• Skip to primary navigation
  • Skip to main content
allofus_logos_dark
  • Home
  • About
  • Protocol for Action
  • Resources
  • News
  • FAQ
DONATE
← Return to Protocol for Action Page

Chapter Three: Threat Assessment

What is a threat assessment and when is it appropriate?

When an employer, co-worker, teacher, family member, or friend identifies someone who is in crisis, how should we respond?  It’s a critical question, and the wrong answer can have tragic consequences. Allowing a student or employee who has made explicit threats and has access to a gun to return to class or work puts us at grave risk.  On the other hand, expelling a student or firing an employee who thought they were making a joke won’t make us any safer, and can have a serious, long-lasting impact on them, their families, and their future.  Even when someone is a threat, firing or expelling them may actually increase the likelihood of future violence. For many of us, choosing between life-altering options amounts to a poorly educated guess. But there is a readily-available and far better answer – a simple, validated threat assessment protocol that almost anyone can learn to administer.

The term “threat assessment” is shorthand for various protocols that can be used to evaluate the risk that a person will engage in violence or die by suicide.  Such protocols, once validated and properly administered, play a pivotal role in gun violence prevention, because they provide a systematic and comprehensive framework for understanding and addressing potential threats and broader risk factors of violence. They enable us to identify problematic behaviors that, when taken together and viewed in context, may be indicative of someone who is on a pathway to targeted violence. The results of that assessment then allow us to make better, informed decisions that are most likely to prevent future violence and make us safer, while avoiding unnecessary harm to those who present little risk.

Because the term “threat assessment” encompasses more than one type of protocol, it is helpful to understand the distinction between a true “threat assessment,” and a “violence and suicide risk assessment.”

A threat assessment can be conducted in the field by a school or employer.  In a school setting, when a school resource officer (SRO) receives information about a person in crisis (for example, someone who has made explicit threats), the SRO would notify school administration, who would activate the school’s trained, multi-disciplinary team. The team would conduct a threat assessment by evaluating the nature, credibility, and severity of the threat, and by assessing the individual’s intent and capability to carry out the attack, including whether the individual has access to firearms. Based on the outcome of the assessment, an appropriate case management strategy can be developed, and interventions implemented. Those interventions might include monitoring the individual, skill development, resiliency building, and referrals to mental health services and supports.  It might also include heightened security measures at the school and, where appropriate, formal referral to law enforcement.  Central to this process is periodic reassessment of the threat and the effectiveness of the management strategy.

Violence and suicide risk assessments are conducted by qualified mental health professionals in clinical settings (e.g., the emergency department or behavioral health crisis center). Such assessments focus more on the interplay between symptoms of mental health and substance use disorders and other evidence-based risk factors associated with violence toward self and others. These factors, determined through public health research of demographic and socio-economic data, adverse childhood events, social determinants of health, and access to firearms, extrapolate individual risk from population-level risk and help estimate the level of risk of imminent harm to self or others in that moment, and inform possible clinical interventions.

Although the differences between threat assessment and suicide/violence risk assessment may seem subtle, they are, in fact, distinct processes supported by their own respective evidence bases and best practices. Furthermore, threat assessments and suicide/violence risk assessments are not mutually exclusive, and both may be used in the same case.  For example, a school threat assessment like the one described above may lead to a clinical suicide/violence risk assessment that reveals serious, uncontrolled mental health symptoms associated with an elevated risk of suicide and/or violence.  In that case, the primary intervention may be in-patient psychiatric hospitalization. The reverse is also true - exploration of possible thoughts of suicide or homicide during the course of a psychiatric evaluation may reveal a threat of targeted violence, activating a multi-disciplinary team to assess the nature and severity of the threat and to develop appropriate risk mitigation strategies like temporarily removing the student from school.

