Harm to Others - Brian Van Brunt - E-Book

Harm to Others E-Book

Brian Van Brunt

0,0
46,99 €

oder
-100%
Sammeln Sie Punkte in unserem Gutscheinprogramm und kaufen Sie E-Books und Hörbücher mit bis zu 100% Rabatt.

Mehr erfahren.
Beschreibung

Harm to Others offers students and clinicians an effective way to increase their knowledge of and training in violence risk and threat assessment, and it also provides a comprehensive examination of current treatment approaches. Although the text includes many examples from K-12 and college/university settings, which are particularly relevant for mental health professionals in school settings, the underlying concepts and suggestions are useful for counselors, psychologists, and social workers who face these issues in their daily practice. In an easy-to-understand, jargon-free manner, Dr. Van Brunt shares his observations, extensive clinical expertise, and the latest research on what clinicians should be aware of when performing risk and threat assessments. In addition, he offers numerous examples from recent mass shootings and rampage violence to help explain the motivations and risk factors of those who make threats. Two detailed case examples are presented to illustrate key concepts related to assessing dangerousness. Treatment options are then described, using a variety of diverse case studies to demonstrate concrete approaches for clients who have been identified as at risk for violence following a threat assessment. *Requests for digital versions from ACA can be found on www.wiley.com. *To purchase print copies, please visit the ACA website *Reproduction requests for material from books published by ACA should be directed to [email protected].

Sie lesen das E-Book in den Legimi-Apps auf:

Android
iOS
von Legimi
zertifizierten E-Readern

Seitenzahl: 532

Veröffentlichungsjahr: 2014

Bewertungen
0,0
0
0
0
0
0
Mehr Informationen
Mehr Informationen
Legimi prüft nicht, ob Rezensionen von Nutzern stammen, die den betreffenden Titel tatsächlich gekauft oder gelesen/gehört haben. Wir entfernen aber gefälschte Rezensionen.



CONTENTS

Cover

Title Page

Copyright

Dedication

Preface

About the Author

Part 1: Assessment of Violence

Chapter 1: Understanding Violence

Chapter 2: Preparing for the Assessment

Chapter 3: Case Studies

Chapter 4: Central Threat Concepts

Chapter 5: Additional Threat Concepts

Chapter 6: Risk Factors Identified in the Litrature

Chapter 7: Structured Professional Judgment

Part 2: Treatment of Dangerousness

Chapter 8: Learning to Listen

Chapter 9: Understanding Their Story

Chapter 10: Learning to Think Differently

Chapter 11: Taking it Step by Step

Chapter 12: Searching for Meaning

Chapter 13: Case Studies Treatment Summary

Appendix A: On-Campus Risk Assessment Informed Consent

Appendix B: Off-Campus Provider Questions

Appendix C: The Structured Interview for Violence Risk Assessment (SIVRA-35)

Appendix D: ATAP “Risk Assessment Guideline Elements for Violence: Considerations for Assessing the Risk of Future Violent Behavior”

