From the 2012 school shooting in Newtown, Connecticut, to the 2015 terrorist attack in San Bernardino, we have been repeatedly shocked by acts of mass killing. After each tragedy, we ask key questions: why did this happen? Were there warning signs? How can we mitigate the risk of another tragedy? Although many mass killings cannot be prevented, all too often there were warning signs that the perpetrator was on a path to violence. In our hyperconnected society of e-mails, text messages, and social media, those on the road to violence often broadcast their roadmap for thousands to see. This text is a timely review of the state of the science of threat assessment. The authors quote the mass shooter, Anders Breivik, who wrote in his manifesto, “The time for dialogue is over” (p 1377). This quotation provides an apt metaphor for the core lessons in the text. Although prediction of mass shootings is impossible, the methods laid out in this book can help us assess when someone poses a threat and when the time for dialogue may be ending. The book, which is simultaneously broad in scope and richly detailed, is a resource that should easily earn a place on your bookshelf.
The text is divided into three sections: Foundations, Fields of Practice, and Operations. Each chapter includes case examples and concludes with a bulleted list of key concepts. It elegantly proceeds from concepts to specific procedures for assessment and intervention. Because of its broad scope, in my view this book is primarily for reference. I found the text fascinating to read in its entirety but realize that other busy clinicians may not read through the more specialized areas, such as the chapter on computer models for assessing threatening communications. This volume serves as an excellent starting point for researching different areas of threat assessment. Each chapter is thoroughly referenced, providing the reader with access to even more detailed research.
The first section, Foundations, should be required reading in every forensic fellowship program. It begins by contrasting violence risk assessment with threat assessment. Although both focus on preventing violent acts, there are important differences. Violence risk assessments are usually based on population data and focus on determining and reducing the likelihood of violence by a specific person, such as a defendant convicted of domestic violence, and they are generally conducted by clinicians providing consultation to legal decision makers. A threat assessment, on the other hand, refers to case-specific data and focuses on protecting a specific victim. These assessments are often conducted in an operational setting by law enforcement agencies, such as the Federal Bureau of Investigation or Secret Service, and they are dynamic, in that they continually evaluate the danger to a specific target. Subsequent chapters in the first section include discussions of warning behaviors, data collection in threat assessments, and legal concerns.
In the second section, Fields of Practice, the authors discuss the process of threat assessment in different settings. Each type of threat has unique characteristics and requires a different approach. For example, a unique risk factor for intimate-partner femicide is proprietariness, when the potential perpetrator feels that he has or should have control over the victim.
The emerging topic of electronic threat assessment is also examined. The authors discuss studies about the characteristics of e-mail and social media threats, as well as characteristics of threateners who approach their targets. Also reviewed are methods for assessing threats that involve workplace violence, public figures, school shootings, terrorists, and anonymous perpetrators.
The authors use the Operations section of the book to discuss practical aspects of how threat-assessment teams function in different settings. Diverse programs including the Los Angeles Police Department (LAPD) Threat Management Unit, the Fixated Threat Assessment Centre in the United Kingdom, and threat assessment at universities in Germany and Switzerland are described. Administrators and policy makers interested in developing threat assessment teams will find this section helpful. It provides several multidisciplinary models that can serve as roadmaps for new programs. It describes how these teams screen referrals, investigate threats, and intervene to protect potential targets. A diverse array of operations is reviewed, including preventing school and university shootings, preventing honor killings, and combatting international terrorism. I found Prosecutor Rachel Solov's chapter, “An Operational Approach to Prosecuting Stalking Cases” (Chapter 23), particularly enlightening. She discussed her approach to recognizing stalking behaviors, interacting with victims, sentencing perpetrators, and protecting victims.
I know that I will reread several of the chapters in this book. The information can guide clinical assessments, future research, and public policy. The authors summarize this complex topic in a manner that is clear, concise, and highly accessible to the busy clinician. Whether you are interested in assessing the risk posed by terroristic threats, stalking, or intimate-partner violence, this book is an invaluable resource.
Footnotes
Disclosures of financial or other potential conflicts of interest: None.
- © 2016 American Academy of Psychiatry and the Law