Public Figure Stalking and Attacks

Author(s):  
J. Reid Meloy ◽  
Molly Amman ◽  
Jens Hoffmann

The operational research and understanding of public figure stalking and attacks continue to grow. This chapter reviews the current science as it pertains to politicians, celebrities, royalty, judges, religious leaders, corporate figures, athletes, and journalists. New concepts and research concerning the publicly intimate figure, fixation, grandiosity, intensity of pursuit, mental disorder and persistent emotional disturbance, target dispersion, extreme overvalued beliefs, and motivational changes are also discussed and applied to both threat assessment and threat management.

Author(s):  
Kris Mohandie ◽  
Jens Hoffmann

Threat assessment and threat management occur within the evolving context of legal issues that both enhance and restrict threat investigation and intervention activities. Legal issues affecting threat management practice in Europe and the United States include criminal code statutes and case law that define relevant crimes such as stalking, criminal threats, domestic violence, and other violent crimes that fall within the purview of threat assessors. Additional issues include civil commitment procedures such as involuntary hospitalization, as well as bail and probation conditions. New developments in threat management–related laws are usually precipitated by tragedy and violence. Most recently, in the United States, this led to red flag laws and Extreme Risk Protection Orders in the aftermath of the Parkland, Florida, school shooting in 2018. Similarly, in Germany, the suicide of a stalking victim has resulted in greater sensitivity by the legal system to victim impact in stalking cases. Red flag law preliminary research data related to threat reduction have been promising, and ideally the impact of legislative changes in multiple threat management contexts on victim safety should continue to be assessed so that evidence informs violence risk legal responses.


Author(s):  
Eugene R. D. Deisinger ◽  
Jeffrey J. Nolan

This chapter provides an overview of the development, implementation, and operation of threat assessment and management practices within institutions of higher education. The authors provide a brief summary of the history and development of campus threat management over the past 25 years, noting the contributions of a range of disciplines, research, and informed practice. The chapter delineates the essential elements of a comprehensive threat assessment and management process designed to help campus practitioners to identify, assess, and intervene across the range of potential threats and concerns that may arise. The authors provide an overview of legal duties and issues relevant to threat management, referencing legal principles and cases that have informed standards of practice for the field. Finally, the authors discuss opportunities for advancing the practice of threat management to sustain and enhance the health, safety, and well-being of campus communities.


Author(s):  
Liam Ennis ◽  
N. Zoe Hilton

Many cases referred for threat assessment involve intimate partner violence (IPV). As a form of targeted violence, IPV fits the preventative focus of the threat assessment model. However, heterogeneity of IPV offender profiles, the personal nature of the relationship between aggressor and target, and concern for a diverse range of undesirable but relatively probable outcomes present distinct challenges to effective threat management. In this chapter, the authors offer a theoretically grounded and empirically informed framework for evaluating and managing threats to intimate partners. They describe empirically validated IPV risk assessment tools, and outline an approach to IPV threat assessment using the guiding principles of risk, need, and responsivity; such guidelines emphasize communication and collaboration with the threat management team and third parties, including the victim, and include perpetrator controls that attend to the perpetrator’s criminogenic needs. The authors also discuss victim safety issues and potential situational risk factors applying to IPV cases.


Author(s):  
Bram B. Van der Meer

Threat assessment professionals regularly interact with sources who are deceitful or reluctant to engage in a conversation, especially when asked to provide sensitive information. Besides listening well, which still is the most important information recovery agent, how can interviewers lower resistance and stimulate openness when structuring their questioning? And what does science teach us about verbal, nonverbal, and more personal skills and characteristics of the interviewer who is successful in creating a rich interpersonal dialogue, forging new understandings, and uncovering valuable new information? This chapter aims at answering these questions.


2016 ◽  
Vol 67 (1) ◽  
pp. 35
Author(s):  
Amirhossein Okhravi ◽  
Alireza Pooya ◽  
Shamsodin Nazemi ◽  
Mostafa Kazemi

<p>In this study, using operational research techniques, a model has been presented to assess battlefield threat, to prioritise aggressive targets, to evaluate the capability of own sites and the risks of the conflict with the targets, to define conflict scenarios and finally to select the best scenario using an assignment model. The above proceedings were added as an intermediate phase of target-site assignment, called ‘deciding the best conflict scenario’, to the ‘threat assessment’ and ‘weapon-target assignment’ in the naval combat management system. For each of the own site, the data collected from the environment together with the panels of experts are shown in a two-dimensional matrix, in which the four areas of the matrix represent the conflict scenarios. Considering that the study was done in a simulated environment, the expert’s verification and the convergence of the results in Monte Carlo method were used to validate the research. The proposed model can offer optimised decision to the operational commander through predicting the battlefield and managing the site’s capacity and the interaction in between during the combat.</p>


Author(s):  
Scott Rutz

In 2013 the Coast Guard Investigative Service (CGIS) created a Threat Management Unit (TMU) to examine aberrant, aggressive, and violent behavior. This article examines the experiences of developing that unit from the most nascent stage: gathering information from experts, developing understanding of how the organization was handling concerning behavior cases, and deciding a process to be useful to consumers requiring threat assessment and threat management consultation. This chapter provides the learning, key observations, and ultimate structure of the CGIS TMU, as well as an overview of military culture and the military member personality, and suggestions on how to navigate the resources within a military organization.


1979 ◽  
Vol 30 (2) ◽  
pp. 261-276 ◽  
Author(s):  
Keith Robbins

The death of Canon R.J. Campbell on 1 March 1956 did not cause a national stir. There was an obituary the following day in The Times and some comment on subsequent days from friends and associates, but little to indicate that fifty years earlier he had been a substantial public figure. One obscure diarist, who had known Campbell as a young man, felt that ‘the grudging admission…of some academic distinction’ was an inadequate summary of Campbell's life and work. In part, of course, having outlived most of his contemporaries, Campbell was paying the penalty for his longevity. More important, however, was the fact that for decades he had consciously avoided the limelight. ‘No man’ he had written to the novelist Margaret Lane in December 1947 ‘could more carefully avoid publicity than I have done for a generation’. From 1930 to 1946 he had been a residentiary canon and then chancellor of Chichester and before that served as vicar of Holy Trinity, Brighton for six years. It would appear that he possessed an eminently Anglican pedigree. In May 1903, however, a frail, ascetic-looking, prematurely white-haired Campbell had commenced his ministry at the City Temple, the leading Congregational church in London. W. T. Stead's Review of Reviews looked forward to the ‘Renascence of Nonconformity’ under the leadership of this thirty-five-year-old young man. Over seven thousand people attended the services on his first Sunday. Picture postcards of Campbell were soon on sale and later admirers could purchase the R. J. Campbell Birthday Book containing his ‘favourite poetical quotations, portrait and autograph’. There was even A Rosary from the City Temple, described as being threaded from the writings and sermons of R. J. Campbell. The publicity which attended his arrival in London rarely left him for the next dozen years. In September 1915, rumours of Campbell's intention to resign the pastorate and speculation about his subsequent course were thought of sufficient interest to reach the news columns of The Times. His resignation merited a leader in the newspaper and, following his reception into the Church of England in early October, the comments of prominent religious leaders were printed. In 1916 Campbell published A Spiritual Pilgrimage, and a reconsideration of this volume throws interesting light on the cross-currents of Edwardian religious life.


Sign in / Sign up

Export Citation Format

Share Document