Developed in Collaboration with

Slides:



Advertisements
Similar presentations
SCHOOL PSYCHOLOGISTS Helping children achieve their best. In school. At home. In life. National Association of School Psychologists.
Advertisements

Safe School Initiative (SSI)  Targeted violence   37 incidents, 41 attackers  Operational emphasis.
Violence Prevention. Preventing school violence is a top priority for school and public safety officials today. Efforts include creating more positive.
Anti-Bullying Bill of Rights Act By: Frank P. Cavallo, Jr., Esquire Parker McCay P.A.
Keeping Yourself & Your Classrooms Safe A Resource for Faculty.
Active Shooter Situational Awareness
How to Respond. Sgt. Trent Smith Bremen District #24.
Social Networking in Education Presented by Justin R. Clark.
Internet Safety Part II CyberBullying. Judson Independent School District … strives to provide a safe, positive learning environment for students in our.
Threat Assessment in Schools: Lessons Learned from School Shootings Marleen Wong, Ph.D.. Director Assistant Dean and Clinical Professor Director of Field.
Module 2: Creating a Supportive Classroom Climate Creating a Safe and Respectful Environment in Our Nation’s Classrooms.
Legal One Bullying Summit Foundation for Educational Administration, Inc. April 16, 2012 Philip Patire Presenter.
What you should know as parents by Charles McKinley Parents’ Technology Night, 2013, sponsored by your PTSO.
Implementing and Conducting a School Threat Assessment United States Secret Service & U.S. Department of Education Presented by Eric Gettes School Psychologist.
Threat Assessment in Schools David Liss Director Department of Safety & Security Marana Unified School District Jo Ann Gelormine Director Department of.
Foundations of Effective Threat Assessment in Schools Claire Cunningham Lead Deputy County Counsel, County of San Mateo Nancy Magee Administrator,
Sutton Public Schools Anti-Bullying Law Overview.
This Presentation Evening is designed to inform you about any potential threats that your children could find themselves when online. At no point is it.
Mihaela Bingula Andrea Matić VanesaVarga Nives Mikelić Preradović Faculty of Humanities and Social Sciences Zagreb.
Violence Prevention Marcy A. Spath Counseling 511 March 20, 2007
WHAT DOES IT LOOK LIKE? Crisis Management and Threat Assessment.
ASHLEIGH LENTYCH CYBER BULLYING AND INTERNET SAFETY.
Forensic Victimology 2nd Edition Chapter Thirteen: School Shootings.
Facilitate Group Learning
Cyberbullying What does it mean? What can we do?.
Technology Tips and Safety for Parents and Teens.
Internet Safety. Online Concerns: Contact Content Conduct.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Child Safe Standards How effective is your leadership team in promoting a child safe culture in your organisation? 2 June 2016.
PUBLIC HEALTH APPROACH. PUBLIC HEALTH APPROACH-Step 1 Define the problem -How many deaths, injuries, violence related behaviors - Frequency -Trends -
IDENTIFYING OBSTACLES Advanced Social Communication Middle School: Lesson Two.
DaSy Conference Data Breach Exercise August 2016 [Logo]
Service Learning in the IBCP
Sutton Public Schools Anti-Bullying Law Overview
Acceptable Use Policy (Draft)
Creating your online identity
Systematic Support for Students
2016 NC Teacher Working Conditions Survey Results
Active Shooter Situational Awareness
Bully Free Sophomore Class Session 2
Internet Safety: Providing an Education Plan for Your School
E-Safety Briefing
An introductory course for Plast leaders
Preventing Hate Crimes
Active Shooter Situational Awareness
January 25, 2017 The Bromfield School
Virtual Battles: Cyberbullies
Cyber Bullying Among American Teenagers
School-Based Behavioral and Mental Health Supports and Services
The KiVa program Evidence-based program to prevent and reduce bullying
Overview – Guide to Developing Safety Improvement Plan
Overview – Guide to Developing Safety Improvement Plan
Conyers Middle School Advisement Lesson October 20, 2014
Bullying 101 Presented by: RHMS Counselors
Student Threat Assessment
SOCIAL MEDIA: ARE YOU PLAYING IT SAFE?.
Public Health Interventions
Results of the Organizational Performance
CYBERBULLYING References: Fund for Civility, Respect, and Understanding OK, Inc. Friends4Friends Campaign
The Importance of a School Threat Assessment Team
ICT CyberSecurity Lesson 2:
Unit 2: Violence & Injury Prevention
Issues With Internet in College
Bully Free Zone.
(COLOR SYSTEMS FLOWCHART HANDOUT, fancier than book): LETS LOOK AT OUR RECOMMENDATIONS FOR A SYSTEM (LEVEL 1 AND LEVEL 2… THEN WE’LL DISCUSS YOUR SYSTEM.
Cyberbullying PREPARED FOR STUDENTS OF SHAC ST. JOHN’S COLLEGE.
October 19, 2018 WESTON MIDDLE SCHOOL 1.
IS-907 – Active Shooter: What You Can Do
Cyberbullying and Mental Health Awareness
Module 2: Creating a Supportive Classroom Climate
Presentation transcript:

Developed in Collaboration with School Behavioral Threat Assessments: An Introduction Presented by Dr. Victoria Calder October 27, 2018 Developed in Collaboration with Readiness and Emergency Management for Schools (REMS) Technical Assistance (TA) Center

Presentation Goal This presentation is intended to familiarize you with the use of school threat assessments to reduce targeted violence at K-12 schools and will provide guidance on how to form your own school or district threat assessment team.

Audience Participation Show of Hands Has your school district or school established a threat assessment process and team? sessment process and team configuration.

Presentation Objectives The aim of this presentation is to help you: Describe key findings of the Safe School Initiative (SSI); Understand the purpose of a school threat assessment and the role of a Threat Assessment Team (TAT); Recognize how threats can be made online and how to identify these threats; Recognize effective elements of a school threat assessment; and Understand the five stages of a school threat assessment.

Introduction Introduction to School Safety, Security, Emergency Management and Preparedness and the Safe School Initiative (SSI)

Five Preparedness Missions Prevention Recovery Mitigation Response Protection Before During After an incident or emergency

Preparedness and Targeted Violence Prevent Build positive climate Protect Set policies and rules Mitigate Educate students, teachers, staff, and families Respond Stop an incident Recover Support students impacted

Definition of Targeted Violence in School Settings “School shootings and other school-based attacks where the school was deliberately selected as the location for the attack and was not simply a random site of opportunity.” ̶̶ The Final Report and Findings of the Safe School Initiative U.S. Secret Service and U.S. Department of Education, p. 4

Why Focus on Targeted Violence in Schools? Affects schools, families, communities, states, regions, nations, and the world; Interrupts the learning environment; Creates and propagates fear over perceived threat; Produces long-term effects; and Can be prevented! There are also other human-caused threats that may have the same effect, such as suicide or the act of students making threats that they do not carry out.

The SSI Examined targeted violence from 41 attackers in 37 incidents between 1974 and 2000

SSI 10 Key Findings 1. Rarely sudden, impulsive acts 2. Usually others knew about attacker’s idea/plan 3. Most did not threaten targets directly prior to attack 4. No accurate or useful profile of a “school shooter” 5. Most had difficulties coping with loss/failure

SSI 10 Key Findings (cont.) 6. Most had previously displayed actions that concerned others prior to an attack 7. Many felt bullied, persecuted, or injured by others prior to the attack 8. Prior to the attack, most had access to and had used weapons previously 9. In more than half the cases, other students were involved 10. Despite prompt law enforcement response, most incidents were stopped by someone other than law enforcement

Purpose of a School Threat Assessment The primary purpose of a school threat assessment is to prevent targeted violence in schools by students.

What Is a Threat Assessment? A fact-based investigative and analytical approach that focuses on what a particular student is doing and saying; and not on whether the student "looks like" those who have attacked schools in the past. Threat assessment emphasizes the importance of such behavior and communications for identifying, evaluating, and reducing the risk posed by a student who may be thinking about or planning for a school-based attack. ̶̶ The Final Report and Findings of the Safe School Initiative, p. 4

Role of a School Threat Assessment Not intended to be punitive Intervention to support target of threat and the individual making the threat

Six Principles of Threat Assessment (1, 2) Targeted violence is the end result of an understandable, and oftentimes discernible, process of thinking and behavior. Targeted violence stems from an interaction between the individual, the situation, the setting, and the target.