Appendix E: Reality Therapy WDEP Worksheet

Appendix F: An Existential Exercise

References

Index

Technical Support

End User License Agreement

Guide

Cover

Table of Contents

Begin Reading

Part 1

Chapter 1

Pages

i

ii

iii

iv

vii

viii

ix

x

xi

xii

1

2

3

4

5

6

7

8

9

10

11

12

13

14

15

16

17

18

19

20

21

22

23

24

25

26

27

28

29

30

31

32

33

34

35

36

37

38

39

40

41

42

43

44

45

46

47

48

49

50

51

52

53

54

55

56

57

58

59

60

61

62

63

64

65

66

67

68

69

70

71

72

73

74

75

76

77

78

79

80

81

82

83

84

85

86

87

88

89

90

91

92

93

94

95

96

97

98

99

100

101

102

103

104

105

106

107

108

109

110

111

112

113

114

115

116

117

118

119

120

121

122

123

124

125

126

127

128

129

130

131

132

133

134

135

136

137

138

139

140

141

142

143

144

145

146

147

148

149

150

151

152

153

154

155

156

157

158

159

160

161

162

163

164

165

166

167

168

169

170

171

172

173

174

175

176

177

178

179

180

181

182

183

184

185

186

187

188

189

190

191

192

193

194

195

196

197

198

199

200

201

202

203

204

205

206

207

208

209

210

211

212

213

214

215

216

217

218

219

220

221

222

223

224

225

226

227

228

229

230

231

232

233

234

235

236

237

238

239

240

241

242

243

244

245

246

247

248

249

250

251

252

253

254

255

256

Harm to Others

The Assessment and Treatment of Dangerousness

Brian Van Brunt

American CounselingAssociation

5999 Stevenson Avenue | Alexandria, VA 22304 | www.counseling.org

Copyright © 2015 by the American Counseling Association. All rights reserved. Printed in the United States of America. Except as permitted under the United States Copyright Act of 1976, no part of this publication may be reproduced or distributed in any form or by any means, or stored in a database or retrieval system, without the written permission of the publisher.

10 9 8 7 6 5 4 3 2 1

American Counseling Association

5999 Stevenson Avenue | Alexandria, VA 22304

Associate Publisher | Carolyn C. Baker

Digital and Print Development Editor | Nancy Driver

Production Manager | Bonny E. Gaston

Copy Editor | Ida Audeh

Cover and text design by Bonny E. Gaston.

Library of Congress Cataloging-in-Publication Data

Van Brunt, Brian.

Harm to others: the assessment and treatment of dangerousness/by Brian Van Brunt, EdD.

pages cm

Includes bibliographical references and index.

ISBN 978-1-55620-342-8 (pbk. : alk. paper)

1. Violence—Evaluation. 2. Violence—Treatment. 3. Violence in the workplace. 4. Violence in the workplace—Prevention. 5. School violence. 6. School violence—Prevention. 7. Violence—Case studies.

I. Title.

HM1116.V36 2015

303.6—dc23

2014016245

“You see us as you want to see us . . . In the simplest terms, in the most convenient definitions. But what we found out is that each one of us is a brain . . . and an athlete . . . and a basket case . . . a princess . . . and a criminal.

Does that answer your question?”

—The Breakfast Club

“Passion . . . it lies in all of us. Sleeping, waiting, and though unwanted, unbidden, it will stir, open its jaws, and howl. It speaks to us, guides us . . . passion rules us all. And we obey. What other choice do we have? Passion is the source of our finest moments; the joy of love, the clarity of hatred, and the ecstasy of grief. It hurts sometimes more than we can bear. If we could live without passion, maybe we’d know some kind of peace. But we would be hollow. Empty rooms, shuttered and dank . . . without passion, we’d be truly dead.”

—Angelus, Buffy the Vampire Slayer

Dedication

To Bethany,

“There’s something you’d better understand about me ‘cause it’s important, and one day your life may depend on it: I am definitely a mad man with a box!”

—Dr. Who

Kat is a guppy.

—Dad

Preface

Over the years, I have had the opportunity to offer trainings to thousands of clinicians, administrators, and law enforcement officers interested in reducing the likelihood of violence in educational settings and in the workplace. Through the process of writing this book, I've had a chance to smooth out some of the concepts I want to share, and I've had the opportunity to receive feedback from individuals I've taught about the effectiveness of how I share the concepts. It’s my hope that this book provides the very best summary of my thoughts, clinical expertise, and experience in the area of assessing and treating violent individuals. I make use of frequent case examples and try to keep my language grounded and conversational—to make this book the kind of book I like to read when it comes to learning new tasks and looking at innovative ways to work with clients. I hope the style is one that sits well with you.

The central theme of this book is this: The most effective solution to rampage violence is early, easy, and frequent access to care for potential perpetrators. This care involves (a) assessment to identify the individuals who are at risk and (b) treatment to move those individuals off the pathway to violence.