Threat assessments and suicide/violence risk assessments apply at the individual level.  But risk can also be assessed at a community or population level and addressed with public health measures. This involves examining and understanding how various elements such as social dynamics, economic and health disparities, mental health resources, the prevalence of firearms, and other social determinants of health impact overall rates of gun violence in the community. For instance, if the community has high rates of unemployment and limited access to mental health services, these factors could contribute to an overall increased risk of violence. Population-level interventions intended to reduce the overall likelihood of gun violence might include community outreach programs, mental health support initiatives, and legislative measures to enhance gun safety. Together, threat assessment, suicide/violence risk assessment, and public health measures play a powerful role in the prevention of gun violence, combining targeted actions against specific threats along with comprehensive public health strategies to address the root causes of violence.

In the section below we detail threat assessment as a multidisciplinary and comprehensive tool to identifying, evaluating, and addressing threats of targeted violence. We also describe best practices and make recommendations for implementing and using a threat assessment model.  Finally, we cite current evidence around their safety effectiveness, and their potential applications across settings.

1. Behavioral Threat Assessment & Management (BTAM) Expand

Behavioral Threat Assessment and Management (BTAM) is a concept and approach that has evolved over the decades in response to the need for proactive measures to prevent violence and address concerning behaviors. The development of BTAM has been influenced by various disciplines, including psychology, law enforcement, education, and security.

The origins of threat assessment and management can be traced back to the field of psychology and the study of abnormal behavior. Over time, professionals in fields such as law enforcement, security, and education recognized the need for a more integrated and collaborative approach to address potential threats. While there isn’t a single founding entity or date for the establishment of BTAM, its principles have been shaped by research, case studies, and practical experience in dealing with threats of targeted violence. The approach gained prominence in response to high-profile incidents of violence in schools and other public spaces.

After the 1999 Columbine High School massacre, the U.S. Secret Service and the U.S. Department of Education collaborated on an initiative called the “Safe School Initiative,” and published its findings in 2002.(1) This work examined school shootings and emphasized the importance of threat assessment in preventing targeted violence in schools. It contributed significantly to the development of BTAM principles, emphasizing the importance of early identification, assessment, and intervention. As a result of ongoing research, collaboration between different professional disciplines, and the growing recognition of the need for a comprehensive approach to threat assessment, BTAM has become an established framework used in various settings to enhance safety and security. Different organizations and institutions may have their own variations of BTAM protocols, but the underlying principles remain consistent across contexts.

The primary goal of BTAM is to evaluate potential threats to help schools and community settings distinguish between an individual making a threat (with no intent to harm) versus posing a legitimate threat. In all cases, the goal is to connect individuals with proper community-based resources and interventions as identified by the assessment. With proper implementation using best practices, the model aims to avoid potentially harmful decisions that could result in community distrust, overcriminalization and/or unnecessary disciplinary action (i.e., suspension or expulsion) and requires the team to consider the context of the situation rather than a reductive, zero-tolerance approach. Research has shown that by taking this approach, teams can better identify effective interventions and referrals, build a management plan that mitigates a potential threat, and support the safety of the entire community, while also helping the person(s) in need develop a more positive developmental trajectory.

2. Protecting Individuals’ Rights in BTAM Expand

While BTAM is generally considered a valuable tool for preventing violence and addressing concerning behaviors, there have been some concerns associated with its implementation. For example, BTAM in educational settings could result in over-management and excessive disciplinary action on students. Zero tolerance policies, adopted by some schools in response to perceived threats, may result in severe consequences without considering the context or intent, which has shown to disproportionately affect marginalized student groups. Thus, training must include examination of how bias and racism can impact perceptions of student behavior and strategies to eliminate discriminatory action. Misinterpreting behaviors as threats may also lead to unnecessary disciplinary actions, and an overreactive BTAM process may stigmatize students and lack proper support for mental health issues. A focus on punitive measures without addressing underlying causes can contribute to a cycle of repeated problematic behavior, potentially impacting students’ academic achievement and overall well-being.

