Psychological Risk Training Services

 

Protecting Your Principal: Analyzing and Managing Inappropriate and Threatening Correspondence

Public figures and corporate leaders are at greater risk of being harassed or pursued by members in society.  Both groups are reporting an increase in the frequency they are receiving inappropriate or threatening correspondence from either anonymous and identified persons or groups of interest.  Attendees will learn how to gather, document, assess, manage, and archive this correspondence using a standardized screening process.  This proactive method will assist in determining the identity of an unknown individual or group, credibility, risk level, interventions, and which cases should undergo further analysis, investigation, and assessment. 

Attendee Learning Objectives:

  • Provide a brief summary of the current research related to inappropriate and threatening correspondence;
  • Discuss the benefits and limitations to responding to such communiqué, especially when it comes from an anonymous source;
  • Provide the rationale for creating and implementing a standardized screening process;
  • Discuss how to select, recruit, and train personnel;
  • Discuss the workflow process including: identifying the points of entry; collection, documentation, and preservation of the correspondence; and conducting a preliminary screening using known risk enhancing and risk reducing factors;
  • Learn the techniques used to identify an anonymous person or group of interest using linkage analysis; identify the potential target(s) and assess level of vulnerability; assessing the credibility of the communiqué and assigning a preliminary risk level; and reviewing intervention and management strategies to mitigate exposure;
  • Attendees will learn which cases to refer for additional analysis, investigation, and assessment; and
  • Discuss the benefits of consulting with a mental health risk assessment professional.

Indirect Psychological Violence Risk and Threat Assessments

Public figures and corporate leaders are at greater risk of being harassed or pursued by members in society.  If the person or group of interest is identifiable, security and protection managers have the option of conducting an indirect psychological violence risk and threat assessment.  Indirect assessments involve gathering as much relevant background information about the person or group of interest as possible, for example, criminal history, investigative reports, surveillance media, and inappropriate communications.  These sources of information are then compared to known risk enhancing and risk reducing factors to help determine if the person or group is moving toward or away from engaging in any attack-related behaviors.  Attendees will learn how to gather, document, assess, manage, and archive these data sources using a standardized screening process.  This proactive method will assist in determining the credibility, risk level, interventions, and which cases should undergo further analysis, investigation, and assessment.

Attendee Learning Objectives:

  • Discuss the benefits and limitations of an indirect violence risk and threat assessment;
  • Provide the rationale for creating and implementing a standardized screening process;
  • Discuss the workflow process including: data collection, documentation, and preservation; and conducting a preliminary screening using known risk enhancing and risk reducing factors;
  • Learn the techniques used to identify a person or group of interest using linkage analysis; identify the potential target(s) and assess level of vulnerability; assessing the credibility of the person or group of interest and assigning a preliminary risk level; and reviewing intervention and management strategies to mitigate exposure;
  • Attendees will learn which cases to refer for additional analysis, investigation, and assessment; and
  • Discuss the benefits of consulting with a mental health risk assessment professional.

Preventing Workplace Violence: Establishing an Interdisciplinary Threat Assessment Team

Preventing workplace violence continues to be a top priority.  Many mid to large sized organizations are creating an interdisciplinary threat assessment team using existing personnel without significantly increasing staff workload or expense, and reducing overall exposure.  Attendees will learn the rationale, mission, benefits and limitations of this approach; how to select, recruit, and train appropriate team members; how to assign roles and responsibilities; and overall workflow process.  The threat assessment team will provide the organization with a standardized, best practice approach in how to identify, assess, and manage a disgruntled, hostile, or potentially dangerous current or former employee, client, vendor, or other third party individual or group.