Six Principles of Threat Assessment (3, 4) An investigative, skeptical, inquisitive mindset is critical to successful threat assessment. Effective threat assessment is based upon facts rather than characteristics or traits.

Six Principles of Threat Assessment (5, 6) Threat assessment is guided by an integrated systems approach. The central question in a threat assessment inquiry is whether a student poses a threat, not whether a student made a threat.

Behavior and Communication

Behavioral/Mental Health Concerning Behaviors Academic Social & Emotional Behavioral/Mental Health

Concerning Communication

Categories of Social Media Instant Messaging (IM) and Texting Social Networking Blogging Microblogging Forums for online communities, including posting and viewing of content (E.g., Facebook, Bebo, Orkut, BlackPlanet, MiGente, AsianAve). Online form of journaling allowing for interaction (E.g., Blogger, WordPress, Reddit). Send messages using a limited number of characters and follow others (E.g., Twitter). Send and receive messages in real time (E.g., Skype, Google Chat, Yahoo Messenger). Online Multiplayer Games/Virtual Worlds Photo Sharing Video Sharing Wikis Post, view, and share photos and videos, and comment (E.g., Flickr, Photobucket, Picasa, Snapchat, Instagram). Post, view, and share videos, post comments (E.g., YouTube, Vine). Create and edit Web pages that provide information (E.g., Wikipedia, Wikinews). Online games with players in various locations (E.g., World of Warcraft, Pokémon Go). Adapted from Using Social Media to Prevent Gang Violence and Engage Youth. Senator Charles E. Shannon, Jr., Community Safety Initiative Series, p. 4

Audience Participation What are the latest social media platforms that your students are using? What features do they include?

Unique Features of Social Media Distinctive features, such as disappearing content Allow for anonymity Allow for “hidden apps”

Social Media Use by Youth 95% of teens have access to a smartphone at home Approximately 45% report being online “almost constantly” YouTube, Instagram, and Snapchat are the most popular platforms for teens 31% of teens say social media has mostly a positive effect Pew Research Center, 2018

Positive Aspects of Social Media in Schools Social media can be used by schools as a tool to Promote a positive school climate Communicate with students, teachers, staff, and parents/guardians about daily activities Inform the school community during emergencies

Positive Aspects of Social Media For Prevention Technology can be an effective reporting tool if it is: Safe and anonymous; Supported by trusted adults; Maintained collaboratively; and Accessible to the whole school community.

Challenges of Social Media in Schools Privacy and legality of monitoring students’ online activity Social media can be used by students to express a desire to harm others or themselves

Types of Threats An actual threat or hoax threat of targeted violence Can also harm others through: Cyber crime/hacking Bullying Radicalization Gang activity Bomb threats

Prevalence of Cyber Aggression Between 9% and 35% of young people are victims of cyber aggression Between 4% and 21% are perpetrators Approximately 14.8% of students have reported being electronically bullied via email, chat rooms, instant messaging, Websites, or texting during the previous 12 months . Youth Risk Behavior Surveillance, CDC, 2014

Prior Online Behavior Before a School Shooting Unclassified//For Official Use Only

Suicide Concern (picture of knife) Unclassified//For Official Use Only

Identifying Online Threats Encourage communication between students, teachers, staff, and parents or guardians Create tip line (calls, texts) Ensure anonymity for those reporting Know which social media apps are popular with students Understand current threat trends

Identifying Online Threats (cont.) Monitor social media General awareness Open profiles Tweets, posts, and videos Collaborate with law enforcement Use software that provides information from specific geographic areas

Legal Considerations General counsel can help contribute to district and school procedures and policies as they relate to: Information sharing; Student conduct and use of technology, such as computers and telephones; and Surveillance and monitoring.