The first part of this book, which covers Chapters 1–7, is centered on the assessment of violence. Using my clinical experience and the threat assessment literature, I outline what counselors need to be aware of and vigilant for when working with threat assessments. Part II, Chapters 8–13, explores a variety of treatment options available for longer term treatment of potentially violent clients.

Counselors, psychologists, social workers, couples therapists, and pastoral counselors are likely to be familiar with the phrase “danger to self or others.” There are hundreds of books, trainings, journal articles, and graduate school classes dedicated to assessing suicidality and treating clients who are at risk for killing themselves. Organizations that focus on this population include the Jed Foundation (http://www.jedfoundation.org), Suicide Prevention Resource Center (http://www.sprc.org), and American Association of Suicidality (http://www.suicidology.org/home).

Clinical staff typically are asked to assess individuals with mental health disorders who pose a potential for risk to others. Examples include the individual experiencing a manic phase in his or her bipolar disorder or a patient who has a psychotic break and begins to act the commands issued by hallucinatory voices. “Harm to others,” in other words, is focused more on mental health motivating causes that drive individuals to violence. However, the problem lately has been that many of the individuals being dropped off at the counselor’s office (particularly in K-12 and higher education settings) are making threats or posing a threat to others but have no indication of mental health problems. A student, upset at a friend, posts on Facebook that she is “coming over to your house with a knife to kill you.” Another student threatens a college professor as a result of a poor grade on an assignment. Still another uses social media and tweets: “I’m going to bring a bomb to school tomorrow.”

Although mental illness may be an important contributing factor in any of these three examples, the core of any assessment must be based on threat assessment principles, not clinical pathology. An entire community of law enforcement, human resources, and federal agencies (Naval Criminal Investigative Service, Central Intelligence Agency, Federal Bureau of Investigation, Homeland Security) is exploring the assessment of threat and dangerousness. This is the information I want to bring to the counseling community in the first half of this book. One quick summary of the approach is offered by Mohandie (2014): “Four categories of information inform threat assessment: (1) warning signs or leakage, (2) risk factors, (3) stabilizing factors, and (4) precipitating events” (p. 129).

It’s my hope to reach out to counselors, psychologists, social workers, and other clinicians who are required to assess violence in schools (K-12), in higher education settings (residential and community colleges), and within the community in order to provide them with a better understanding of threat assessment principles as they apply to the assessment of dangerousness.

Chapter 1 introduces several key concepts (e.g., leakage, direct communicated threats, and the importance of attending to writing and social media) that are useful in understanding the literature and history of assessing dangerousness. Chapter 2 describes what should be included in an informed consent document, the difference between assessment and treatment, and the importance of gathering information from various sources. Concepts such as establishing rapport, building connections, and lowering client defensiveness are reviewed.

Chapter 3 introduces the two case studies, Stacie and Dustin, that are used throughout the book to illustrate key points related to assessment. The cases of Stacie and Dustin are teaching demonstrations that draw on past threat assessment cases with identifying details heavily disguised to protect anonymity. Full transcripts of each case are provided to give the reader a more in-depth view of the clinician’s exploration of risk factors for future violence. Each case study ends with a hypothetical threat assessment that explains the client’s risk profile and offers suggestions for follow-up and treatment.

Chapter 4 reviews six core issues related to threat assessment. Chapter 5 highlights a secondary set of core issues useful in assessing violence, such as weapon and bomb access and knowledge, attitudes toward authority, availability of support, and mental health issues. Chapter 6 reviews additional risk factors that are supported by literature and agencies that have been tasked with preventing violence, such as the U.S. Post Office and Federal Bureau of Investigation. These risk factors should be explored by clinicians during threat assessment interviews.

Chapter 7 introduces an approach to threat assessment and management, structured professional judgment, that provides the clinician with a framework to better conceptualize the motivations (disinhibitors and destabilizers) useful to develop a good formulation of risk. Concepts such as scenario planning and case management are introduced as the discussion shifts into treatment and management of risk.

