Warehouse Stock Clearance Sale

Grab a bargain today!

Threat Assessment and Management Strategies


Product Description
Product Details

Table of Contents


Establishing Threat Management Processes
Recognize the Need for Threat Management Processes
Assign Responsibility to Manage Inappropriate Situations to Trained Threat Managers
Provide Training and Liaison with Potential Targets and Administrative Staff
Create an Incident Tracking System with Well-Documented Files
Establish Liaison with Other Agencies, Neighboring Organizations, and Institutions with Shared Interests
Conduct Thorough Fact Finding
Use Consistent and Valid Threat Assessment Methods
Apply Threat Management Strategies Flexibly and Intelligently
Communicate with Potential Targets Professionally, Confidently, and Competently
Manage Inappropriate Situations Appropriately
Situation Analysis: When Physical Protection Fails

Identifying Problem Individuals
Understanding Violence
Identifying Problem Individuals
Protective Fact Finding Compared with Criminal Investigations
Conducting Protective Fact Finding
Using the Need to Knows
Interviewing the Subject
Situation Analysis: A Tragic Winters Tale

Assessing Problem Individuals
Formalized Threat Assessment Approaches
Situation Analysis: The Disgruntled Vet

Managing Problem Individuals
Threat Management Rules of Conduct
Take No Further Action at This Time
Watch and Wait
Third-Party Control or Monitoring
Subject Interviews: Refocus or Assist
Subject Interview: Warning or Confront
Civil Orders
Administrative Actions
Mental Health Commitments
Criminal Prosecutions
Managing the Risk
Situation Analysis: A Loser's Shot at "Redemption"


Introducing Hunters versus Howlers
Balancing Physical Security and Threat Management
Who Needs Managing?
Purpose of Part 2: Identifying Howlers and Hunters
Situation Analysis: The Poacher

Defining Hunters and Howlers
Hunters Defined and Exemplified
Howlers Defined and Exemplified
Hunters versus Howlers
Situation Analysis: The Payoff

Understanding Hunters
What Hunters Do
The Undetectable
Situation Analysis: The Nonaccidental Tourist

Understanding Howlers
Howler Categories
What Howlers Want
Situation Analysis: The Snitch

Working with the Intimacy Effect and the Law
Working with the Intimacy Effect
Applying Federal Law
Working with State and Local Laws on Threats and Domestic Violence
State Stalking Laws
Situation Analysis: A Mother's Help

Working with the Hunter, Howler, and Other Concepts
Working with the Last Straw Syndrome
Other Concepts Influencing the Threat Management Process
Managing Hunters and Howlers
10 Guidelines for Managing Hunters and Howlers
Situation Analysis: The Relentless Pursuer

Appendix: When Should Threats Be Seen As Indicative of Future Violence? Threats, Intended Violence, and the Intimacy Effect

About the Author

Frederick S. Calhoun, PhD, oversaw a national workplace violence prevention program for a large federal agency. He earned his PhD from the University of Chicago. He was the lead researcher and principal architect in developing the threat assessment process used by the United States Marshals Service for analyzing risks to federal judicial officials. He also developed the service's policies and procedures for conducting protective investigations and wrote the curriculum and led the training of deputy US Marshals Service threat investigators and their supervisors. He is the author of 12 books and teaches a periodic two-day seminar, "Managing Threats: Reducing the Risk of Violence," designed to train law enforcement officers, mental health professionals, and private security officials to identify, assess, and manage individuals of violent intent. Stephen W. Weston, JD, is a retired 32-year veteran of the California Highway Patrol. For 15 years, he managed the unit responsible for investigating threats against California state officials and government facilities. He is the coauthor of four books with Frederick S. Calhoun, consults with government and private organizations in the management of threatening situations, and lectures throughout the United States on threat management topics. He has served as president of the Northern California Chapter of the Association of Threat Assessment Professionals and taught a class in the California State University system entitled "Violence and Terrorism."

Ask a Question About this Product More...
Write your question below:
Look for similar items by category
Home » Books » Computers » Security » Networking
Home » Books » Nonfiction » Law » Criminal Law
How Fishpond Works
Fishpond works with suppliers all over the world to bring you a huge selection of products, really great prices, and delivery included on over 25 million products that we sell. We do our best every day to make Fishpond an awesome place for customers to shop and get what they want — all at the best prices online.
Webmasters, Bloggers & Website Owners
You can earn a 8% commission by selling Threat Assessment and Management Strategies: Identifying the Howlers and Hunters, Second Edition on your website. It's easy to get started - we will give you example code. After you're set-up, your website can earn you money while you work, play or even sleep! You should start right now!
Authors / Publishers
Are you the Author or Publisher of a book? Or the manufacturer of one of the millions of products that we sell. You can improve sales and grow your revenue by submitting additional information on this title. The better the information we have about a product, the more we will sell!
Back to top