Furthermore, if students fear that reporting concerns about their peers may lead to harsh disciplinary consequences, they may be less likely to come forward with information that can hinder early identification and prevention of threats. Many of these concerns also raise legal and ethical issues, particularly if students’ due process rights are not adequately protected during an assessment and management process. Importantly, BTAM teams must be trained to understand privacy laws (e.g., FERPA and HIPAA), and clear guidelines of how information should and should not be used must be clearly articulated and enforced. It is critical that fair and transparent procedures are in place to ensure balance between security and individual rights.

It is also important to note that BTAM is not a substitute for other school teams and processes that address nonviolent behaviors of concern (e.g., attentional, emotional regulation, social skills), nor is it a mechanism to allow schools to remove children from school because they may have behaviors that are difficult to manage or as a disciplinary process.

To address these concerns, it is crucial for organizations to establish a multi-disciplinary team with clear and well-defined BTAM policies, train staff on the proper implementation of a threat assessment model, involve mental health professionals in the process, and prioritize a balanced and supportive approach that considers the overall well-being of students. Regular review and refinement of BTAM procedures, along with ongoing training, can help mitigate the risks associated with inadequate implementation.

Research has consistently shown that when BTAM is implemented using best practices and implemented with fidelity, students are more likely to receive counseling services and a parent conference and are less likely to receive long-term suspension or an alternative placement then when such programs are implemented with limited training or multi-sectoral engagement.(2) It has also been shown that when implemented correctly, there were no disparities found between Black, Hispanic, and White students in out-of-school suspensions, school transfers, or legal actions. This suggests that by implementing a threat assessment process in accordance with evidence-based best practices may help establish parity in school discipline.(3)

Beyond schools, individuals are more likely to receive services and supports.

Settings for BTAM: Schools, Workplace, Faith-Based Organizations, Healthcare Facilities, Community

3. The Eight Steps of Implementing BTAM Expand

The National Threat Assessment Center (NTAC) of the U.S. Secret Service and Department of Homeland Security has outlined the best practices for BTAM implementation based on 20 years of research, training, and consultation on threat assessment and preventing targeted acts of violence. Best practices include information on the essential foundations to effective and evidence-informed threat assessment protocols and procedures and can apply to schools, higher education, community agencies, and workplace environments.

The NTAC guidelines provide a framework to create a targeted violence prevention plan based on evidence and best practices, with a focus on decreasing the risk of an individual engaging in targeted violence.

Step 1. Establish a Multidisciplinary Threat Assessment Team

Step 2. Define Prohibited and Concerning Behaviors

Step 3. Develop a Central Reporting Mechanism

Step 4. Determine the Threshold for Law Enforcement Intervention

Step 5. Establish Assessment Procedures

Step 6. Develop Risk Management Options

Step 7. Create and Promote Safe School/Campus/Work Climates

Step 8. Conduct Training for All Stakeholders

If you are interested in additional details for each of these steps, an example within the school setting can be found in the 2018 U.S Secret Service Report on Enhancing School Safety Using a Threat Assessment Model. We have also outlined these steps along with other recommendations and how they can be applied across different settings (e.g., workplace) in the Appendix.

Recommendations for BTAM:

Create a multidisciplinary advisory committee within your respective organization, focusing on the use of a collaborative problem solving approach to:

  • Support countywide threat assessment activities.
  • Include systematic training and education about the application of BTAM.
  • Implement evaluation plan and monitor adherence and progress.
  • Increase engagement and partnerships among all stakeholders.
  • Strive for consistency and fidelity in evidence-based and best practices.
  • Provide for continuing education and re-evaluation of processes and outcomes based on data.

Support the community threat assessment team, led by your local community health organization in collaboration with law enforcement and other key partners.

  • Increase collaboration to assess and facilitate the continuum of services (e.g., K-12 or higher education student for wraparound services; employee who requires management assistance in the community).
  • Share best practices and knowledge around existing threat assessment practices.
  • Support existing threat assessment teams and provide training and technical assistance.