The second half of the book is drawn more from my clinical experience working as a child and family therapist, college counselor, and director of two college counseling centers and focuses on treatment. My treatment suggestions in the second half of the book are drawn from my clinical insights and an eclectic mix of treatment theories drawing from such authorities as Carl Rogers’s (1961, 1980) humanistic person-centered approach, Irvin Yalom’s (1980) existential therapy, Michael White’s narrative therapy, Albert Ellis’s (2007) rational emotive behavior therapy, and Stephen Rollnick’s motivational interviewing. This is not a graduate course in these therapeutic approaches but instead a seasoned clinician’s insights on how each of these clinical treatment approaches has been useful to me when working with clients who presented a risk to others. Obviously, simply reading a book on a topic doesn’t make anyone an expert in threat assessment any more than watching a video about car tune-ups makes a person a mechanic.

Chapter 8 introduces a case study with an individual who is angry and alone in order to illustrate the importance of developing active listening skills, forming connections to others, creating shared communication, and avoiding objectification. These are the concepts and theories central to Rogers’s work and the humanistic approach to treatment.

Chapter 9 explores the concepts of narrative therapy through a case study with an individual who has been abused and broken. Concepts such as learning, externalizing, and mapping the client’s story are discussed. The importance of attending to metaphors with clients and how to use metaphors in treatment are highlighted.

Chapter 10 uses a case study of a paranoid and anxious client to demonstrate the cognitive–behavioral approach to treatment with an at-risk individual. Specific techniques, such as identifying and managing triggers as well as catching irrational thoughts, are explored in this chapter; so too are plan development and managing anger.

Chapter 11 looks at an impulsive and violent client and explores the techniques of motivational interviewing and transtheoretical change theory to address the client’s reluctance to change, effective methods to avoid escalation of negative emotion and build trust and understanding treatment approaches. Larger concepts of how to teach patience and redefining perceived failure are also discussed.

Chapter 12 explores the use of existential therapy with a client who is isolated and distant from others. Concepts such as wrestling with freedom, death, isolation, and meaningless can be used to empower the client and encourage further exploration of the factors that may be contributing to a violent outlook.

Chapter 13 examines treatment that might be useful for Stacie and Dustin, the cases introduced in Chapter 3. Although these case histories were primarily offered to illustrate assessment techniques, it is useful to explore the treatments that might be beneficial following the initial assessment.

Clinical staff across the country are increasingly being asked to participate in threat assessment teams and behavioral intervention teams and conduct these kinds of assessments. I hope that sharing what I have learned over the years helps clinical staff conduct substantive assessment.

About the Author

Brian Van Brunt, EdD, LPC, joined The National Center for Higher Education Risk Management (NCHERM) Group as Senior Vice President for Professional Program Development in January 2013. He is past-president of the American College Counseling Association, president of the National Behavioral Intervention Team Association, and managing editor for Student Affairs eNews and the Journal of Campus Behavioral Intervention (J-BIT). He has a doctoral degree in counseling supervision and education from the University of Sarasota/Argosy and a master’s degree in counseling and psychological services from Salem State University.

Brian is a regular speaker at academic conferences around the world. He has presented dozens of workshops with the American College Counseling Association, Association of Student Conduct Administrators, National Association of Forensic Counselors, American College Personnel Association, Association of University College Counseling Center Directors, Student Affairs Administrators in Higher Education, Association of Threat Assessment Professionals, and European Congress on Violence in Clinical Psychiatry.

Brian has presented hundreds of online training seminars and classes. These trainings have reached well over 150,000 individual staff and faculty at colleges and universities across the country. He has developed remote, asynchronous training modules on violence, mental health, and suicide prevention for resident advisors through Magna Publications and created a behind-closed-doors-style card game for resident advisors called RACE! He developed a mental health crisis guide for study abroad advisors for the American Councils and has written textbook test banks and instructor guides for Pearson Education.

