ARTICLES

Articles by Brian Van Brunt

Advertising and Marketing a BIT

 

Assessment of BIT

BITs and Other Departments 

Case Management

Community College and BIT

Lessons from Past Attacks

Mental Health and Disability

Self-Care

 

Special Topics

Threat and Violence Risk Assessment

Heading 1

Government Publications

threat-assesssment.png

This report is NTAC’s second analysis of mass attacks that were carried out in public spaces. View.

Mass Attacks in Public Spaces

dump_1.gif

By articulating the concrete, observable pre-attack behaviors of many active shooters, the FBI hopes to make these warning signs more visible and easily identifiable. View.

Pre-Attack Behaviors of Active Shooters

51vbDRbeIGL._SX331_BO1,204,203,200_.jpg

This guide describes an approach to threat assessment that can be of assistance to law enforcement and security with protective intelligence duties. View.

Protective Intelligence Threat Assessment Investigations

Screen-Shot.png

The purpose of this report was to understand the school's threat and risk assessment procedures and responses, and lessons learned to improve youth violence prevention across the U.S. View.

Report on the Arapahoe High School Shooting

MassViolence-232x300.jpg

The National Council for Behavioral Health Medical Director Institute convened an expert panel to analyze the root causes of mass violence. View.

Mass Violence in America

dump_1 (1).gif

This report is based on a symposium of researchers, mental health experts, and law enforcement officials addressing effective prevention of the active shooter phenomenon. View.

Making Prevention a Reality

iscs.png

This report covers victimization, teacher injury, bullying and electronic bullying, school conditions, fights, weapons, availability and student use of drugs and alcohol, student perceptions of personal safety at school, and criminal incidents at postsecondary institutions.  View.

Indicators of School Crime and Safety

6a00d83452098b69e2022ad36d61b7200c-600wi

This operational guide provides direction on how to prevent targeted school violence. View.

Enhancing School Safety Using a Threat Assessment Model

dump_1 (2).gif

This document identifies strategies that contribute to preventing, not predicting, targeted violence resulting in mass casualty events. View.

Mass Victimization: Promising Avenues for Prevention

51RzGvcywVL.jpg

This is a guide for managing threatening situations in the school setting and for creating safer school climates by setting a process for identifying, assessing, and managing students who may pose a threat. View. 

Threat Assessment in Schools

Research Articles

Screenshot (2).png

The Concept of Leakage in Threat Assessment

This article defines leakage and explains how it can help in the prevention of mass casualty attacks. View.

Screenshot (7).png

An Exploration of the Risk, Protective, and Mobilization Factors to Violent Extremism in College Populations

This article examines risk factors for violent extremism, mobilization factors contributing to violent actions, and protective factors that reduce the potential for violence. View.

Screenshot (16).png

Using Suspicious Activity Reporting and Threat Assessments to Enhance School Safety

Informed, alert communities play a critical role in keeping the nation safe. This article explains the importance of encouraging reporting of suspicious activity. View. 

Screenshot (22).png

Assessing Threat in Written Communications, Social Media, and Creative Writing

This article provides a framework for reviewing and understanding written messages and assessing them for potential lethality and dangerousness. View.

Screenshot (28).png

The Warning Behaviors of Anders Breivik

This case study looks at Anders Breivik's activities and mental state through the lens of eight warning behaviors that may indicate proximal and dynamic patterns of risk for targeted violence: pathway. View.

Screenshot (5).png

The Role of Warning Behaviors in Threat Assessment

The concept of warning behaviors offers an additional perspective in threat assessment.  This paper offers an explanation and suggested typology. View.

Screenshot (9).png

Rampage School Shooters: A Typology

This article examines the cases of ten rampage school shooters in an effort to find out not only how they are alike, but also how they differ. View.

Screenshot (18).png

Shooting Alone: The Pre-Attack Experiences and Behaviors of U.S. Solo Mass Murderers

This article examines various properties of 115 mass shooters in the U.S. between 1990 and 2014 in search of commonalities. View.

Screenshot (24).png

Violence Risk Assessment: Getting Specific About Being Dynamic

In this article, the authors differentiate risk status from risk state, analyze the relevance of contemporary risk assessment measures for capturing dynamic risk, and distill dynamic risk factors from the literature. View.

download (1).jpg

The Final Report and Findings of the Safe School Initiative

This is the culmination of an extensive examination of 37 incidents of targeted school violence that occurred in the United States from December 1974 through May 2000. View.