Support the work of schools and organizations in establishing and refining BTAM programs and teams.

  • Support training, resources, and funding of local school districts’ BTAM processes.
  • Encourage opportunities for community partners to attend the BTAM training being offered within school districts or organizations to understand BTAM and their role in collaborating with these teams.
  • Support the collaborative work between the Michigan State Police Office of School Safety, Michigan Department of Education, Oakland County Schools, Oakland Community Health Network, local law enforcement, Prosecutor’s Office, Department of Juvenile Justice, local service provider agencies, and other key collaborative entities to further BTAM initiatives.

Implementing these recommendations will help support threat assessment activities and contribute to a safer community for all residents. By fostering collaboration, enhancing awareness, and providing the necessary resources for training, prevention, intervention, and treatment, we can work together to reduce gun violence and protect public safety.

References Expand
  1. Vossekuil B. The final report and findings of the Safe School Initiative: Implications for the prevention of school attacks in the United States. Diane Publishing; 2002.
  2. Cornell D, Lovegrove P. Student threat assessment as a method of reducing student suspensions. Closing Sch Discip Gap Equitable Remedies Excessive Exclusion. 2015;180–91.
  3. Cornell D, Maeng JL, Burnette AG, Jia Y, Huang F, Konold T, et al. Student threat assessment as a standard school safety practice: Results from a statewide implementation study. Sch Psychol Q. 2018;33(2):213.
Additional Resources for BTAM: Expand
  • 2018 U.S Secret Service Report on Enhancing School Safety Using a Threat Assessment Model: https://www.secretservice.gov/sites/default/files/reports/2020-10/USSS_NTAC_Enhancing_School_Safety_Guide.pdf
  • CSTAG: https://education.virginia.edu/research-initiatives/research-centers-labs/research-labs/youth-violence-project/yvp-projects-resources/comprehensive-school-threat-assessment-guidelines
  • Salem-Keizer: https://www.co.marion.or.us/BOC/PSCC/Documents/MCPSCC%202016/Salem-Keizer%20School%20District%20Threat%20Management%202-9-16.pdf
  • United States Secret Service: https://www.secretservice.gov/protection/ntac
  • USSS Averting Targeted School Violence.2021.03.pdf (secretservice.gov): https://www.secretservice.gov/sites/default/files/reports/2021-03/USSS%20Averting%20Targeted%20School%20Violence.2021.03.pdf
  • New Secret Service Research Examines for the First Time Five Years of Mass Violence Data | United States Secret Service: https://www.secretservice.gov/newsroom/releases/2023/01/new-secret-service-research-examines-first-time-five-years-mass-violence
  • Protecting_Americas_Schools.pdf (secretservice.gov): https://www.secretservice.gov/sites/default/files/2020-04/Protecting_Americas_Schools.pdf
  • 2017_FoundationsOfThreat.pdf (drreidmeloy.com): https://drreidmeloy.com/wp-content/uploads/2017/12/2017_FoundationsOfThreat.pdf
  • Michigan State Police Office of School Safety: https://www.michigan.gov/msp/divisions/grantscommunityservices/school-safety
  • Michigan K-12 Behavioral Threat Assessment and Management: https://www.michigan.gov/msp/divisions/grantscommunityservices/school-safety/michigan-k12-behavioral-threat-assessment-and-management

 

SIGMA Threat Assessment and Management Services - Ontic

https://ontic.co/services-threat-assessment-and-management/

 

National Association of School Psychologists – BTAM Guidance

https://www.nasponline.org/resources-and-publications/resources-and-podcasts/school-safety-and-crisis/systems-level-prevention/threat-assessment-at-school

Appendix Expand

Detailed Recommendations for BTAM Implementation:

Step 1. Establish a Multidisciplinary Threat Assessment Team

Community

Key members on this team should include a local community mental health authority, local law enforcement, and FBI, as the core team, with additional members as follows: Emergency Management & Homeland Security, Prosecutor’s Office, judges, behavioral health providers / emergency services, technology/social media, and other / case specific (providers, churches, schools, Children’s Village, youth-based organizations such as Youth Assistance, Veteran Navigator).

