The 2024 Guide to Threat Assessment Approaches for Law Enforcement

For law enforcement officers, the ability to accurately identify and respond to threats is paramount to ensuring public safety. Whether it’s reacting to active threats in real time or enhancing long-term predictive capabilities, threat and risk assessments  are techniques that can help resolve threats and prevent violent incidents. 

But threat assessment means different things to different people. Security professionals, police, military personnel, psychologists, and school counselors all conduct tasks they describe as threat assessment. These tasks are all predictive in nature, but very different. 

For example, judges conduct threat risk assessments to determine whether someone presents a general danger to the public after being released pretrial, while law enforcement is more often focused on assessing imminent or immediate threats.

This guide was first published in 2019. I wrote it because I was having trouble differentiating between all the different “types” of threat assessment. It turns out that lots of people use the term. Sometimes the term is used interchangeably with “risk assessment.” 

 Since its publication, it has proven to be one of the most popular posts. Last year alone, more than 2,900 people all over the world had read this post. For a small company like us, this is awesome. We are proud to be helping police everywhere identify techniques that can help them protect their communities. 

I hope you find this resource useful too. Don’t hesitate to reach out if we can help you or your organization.

Threat Assessment Approaches

Take a moment to think about what problem you are hoping that threat assessment will help solve. 

Are you looking to:

  1. plan for and protect facilities and critical infrastructure against terrorist attacks, insider threats, or natural disasters;

  2. help your officers identify behavior-based threats and react to threatening individuals, such as active shooters; 

  3. protect your computer networks, systems, and servers from attacks by malicious actors;

  4. identify, assess, and intervene with a person who may commit targeted or instrumental violence (e.g., a mass shooting); or 

  5. assess a specific individual’s risk for violent behavior.

Let’s take a deeper dive into each threat risk assessment approach. Please understand that these next sections do not represent a comprehensive review of each approach. Instead, they are meant to help you identify relevant threat assessment training and provide you with resources to learn more.

1. The Security Threat and Risk Assessment

For people who work in the security or protection industry, threat assessment refers to the process of evaluating and analyzing potential risks that could impact the security and safety of critical infrastructure and people associated with a particular site or facility. 

It focuses on analyzing existing protective measures and vulnerabilities at facilities and identifying ways to reduce those vulnerabilities and enhance safety. This includes assessing things like physical security, cybersecurity, and staffing to safeguard not only critical infrastructure but any facility—businesses, elementary schools, and concert halls.

 There are a broad range of threats that can affect a particular site or location, including:

  • External hazards, such as natural disasters and fires;

  • Nonviolent and violent criminal threats, such as potential thefts, threats of violence toward staff, active shooter incidents, or terrorist threats

  • Potential accidents related to improper building maintenance or unsafe working conditions;

  • Cyber threats, such as hacking, data breaches, ransomware; and

  • Any other threats that could impact telecommunications, transportation, or delivery of services at that location. 

Security Threat Risk Assessment at a School

For a security risk assessment, let’s take the example of an elementary or high school. Potential threats to a school could include a natural disaster, an active shooter, or accidents arising from improper safety precautions. Each of these threats requires a different response

This security threat risk assessment includes not only identifying potential threats but also assessing the likelihood of their occurrence. Just because something can happen doesn’t mean it will. 

The Vulnerability Assessment

Following the security risk threat assessment is the vulnerability assessment, which has two parts. First, it involves a determination of the assets at risk (e.g., people, buildings, equipment). This includes an estimation of the financial loss that would be incurred if the given location was successfully attacked and stopped providing service. Second, it includes an assessment of the level of attractiveness of the target (in the case of intentional attacks) and the level of existing defenses against each threat.

In the case of a school, some common gaps in security include difficulty in securing entry and access points, insufficient security measures (e.g., cameras, security personnel) due to budgetary concerns, and limitations in training and experience among school personnel.  

Learn More About the Security Risk Threat Assessment

If you are interested in learning more about security threat risk assessment, here are some great resources:

2. Active Threat Assessment

For law enforcement officers, threat assessment is also used to describe a process of observing, identifying, and reacting to potential, imminent, or immediate threats. These threats could be against your officers or the public. At Second Sight, we refer to the systematic process of identifying immediate threats as “active threat assessment.” 