Early in his career, Brian provided case management services through the Massachusetts Department of Mental Health, coordinated involuntary psychiatric commitments for law enforcement and hospital emergency departments, offered medical care as an Emergency Medical Technician and Ski Patrol member, and was a registered white water rafting guide in the state of Maine. Brian is certified in Brief Alcohol Screening and Intervention of College Students (BASICS) and the Question/Persuade/Refer (QRP) suicide prevention gatekeeper trainer programs.

Brian has taught at a number of universities and colleges. He has offered classes in counseling theory, ethics, program evaluation, statistics, and sociology for both graduate and undergraduate students. Brian has served as the director of counseling at New England College and Western Kentucky University. He is the author and coauthor of several books, including Ending Campus Violence: New Approaches in Prevention (2012), A Faculty Guide to Addressing Disruptive and Dangerous Behavior (with W. Scott Lewis, 2013) and The Prevention and Management of Mental Health Emergencies (with David Denino, Mary-Jeanne Raleigh, and Michelle Issadore, 2015). Brian is an expert on campus violence and has been interviewed by the New York Times, National Public Radio, Los Angeles Times, and USA Today and has appeared on Headline News and Anderson Cooper 360. He frequently is an invited keynote speaker and has offered training to law enforcement, homeland security, the Federal Bureau of Investigation, college faculty, and staff.

Part 1Assessment of Violence

Introduction

The first half of this book focuses on assessing violence. Meloy described assessment this way: “Assessment is, most generally, the process of gathering information for the use in making decisions” (Meloy, Hart, & Hoffmann, 2014, p. 4). Information is gathered from the individual and understood in the context of analytical process (such as structured professional judgment, highlighted in Chapter 7), and the clinician assesses the information and writes an opinion for the referral source.

Threat or violence risk assessment techniques are used to determine individuals’ risk to the greater community through asking contextual questions about the nature of the threat and risk and assessing risk factors that can help determine potential dangerousness (Meloy & Hoffmann, 2014). Threat assessments generally take place after a communicated threat has been made. There may or may not be a history of violence. Threat assessments become forensic in nature when they are in response to legal issues (such as competency to stand trial), criminality (breaking laws such as terroristic threatening), or mental health commitment.

Violence risk assessments, on the other hand, typically focus more on past behavior and a more subjective concern expressed by the referral source. They often occur with individuals who are in a secure location, such as an inpatient unit, prison, or hospital, and there has been a past history of violence.

Meloy, Hoffmann, Guldimann, and James (2011) described the difference between threat and violence risk assessment in this way:

Threat assessment and risk assessment have developed as somewhat overlapping fields. Violence risk assessment has an older provenance, and is a method by which the probability of generally violent behavior is estimated for an individual based upon his membership in a particular at-risk group. Threat assessment is concerned almost wholly with the risk of targeted violence by a subject of concern, and has a behavioral and observational policing focus. Risk assessment may address different domains of risk than threat assessment, and typically relies on more historical and dispositional (status) variables. (p. 257)

The American Society of Mechanical Engineers Innovative Technologies Institute (2010) recommends the following statement in terms of resolving risk:

Evaluating options for reducing risk (usually by considering benefit/cost) and selecting, implementing and managing those that are selected. Risk resolution also includes systematic implementation of the selected options, monitoring and evaluating the options for effectiveness, carrying out corrective actions when needed, and repeating this cycle. Risk resolution in institutes of higher education generally considers a more comprehensive set of variables including business continuity, academic continuity, and maintaining the core missions of the institute. (p. 16)

Threat and violence risk assessments have the added focus on answering the central question of “Does this individual pose a risk of violence to the community?” The recent American Society of Mechanical Engineers Innovative Technologies Institute (2010) American National Standard Institute defines risk analysis as follows:

The process of estimating the components of risk and combining them into the estimate of risk. Risk analysis provides the processes for identifying threats, hazards or hazard scenarios, event-probability estimation, vulnerability assessment and consequence estimation. The risk analysis process answers four basic questions: (1) What can go wrong?; (2) How can it happen?; (3) What is the probability that it will go wrong? and (4) What are the consequences if it does go wrong? (p. 14)

The evaluator brings skills and training to bear on the what, when, how, why, and where of potential dangerousness. Reports and recommendations typically focus on mitigating risk factors to thwart an attack.