K-12

Key members on this team should include administration, school-employed mental health, and law enforcement (SRO) as the core team, with additional members as follows: behavior management, instruction, special education, safety and security / emergency management, technology / social media, local community mental health authority, Youth Assistance, extracurricular coaches / advisors, and others as needed.

Higher Education

Key members on this team should include administration, university-employed mental health /counseling center, and law enforcement/campus police as the core team, with additional members as follows: Human Resources, faculty, health center care team, Dean of Students, advisor(s), housing / facilities coordinators, IT / social media, local community mental health authority, judicial affairs / legal representative, residence advisor / director, coaches, and others as needed.

Workplace

Key members on this team should include human resources, organizational leader(s) / management, legal, employee assistance, security, public information / public relations, risk management, mental health professional, IT, and local law enforcement (as needed).

Step 2. Define Prohibited and Concerning Behaviors

Community

Any individual who is threatening, stalking/harassing, or engaging in physical violence is at risk of being on the pathway to targeted violence. Concerning behaviors include, but are not limited to the following:

  • Engaging in / threatening violence
  • Efforts to obtain a weapon and/or carrying a weapon for the purpose of intentionally harming others
  • Command hallucinations / delusions, especially paranoia
  • Other untreated / under-treated psychiatric symptoms associated with increased risk of violence
  • Violent ideation
  • Evidence of ideation, planning, and/or preparation of a targeted attack
  • Significant change in behavior, particularly after possible triggering events that may include: exposed to personal threat by another, something valued is loss/destroyed (job, career, relationships, possessions), self-esteem/identify threatened, experienced (perceived) injustice, interpersonal conflicts, intimate partner problems, loss/disappointment
  • Identification and emulation with previous attackers
  • Entrenched grievances
  • Personal deterioration to include hopelessness, desperation, despair, suicidal thinking

K-12 / Higher Education

  • Engaging in / threatening violence
  • Bringing a weapon to school / campus
  • Evidence of ideation, planning, and/or preparation of a targeted attack
  • Bullying or harassing behavior involving stalking/ threatening behavior on school grounds and/or behavior off school grounds that impact safety at school
  • Assault, menacing behaviors
  • Escalating pattern aggressive/violent behavior
  • Others fearful
  • High level anger inappropriate for situation
  • Expression and/or justification for violence
  • Significant change in behavior, particularly after possible triggering events that may include exposed to personal threat by another, something valued is loss/destroyed (relationships, possessions), self-esteem/identify threatened, experienced (perceived) injustice, interpersonal conflicts, relationship problems, loss/disappointment/failure
  • Frustrated/confused mental state

Workplace

  • Engaging in / threatening violence
  • Bringing a weapon to work
  • Bullying or harassing behavior involving stalking/ threatening behavior
  • Evidence of ideation, planning, and/or preparation of a targeted attack
  • Efforts to obtain a weapon and/or carrying a weapon for the purpose of intentionally harming others
  • High level anger inappropriate for situation
  • Others fearful
  • Entrenched grievances
  • Personal deterioration to include hopelessness, desperation, despair, suicidal thinking, substance abuse
  • Significant change in behavior, particularly after a workplace conflict, poor job performance evaluation, reprimand, and/or possible dismissal, experienced (perceived) injustice/loss/disappointment, self-esteem/career identify threatened, intimate partner problems

Step 3. Develop a Central Reporting Mechanism

Community

The community threat assessment team will be able to receive reports and/or threat assessment requests via multiple mechanisms:

  • Reports to the local community mental health authority via phone, email, crisis line, access, customer service, etc.
  • From law enforcement, schools, justice system
  • From behavioral health and medical providers
  • From schools and higher education

K-12

School should select and regularly communicate multiple access.  Examples might include:

  • OK2SAY
  • Online form on school website
  • Dedicated email and/or phone number
  • Smartphone application platforms
  • QR codes
  • Telling a trusted adult
  • Reporting link within online learning platforms/management systems

Higher Education

Colleges / Universities should select and regularly communicate multiple access.  Examples might include:

  • Faculty / Staff / Resident Advisors/Students complete online report directed to Dean of Students Office
  • Report routes to Campus Police / Safety & Counseling and Psychological Services Office
  • Campus Police / Safety take other reports from outside the university
  • QR codes

Workplace

Employers should select and regularly communicate multiple access.  Examples might include:

  • Accept anonymous reports
  • 800 Number
  • Online submission questionnaire
  • Dedicated email
  • Report to supervisor / human resources

Step 4. Determine the Threshold for Law Enforcement Intervention

Community / Workplace

The following behaviors are the threshold for law enforcement involvement:

  • Expression of violent ideation and/or threat to self or others
  • Threatening words, actions, behaviors, social media posts that reference a targeted act of violence
  • Subject likely to have means and ability to develop and carry out a planned attack
  • Subject is not actively engaged in appropriate mental health treatment, if such treatment is indicated
  • Sexual assault/violence
  • Stalking/harassing behaviors

 K-12 / Higher Education

The following behaviors are the threshold for law enforcement involvement:

  • Physical violence
  • Threats of violence
  • Planned school attack
  • Behavior involving weapons
  • Stalking/harassing behaviors
  • Escalation of behaviors
  • Drugs
  • Sexual assault/violence

SRO’s must be appropriately trained to work in schools. SRO / law enforcement engagement is on a continuum: may be consultative, helping with data gathering (i.e., social media searches), providing interventions/supports, taking protective actions, follow-up, etc.

Step 5. Establish Assessment Procedures

Community

The local community mental health authority would conduct an initial screening to assess imminence of the threat and if there are potential indicators of targeted violence. If imminent risk, protective actions need to be taken and law enforcement possibly involved, If there are potential indicators of targeted violence a full threat assessment would be completed. The following information would be gathered:

  • Determine location of subject and potential target(s)
  • Gather information from relevant sources including subject
  • Assessment of risk of violence to others and suicide risk
  • Make determination of level of risk
  • If indicated, develop case management plan

K-12

A school/district BTAM team would conduct an initial screening to assess imminence of the threat and if there are potential indicators of targeted violence. If imminent risk, protective actions need to be taken and law enforcement involved. If there are potential indicators of targeted violence a full threat assessment would be completed.  There are three evidenced-based / evidenced-informed K-12 Models: Secret Service/NTAC, CSTAG, and Salem-Keizer System. Each follow similar assessment procedures:

  1. Receive report
  2. Screen report
  3. Gather Information
  4. Organize and analyze information
  5. Make assessment

If needed,

  • Development and implement intervention strategies
  • Reassess
  • Close and document case/inactive status

Higher Education

The core threat assessment team would screen to assess imminence of the threat and if there are potential indicators of targeted violence. If imminent risk, protective actions need to be taken and law enforcement possibly involved. If there are potential indicators of targeted violence a full threat assessment would be completed with team members. The team would determine the level of risk and corresponding risk management plan, engage community partners in management plan while protecting FERPA/HIPAA, then re-assess as needed, and finally close the case / place on in-active status when necessary.