Effective Elements of a School Threat Assessment

Identification of Elements Elements are based on the following: A comprehensive literature review of Findings from the SSI; Existing school threat assessment approaches and their impacts on school climate and school violence; and Lessons learned from recent research and incidents. Work with state and local practitioners

Common Element 1 Included in an Emergency Operations Plan (EOP) Integrated into K-12 school safety, security, emergency management and preparedness framework May be one tool to help improve school climate Included in an Emergency Operations Plan (EOP)

Inclusion in EOP Behavioral Threat Assessment Annex Identify team representatives Comply with applicable laws Public Health, Medical, and Mental/Behavioral Health Annex Support the needs of identified students Security Annex Respond to threats

Common Element 2 Mandates or laws Partners Supported by mandates, laws, and partners Mandates or laws Partners

Roles & Responsibilities Common Element 3 Defined with clear purpose, policies and procedures, and roles and responsibilities Purpose Polices & Procedures Roles & Responsibilities

Purpose 1. Type of threat(s) addressed: Prevention of targeted violence in schools by students; or also prevention of additional threats such as bullying and fighting 2. Population addressed: Focus only on threats by students; or address threats posed by adults, too

Policies and Procedures Aspects such as Reporting a threat; Authority to conduct an assessment; Starting an inquiry; Information gathering; and Information sharing.

Roles and Responsibilities It is important to establish: Who is in charge of the team; Who is the point of contact; Guidance and training to the school community; How the school team complements role of law enforcement; Who has authority to make decisions; and How are decisions made.

Common Element 4 Conducted via a collaborative process with information from various sources Internally Externally

Common Element 5 Performed by a trained, multidisciplinary team Team structure Training

Team Structure Chaired by school administrator and includes Another member of school administration; Investigator, such as school resource officer; Mental/behavioral health professional; and Others, such as coaches, educators, school psychologists, and counselors.

Training Training for TAT members in threat assessment, threat management, and availability of resources Also include training for Teachers, administrators, and other staff; Students; and Community groups.

Common Element 6 Conducted along a continuum School Inquiry Law Enforcement Investigation

Case Study: Inquiry > Investigation A tip was made to high school administrators in California, who then informed law enforcement. Part of the police investigation involved Internet surveillance of two teenagers as they discussed their plans. Two teenagers were then arrested for plotting a mass school shooting.

Student(s) posing threat Common Element 7 Supportive of the student(s) posing the threat and target(s) of threat Student(s) posing threat Target(s) of threat

Common Element 8 Evaluation Adjustment Continually evaluated and adjusted, if needed Evaluation Adjustment

Conducting a School Threat Assessment

Five Stages of a School Threat Assessment

Stage 1: Initiate Threat Assessment Threat assessment is initiated once a possible threat is posed through Actual threat; and/or Student behavior that indicates a potential threat.

Four Categories of Threats Direct Threat Indirect Threat Veiled Threat Conditional Threat

Leakage and Bystanders “Leakage” occurs when a student intentionally or unintentionally reveals clues to feelings, thoughts, fantasies, attitudes, or intentions that may signal an impending violent act. These clues can take the form of subtle threats, boasts, innuendos, predictions, or ultimatums. ̶̶ The School Shooter: A Threat Assessment Perspective, FBI, p. 16

Case Study: Leakage

“Prior Knowledge of Potential School-Based Violence” Bystanders “Prior Knowledge of Potential School-Based Violence”

Bystander Research Topics covered in interviews: What existing knowledge did bystanders share and/or withhold? Why did some come forward (or not)? Any differences between the groups? What factors may encourage an individual to come forward?

Bystander Findings (1, 2) Relationships between bystanders and attackers varied. When and how bystanders received information about the planned attacks varied, too. Bystanders shared information related to a threat along a continuum that ranged from those who took no action to those who actively conveyed the information.

Bystander Findings (3, 4) School climate affected whether bystanders came forward with information related to the threats. Some bystanders disbelieved that the attacks would occur; consequently, bystanders did not report them.

Bystander Findings (5, 6) Bystanders often misjudged the likelihood and immediacy of the planned attack. In some situations, parents and parental figures influenced whether the bystander reported the information related to the potential attack to school staff or other adults in positions of authority.

Case Study: Bystander 1

Case Study: Bystander 2 In West Virginia, students were overheard talking about a mass shooting at a middle school. Schools were closed for the remainder of the week, and three students continued their education at another location. After a police investigation, the three students were charged with making terrorist threats, conspiracy to commit murder, and solicitation to commit murder.