The Active Threat Assessment Methodology

Active threat assessment involves a focused observation of behaviors and actions. In this methodology, an observer (such as one of your officers) systematically observes their environment, identifies potentially suspicious individuals (also known as persons of interest), and assesses the potential threats posed by these individuals. 

Threat_Assessment_Training_V2.png

A person of interest (POI) is someone who displays some type of abnormal behavior warranting closer observation. At this time, an officer can assess threat indicators, which are visual behaviors that might indicate threatening behavior or suspicious activity. If threat indicators are apparent, the POI may become a target for potential interdiction.

Active Threat Assessment Training

Threat assessment skills will help your officers focus their attention on true threats and better equip them to prevent potential tragedies. For example, a POI might show visible signs that they are carrying a weapon. In such a scenario, it could help an officer identify and prevent a potential active shooter incident.  

 Second Sight offers active threat assessment training for law enforcement professionals. Law enforcement classes are certified through the IADLEST National Certification Program (NCP) and are regularly updated based on emerging research as well as feedback from our participants.

 To learn more about active threat assessment, check out our companion posts:

You can also take our free online course, Introduction to Active Threat Assessment. In this course, you can learn about the active threat assessment methodology and decide if our full-length active threat assessment programs are right for you and your officers. 

3. The Cyber-security Threat Risk Assessment

The same threat risk assessment and analysis process can be applied to cybersecurity, which is a key component of overall risk assessment. A cybersecurity threat risk assessment focuses on protecting access to information (e.g., data, personal information), access to networks (e.g., the internet at your offices), software (e.g., telecommunications systems, electronic data management systems), and hardware (e.g., the laptops and mobile phones of your officers). 

 A cyberattack refers to any purposeful attempt to obtain unauthorized access to a network, computer system, or device. Typically, these attacks are carried out with the intention of stealing, modifying, exposing, or destroying data or other assets. Perpetrators employ a range of techniques in carrying out these attacks.

 One type of cyberattack that is becoming increasingly common is ransomware. Ransomware is a type of malware that is installed on a system without the user’s knowledge or permission, often via websites, emails, or file attachments. Once infected, the ransomware locks and encrypts a victim’s data, files, and systems, rendering them unusable until a sum of money is paid to the attacker.

 Ransomware can have dire consequences. Once the data gets into someone else’s hands, there’s no guarantee that the victim will get it back. Unless they pay the ransom, which still doesn’t guarantee that cybercriminals will return the files. 

 In recent years, there has been a significant increase in the number of ransomware attacks, with several high-profile incidents affecting diverse entities ranging from hospitals to schools and government agencies. For example, researchers estimate that 6 in 10 health care companies were hit by ransomware attacks in the last year. These attacks disrupt services, put patients’ lives at risk and cost hospitals millions of dollars.

The basic steps of a cybersecurity threat risk assessment are: 

  1. characterize the type of system that is at risk;

  2. identify specific threats to that system (e.g., unauthorized access, misuse of information, data leakage or exposure, loss of data, disruption of service);

  3. determine inherent risks and impacts;

  4. analyze and identify existing controls that may prevent, mitigate, detect, or compensate for potential threats;

  5. assess the extent to which existing controls successfully mitigate the threats;

  6. determine the likelihood of a threat occurring based on current controls; and

  7. calculate a risk rating based on a combination of impact and likelihood of occurrence.

After the assessment, you will have a better idea of what cybersecurity controls are in place and where vulnerabilities still exist. Then, you can begin implementing security controls to mitigate any potential risks. 

 If you are interested in learning more about cybersecurity threat risk assessments, check out the following resources:

 4. Threat Assessment for Instrumental Violence

Instrumental violence is when someone commits or threatens to commit a specific attack, such as a mass shooting. In your case, it could involve an employee who has made threats against other staff members or has been involved in recent altercations at work.

Threat assessment for instrumental violence is incident- and subject-specific, meaning that it assesses the likelihood that a specific individual will commit a specific attack. This is a growing area and is often referred to as Behavioral Threat Assessment and Management (or BTAM) or Threat Assessment and Management.

The National Association of School Psychologists (NASP) describes a broad spectrum of activities for identifying and intervening with potentially violent individuals who exhibit risk factors for instrumental violence.

A noted authority on this approach is the U.S. Secret Service National Threat Assessment Center (NTAC). In a 2023 report titled “Mass Attacks in Public Places,” they noted that many mass attackers often have similarities, including: a personal grievance; a history of criminal behavior; substance abuse or mental health symptoms; or other stressors (such as financial instability). Many of these attackers also made statements or exhibited certain behaviors prior to the attack that elicited concern from others. These situational and behavioral factors can serve as flags for individuals who may commit instrumental violence.

