Verified Document

Threat Assessment The Objective Of Essay

" (Vossekuil, Borum, Fein, and Reddy, 2008) Stated to be an example of inductive assessment strategy is that of profiling. Profiling involves a description of the 'typical perpetrator' being compiled through use of characteristics that previous perpetrators of that specific type of crime have met. This profile is then used as a template or prototype for comparison of individuals who are believed or suspected to be a potential perpetrator. In contrast, the process of threat assessment is deductive on a fundamental level and has as its focus primarily the 'facts of the particular case in question to guide inferences about whether the person is thinking about, planning, or building capacity for a violent act. The threat assessment approach emphasizes close examination of the progression of ideas and planning behaviors over time and corroboration of information gathered in the case from multiple sources in contact with the potential perpetrator." (Vossekuil, Borum, Fein, and Reddy, 2008)

Threat assessment is stated to be guided by "several operational principles" and to rely on key questions "that ECSP research suggests are important to ask when evaluating the risk posed by an individual for acts of targeted violence." (Vossekuil, Borum, Fein, and Reddy, 2008). Stated as the three principles that guide threat assessment are as follows: (1) targeted violence is the end result of an understandable and often discernible process of thinking and behavior. Acts of targeted violence are neither impulsive nor spontaneous. (2) it is important to distinguish between making a threat and posing a threat. Many people who make threats do not pose a serious risk of harm to a target. People may make threats for a variety of reasons, many of which are unrelated to any desire or intent to harm the target. Conversely, many who pose a serious risk of harm will not issue direct threats prior to an attack.

It is related that after the assassination of "Judge Daranco, U.S. District Judge Dudley H. Bowen Jr., spokesman for the Federal...

Unfortunately, people who are going to kill you ain't going to threaten you. They are going to do it" (Blum 1988, 3 in: Vossekuil, Borum, Fein, and Reddy, 2008)
Summary and Conclusion

This brief study has examined courthouse security in the event of a high-profile trial and has related various references and authorities relating to the implementation of security for this particular scenario. The initiative of courthouse security is complex and involves many actors and this is an initiative that requires communication optimization and highly effective coordination.

Bibliography

Baehler, Aimee and Somerlot, Douglas K. (2005) Security and Disaster Preparedness: A Collaborative Process between State and Federal Courts. Aug 2005. The Justice Management Institute. Denver Colorado. www.jimjustice.org.

Renfroe, Nancy a. And Smith, Joseph L. (2008) Threat Vulnerability Assessments and Risk Analysis. 24 May 2008. Applied Research Associates. Online available: http://www.wbdg.org/resources/riskanalysis.php

Vossekuil, Bryan, Borum, Randy, Fein, Robert, and Reddy, Marisa (2008) Preventing Targeted Violence against Judicial Officials and Courts. United States Secret Service. Online available at: http://www.secretservice.gov/ntac_aapss.shtml

Form for 1.2.1 National Sheriffs' Association Physical Security Checklist (nd) Online available at: http://www.ncsconline.org/D_Research/TCPS/Forms/Form_121.pdf

Casey, Pamela (2006) a National Plan Judicial Branch Security Strategy. National Center for State Courts and National Sheriff's Association. 7 Feb 2006. Online available at: http://www.domesticpreparedness.com/pub/docs/DPJournalJul09.pdf

Weiner, Neil Alan, et al. (2000) Safe and Secure: Protecting Judicial Officials. Court Review Winter 2000. http://aja.ncsc.dni.us/courtrv/cr36-4/36-4SafeSecure.pdf

Sources used in this document:
Bibliography

Baehler, Aimee and Somerlot, Douglas K. (2005) Security and Disaster Preparedness: A Collaborative Process between State and Federal Courts. Aug 2005. The Justice Management Institute. Denver Colorado. www.jimjustice.org.

Renfroe, Nancy a. And Smith, Joseph L. (2008) Threat Vulnerability Assessments and Risk Analysis. 24 May 2008. Applied Research Associates. Online available: http://www.wbdg.org/resources/riskanalysis.php

Vossekuil, Bryan, Borum, Randy, Fein, Robert, and Reddy, Marisa (2008) Preventing Targeted Violence against Judicial Officials and Courts. United States Secret Service. Online available at: http://www.secretservice.gov/ntac_aapss.shtml

Form for 1.2.1 National Sheriffs' Association Physical Security Checklist (nd) Online available at: http://www.ncsconline.org/D_Research/TCPS/Forms/Form_121.pdf
Casey, Pamela (2006) a National Plan Judicial Branch Security Strategy. National Center for State Courts and National Sheriff's Association. 7 Feb 2006. Online available at: http://www.domesticpreparedness.com/pub/docs/DPJournalJul09.pdf
Weiner, Neil Alan, et al. (2000) Safe and Secure: Protecting Judicial Officials. Court Review Winter 2000. http://aja.ncsc.dni.us/courtrv/cr36-4/36-4SafeSecure.pdf
Cite this Document:
Copy Bibliography Citation

Related Documents

Law Enforcement - Threat Assessment
Words: 1355 Length: 5 Document Type: Thesis

For example, the motorized wheelchair elevator of the transport vehicle may take equally long in both directions but the protectee need not be on scene while the elevator platform descends. By delaying the exit of the protectee from the departure location until the transport vehicle elevator is already in the down position and prepared for immediate ascent, the protection agent can reduce the protectee's exposure my more than half in

Security Planning Threat Assessment Controversy Surrounding the
Words: 945 Length: 2 Document Type: Essay

Security Planning Threat Assessment Controversy Surrounding the Client This client is not the typical, everyday individual. He is an outspoken controversial white supremacist who often engages in blatantly controversial public behavior. The client is also planning to meet with the press and speak his mind regarding the recent charges brought against him involving murder and violation of civil rights. He is currently out on a $1 million bond and going through a

Marijuana Social Threat the Social
Words: 1371 Length: 5 Document Type: Term Paper

Increases in any of these demographics is negatively correlated with polls in favor of partially legalizing marijuana use and possession, with the researcher's observations allowing some more detailed examination of the possible reasons, as well (Myers, 2011). Marijuana's association with violent crime and with a lax work ethic causes it to be more feared y Protestants and in communities with large minority populations, and individuals over the age of

Threat of Terrorism Weighing Public Safety in Seattle
Words: 5948 Length: 17 Document Type: Case Study

Terrorism in Seattle Even before the World Trade Center attack in September, 2011, most major cities in the United States were not only aware, but anticipatory regarding the potential for a terrorist attack. Seattle has been fortunate in that it has never experienced an actual international attack, but has had three major domestic incidents since 1999 that continue to be in the minds of Emergency Management professionals. In 1999, Ahmed Ressam,

Social Work Assessment From My
Words: 6527 Length: 20 Document Type: Assessment

Therefore, today's society in the United States is diverse, which is something a social worker needs to understand and know how to deal with each diverse group. Furthermore, through research, it has been discovered most ethnic groups that live in the United States consist of young people, which means by staying in this country, they grow accustom to their surroundings. Once they have grown accustom to living here, they

How Real Terrorist Threat Commercial Sector Explain Justify Opinion...
Words: 2196 Length: 6 Document Type: Essay

Terrorist Threat and the Commercial Sector: Terrorist threat has emerged as one of the major global threats in the 21st Century that has significant impacts on global security. In the past few centuries, the nature and values of terrorism have slowly shifted and resulted in the emergence of different definitions or descriptions of terrorism. These different descriptions have not only been used by scholars but also by governments to broaden the

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now