Proposal Page

That password is incorrect. Please try again.

Your password has expired. Please contact bethany@dprep.com for continued access.

blank header image.png
blank header logo.png

Sample Training Schedule

Trainings On Select Tuesdays, 11:00 - 12:30pm ET

CARE training overview
BIT Guide

DATE

TOPIC

SLIDES

August 30th

Core competencies for the CARE team

September 13

Initial risk assessment and case studies

September 27

Meeting logistics, process and flow

October 11

Growing and maturing the team

October 25

Core tenets of violence risk assessment

November 8

Interviewing skills, deception detection and bias & culture

November 22

From risk assessment to threat management

December 6

Case study application and report writing

January 10

Building connection and establishing a plan

January 24

Assessing risk and making a referral

February 7

Motivating the unmotivated

February 28

Growing and maturing the team

Moving Beyond the Red Flags:
Overcoming Obstacles and Managing Threat

Red Flags Outline

Program Outline

Red Flags Participant Guide

Participant Guide

Case Study

Case Study Guide

Part One: Defining the Problem

Part Two: Finding Solution

Resources & Suggested Reading

Back to School Safety Preparation
BIT Development Checklist
Assessing Risk Guide
Training in School-Based Threat Assessment
Affective Violence Interview Sheet
Targeted Violence Interview Sheet
Suicide Interview Sheet

This work hypothesizes that the costuming and objectification of targets provide insight into the motivation for a rampage violence attack. These risk factors are then useful for members of behavioral intervention and threat assessment teams to observe as potential leakage prior to an attack. The article presents dozens of incidents of mass casualty shootings and highlights the targeting of women and the process of objectification of the targets. The clothing and accessories used by the attackers are investigated not only for their tactical significance, but also in affiliation with societal archetypes of antiheroes. In addition, the authors present a review of mass shooters who focused on female targets in an attempt to find a catharsis from their past negative experiences, irrational thoughts, and misogynistic philosophies.

Most of those who plan violent attacks communicate their intentions before the attacks via social media and written communication, either through unintentional ‘‘leakage’’ or intentionally through ‘‘legacy tokens’’ used to explain their motivations. These should be understood as part of their fantasy rehearsals in the aftermath of an attack. Additionally, searching for and attending to such messages provides an opportunity to intervene and thwart potential attacks. This article provides a framework for reviewing and understanding these messages and assessing them for potential lethality and dangerousness.

Two issues of importance for Behavioral Intervention and Threat Assessment Teams are the accessibility of the BIT/TAT site on the college website and what keywords to search for on social media in conjunction with the school name to get out ahead of potential threats. This article offers some suggestions to increase visibility and access to the BIT/TAT website and identify potential concerns by combing through social media for threatening language.

The VRAW2 is a newly created instrument used to assess emails, letters, or creative writing that contain direct threats or violent themes of concern. The article reviews the five factors and corresponding sub-factors used to assess the potential for threat. Scoring considerations and case examples are provided to illustrate how to score each of the sub-factors informing the overall factors. The VRAW2 is then discussed in context of the NaBITA Threat Assessment Tool and the Structured Interview for Violence Risk Assessment (SIVRA-35).

There is a pervasive assumption that mental illness equates to dangerousness and violence as it relates to mass shootings. The researchers examine the assumption and present a comprehensive literature review of how issues of mental illness impact violence and dangerousness. Many risk factors for violence are associated with mental health conditions, but they also occur in the absence of a diagnosis. A range of issues will be explored, including the unpredictability of bipolar disorder and schizophrenia, stress from mental health problems inhibiting emotional stability, and past inpatient hospitalizations for suicide attempts as they impact likelihood of committing targeted violence. Risk mitigation strategies will be presented following a review of the literature.

Cover of Beyond Initial Response: Using the National Incident Management System Incident Command System

Beyond Initial Response: Using the National Incident Management System Incident Command System

Tim Deal

Responders have to be ready to carry out their Incident Command System position-specific responsibilities and to be effective they have to know how to operate as part of an ICS organization. This book provides readers the confidence, knowledge and assurance that are required to successfully play as part of an incident management team.

Cover of Catastrophe and Social Change: Based Upon a Sociological Study of the Halifax Disaster

Catastrophe and Social Change: Based Upon a Sociological Study of the Halifax Disaster

Samuel Henry Prince

This book offers an observational study of the social impact caused by the Halifax disaster, where 1,782 people were killed in an explosion on a cargo ship, and the relief efforts following the event. In it, Prince follows the event from the nature of the catastrophe, through the disintegration of social order, and ending with the rebuilding of the effected communities.

Cover of Disasters by Design: A Reassessment of Natural Hazards in the United States

Disasters by Design: A Reassessment of Natural Hazards in the United States

Dennis S. Mileti

Disasters by Design provides an alternative and sustainable way to view, study, and manage hazards in the United States that would result in disaster-resilient communities, higher environmental quality, inter- and intragenerational equity, economic sustainability, and improved quality of life as well as an overview of what is known about natural hazards, disasters, recovery, and mitigation.

Cover of Full-Rip 9.0: The Next Big Earthquake in the Pacific Northwest

Full-Rip 9.0: The Next Big Earthquake in the Pacific Northwest

Sandi Doughton

Meet the scientists who are dedicated to understanding the way the earth moves and what patterns can be identified and how prepared (or not) people are. With a 100% chance of a mega-quake hitting the Pacific Northwest, this fascinating book reports on the scientists who are trying to understand when, where, and just how big The Big One will be.