For information on threats of mass attacks in public places, see the following resources:

Threat Assessment in Schools

Instrumental violence is often associated with schools, for which a more nuanced approach can be used. This threat assessment process focuses on a range of factors, including but not limited to motives, communications, weapons access, stressors, emotional and developmental issues, and protective factors. For more information on this approach, see our post on school behavioral threat assessment.

One alarming trend that has been on the rise is the false reporting of attacks at schools and universities. More than 500 schools across the country have received these hoax calls, which are now considered to be part of a coordinated “swatting” campaign exploiting prevalent fear over school shootings. Swatting is when people falsely report violent situations like bomb threats, hostages, and active shooters to trigger a police response, preferably by a SWAT team, to a particular address.

 Swatting incidents can be dangerous, putting the lives of the individuals at the reported location at risk. Law enforcement might respond aggressively, not knowing that the situation is a hoax. The fear and trauma associated with a sudden, intense police response can also cause lasting psychological effects for targeted individuals. These incidents also occupy limited emergency services in a community and can cause delayed responses to genuine emergencies.

 Proactive mitigation strategies are essential to preventing and limiting the impact of these incidents. For information on how to identify and respond to a potential swatting incident, see this guide from the state of Washington’s School Safety Center.

 For more information on instrumental violence threat assessment in schools, see the resources below:

5. The Violence Threat Risk Assessment

Violence threat risk assessments are typically used to estimate the likelihood that an individual will exhibit violent behavior in the future. They are used to help practitioners and intervention providers make informed decisions about risk mitigation, supervision, and treatment options for potentially dangerous individuals.

 Like the instrumental violence approach described above, this approach also involves identification of risk factors and intervention strategies. The difference, though, is that violence threat risk assessment focuses on assessing an individual’s predilection for violence more generally and is not related to a specific attack against a specific target.

 This is often referred to as a violence risk assessment or just a risk assessment. A critical difference between this risk assessment and the threat assessment for instrumental violence is the former measures the likelihood that an individual will commit some sort of violent act in the future, while the latter is focused on predicting a specific targeted act.

This approach may not be something you or your officers perform directly. Typically, these assessments are conducted by qualified clinical professionals. There are different types of violence threat risk assessments that predict different types of risks, ranging from domestic violence to terrorism. Some of these rely on the judgment of professionals, while others are actuarial-based. 

 One recommendation is the shift toward structured professional judgment (SPJ) approaches. The SPJ approach involves a systematic evaluation of risk factors by professionals who use their expertise and judgment to reach a conclusion about an individual's level of risk. Some of the commonly known SPJ approaches are the Violent Extremism Risk Assessment (VERA), the Extremism Risk Guidance 22+ (ERG 22+), the Spousal Assault Risk Assessment (SARA), and the Historical Clinical Risk Management-20 (HCR-20).

 In contrast, actuarial-based risk assessment instruments (RAIs) predict risk by using statistical methods and a scoring system informed by historical data and criminological theory. Using the scoring system, RAIs screen for predetermined risk indicators, which are used to generate a numerical risk score. The risk score reflects the likelihood of a future event, such as recidivism or targeted violence. Some of the most commonly used RAIs are the Violence Risk Appraisal Guide (VRAG), the Virginia Pretrial Risk Assessment Instrument (VPRAI), the Level of Service Inventory-Revised (LSI-R), the Ohio Risk Assessment System (ORAS), and the Public Safety Assessment (PSA).

 Each approach has pros and cons. In the SPJ approach, professionals examine a wide range of aggravating and mitigating factors and can offer more personalized assessments, especially in unique circumstances. However, some criticize the SPJ approach for being too subjective and inconsistent when making risk evaluations due to variations in professional judgment and individual biases.

 In contrast, RAIs are consistent in making predictions based on the same inputs, as they rely on predetermined formulae to assess risk. However, there are concerns about their potential to outperform human judgment, as RAIs don’t adapt well to uncommon circumstances, and they often include static factors (such as being a male) that cannot be changed. Relatedly, if historical data is biased, the algorithm might perpetuate biases.

