What is a threat assessment?

After yesRisk Assessmentterday’s post, it became evident many people had never heard of threat assessments in terms of  mental health and crime prevention. Typically assessments are not added to the calculus of overall preventative measures on a local law enforcement level. In most cases this is due to a misunderstanding of their usefulness. In other cases unfortunately, assessments are willfully avoided in an effort to limit agency liability. In the end, we all do assessments of people, situations, buildings, syndicates and so on daily, we just don’t formalize them and distribute them outside of a controlled group. After having conducted well over 400 assessments in the last five years, I’ve learned the only good assessment is one that can be acted upon. For this to happen, they have to be sent to the people who need them most. This piece will focus on some basic tenets of an assessment. Later, I will discuss the “to whom…” portion. Understand, an in-person class on assessments lasts 10 hours so what follows is a very compressed version.

The first thing to remember is threat assessments are dynamic. This is to say, what is accurate now may not be so in 10 minutes. For this reason, assessors expend a lot of energy keeping the assessment as accurate as possible. Most times, the assessment will hold for the time needed to take action whether that be mental health intervention or detainment. There are times however when the ink will have barely dried and the assessment needs to be updated. This point is very important to remember for two groups of people; the customer and the command staff. For this reason both the customer and command staff must dedicate a person to continually liaise with the assessment team so pertinent updates can be pushed quickly to the end users.

The next critical element of an assessment is research. Knowing the risk a subject poses comes in part from understanding from where they came both literally and figuratively. Assessors must dive deep into the history of the subject for this information. For law enforcement this means reading potentially dozens of police reports, arrest records, and field contact cards. The work can be tedious, but one nugget of information can make a life or death difference. For corporate security or contractors, research may be a major obstacle but it’s not one that cannot be overcome. Most counties across the country publish court records on-line and most police departments will provide copies of reports for a nominal fee. If that is all you have, then do what you can. Take a moment to research the subject’s digital world as well. For some, you may only find a digital shadow, while others have a significant digital footprint.

Once the research is complete, the assessor moves to the analysis phase. In reality, an assessment team would simultaneously dig and analyze, however in most agencies assessments fall on one or two people. For this reason, it is necessary to set aside time strictly for analysis. During this phase the assessor begins building a profile of the subject. They will answer questions like, is there a history of violence? What motivated the violence? What are the subject’s stressors? Based on known information, does the subject have a plan to commit violence? Do they have means, motivation, and opportunity? What is the subject’s pattern of life? Finally, as a byproduct of good analysis, the assessor should start seeing shatter-points or weak spots in the subject’s behavior. These become critical in the conclusion phase.

Post analysis, the assessment team needs to make a decision; what is the threat level? The assumption here is a threat matrix already exists. If it does not, then an assessment is nothing more than a research project. The best threat matrices are simple and contain at a minimum three levels. Threat matrices with five or more levels can be cumbersome and not conducive to true assessments. Once the assessment team has made a decision on the threat level, they need to be prepared to defend their choice. This is where the research and analysis will be scrutinized and tested. If done correctly, the threat level will coincide with the known information.

Finally, the conclusion of the assessment is where the customer will start their approach. The conclusion should highlight weaknesses in the subject’s pattern of life, violent plans, or criminal tendencies. These areas need to be exploited in order to frustrate the subject’s plan. By the time the customer reads the conclusion they should have already fo
rmulated a plan and know where their best chances of success lay. The conclusion is where analysis meets actions.

As you have probably noted by now, a full scale assessment will take time. For this reason, assessment teams should have a plan in place for short term assessments that can be used in the interim until a full scale product arrives. Regardless of the length, all assessments should provide actionable intelligence that can be taken by the customer and immediately applied to whatever operation is needed.

Using Risk to Fight Crime?

Risk, risk management, and risk mitigation strategies have existed in one form or another for several years in banking and business. The discipline of risk management however tends to be ignored when it comes to law enforcement. This is not to say law enforcement is unfamiliar with risk, they most certainly are, but they tend to see risk only in terms of measuring officer safety. Risk management strategies can also be used to fight crime in a more efficient and effective manner.

Risk requires four elements; context, environment, actions, and consequences. In law enforcement the consequences are always the same; crime. Therefore the other three elements serve as the core of crime prevention through risk management. The best way to describe this is to use a scenario. Take an alley between two multi-level buildings. Alone, the alley represents nothing, and based on its simplicity is not at risk of crime. Take that same alley and change the environment to nighttime, say 9:35pm and add the context of the alley being the quickest route from the local library to St. Mary’s college. With these factors in the place, the alley begins to look more and more like a breeding ground for crime, but we still need actions, which in law enforcement comes in the form of suspects and victims. Suspect actions typically fall closely in line with environment, as in you will find more drug users around drug houses and potentially more vehicle burglary suspects in shopping mall parking lots. In this case, let’s assume this dark alley is the meeting place for small time street robbers and thieves of opportunity. The final element needed to make this scenario come to life is the actions of a victim. Namely, they need to enter the alley.

There are many ways of looking at the alley scenario. Each one requires that law enforcement see the alley and all of its elements as precursors to crime. This conclusion well in place, we must now look at how to prevent the crime. Some law enforcement minds would respond by increasing marked car patrols in the area of the alley. The thought being, “bad guys don’t like the police and will stop being bad guys while we are around.” In terms of basic crime prevention this is a questionable practice, but in terms of risk management it’s absolutely useless. Random patrols do not remove any of the elements of risk we identified above. From a pure risk management standpoint we need to remove one or more of the elements creating the risk. The addition of sufficient lighting for example will affect the environment as will visible CCTV cameras. Public outreach on the part of the school to educate the students on the dangers of walking alone will mitigate the risk of a solo student using the alley. Finally the use of strategic policing, focusing on high risk suspects in the area, will mitigate the chances a suspect and victim will meet in the alley.

The alley example is an obvious oversimplification of larger criminal problems however the same basic principle applies across the board. If a neighborhood is known for gang activity, it is incumbent on the police to examine the area from a risk management stand-point and move strategically to counter the gang problem. The same can be said for neighborhoods known for burglaries, intersections known for collisions, and apartment complexes famous for drug crime. Simply forming task forces with the stated goal of arrests, does nothing to mitigate further risk. However when you remove one element from each of these criminal equations, your chances of diminishing the risk of continued crime increases exponentially. This also places the police agency in a position to form crime eradication strategies to hopefully bring safety and security to the area.

Risk based policing fits neatly with intelligence led policing techniques in that it is most successful after a full examination of the criminal dynamic has taken place. This furthers the goal of efficient resource allocation. As technology continues to spring forward the use of social networking and digital communications will increase the success of risk based policing. Risk based policing is not a panacea, but it is a far more effective strategy than random police patrols or strategies based solely on high arrest statistics.