Reporting a Threat To encourage reporting a possible threat, schools can Provide a positive school climate; Foster positive relationships between students and at least one adult teacher/staff member; Ensure a Central Point of Contact to report a concern; Allow reports to be made via several forms of media; Provide anonymity; and Ensure students know their information will be taken seriously and addressed appropriately.

Pair and Share Discuss how students can report a concern or threat at your school or district. Are there any other reporting systems you could (realistically) implement?

Stage 2: Collect Information Inquiry Information gathering, typically by school authorities. The student can be referred to support services if found to pose a threat. Investigation Information gathering by law enforcement.

Information Sought in an Inquiry 1. What drew attention? 2. Student information 3. Attack-related behaviors 4. Motives 5. Target selection

Sources of Information School information Collateral school interviews Parent/ guardian interview Interviews with the student of concern Potential target interview

Stage 3: Organize and Analyze Information Information is organized and analyzed for evidence of behavior and conditions that suggest the student is possibly planning and preparing an attack. Analysis of this information should answer the following: Is the behavior of the student consistent with movement on a pathway toward attack? Do the student’s current situation and setting incline him or her toward or away from targeted violence? Answers to these can be guided by 11 Key Questions.

Key Questions (1-3) What are the student’s motive(s) and goals? Have there been any communications suggesting ideas or intent to attack? Has the subject shown inappropriate interest in any of the following? School attacks or attackers Weapons (including recent acquisition of any) Incidents of mass violence (e.g., terrorism, workplace violence)

Key Questions (4-7) Has the student engaged in attack-related behaviors? Does the student have the means to carry out an act of targeted violence? Is the student experiencing hopelessness, desperation, and/or despair? Does the student have a trusting relationship with at least one responsible adult?

Key Questions (8-11) Does the student see violence as an acceptable, desirable, or the only way to solve problems? Is the student’s conversation and “story” consistent with his or her actions? Are other people concerned about the student’s potential for violence? What circumstances might affect the likelihood of an attack?

Stage 4: Determine Whether Student Poses a Threat If, at any time, there is an immediate threat to a student, school, or community, the school should call 9- 1-1. The TAT may conclude that—with the available information obtained in their inquiry—a student poses: no discernible threat; or a level of threat.

Helps the student posing the threat Stage 5: Manage Risk Helps the student posing the threat Addresses emotional and educational intervention: Emotional support internally, such as school psychologist, or externally, through community resources Educational support through, for example, continued education in an alternative location and reintegration/return to the school

Scenario-Based Group Discussion

What actions would you take? “Today is payback time. Everyone at this school will be sorry for the way I have been treated here. The first to die are the most hateful ones. Their blood is on your hands.” What actions would you take?

Where could you go for more information? What could the threat assessment team’s next steps be? What steps would you take while the group gathers information? time.

What are your next steps, if the team’s consensus is that the student likely poses a threat?

Summary and Next Steps N/A

Presentation Summary Introduction to School Safety, Security, Emergency Management and Preparedness and the SSI Introduction to School Threat Assessment Behavior and Communication Effective Elements of a School Threat Assessment Conducting a School Threat Assessment

Presentation Objectives You should now be able to Describe some of the key findings of the SSI. Understand the purpose of a school threat assessment and the role of a TAT. Recognize how threats can be made online and how to identify these threats. List some effective elements of a school threat assessment. Identify the five stages of a school threat assessment.

Audience Participation Pair and Share What changes would you like to make at your school or school district, based on what you have learned today about threat assessments? Ask participants for a show of hands if they plan to implement anything new in their schools as a result of what they’ve learned today. Encourage them to write down an ACTION PLAN indicating what they plan to do, WHEN, HOW, and WHO will perform these actions.

Questions?

REMS TA Center Threat Assessment Resources Webinars and accompanying resource lists on Forming a School Behavioral Threat Assessment Team Use of Social Media in School Behavioral Threat Assessments Reports referenced in this training: The Final Report and Findings of the Safe School Initiative (SSI): Implications for the Prevention of School Attacks in the United States Threat Assessment in Schools: A Guide to Managing Threatening Situations and to Creating Safe School Climates Prior Knowledge of Potential School-Based Violence: Information Students Learn May Prevent a Targeted Attack

Thank You! Thank you for all you do each day to assist your students and your peers!