 Ultimately, selecting a risk assessment tool involves considering the specific nature of the risk being assessed (e.g., violent extremism, general violence, sexual offending), the characteristics of the population being assessed (e.g., age, gender, cultural background), the setting or context of the assessment (e.g., forensic mental health, correctional facility), and the availability of empirical evidence supporting the tool's reliability and validity.

 The Public Risk Innovation, Solutions, and Management (PRISM) framework by the Public Entity Risk Institute (PERI) provides a comprehensive approach to risk management for public entities. While it is not an actuarial-based tool, PRISM encompasses various aspects of risk identification, assessment, and management. The framework includes various modules and resources that assist organizations in understanding, preventing, and responding to a range of risks, from financial and operational risks to strategic and reputational risks.

For more information on violence threat risk assessment, check out the following resources:

What’s Next?

All these approaches are essential to protecting our community and keeping people safe. Depending on your needs, any of these approaches to threat and security assessment may be relevant to you or your personnel.

 As a next step, take a deeper dive into some of these resources or check out our recently recertified onlineThreat Awareness for Law Enforcement  Program.

  • Botha, A. (2021). Chapter 28: Prevention of Terrorist Attacks on Critical Infrastructure. In the Handbook of Terrorism Prevention and Preparedness. Retrieved January 2023 from https://icct.nl/app/uploads/2021/04/Handbook-Ch-28-Botha-Prevention-of-Terrorist-Attacks-on-Critical-Infrastructure.pdf

    Brayne, S., & Christin, A. (2021). Technologies of crime prediction: The reception of algorithms in policing and criminal courts. Social Problems, 68(3), 608-624. Retrieved January 2023 from http://www.angelechristin.com/wp-content/uploads/2020/03/Technologies-of-Crime-Prediction_SocProblems.pdf

    Browning-Wright, D. (2003). “Eleven Questions to Guide Data Collection in a Threat Assessment Inquiry.” U.S. Secret Service: Department of Education. Retrieved January 2023 from https://locker.txssc.txstate.edu/f40474bcbab5f025bb1570f1bfbf9f06/Eleven-Questions-to-Guide-Data-Collection-in-a-Threat-Assessment-Inquiry.pdf

    Capellan, J.A., & Jiao, A.Y. (2019). Deconstructing Mass Public Shootings: Exploring Opportunities for Intervention. Rowan University: Rockefeller Institute of Government. Retrieved January 2023 from https://rockinst.org/wp-content/uploads/2019/10/10-24-19-Deconstructing-Mass-Shootings-Brief-1.pdf

    Chohlas-Wood, A. (2020). Understanding Risk Assessment Instruments in Criminal Justice. The Brookings Institution. Retrieved January 2023 from https://www.brookings.edu/research/understanding-risk-assessment-instruments-in-criminal-justice/

    Commerce. Retrieved January 2023 from https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-30r1.pdf

    Cornell, D.G. (2020). Threat assessment as a school violence prevention strategy. Criminology & Public Policy, 19(1), 235-252. Retrieved January 2023 from https://onlinelibrary.wiley.com/doi/abs/10.1111/1745-9133.12471

    Criminal Intelligence Coordinating Council (CICC). (2016). Understanding Digital Footprints: Steps to Protect Personal Information, A Guide For Law Enforcement. Global Advisory Committee: U.S. Department of Homeland Security. Retrieved January 2023 from https://bja.ojp.gov/sites/g/files/xyckuh186/files/media/document/Understanding_Digital_Footprints-09-2016.pdf

    Cybersecurity and Infrastructure Security Agency (CISA). (2014). Emergency Services Sector Roadmap to Secure Voice and Data Systems. Department of Homeland Security. Retrieved January 2023 from https://www.cisa.gov/sites/default/files/publications/emergency-services-sector-roadmap-to-secure-voice-and-data-systems-032014-508.pdf

    Cybersecurity and Infrastructure Security Agency (CISA). (2015). Emergency Services Sector-Specific Plan. Department of Homeland Security. Retrieved January 2023 from https://www.cisa.gov/sites/default/files/publications/emergency-services-sector-specific-plan-112015-508_0.pdf

    Cybersecurity and Infrastructure Security Agency (CISA). (2017). A Guide to Securing Networks for Wi-Fi, Version 1.0. Department of Homeland Security. Retrieved January 2023 from https://www.cisa.gov/uscert/sites/default/files/publications/A_Guide_to_Securing_Networks_for_Wi-Fi.pdf

