Proposal Page
That password is incorrect. Please try again.
Your password has expired. Please contact bethany@dprep.com for continued access.
Sample Training Schedules
Trainings On Select Tuesdays, 11:00 - 12:30pm ET
DATE
TOPIC
SLIDES
August 30th
Core competencies for the CARE team
September 13
Initial risk assessment and case studies
September 27
Meeting logistics, process and flow
October 11
Growing and maturing the team
October 25
Core tenets of violence risk assessment
November 8
Interviewing skills, deception detection and bias & culture
November 22
From risk assessment to threat management
December 6
Case study application and report writing
January 10
Building connection and establishing a plan
January 24
Assessing risk and making a referral
February 7
Motivating the unmotivated
February 28
Growing and maturing the team
Resources & Suggested Reading
This work hypothesizes that the costuming and objectification of targets provide insight into the motivation for a rampage violence attack. These risk factors are then useful for members of behavioral intervention and threat assessment teams to observe as potential leakage prior to an attack. The article presents dozens of incidents of mass casualty shootings and highlights the targeting of women and the process of objectification of the targets. The clothing and accessories used by the attackers are investigated not only for their tactical significance, but also in affiliation with societal archetypes of antiheroes. In addition, the authors present a review of mass shooters who focused on female targets in an attempt to find a catharsis from their past negative experiences, irrational thoughts, and misogynistic philosophies.
Most of those who plan violent attacks communicate their intentions before the attacks via social media and written communication, either through unintentional ‘‘leakage’’ or intentionally through ‘‘legacy tokens’’ used to explain their motivations. These should be understood as part of their fantasy rehearsals in the aftermath of an attack. Additionally, searching for and attending to such messages provides an opportunity to intervene and thwart potential attacks. This article provides a framework for reviewing and understanding these messages and assessing them for potential lethality and dangerousness.
Two issues of importance for Behavioral Intervention and Threat Assessment Teams are the accessibility of the BIT/TAT site on the college website and what keywords to search for on social media in conjunction with the school name to get out ahead of potential threats. This article offers some suggestions to increase visibility and access to the BIT/TAT website and identify potential concerns by combing through social media for threatening language.
The VRAW2 is a newly created instrument used to assess emails, letters, or creative writing that contain direct threats or violent themes of concern. The article reviews the five factors and corresponding sub-factors used to assess the potential for threat. Scoring considerations and case examples are provided to illustrate how to score each of the sub-factors informing the overall factors. The VRAW2 is then discussed in context of the NaBITA Threat Assessment Tool and the Structured Interview for Violence Risk Assessment (SIVRA-35).
There is a pervasive assumption that mental illness equates to dangerousness and violence as it relates to mass shootings. The researchers examine the assumption and present a comprehensive literature review of how issues of mental illness impact violence and dangerousness. Many risk factors for violence are associated with mental health conditions, but they also occur in the absence of a diagnosis. A range of issues will be explored, including the unpredictability of bipolar disorder and schizophrenia, stress from mental health problems inhibiting emotional stability, and past inpatient hospitalizations for suicide attempts as they impact likelihood of committing targeted violence. Risk mitigation strategies will be presented following a review of the literature.
Beyond Initial Response: Using the National Incident Management System Incident Command System
Tim Deal
Responders have to be ready to carry out their Incident Command System position-specific responsibilities and to be effective they have to know how to operate as part of an ICS organization. This book provides readers the confidence, knowledge and assurance that are required to successfully play as part of an incident management team.
Catastrophe and Social Change: Based Upon a Sociological Study of the Halifax Disaster
Samuel Henry Prince
This book offers an observational study of the social impact caused by the Halifax disaster, where 1,782 people were killed in an explosion on a cargo ship, and the relief efforts following the event. In it, Prince follows the event from the nature of the catastrophe, through the disintegration of social order, and ending with the rebuilding of the effected communities.
Creating a Logistics Resource Binder for Your K-12 School
D-Prep Safety
In the event of a disaster, you will need obtain the resources and services the
school community will need in the immediate aftermath of the event. This helpful guide will give you guidance and advice in setting up your school's logistics binder.
