you can trust with your children, and more.

Enhancing School Safety Using a Threat Assessment Model

National Threat Assessment Center

When incidents of school violence occur, they leave a profound and lasting impact on the school, the community, and our nation as a whole. Ensuring safe environments for elementary and secondary school students, educators, administrators, and others is essential. This operational guide was developed to provide fundamental direction on how to prevent incidents of targeted school violence, that is, when a student specifically selects a school or a member of the school community for harm. The content in this guide is based on information developed by the U.S. Secret Service, Protective Intelligence and Assessment Division, National Threat Assessment Center (NTAC).

Foundations of Threat Assessment and Management

Andre Simons and J. Reid Meloy

In June of 2014 a Seattle Pacific University student tackled and pepper-sprayed an active shooter on campus who had killed one person and injured two others (“1 dead, others hurt,” 2014). In April of 2015 in Washington State, a North Thurston High School teacher confronted and overpowered a 16-year-old school shooter who had fired two shots inside the high school (“Teacher Tackles Shooter,” 2015). In the summer of 2015, a heavily armed gunman opened fire on a high-speed train traveling from Amsterdam to Paris before being challenged by passengers, two of whom were US soldiers ( “The Men Who Averted,” 2015). These disruptions were heroic, incredibly brave, and saved countless lives. The right people were in the right place at the right time; they recognized the signs of the attack and made the decision to challenge the offender.

Guidelines for Responding to Student Threats of Violence

Dewey Cornell and Peter Sheras

This is the only threat assessment model supported by controlled studies and listed in the federal government's National Registry of Evidence-based Programs and Practices. An efficient and effective way to resolve student threats and reduce use of school suspension. Used in thousands of schools nationwide. Training available from the author.

Cover of Harm to Others: The Assessment and Treatment of Dangerousness

Harm to Others: The Assessment and Treatment of Dangerousness

Brian Van Brunt

Van Brunt offers an effective way to increase knowledge of and training in violence risk and threat assessment, and it also provides a comprehensive examination of current treatment approaches. The underlying concepts and suggestions are useful for counselors, psychologists, and social workers who face these issues in their daily practice.

Cover of International Handbook of Threat Assessment

International Handbook of Threat Assessment

J. Reid Meloy & Jens Hoffman

Threat assessment is a method used by mental health and law enforcement professionals to assess the risk of intended violence toward a specific target. This guide offers a definition of the foundations of threat assessment, systematically explores its fields of practice, and provides information and instruction on the best practices of threat assessment.

Rapport Building

D-Prep Safety

This personal connection and attention are necessary at the very outset of the assessment. Failure to create the proper conditions and interview climate will result in increased defensiveness and decreased information being shared.

Terrorist in Training: The Role of Social Media and the Rise of Terrorism through Nationalistic White Agenda

Drs. Lisa Pescara-Kovach, Brian Van Brunt and Amy Murphy

The U.S. political landscape is increasingly divided, fueled in part by the indignant, caustic, and divisive language used in our social media and online conversations. The authors examine a subset of white males who feel marginalized and powerless as they hear messaging advancing tolerance, diversity, equality, and political correctness. This in turn has fueled vocal and strident opposition to mass immigration, rage over the disappearance of a so-called pure culture of Germans and Europeans, and an underlying fear at the prospect of losing their history and heritage. The open nature of social media has provided a safe haven for our youth to be radicalized by those espousing Generation Identity and Alt-Right ideologies, euphemisms for white supremacist thought and Nazism. The authors explore this trend through the recent terroristic actions in El Paso, Texas, Charleston, South Carolina and the related events of Oslo, Norway and Christchurch, New Zealand.

The Role of Warning Behaviors in Threat Assessment: An Exploration and Suggested Typology

J. Reid Meloy, Ph.D., Jens Hoffmann, Ph.D., Angela Guldimann, M.A., and David James, M.B., B.S., M.A.

The concept of warning behaviors offers an additional perspective in threat assessment. Warning behaviors are acts which constitute evidence of increasing or accelerating risk. They are acute, dynamic, and particularly toxic changes in patterns of behavior which may aid in structuring a professional’s judgment that an individual of concern now poses a threat – whether the actual target has been identified or not. They require an operational response. A typology of eight warning behaviors for assessing the threat of intended violence is proposed: pathway, fixation, identification, novel aggression, energy burst, leakage, directly communicated threat, and last resort warning behaviors.

Cover of Threat Assessment and Management Strategies: Assessing Hunters and Howlers

Threat Assessment and Management Strategies: Assessing Hunters and Howlers

Frederick S. Calhoun & Stephen W. Weston

A successful threat management process does not necessarily depend on large staffs or huge resource commitments, but, instead, on attention to detail and a thoughtful approach. Through case studies and analyses, this volume explains the best practices for assessing problem individuals and the optimal protective response and management strategy.

Cover of Threat Assessment: A Risk Management Approach

Threat Assessment: A Risk Management Approach

James T. Turner & Michael G Gelles

Threat Assessment: A Risk Management Approach examines the factors that human resource, security, legal, and behavioral professionals need to understand in work violence and threat situations that disrupt the working environment, revealing the best ways to reduce risk and manage emergencies.

Types of Threat

D-Prep Safety

This guide provides information on the types of threats and the elements we look at to determine the likely risk involved.

Cover of Understanding and Treating Incels: Case Studies, Guidance, and Treatment of Violence Risk

Understanding and Treating Incels: Case Studies, Guidance, and Treatment of Violence Risk

Brian Van Brunt & Chris Taylor

This is an indispensable guide for mental health clinical staff, social workers, prevention specialists, educators, and threat assessment professionals who want to better understand the involuntary celibate movement, assess individuals’ potential for violence, and offer treatment approaches and prevention efforts.

Cover of Violence Assessment and Intervention: The Practitioner’s Handbook

Violence Assessment and Intervention: The Practitioner’s Handbook

James S. Cawood & Michael H. Corcoran

This text provides a proven methodology, grounded in the current empirical research and the authors’ experience in successfully assessing and managing thousands of cases, for analyzing concerning behaviors and potential threatening situations, and taking action in these challenging, dynamic environments before tragedy occurs.

Where the Attack Cycle Intersects the Pathway to Violence

TorchStone VP, Scott Stewart

The concept of the attack cycle is a useful framework protective intelligence practitioners can use to understand, identify and detect behaviors associated with an intentional or targeted attack. The demands of the attack cycle requires those planning an attack to conduct certain activities and the vulnerabilities to detection they leave themselves open to. This article examines how the attack cycle intersects with another model for understanding the behavior and indicators assailants exhibit before an attack, known as The Pathway to Violence.

Cover of White Supremacist Violence: Understanding the Resurgence and Stopping the Spread

White Supremacist Violence: Understanding the Resurgence and Stopping the Spread

Brian Van Brunt, Lisa Pescara-Kovach & Bethany Van Brunt

White Supremacist Violence is a powerful resource for education and mental health professionals who are developing the tools and skills needed to slow the progress of the fast-growing hate movement in the United States. White Supremacist Violence gives readers useful perspectives and insights into the white supremacy movement while offering clinicians, threat-assessment professionals, and K-12 and university educators and administrators practical guidance on treatment and prevention efforts.

bottom of page