Threat Assessment Team - University Police - UA Little Rock (2024)

A threat is defined as an expression of intent to do harm or act out violently against someone or something (including self). A threat can be spoken, written, or symbolic.

Not all threats, nor those that threaten, are equal in their potential for harm, but all threats that are brought to the attention of the university will be taken seriously, evaluated, and documented.

Read more about:
Factors in Threat Assessment
Levels of Risk
Threat Response

The UA Little Rock Threat Assessment Team will consist of the following core members and any appointed individuals as needed or deemed necessary relative to the threat:

  • Vice Chancellor for Student Affairs and/or designee(s)
  • Vice Chancellor for Finance & Administration and/or designee(s)
  • UA Little Rock Police Department and/or designee(s)
  • Executive Vice Chancellor & Provost and/or designee(s)

The UA Little Rock Police Department or designee will serve as the facilitator of the team. In the interest of expediency and specific to the threat, any team member can be designated as chairperson. The team will convene to evaluate and formulate a plan of action to address threats to the safety and security of the university public (students, staff, faculty, and visitors) and to university facilities. Quarterly meetings will be scheduled to exchange information and review the content and methodology of the threat assessment process.

Types of Threats

Threats can be classified into four different categories; direct, indirect, veiled, conditional.

  • A direct threat identifies a specific target and is delivered in a straightforward, clear, and explicit manner.
  • An indirect threat tends to be vague, unclear, and ambiguous. The plan, the intended victim, the motivation, and other aspects of the threat are masked or equivocal.
  • A veiled threat is one that strongly implies but does not specifically threaten violence.
  • A conditional threat is the type of threat often seen in extortion cases. It warns that a violent act will happen unless certain demands or terms are met.
Threat Assessment Team - University Police - UA Little Rock (2024)

FAQs

What questions are asked in a threat assessment? ›

The analysis of the information gathered during the Threat Assessment Inquiry should answer the following two questions: Is the behavior of the student consistent with the movement on a path towards an attack? Does the student's current situation or setting incline him or her toward or away from targeted violence?

What does a threat assessment tell you? ›

Threat Assessment is a fact-based, systematic process designed to IDENTIFY, INQUIRE, ASSESS, and MANAGE potentially dangerous or violent situations. A key goal is to distinguish between an individual who MAKES a threat versus one who POSES a threat.

What is a threat assessment for police? ›

Threat assessment for instrumental violence is incident- and subject-specific, meaning that it assesses the likelihood that a specific individual will commit a specific attack. This is a growing area and is often referred to as Behavioral Threat Assessment and Management (or BTAM) or Threat Assessment and Management.

What is the first step in the threat assessment process? ›

1. Evaluate the threat. The first step in Cornell's model is evaluation — when teachers or school administrators hear of a threat, they need to gather as much data on the incident as possible. This typically includes interviews with the person who made the threat, the intended victim, and other witnesses.

What are the 3 main goals of threat assessment? ›

The three major functions of a threat assessment program are: identification of a potential perpetrator, assessment of the risks of violence posed by a given perpetrator at a given time, and management of both the subject and the risks that he or she presents to a given target.

How is threat assessment done? ›

The process of threat assessment begins with the initial assessment of a threat. It is then followed by a review of its seriousness, and creation of plans to address the underlying vulnerability (perhaps by sinkholing or redirecting it). Finally, a followup assessment and plans for mitigation.

How do police determine if a threat is credible? ›

A credible threat means that a threat was made with the intent and the apparent ability to carry out the threat. After an investigation, law enforcement deems a threat non-credible when through the course of the investigation, they find no legitimacy of the threat.

What does threat assessment team do? ›

A threat assessment team is a group of officials that convene to identify, evaluate, and address threats or potential threats to school security. Threat assessment teams review incidents of threatening behavior by students (current and former), parents, school employees, or other individuals.

What are the four steps of the threat assessment process? ›

The threat assessment process follows the following key steps:
  • Step 1: Notification of a threat. ...
  • Step 2: Information gathering. ...
  • Step 3: Analysis of information. ...
  • Step 4: Assessing the threat. ...
  • Step 5: Make the assessment.

What are the 5 parts of threat assessment opportunities? ›

Now, let's take a deeper dive into each threat and risk assessment approach.
  • The Security Threat and Risk Assessment. ...
  • Active Threat Assessment. ...
  • The Cybersecurity Threat and Risk Assessment. ...
  • Threat Assessment for Instrumental Violence. ...
  • The Violence Threat Risk Assessment.

What factors must officers consider when conducting a threat assessment? ›

Factors in Threat Assessment
  • Identity of the victim or victims.
  • Reason for making the threat.
  • The means, weapon, and method by which it is to be carried out.
  • Date, time, and place where the threatened act will occur.
  • Concrete information about plans or preparations that have already been made.

How long does a security threat assessment take? ›

The Transportation Security Administration indicates that the Security Threat Assessment may take from one to eight weeks to complete.

How to prepare a threat assessment? ›

  1. Step One: Prioritize Which. Assets Need Protection.
  2. Step Two: Identify. Network Vulnerabilities.
  3. Step Three: Creating a. Cybersecurity Policy.
  4. Step Four: Awareness. Training for Employees.

What is the threat investigation process? ›

Threat detection, investigation, and response (TDIR) is a cybersecurity process for finding, analyzing, and mitigating threats. Threat detection is performed through constant system and network monitoring to identify any signs of malicious activity or potential vulnerabilities.

What is the formula for threat assessment? ›

Calculations: 1) Threats x Vulnerability x Asset Value = Total Risk; 2) (Threats x Vulnerability x Asset Value) x Controls Gap = Residual Risk.

What are the 5 questions that make up a threat model? ›

5 Questions to Ask When Threat Modeling Software Applications
  • How is the sensitivity of data determined?
  • What sensitive data is handled by the application?
  • Where does sensitive data enter and leave the application?
  • How is it secured while in transit and at rest?
Jan 17, 2017

What are the 4 stages of threat analysis? ›

The threat modelling process typically consists of four steps - identify assets, identify threats, analyse vulnerabilities, and create countermeasures or safeguards to protect against identified risks.

Top Articles
Latest Posts
Article information

Author: Barbera Armstrong

Last Updated:

Views: 6334

Rating: 4.9 / 5 (79 voted)

Reviews: 86% of readers found this page helpful

Author information

Name: Barbera Armstrong

Birthday: 1992-09-12

Address: Suite 993 99852 Daugherty Causeway, Ritchiehaven, VT 49630

Phone: +5026838435397

Job: National Engineer

Hobby: Listening to music, Board games, Photography, Ice skating, LARPing, Kite flying, Rugby

Introduction: My name is Barbera Armstrong, I am a lovely, delightful, cooperative, funny, enchanting, vivacious, tender person who loves writing and wants to share my knowledge and understanding with you.