Disasters by Design: A Reassessment of Natural Hazards in the United States
Dennis S. Mileti
Disasters by Design provides an alternative and sustainable way to view, study, and manage hazards in the United States that would result in disaster-resilient communities, higher environmental quality, inter- and intragenerational equity, economic sustainability, and improved quality of life as well as an overview of what is known about natural hazards, disasters, recovery, and mitigation.
Full-Rip 9.0: The Next Big Earthquake in the Pacific Northwest
Sandi Doughton
Meet the scientists who are dedicated to understanding the way the earth moves and what patterns can be identified and how prepared (or not) people are. With a 100% chance of a mega-quake hitting the Pacific Northwest, this fascinating book reports on the scientists who are trying to understand when, where, and just how big The Big One will be.
Left of Bang: How the Marine Corps’ Combat Hunter Program Can Save Your Life
Patrick Van Horne, Jason Riley, & Shawn Coyne
Is there a way to listen to your inner protector more and to increase your sensitivity to threats before they happen? General James Mattis asked this question and issued a directive to operationalize the Marine Corps’ Combat Hunter program, a comprehensive and no-nonsense approach to heightening each and every one of our gifts of fear.
School Safety Best Practices
Pikmykid with Dr. Brian Van Brunt, Pat Bhava, and Jeff Solomon
Pikmykid invited three experts to offer their insights and strategies in a panel discussion. Discover the following featured highlights of what Jeff Solomon, Dr. Brian Van Brunt, Director of Behavior & Threat Management at D-Prep, and Pat Bhava, CEO of Pikmykid consider school safety best practices and how you can implement them starting… today!
The Checklist Manifesto: How to Get Things Right
Atul Gawande
Gawande shows what the simple idea of the checklist reveals about the complexity of our lives and how we can deal with it. He examines checklists in aviation, construction, and investing, but focuses on medicine, where checklists mandating simple measures like hand washing have dramatically reduced hospital-caused infections and other complications.
The Gift of Fear: Survival Signals that Protect Us from Violence
Gavin de Becker
De Becker offers specific ways to protect yourself and those you love, including how to act when approached by a stranger, when you should fear someone close to you, what to do if you are being stalked, how to uncover the source of anonymous threats or phone calls, the biggest mistake you can make with a threatening person, and more.
The Unthinkable: Who Survives When Disaster Strikes — and Why
Amanda Ripley
By combining the stories of survivors with research into how the brain works under extreme duress, this inspiring mix of narrative, science and participatory journalism reveals how human fear circuits and crowd dynamics work, why our instincts sometimes misfire in modern calamities, and how we can do much, much better.
Active Shooter Incidents in the United States in 2022
U.S. Department of Justice
This report is part of a series of FBI active shooter-related products published since September 2014. These reports are not intended to explore all facets of active shooter incidents but rather intended to provide law enforcement officers, other first responders, corporations, educators, and the public with a baseline understanding of active shooter incidents.
Averting Targeted School Violence: A U.S. Secret Service Analysis of Plots against schools
National Threat Assessment Center (NTAC)
Understanding cases of averted violence allows officials and researchers the ability to study where violence reduction principles worked and stopped an attack from moving from idea to action. This study included 67 averted attacks occurring from 2006 to 2018. The report stresses the importance of identifying risk factors like bullying, access to firearms, and grievances prior to criminal action.
Debunking the Myths: Mental Illness and Mass Shootings
Drs. Brian Van Brunt and Lisa Pescara-Kovach
There is a pervasive assumption that mental illness equates to dangerousness and violence as it relates to mass shootings. The researchers examine the assumption and present a comprehensive literature review of how issues of mental illness impact violence and dangerousness. Many risk factors for violence are associated with mental health conditions, but they also occur in the absence of a diagnosis. A range of issues will be explored, including the unpredictability of bipolar disorder and schizophrenia, stress from mental health problems inhibiting emotional stability, and past inpatient hospitalizations for suicide attempts as they impact likelihood of committing targeted violence. Risk mitigation strategies will be presented following a review of the literature.
