Our Process

The best Threat Assessment response is always tailored to the specific, unique qualities of each situation.

There are numerous types of Direct, Indirect and Perceived Threats and each differs in presentation and execution. When we receive an initial inquiry, we take the following steps to obtain a thorough understanding of the details of the situation. Following these initial steps, we are able to initiate an effective threat assessment process.

1. POTENTIAL SUSPECT(S) AND THEIR BEHAVIOR

  • Behaviors or communications of concern. We want as clear a picture of the threatening behaviors as possible.
  • Characterization of the suspect(s) of concern for violence. This includes the individual’s interpersonal behaviors, relations to his or her work-group or peers and superiors or teachers, any known stressors, and an overall impression of the personality and temperament of the individual. Alcohol and substance abuse, criminal backgrounds, and pre-occupations and access to weapons are important information.

2. OBTAIN INFORMATION ON POTENTIAL TARGET(S)

  • Potential victims. We need an understanding of their relationships to the potential suspect, to peers, workgroup, superiors, known stressors, vulnerabilities and the temperament of that individual. We use this knowledge to help us understand how factors which may increase or decrease risk interact between the potential suspect and the potential victim.
  • Potentially violent setting. The physical vulnerabilities and the interpersonal, culture qualities of a specific organization are important to know. Corporate, organizational or school security usually takes the lead on clarifying physical vulnerabilities and offering options to further protect the premises or potentially violent settings. We can help create a profile of the interpersonal culture and the psychological vulnerabilities of an organization or individual upon leaving the setting each day.

3. ASK ABOUT TRIGGERS

  • Potential triggers. We are particularly interested in understanding any events or perceived events which may trigger a threatening situation.

 4. MENTORING/COACHING

Beth works closely with the security teams responsible for the the physical safely of the recipient of the threat(s).  Beth will work with the client to integrate the necessary behavioral changes to assist in keeping them safe…Beth supports the client in maintaining the changes over the long term. (Complacency or “forgetting” can have dire consequences.)