    Cybersecurity and Infrastructure Security Agency (CISA). (2019). A Guide to Critical Infrastructure Security and Resilience. Retrieved January 2023 from https://www.cisa.gov/sites/default/files/publications/Guide-Critical-Infrastructure-Security-Resilience-110819-508v2.pdf

    Cybersecurity and Infrastructure Security Agency (CISA). (2019). Emergency Services Sector Landscape, Department of Homeland Security. Retrieved January 2023 from https://www.cisa.gov/sites/default/files/publications/emergency-services-sector-landscape-082019-508.pdf

    Cybersecurity and Infrastructure Security Agency (CISA). (2020). Cyber Resilience Review (CRR) Question Set with Guidance. Department of Homeland Security. Retrieved January 2023 from https://www.cisa.gov/sites/default/files/publications/3_CRR_4.0_Self-Assessment_Questions_%26amp%3B_Guidance_April_2020.pdf

    Cybersecurity and Infrastructure Security Agency (CISA). (2020). Cyber Resilience Review (CRR) Cybersecurity Frameworks. Department of Homeland Security. Retrieved January 2023 from https://www.cisa.gov/sites/default/files/publications/4_CRR_4.0_Self_Assessment-NIST_CSF_v1.1_Crosswalk-April_2020.pdf

    Cybersecurity and Infrastructure Security Agency (CISA). (ND). “State, Local, Tribal, and Territorial Authorities, Government, and First Responders.” Department of Homeland Security. Retrieved January 2023 from https://www.cisa.gov/state-local-tribal-and-territorial-authorities-government-and-first-responders

    Defense Science Board (DSB). (2012). Predicting Violent Behavior. Task Force Report. U.S. Department of Defense. Retrieved January 2023 from https://irp.fas.org/agency/dod/dsb/predicting.pdf

    Desmarais, S. L., & Zottola, S. A. (2019). Violence risk assessment: Current status and contemporary issues. Marquette Law Review, 103, 793. Retrieved January 2022 from https://scholarship.law.marquette.edu/cgi/viewcontent.cgi?article=5441&context=mulr

    Dipshan, R., Hudgins, V., Ready, F., & Warren, Z. (2020). “The Most Widely Used Risk Assessment Tool in Each U.S. State.” Retrieved January 2023 from https://www.law.com/legaltechnews/2020/07/13/the-most-widely-used-risk-assessment-tool-in-each-u-s-state/?slreturn=20230019150826

    Enang, I., Murray, J., Dougall, N., Aston, E., Wooff, A., Heyman, I., & Grandison, G. (2021). Vulnerability assessment across the frontline of law enforcement and public health: A systematic review. Policing and Society, 1-20. Retrieved January 2022 from https://www.tandfonline.com/doi/full/10.1080/10439463.2021.1927025

    International Association of Chiefs of Police (IACP). (2017). Managing Cybersecurity Risk: A Law Enforcement Guide. Retrieved January 2023 from https://www.iacpcybercenter.org/wp-content/uploads/2015/04/Managing_Cybersecurity_Risk_2017.pdf

    Mayorkas, A.N. (2022). Summary of Resources for State, Local, Tribal, Territorial, and Campus Law Enforcement Partners. U.S. Department of Homeland Security. Retrieved January 2023 from https://www.dhs.gov/sites/default/files/2022-04/22_0407_OSLLE_LE-resource-guide-signed_508.pdf

    Miller, A. (2014). Threat Assessment in Action. The American Psychological Association. Retrieved January 2023 from https://www.apa.org/monitor/2014/02/cover-threat.aspx.

    Modzeleski, W., & Randazzo, M.R. (2018). School threat assessment in the USA: Lessons learned from 15 years of teaching and using the federal model to prevent school shootings. Contemporary School Psychology, 22(2), 109-115. Retrieved January 2023 from https://link.springer.com/article/10.1007/s40688-018-0188-8

    National Association for Behavioral Intervention and Threat Assessment (NABITA). (2014). “NABITA Threat Assessment Tool.” Retrieved January 2023 from https://cdn.nabita.org/website-media/nabita.org/wordpress/wp-content/uploads/2014/04/2014-NaBITA-Threat-Assessment-Tool.pdf

    National Association for Behavioral Intervention and Threat Assessment (NABITA). (2014). “21 Questions: A Supplemental Flow Chart for the NABITA Threat Assessment Tool.” Retrieved January 2023 from http://nabita.moatusers.com/Rubric/21-Questions_0518.pdf