Five Facts About Mass Shootings in K-12 Schools
National Institute of Justice
Preventing mass shootings in the United States, particularly those occurring in school settings, is an important priority for families, government leaders and officials, public safety agencies,
mental health professionals, educators, and local communities. What does the evidence say about how to detect, prevent, and respond to these tragic events? Here’s what we’ve learned through NIJ-sponsored research,
School Shooters: Understanding High School, College, and Adult Perpetrators
Peter Langman
Langman takes a look at 48 national and international cases of school shootings in order to dispel the myths, explore the motives, and expose the realities of preventing school shootings from happening in the future, including identifying at risk individuals and helping them to seek help before it’s too late.
The Contagion Effect as it Relates to Public Mass Shootings and Suicides
Dr. Lisa Pescara-Kovach and Dr. MJ Raleigh
This article demonstrates the impact of media on public mass shootings and suicides with special attention to sensationalized media coverage such as the Columbine attack, Virginia Tech, and Mandalay Bay shootings, as well as the Netflix series, Thirteen Reasons Why. The authors provide relevant research and advice to assist Behavioral Intervention Teams (BITs) toward reducing the risk of copycat public mass shootings and suicides by being more intentional regarding communication and coverage related to these events. Experts in the field of threat assessment have long understood the effect of media attention on high fatality mass shootings. These highly publicized, greatly sensationalized shootings often inspire and motivate at-risk individuals to perpetrate similar acts to achieve greater notoriety. Such shootings and suicides that include graphic details by media sources increase the likelihood of similar violence. Just as media details of a public mass shooting provide a recipe for a copycat incident, so do sensationalized details of suicide. High-profile celebrity suicides and graphic fictional suicides have been a trigger for copycat suicides for decades. Predicting and/or reducing copycat incidents is a central focus of Behavioral Intervention Teams (BITs). Research and guidance in this article serves to assist members in understanding what should be avoided to reduce contagion effects and copycat behavior.
Trigger Points: Inside the Mission to Stop Mass Shootings in America
Mark Follman
As Follman examines threat-assessment work throughout the country, he goes inside the FBI’s elite Behavioral Analysis Unit and immerses in an Oregon school district’s innovative violence-prevention program, the first such comprehensive system to prioritize helping kids and avoid relying on punitive measures. With its focus squarely on progress, the story delves into consequential tragedies and others averted, revealing the dangers of cultural misunderstanding and media sensationalism along the way. Ultimately, Follman shows how the nation could adopt the techniques of behavioral threat assessment more broadly, with powerful potential to save lives.
Why Kids Kill: Inside the Minds of School Shooters
Peter Langman
In this breakthrough analysis, Dr. Peter Langman presents the psychological causes of school shootings and offers unprecedented insight into why certain teens exhibit the potential to kill. He shows how to identify early signs of possible violence and offers preventative measures that parents and educators can take to protect their communities.
An Educator’s Guide to Assessing Threats in Student Writing
Brian Van Brunt, W. Scott Lewis & Jeffrey H. Solomon
Based on research from the threat-assessment community and drawing from the collective fields of law enforcement, law, and psychology, the authors expand on evidence-based practices to help student affairs staff and K-12 educators best assess the validity of these communications and develop intervention and management plans.
Assessing Threat in Written Communications, Social Media, and Creative Writing
Dr. Brian Van Brunt
Most of those who plan violent attacks communicate their intentions before the attacks via social media and written communication, either through unintentional ‘‘leakage’’ or intentionally through ‘‘legacy tokens’’ used to explain their motivations. Most attackers share this information prior to the attack as a fantasy rehearsal to gauge the reaction and level of the attention that will come to them after the actual attack.