Cover of Left of Bang: How the Marine Corps’ Combat Hunter Program Can Save Your Life

Left of Bang: How the Marine Corps’ Combat Hunter Program Can Save Your Life

Patrick Van Horne, Jason Riley, & Shawn Coyne

Is there a way to listen to your inner protector more and to increase your sensitivity to threats before they happen? General James Mattis asked this question and issued a directive to operationalize the Marine Corps’ Combat Hunter program, a comprehensive and no-nonsense approach to heightening each and every one of our gifts of fear.

Cover of The Checklist Manifesto: How to Get Things Right

The Checklist Manifesto: How to Get Things Right

Atul Gawande

Gawande shows what the simple idea of the checklist reveals about the complexity of our lives and how we can deal with it. He examines checklists in aviation, construction, and investing, but focuses on medicine, where checklists mandating simple measures like hand washing have dramatically reduced hospital-caused infections and other complications.

Cover of The Gift of Fear: Survival Signals that Protect Us from Violence

The Gift of Fear: Survival Signals that Protect Us from Violence

Gavin de Becker

De Becker offers specific ways to protect yourself and those you love, including how to act when approached by a stranger, when you should fear someone close to you, what to do if you are being stalked, how to uncover the source of anonymous threats or phone calls, the biggest mistake you can make with a threatening person, and more.

Cover of The Unthinkable: Who Survives When Disaster Strikes — and Why

The Unthinkable: Who Survives When Disaster Strikes — and Why

Amanda Ripley

By combining the stories of survivors with research into how the brain works under extreme duress, this inspiring mix of narrative, science and participatory journalism reveals how human fear circuits and crowd dynamics work, why our instincts sometimes misfire in modern calamities, and how we can do much, much better.

Cover of School Shooters: Understanding High School, College, and Adult Perpetrators

School Shooters: Understanding High School, College, and Adult Perpetrators

Peter Langman

Langman takes a look at 48 national and international cases of school shootings in order to dispel the myths, explore the motives, and expose the realities of preventing school shootings from happening in the future, including identifying at risk individuals and helping them to seek help before it’s too late.

Cover of Why Kids Kill: Inside the Minds of School Shooters

Why Kids Kill: Inside the Minds of School Shooters

Peter Langman

In this breakthrough analysis, Dr. Peter Langman presents the psychological causes of school shootings and offers unprecedented insight into why certain teens exhibit the potential to kill. He shows how to identify early signs of possible violence and offers preventative measures that parents and educators can take to protect their communities.

Cover of An Educator’s Guide to Assessing Threats in Student Writing

An Educator’s Guide to Assessing Threats in Student Writing

Brian Van Brunt, W. Scott Lewis & Jeffrey H. Solomon

Based on research from the threat-assessment community and drawing from the collective fields of law enforcement, law, and psychology, the authors expand on evidence-based practices to help student affairs staff and K-12 educators best assess the validity of these communications and develop intervention and management plans.

Cover of Dangerous Instincts: Use an FBI Profiler's Tactics to Avoid Unsafe Situations

Dangerous Instincts: Use an FBI Profiler's Tactics to Avoid Unsafe Situations

Mary Ellen O’Toole & Alisa Bowman

Using the SMART method, which O’Toole developed and used at the FBI, we can confidently know how to Respond to a threat in any situation, hire someone who will work inside your home like a contractor or housekeeper, figure out whether a prospective employee is a safe bet, know whom you can trust with your children, and more.

Cover of Harm to Others: The Assessment and Treatment of Dangerousness

Harm to Others: The Assessment and Treatment of Dangerousness

Brian Van Brunt

Van Brunt offers an effective way to increase knowledge of and training in violence risk and threat assessment, and it also provides a comprehensive examination of current treatment approaches. The underlying concepts and suggestions are useful for counselors, psychologists, and social workers who face these issues in their daily practice.

Cover of International Handbook of Threat Assessment

International Handbook of Threat Assessment

J. Reid Meloy & Jens Hoffman

Threat assessment is a method used by mental health and law enforcement professionals to assess the risk of intended violence toward a specific target. This guide offers a definition of the foundations of threat assessment, systematically explores its fields of practice, and provides information and instruction on the best practices of threat assessment.

Cover of Threat Assessment and Management Strategies: Assessing Hunters and Howlers

Threat Assessment and Management Strategies: Assessing Hunters and Howlers

Frederick S. Calhoun & Stephen W. Weston

A successful threat management process does not necessarily depend on large staffs or huge resource commitments, but, instead, on attention to detail and a thoughtful approach. Through case studies and analyses, this volume explains the best practices for assessing problem individuals and the optimal protective response and management strategy.

Cover of Threat Assessment: A Risk Management Approach

Threat Assessment: A Risk Management Approach

James T. Turner & Michael G Gelles

Threat Assessment: A Risk Management Approach examines the factors that human resource, security, legal, and behavioral professionals need to understand in work violence and threat situations that disrupt the working environment, revealing the best ways to reduce risk and manage emergencies.

Cover of Understanding and Treating Incels: Case Studies, Guidance, and Treatment of Violence Risk

Understanding and Treating Incels: Case Studies, Guidance, and Treatment of Violence Risk

Brian Van Brunt & Chris Taylor

This is an indispensable guide for mental health clinical staff, social workers, prevention specialists, educators, and threat assessment professionals who want to better understand the involuntary celibate movement, assess individuals’ potential for violence, and offer treatment approaches and prevention efforts.

Cover of Violence Assessment and Intervention: The Practitioner’s Handbook

Violence Assessment and Intervention: The Practitioner’s Handbook

James S. Cawood & Michael H. Corcoran

This text provides a proven methodology, grounded in the current empirical research and the authors’ experience in successfully assessing and managing thousands of cases, for analyzing concerning behaviors and potential threatening situations, and taking action in these challenging, dynamic environments before tragedy occurs.