    National Association of School Psychologists (NASP). (2015). School Violence Prevention: Guidelines for Administrators and Crisis Teams. Retrieved January 2023 from https://www.nasponline.org/resources-and-publications/resources-and-podcasts/school-safety-and-crisis/school-violence-resources/school-violence-prevention/school-violence-prevention-guidelines-for-administrators-and-crisis-teams

    National Institute for Occupational Safety and Health (NIOSH). (2020). “Violence Risk Assessment Tools.” The Centers for Disease Control and Prevention. Retrieved January 2023 from https://wwwn.cdc.gov/WPVHC/Nurses/Course/Slide/Unit6_8

    National Threat Assessment Center (NTAC). (2018). Enhancing School Safety Using a Threat Assessment Model: An Operational Guide for Preventing Targeted School Violence. U.S. Secret Service: Department of Homeland Security. Retrieved January 2023 from https://www.cisa.gov/sites/default/files/publications/18_0711_USSS_NTAC-Enhancing-School-Safety-Guide.pdf.

    National Threat Assessment Center (NTAC). (2019). Protecting America’s Schools: A U.S. Secret Service Analysis of Targeted School Violence. U.S. Secret Service: Department of Homeland Security. Retrieved January 2023 from https://www.secretservice.gov/sites/default/files/2020-04/Protecting_Americas_Schools.pdf

    National Threat Assessment Center (NTAC). (2020). Mass Attacks in Public Spaces - 2019. U.S. Secret Service: Department of Homeland Security. Retrieved January 2023 from https://www.secretservice.gov/sites/default/files/reports/2020-09/MAPS2019.pdf

    National Threat Assessment Center (NTAC). (2021). Averting Targeted School Violence. U.S. Secret Service: Department of Homeland Security. Retrieved January 2023 from https://www.secretservice.gov/sites/default/files/reports/2021-03/USSS%20Averting%20Targeted%20School%20Violence.2021.03.pdf

    National Threat Evaluation and Reporting Program. (ND). “Behavioral Approach to Violence Prevention.” Office of Intelligence Analysis: Department of Homeland Security. Retrieved January 2023 from https://sites.ed.gov/whhbcu/files/2022/01/Behavioral-Approach-to-Violence-Prevention.pdf

    Occupational Safety and Health Administration (OSHA). (ND). “Evacuation Planning Matrix.” U.S. Department of Labor. Retrieved January 2023 from https://www.osha.gov/emergency-preparedness/evacuation-matrix

    “Ohio Risk Assessment System: Pretrial Assessment Tool (ORAS-PAT).” (2018). Retrieved January 2023 from https://cjdata.tooltrack.org/sites/default/files/2018-10/ORAS%20Scoring%20Assessment.pdf

    Partnership on Artificial Intelligence. (2019). Report on Algorithmic Risk Assessment Tools in the U.S. Criminal Justice System. Retrieved January 2023 from https://pde.is/posts/docs/Report-on-Algorithmic-Risk-Assessment-Tools.pdf

    RAND Corporation (ND). “Follow-Up Actions: No Prevention Opportunity Missed.” Mass Attacks Defense Toolkit. Retrieved January 2023 from https://www.rand.org/pubs/tools/TLA1613-1/toolkit/prevent/follow-up-actions.html

    RAND Corporation (ND). “In Depth: Databases to Support Threat Assessments.” Mass Attacks Defense Toolkit. Retrieved January 2023 from https://www.rand.org/pubs/tools/TLA1613-1/toolkit/prevent/threat-assessment/databases.html#:~:text=Most%2DCommonly%20Used%20Data%20Systems,and%20state%20and%20local%20databases

    RAND Corporation (ND). “Initial Detection: Through Increasing Tips and Leads Through Information Sharing.” Mass Attacks Defense Toolkit. Retrieved January 2023 from https://www.rand.org/pubs/tools/TLA1613-1/toolkit/prevent/initial-detection.html

    RAND Corporation (ND). “Prevent Phase Framework.” Mass Attacks Defense Toolkit. Retrieved January 2023 from https://www.rand.org/pubs/tools/TLA1613-1/toolkit/prevent/framework.html

    RAND Corporation (ND). “Threat Assessment: Finding and Putting Together the Puzzle Pieces.” Mass Attacks Defense Toolkit. Retrieved January 2023 from https://www.rand.org/pubs/tools/TLA1613-1/toolkit/prevent/threat-assessment.html