Averting Targeted School Violence: A U.S. Secret Service Analysis of Plots against schools
National Threat Assessment Center (NTAC)
Understanding cases of averted violence allows officials and researchers the ability to study where violence reduction principles worked and stopped an attack from moving from idea to action. This study included 67 averted attacks occurring from 2006 to 2018. The report stresses the importance of identifying risk factors like bullying, access to firearms, and grievances prior to criminal action.
Beyond the Red Flags
Brian Van Brunt, Ed.D. and Amy Murphy, Ph.D.
Early identification of red flags and at-risk behavior is a research-based best practice in the prevention of targeted violence. This article expands on this foundational concept and describes how to fill gaps in targeted violence prevention by moving beyond red flags. The authors describe five critical concepts related to behavioral intervention and threat assessment work in schools, workplaces, and communities that are commonly missed or underutilized.
Beyond the Red Flags: Overcoming Obstacles and Managing Threat
D-Prep Safety
When it comes to preventing violence, it is not enough to just know and recognize the red flags. We need to advance the research-based work of collaborative teams, avoid the singular focus on target hardening or mental health diagnosis, increase the use of threat or violence risk assessments over psychological assessments, incorporate red teaming into processes to identify vulnerabilities, and commit to continuous risk assessments and ongoing threat management.
Dangerous Instincts: Use an FBI Profiler's Tactics to Avoid Unsafe Situations
Mary Ellen O’Toole & Alisa Bowman
Using the SMART method, which O’Toole developed and used at the FBI, we can confidently know how to Respond to a threat in any situation, hire someone who will work inside your home like a contractor or housekeeper, figure out whether a prospective employee is a safe bet, know whom you can trust with your children, and more.
Enhancing School Safety Using a Threat Assessment Model
National Threat Assessment Center
When incidents of school violence occur, they leave a profound and lasting impact on the school, the community, and our nation as a whole. Ensuring safe environments for elementary and secondary school students, educators, administrators, and others is essential. This operational guide was developed to provide fundamental direction on how to prevent incidents of targeted school violence, that is, when a student specifically selects a school or a member of the school community for harm. The content in this guide is based on information developed by the U.S. Secret Service, Protective Intelligence and Assessment Division, National Threat Assessment Center (NTAC).
Foundations of Threat Assessment and Management
Andre Simons and J. Reid Meloy
In June of 2014 a Seattle Pacific University student tackled and pepper-sprayed an active shooter on campus who had killed one person and injured two others (“1 dead, others hurt,” 2014). In April of 2015 in Washington State, a North Thurston High School teacher confronted and overpowered a 16-year-old school shooter who had fired two shots inside the high school (“Teacher Tackles Shooter,” 2015). In the summer of 2015, a heavily armed gunman opened fire on a high-speed train traveling from Amsterdam to Paris before being challenged by passengers, two of whom were US soldiers ( “The Men Who Averted,” 2015). These disruptions were heroic, incredibly brave, and saved countless lives. The right people were in the right place at the right time; they recognized the signs of the attack and made the decision to challenge the offender.
Guidelines for Responding to Student Threats of Violence
Dewey Cornell and Peter Sheras
This is the only threat assessment model supported by controlled studies and listed in the federal government's National Registry of Evidence-based Programs and Practices. An efficient and effective way to resolve student threats and reduce use of school suspension. Used in thousands of schools nationwide. Training available from the author.
Harm to Others: The Assessment and Treatment of Dangerousness
Brian Van Brunt
Van Brunt offers an effective way to increase knowledge of and training in violence risk and threat assessment, and it also provides a comprehensive examination of current treatment approaches. The underlying concepts and suggestions are useful for counselors, psychologists, and social workers who face these issues in their daily practice.
International Handbook of Threat Assessment
J. Reid Meloy & Jens Hoffman
Threat assessment is a method used by mental health and law enforcement professionals to assess the risk of intended violence toward a specific target. This guide offers a definition of the foundations of threat assessment, systematically explores its fields of practice, and provides information and instruction on the best practices of threat assessment.