Workplace

The core threat assessment team would screen to assess imminence of the threat and if there are potential indicators of targeted violence. If imminent risk, protective actions need to be taken and law enforcement possibly involved. If there are potential indicators of targeted violence a full Threat Assessment would be completed with team members. The following steps are recommended:

  1. Identify persons / situations of concern
  2. Gather additional information
  3. Assess whether person / situation poses a threat
  4. Develop and implement strategies to reduce threat / risk
  5. Monitor and re‐evaluate threat
  6. Evaluate needs of workplace / community

Step 6. Develop Risk Management Options

Community

  • Establish regular, ongoing meetings with team
  • Create dashboard for monitoring progress, cases, and data
  • Screen / assess for services if not already open
  • If open, connect with Core Provider Agency and case manager / supports coordinator
  • Collaboration with law enforcement, school, workplace, friends, and family to develop interventions
  • Establish plan for monitoring 

K-12

  • Restorative practices
  • Engagement
  • Monitoring
  • Skill development
  • Resiliency building
  • Relationship building
  • Environmental (school climate and culture)
  • Discipline, if appropriate
  • Community supports
  • Tele-medicine/tele-health/tele-therapy
  • Supports for school staff
  • Victim notification / services / protection, if warranted

Higher Education

  • Restorative practices
  • Engagement
  • Monitoring with campus and community law enforcement.
  • Victim notification / services / protection, if warranted
  • Skill development
  • Resiliency building
  • Relationship building
  • Environmental (school climate and culture)
  • Discipline, if appropriate
  • Community supports
  • Telemedicine / telehealth / teletherapy
  • Supports for faculty/staff

Workplace

  • Provide guidance to superiors on how to best manage behaviors without escalating risk/grievances
  • If disconnecting from employment, Human Resources must be trained in how to do this without escalating risk**
  • Establish regular, ongoing meetings with team
  • Create system for monitoring progress, cases, and data
  • Contact community mental health for screening/ access to services and/or resources
  • Collaboration with law enforcement, coworkers, family to develop interventions
  • Establish plan for monitoring
  • Victim notification / services / protection, if warranted

** Disconnecting an individual does NOT decrease risk.  Disconnecting can further increase isolation, provides more time for subject of concern to research and plan an attack, decreases ability to monitor, may escalate grievances, increases stressors (i.e., fall further behind academically, loss of support and structure, job loss leads to financial stress, etc.). The goal is to try and maintain connectedness, relationships, and further build social-emotional skills to help the subject of concern function in school, workplace, and society.

Step 7. Create and Promote Safe School / Campus / Work Climates

Community

There are multiple ways to promote safe climates within the community:

  • Encourage reporting
  • Create a template of workplace violence policy that other organizations and workplaces may use
  • Confidentiality agreement for threat assessment team and Critical Incident Stress Management (CISM) team
  • Special community events / town halls to increase knowledge of BTAM process and supports available.

K-12 / Higher Education

Assess school climate by administering surveys to students, staff, parents, focus groups and sharing results. Enhance current school climate by using survey findings to identify areas to address and involve students in developing and implementing solutions. Strengthen students’ connectedness to a trusted adult – this is a powerful protective factor. Building relationship and connectedness is no cost and easy to implement.

Zero tolerance can be counterproductive. If threatening behavior is the impetus for a potential expulsion, school / district / university should not proceed with expulsion without a threat assessment being conducted and other interventions / alternatives are considered. The findings of a full threat assessment inform and direct appropriate interventions and supports, thus a full assessment must be done before management decisions are made.

Workplace

There are multiple ways to promote safe climates within a workplace:

  • Updated workplace violence policy
  • Confidentiality agreement for team members
  • Training and education, regular and ongoing
  • Engage in activities that promote collaboration and a focus on supports
  • Laws/Policies/Guidelines:
    • Federal Americans with Disabilities Act and Section 504 of Rehabilitation Act
    • State public accommodations laws / disability‐related employment laws
    • Federal Health Insurance Portability and Accountability Act (“HIPAA”)
    • State patient‐health care professional privileges

Step 8. Conducting Training for All Stakeholders

Community

The community threat assessment team and/or county advisory committee should provide:

  • On-going Behavioral Threat Assessment and Management training and education, using an evidence-based / best practice model
  • Training / exercises with first responders around Behavioral Threat Assessment and Management
  • Engage with and train / educate unions, employee assistance programs, etc.
  • Incorporate Behavioral Threat Assessment and Management into Crisis Intervention Team (CIT) training for law enforcement
  • Provide de-escalation techniques and strategies training for first responders, provider network, staff, etc.
  • Provide Notice. Talk. Act. and Mental Health First Aid / Youth Mental Health First Aid to recognize the signs and symptoms of mental illness and substance use disorders

K-12

Training for threat assessment teams in one of these three evidenced-based / evidenced-informed K-12 Models: Secret Service/NTAC, CSTAG, and Salem-Keizer System

  • Quality training on behavioral threat assessment procedures. Those providing the BTAM training for schools must have expertise in K-12 threat assessment, paired with experience working in schools and/or serving on school-based BTAM teams
  • Train all team members together
  • Invite outside law enforcement and mental health professionals
  • Include legal counsel, public communications personnel
  • Identify opportunities for refresher training, advanced training

Training for students, staff, and parents:

  • Tailor sessions to audiences, make age-appropriate
  • Address why reporting is important
  • Identify behaviors to report and how to report
  • Explaining how reporting is not snitching / tattling
  • Include ALL staff

One example is the Michigan State Police Office of School Safety which has developed a cadre of carefully selected and trained individuals across the state of Michigan to provide BTAM basic training workshops according to the Secret Service/NTAC model. A carefully selected cadre of Oakland County School professionals have completed the Secret Service/NTAC training-the trainer workshop and can offer the BTAM basic training to K-12 schools and community professionals in Oakland County and surrounding districts/ISD’s. This can further continue to build capacity for schools/district/ISD’s within Oakland County.

Threat assessments have prevented many acts of targeted school violence, but the reality is acts of violence can still occur. Thus, schools need to also be trained in crisis prevention, intervention, and recovery. The PREPaRE School Crisis Prevention and Intervention Training Curriculum (3rd Ed) is a nationally and internationally recognized curriculum developed to help schools meet the crisis prevention and intervention needs of students, staff, and families.  PREPaRE is featured in the Best Practices Registry of the Suicide Prevention Resource Center. Additional information and program evaluation results can be found at https://www.nasponline.org/professional-development/prepare-training-curriculum.

Homicidal ideation often couples with suicidal ideation.  Additional K-12 staff development in suicide prevention and intervention in evidenced based curriculums are critical for educators (I.e., Signs of Suicide, safeTALK and ASIST).

Higher Education

  • Academic units and buildings have safety teams with designated / assigned staff
  • Complete online required training modules (awareness training for all students, faculty, and staff)
  • Conduct PR campaigns that encourage reporting and reaching out for help
  • Provide resources on university website
  • Train campus advisors and student leaders/activity groups (clubs, activity groups, Greek Life, etc.) on identification and reporting of concerns

 

Workplace

  • On-going training for staff and supervisors
  • Conduct PR campaigns that encourage reporting and reaching out for help
  • Training/exercises with first responders
  • Engage with unions, employee assistance programs, etc.
report

Read the full protocol for action

Download the Protocol for Action Against Gun Violence Here

Join All Of Us

Get the latest news, updates and resources from All Of Us. We will never share or sell your information.

* indicates required
You can list my name as a public supporter!
* indicates required
You can list my name as a public supporter!

Get In Touch!

P.O. Box 11174 Lansing, MI 48901

info@allofuscan.org

About All Of Us

All of Us Foundation is a 501c3 organization working to provide citizens with the information, tools and resources they need to use their own power to keep our communities safe through education and prevention.

© 2025 by All Of Us.

Paid for by All of Us Foundation, P.O. Box 11174, Lansing, Michigan 48901
Not paid for with taxpayer funds.