New Available Courses

Assessment of Social Media Threat

This course will provide practical experience to participants looking to better understand how NaBITA’s assessment tools are used to assess risk. This will include our triage tool (NaBITA Risk Rubric), how to assess written content (VRAW2), our in-person threat assessment interview (SIVRA-35 and the extremist violence assessment (ERIS). Participants will learn the VRAW2 assessment process through detailed case examples as well as how to teach the basic VRAW2 concepts to non-BIT members such as faculty and staff.  The afternoon will be spent assessing the risk of six separate cases involving social media and increased risk. The discussion will include the importance of diversity and bias awareness, how to rate the risk on written narratives, emails and social media posts and the importance of using an objective approach to assessing and managing risk.

Morning

  1. Overview of NaBITA’s four Risk Assessment Tools
    1. NaBITA Risk Rubric
    2. Violence Risk Assessment of the Written Word (VRAW2)
    3. Structured Interview for Violence Risk Assessment (SIVRA-35)
    4. Extremist Risk Intervention Scale (ERIS)
  2. Understanding the VRAW2’s scoring and application
    1. VRAW2 Case Examples
      1. Workplace Violence Angry Letter
      2. Facebook story – El Paso Attack
  1. Threatening email to Conduct office
  2. Newspaper story

Afternoon

  1. Social Media and Threat Assessment (six Cases)
    1. Massachusetts Threat: A student places concerning letters under the doors of 5000 residential rooms with a vague threat. Creates YouTube videos in response to campus reaction
    2. Threatening Language: An InCel posts negative and threatening comments on an app causing a community college campus concern.
    3. Vester Flanagan Live Attack: Ex-reporter kills reporter and cameraman live on television. A look at social media and catalyst events that lead up to the attack.
    4. Dayton Shooting: A deeper look at the social media history of the 8/4/19 Dayton shooting attack.
    5. False Shepard: A student posts a lengthy blog to his course, causing a report to the BIT.
    6. Isle Vista Attack: An Incel posts concerning content online prior to an attack in the California community

From Intake to Intervention: Developing Risk Management Plans

This course will be an interactive workshop to assist those in K-12, college and university and workplace setting better develop their intake skills and demonstrate how to create a Risk Management Plan to create a better chance for success, address violence potential and reduce legal liability. The focus will be on creating a plan that seeks to reduce the risk to the workplace or educational institutions while clearly and consistently leaning into best practice concepts to better ensure improvement in the behavior of the individual. This will be an interactive and group discussion-based training that will review a variety of cases with an eye to diversity, bias reduction and opportunities to bring practical take-a-ways back to put immediately into practice.

Morning

  1. Foundations of…
    1. Intake/Assessment
    2. Treatment Planning and Intervention
    3. Documentation discussion
    4. Layout of the day—five cases, interactive discussions
  2. Creation of a Risk Management Plan
    1. Introduction to the RMPT and overview of its use
    2. Developing a bias mitigation mindset
  3. Suicide Intake and Assessment (two videos by CM and clinical CM- Dave, Mak, Nicole)
    1. Group discussion with the challenge to write a two-paragraph summary
    2. Development of intervention goals
  4. Human Resource disruption and threat case
    1. Group discussion with the challenge to write a two-paragraph summary
    2. Development of intervention goals

Afternoon

  1. Substance abuse Intake and CM (Allison case and Mak)
    1. Group discussion with the challenge to write a two-paragraph summary
    2. Development of intervention goals
  2. ASD Student with poor boundaries and Title IX involvement
    1. Group discussion with the challenge to write a two-paragraph summary
  3. K-12 middle school threat (Window into BIT 3, part 2)
    1. Group discussion with the challenge to write a two-paragraph summary
    2. Development of intervention goal