Terrorist in Training: The Role of Social Media and the Rise of Terrorism through Nationalistic White Agenda
Drs. Lisa Pescara-Kovach, Brian Van Brunt and Amy Murphy
The U.S. political landscape is increasingly divided, fueled in part by the indignant, caustic, and divisive language used in our social media and online conversations. The authors examine a subset of white males who feel marginalized and powerless as they hear messaging advancing tolerance, diversity, equality, and political correctness. This in turn has fueled vocal and strident opposition to mass immigration, rage over the disappearance of a so-called pure culture of Germans and Europeans, and an underlying fear at the prospect of losing their history and heritage. The open nature of social media has provided a safe haven for our youth to be radicalized by those espousing Generation Identity and Alt-Right ideologies, euphemisms for white supremacist thought and Nazism. The authors explore this trend through the recent terroristic actions in El Paso, Texas, Charleston, South Carolina and the related events of Oslo, Norway and Christchurch, New Zealand.
The Role of Warning Behaviors in Threat Assessment: An Exploration and Suggested Typology
J. Reid Meloy, Ph.D., Jens Hoffmann, Ph.D., Angela Guldimann, M.A., and David James, M.B., B.S., M.A.
The concept of warning behaviors offers an additional perspective in threat assessment. Warning behaviors are acts which constitute evidence of increasing or accelerating risk. They are acute, dynamic, and particularly toxic changes in patterns of behavior which may aid in structuring a professional’s judgment that an individual of concern now poses a threat – whether the actual target has been identified or not. They require an operational response. A typology of eight warning behaviors for assessing the threat of intended violence is proposed: pathway, fixation, identification, novel aggression, energy burst, leakage, directly communicated threat, and last resort warning behaviors.
Threat Assessment and Management Strategies: Assessing Hunters and Howlers
Frederick S. Calhoun & Stephen W. Weston
A successful threat management process does not necessarily depend on large staffs or huge resource commitments, but, instead, on attention to detail and a thoughtful approach. Through case studies and analyses, this volume explains the best practices for assessing problem individuals and the optimal protective response and management strategy.
Threat Assessment: A Risk Management Approach
James T. Turner & Michael G Gelles
Threat Assessment: A Risk Management Approach examines the factors that human resource, security, legal, and behavioral professionals need to understand in work violence and threat situations that disrupt the working environment, revealing the best ways to reduce risk and manage emergencies.
Understanding and Treating Incels: Case Studies, Guidance, and Treatment of Violence Risk
Brian Van Brunt & Chris Taylor
This is an indispensable guide for mental health clinical staff, social workers, prevention specialists, educators, and threat assessment professionals who want to better understand the involuntary celibate movement, assess individuals’ potential for violence, and offer treatment approaches and prevention efforts.
Violence Assessment and Intervention: The Practitioner’s Handbook
James S. Cawood & Michael H. Corcoran
This text provides a proven methodology, grounded in the current empirical research and the authors’ experience in successfully assessing and managing thousands of cases, for analyzing concerning behaviors and potential threatening situations, and taking action in these challenging, dynamic environments before tragedy occurs.
Where the Attack Cycle Intersects the Pathway to Violence
TorchStone VP, Scott Stewart
The concept of the attack cycle is a useful framework protective intelligence practitioners can use to understand, identify and detect behaviors associated with an intentional or targeted attack. The demands of the attack cycle requires those planning an attack to conduct certain activities and the vulnerabilities to detection they leave themselves open to. This article examines how the attack cycle intersects with another model for understanding the behavior and indicators assailants exhibit before an attack, known as The Pathway to Violence.
White Supremacist Violence: Understanding the Resurgence and Stopping the Spread
Brian Van Brunt, Lisa Pescara-Kovach & Bethany Van Brunt
White Supremacist Violence is a powerful resource for education and mental health professionals who are developing the tools and skills needed to slow the progress of the fast-growing hate movement in the United States. White Supremacist Violence gives readers useful perspectives and insights into the white supremacy movement while offering clinicians, threat-assessment professionals, and K-12 and university educators and administrators practical guidance on treatment and prevention efforts.