    Ready Campaign. (2021). “Risk Assessment.” Retrieved January 2022 from https://www.ready.gov/risk-assessment

    Ready Campaign. (2022). “Disasters and Emergencies.” Retrieved January 2023 from https://www.ready.gov/risk-assessment

    Ready Campaign. (2022). “Emergency Response Plan.” Retrieved January 2023 from https://www.ready.gov/business/implementation/emergency

    Ready Campaign. (2022). “Resource Management.” Retrieved January 2023 from https://www.ready.gov/resource-management

    Ready Campaign. (2022). “Risk Mitigation.” Retrieved January 2023 from https://www.ready.gov/risk-mitigation

    Renfroe, N.A. and Smith, J.L. (2016). “Threat / Vulnerability Assessments and Risk Analysis.” Applied Research Associates. Retrieved January 2023 from https://www.wbdg.org/resources/threat-vulnerability-assessments-and-risk-analysis.

    Romano, S.J., Levi-Minzi, M.E., Rugala, E.A., & van Hasselt, V.B. (2011). Workplace Violence Prevention. Federal Bureau of Investigation: U.S. Department of Justice. Retrieved January 2023 from https://www.fbi.gov/file-repository/stats-services-publications-workplace-violence-workplace-violence/view

    Ruggiero, P., & Foote, J. (2011). Cyber Threats to Mobile Phones. U.S. Computer Readiness Team: Department of Homeland Security. Retrieved January 2023 from https://www.cisa.gov/uscert/sites/default/files/publications/cyber_threats_to_mobile_phones.pdf

    Savage, T.A., and Woitaszewski, S.A. (2018). School-Based Threat Assessment: Best Practices and Resources. Presentation at the Minnesota School Psychologists Association: Plymouth, MN. Retrieved January 2023 from https://www.mspaonline.net/resources/Documents/past%20conference%20materials/2018/School-Wide%20Practices/School-Based%20Threat%20Assessment_%20Best%20Practices%20and%20Resources%20-%20Savage,%20Woitaszewski.pdf

    Serin, R.C., Lowenkamp, C.T., Johnson, J.L., & Trevino, P. (2016). Using a multi-level risk assessment to inform case planning and risk management: Implications for officers. Federal Probation, 80, 10. Retrieved January 2023 from https://www.uscourts.gov/sites/default/files/80_2_2_0.pdf

    Simons, A., & Meloy, J. R. (2017). Foundations of threat assessment and management. In The Handbook of Behavioral Criminology, 627-644. Retrieved January 2023 from https://link.springer.com/chapter/10.1007/978-3-319-61625-4_36

    Sokolow, B.A., Lewis, W.S., Schuster, S.K., Swinton, D.C., van Brunt, B.J. (2014). Threat Assessment in the Campus Setting. National Behavioral Intervention Team Association. Retrieved January 2023 from http://nabita.moatusers.com/Rubric/2014%20NaBITA%20Whitepaper.pdf

    South Dakota Department of Corrections. (2015). “Policy 1.4.B.123: LSI-R Assessment and Case Planning.” Retrieved January 2023 from https://doc.sd.gov/documents/about/policies/LSI-R%20Assessment%20and%20Case%20Planning.pdf

    “Violence Risk Assessments.” (ND). Retrieved January 2023 from https://psychology.iresearchnet.com/forensic-psychology/violence-risk-assessment/

    Virginia Department of Criminal Justice Service. (2018). Virginia Pretrial Risk Assessment Instrument (VPRAI) Instruction Manual, Version 4.3. Retrieved January 2023 from https://www.dcjs.virginia.gov/sites/dcjs.virginia.gov/files/publications/corrections/virginia-pretrial-risk-assessment-instrument-vprai_0.pdf

    Whole Building Design Guide (WBDG). (2017). “Natural Hazards Mitigation.” Secure/Safe Committee. Retrieved January 2023 from https://www.wbdg.org/design-objectives/secure-safe/natural-hazards-mitigation

    Whole Building Design Guide (WBDG). (2017). “Occupant Safety and Health.” Secure/Safe Committee. Retrieved January 2023 from https://www.wbdg.org/design-objectives/secure-safe/occupant-safety-health

Previous
Previous

The Benefits of Certified Training

Next
Next

5 Threat And Risk Assessment Approaches for Security Professionals in 2024