It is generally agreed that violence is either affective or predatory.

Affective violence, sometimes referred to as reactive, impulsive, or emotional violence, is preceded by autonomic arousal, caused by a reaction to a perceived threat, and accompanied by intense feelings of anger and/or fear. It is a defensive violence, and its evolutionary basis is self-protection to live another day. . . . Predatory violence, sometimes referred to as instrumental or premeditated violence, is characterized by the absence of autonomic arousal and emotion, the absence of an imminent threat, and planning and preparation beforehand. It is offensive violence, and its evolutionary basis is hunting for food to live another day. (Meloy, Hart, et al., 2014, p. 5; see also Meloy, 1997, 1998, 2006, 2012)

The tendency toward violence is a genetically predisposed quality that has been useful for the survival of our species.

None of us would be here if our ancestors had not excelled at both affective and predatory violence; hence the theory that we have the biological capacity for both modes of violence and the accumulating empirical evidence that this is correct. (Meloy, Hart, et al., 2014, p. 5; see also Gregg & Siegal, 2001; McEllistrem, 2004; Raine et al., 1998; Viding & Firth, 2006)

Yet the innate capacity for violence must be tempered with a judicious process of control in our modern society. Irrespective of the type of violence and whether it is influenced by hard-wired biology or environmental factors, it presents an assessment and management challenge.

As we begin to look more closely at the concept of threat assessment, it is important to ensure that the clinician performing the evaluation has the education and experience and information necessary to develop an accurate picture of the potential threat. Van der Meer and Diekhuis (2014) described it this way:

Four elements can be identified as important to guarantee a good-quality threat assessment: (1) education, experience and subject matter expertise; (2) access to sufficient information to perform the assessment; (3) a level of certainty that the received information is indeed reliable; and (4) a professional objective assessment of the available material. (p. 54)

When a threat assessment goes poorly, it is often because of one of these four factors identified in the preceding extract. A clinician is put in the position of assessing the threat without sufficient training or expertise. There is not enough information available to make an accurate review of the potential for violence. The information is reliable, but the accuracy of the information is called into question because of bias or contamination. The objectivity of the professional conducting the assessment is called into question. All present a challenge for those looking to conduct forensic threat or violence risk assessments.

It is my hope that this book helps reduce the risk of these factors interfering with the process and that the clinician conducting the assessment may be better prepared to accomplish the task. S. White (2014) starts our journey together with these words of wisdom:

The central task of a workplace threat assessment protocol is to (1) sort out the large majority of cases that present a very low level of concern for violence and do not need intensive case management; (2) identify the few cases that credibly suggest a high or imminent level of concern about serious violence and therefore justify the necessary, costly, and potentially disruptive measures to protect safety; (3) for the midlevel cases, find appropriate and reasonable strategies for ongoing assessment and monitoring until the pathway toward or away from violence is clear. (p. 91)

Chapter 1Understanding Violence

Chapter Highlights

This chapter explores the concepts of violence and harm to others, forensic threat assessment, and violence risk assessment.

Leakage

is communication by an individual planning the attack to a third party. This chapter explores various forms of leakage (e.g., writing, social media posts) and how they should factor into the threat assessment.

Directly communicated threats

are threats that are made to the target. These threats can be direct, veiled, or contingent on future action. Disruptive behavior as a potential nonverbal threat is also described. Warren, Mullen, and McEwan’s (2014) typology of

screamers, shockers, shielders, schemers,

and

signalers

is discussed.

G. Deisinger, Randazzo, O’Neill, and Savage’s (2008)

pathway to violence

is described as a four-step model involving ideation, planning, acquisition, and implementation.

O’Toole and Bowman’s (2011) book

Dangerous Instincts

provides insight into potential blind spots for clinicians, such as and .

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!