Screenshot (14).png

Debunking the Myth: Mental Illness and Mass Shootings

There is a pervasive assumption that mental illness equates to dangerousness and violence as it relates to mass shootings. The researchers examine the assumption. View. 

Screenshot (20).png

Threat Assessment: Defining an Approach for Evaluating Risk of Targeted Violence

This paper attempts to define an approach developed by the Secret Service and apply it within the existing professional/scientific literature on risk assessment. View.

Screenshot (26).png

The Contagion Effect as it Relates to Public Mass Shootings and Suicides

The authors provide relevant research and advice to assist Behavioral Intervention Teams (BITs) toward reducing the risk of copycat public mass shootings and suicides. View.

Threat Assessment Books

Screenshot (29).png

The Concept of Leakage in Threat Assessment

This guide summarizes the existing literature on campus teams and suggests some of the key issues that should be considered when creating or managing a campus team. View.

41ZUOZIy4WL._SX348_BO1,204,203,200_.jpg

Ending Campus Violence: New Approaches to Prevention

This book will be useful for student affairs professionals as well as college counselors, psychologists, social workers interested in the practical management of aggression and violence on a college campus. View.

41uA2lpYESL.jpg

Why Kids Kill: Inside the Minds of School Shooters

In this breakthrough analysis, Dr. Peter Langman presents the psychological causes of school shootings and offers unprecedented insight into why certain teens exhibit the potential to kill. View.

41c5YpPWCDL.jpg

Threat Assessment: A Risk Management Approach

Detailed “how to's” of threat assessment—from the initial contact to the sharing of results. View.

VanBruntHarmOtherscvr-jpg.jpg

Harm to Others: The Assessment and Treatment of Dangerousness

This book offers students and clinicians an effective way to increase their knowledge of and training in violence risk and threat assessment, while providing a comprehensive examination of current treatment approaches View.

71sMtbZlP0L.jpg

The Like Switch

From a former FBI Special Agent specializing in behavior analysis and recruiting spies comes a handbook filled with his proven strategies on how to instantly read people and influence how they perceive you, so you can easily turn on the like switch. View.

The-Handbook-For-193x300.jpg

The Handbook for Campus Threat Assessment & Management Teams

The handbook presents the guiding principles and key practices of campus threat assessment and management.  View.

819EPc8Q40L.jpg

Dangerous Instincts: Use an FBI Profiler's Tactics to Avoid Unsafe Situations

Whether you are opening the door to a stranger or meeting a date you connected with online, you need to know how to protect yourself from harm-physical, financial, legal, and professional. View. 

Threat and Violence Risk Assessment Tools

Screenshot (30).png

MOSAIC Threat Assessment Systems

MOSAIC is an error avoidance method, a computer-assisted method for conducting comprehensive assessments View.

Screenshot (35).png

SIVRA-35

The Structured Interview for Violence Risk Assessment (SIVRA-35) is a thirty-five-item inventory used to assist Behavioral Intervention Team members and clinical staff in conducting a more thorough and research-based violence risk assessment. View.

Screenshot (43).png

ISP List

The ISP List is a database of Internet service and other online content providers that will help you get the information you need for your case. View.

Screenshot (32).png

WAVR-21

The WAVR-21 – Workplace Assessment of Violence Risk – is a 21-item coded instrument for the structured assessment of workplace and campus targeted violence risk. View.

pclr2nd.jpg

Harm to Others: The Assessment and Treatment of Dangerousness

In clinical settings, the PCL-R is used for psycho-diagnostic purposes. View.

FAVT.jpg

FAVT: Firestone Assessment of Violent Thoughts

Assesses the underlying thoughts that predispose violent behavior in adults ages 18 to 75 years (FAVT) and adolescents ages 11 to 18 years (FAVT-A).  View.

Screenshot (37).png

HRC-20

Version 3 of the HCR-20 is the latest version of a comprehensive set of professional guidelines for  violence risk assessment and management based on the Structured Professional Judgement (SPJ) model. View.

©2019, BRIAN VAN BRUNT, ED.D. WEBSITE BY CG COMMUNICATION & DESIGN.