Psychological and Educational Perspectives
From a psychological perspective, there are a number of reasons why students make threats. They may be made to obtain a reaction to perceived injustices, as a blind str ike back at those who have caused harm in their lives, from intense suicidal or self-harm feelings, as symptoms of a serious mental health disorder, as an attempt at processing their rage and frustration regarding being teased or bullied or as leakage concerning an actual attack plan. Understanding the range of threats helps the BIT/ CARE team address potential bias and stay focused on an accurate assessment of the risk.
An important consideration when assessing threat is the academic context under which the uniting was shared. An essay about self-injury with disturbing content as part of an assignment where the teacher asks the students to “Write about one of the hardest challenges vou have overcome in vour life” should be somewhat expected.The writing in Figure 5.5 is taken from an essay written by a college student in Massachusetts about their self-injury. While it is certainly upsetting, but it could be argued the student was asked to share this exact kind of material (Van Brunt & Solomon, 2019).
Likewise, there are times where a student’s mental ilhiess is clearlv in the fore-
J
front of the writing. When a student is experiencing reality-testing difficulties

FIGURE 5.5 Essay from student on self-injury.

FIGURE 5.6 Mental illness written threat.
related to schizophrenia or bipolar disorder, the BIT/ CARE team may be faced with sorting through rambling, psychotic speech to assess the risk. It is important to remember that individuals with mental illness are far more likely to be the victim that the perpetrator of an attack (Van Brunt & Pescara-Kovach, 2019). An example of tills type of case is provided in Figure S.6. This was a student from a Washington, DC, university who had posted some concerning and rambling content to the administration that raised concern around potential t hie at and violence (Van Brunt & Solomon, 2019).

FIGURE 5.7
Update on the Reddit Case
For those interested in the outcome of the case which started this chapter, the post found in Figure 5.7 was made prior to the deadline for the suicide. In addition to the school’s post, there were dozens of supportive posts made by those inside and outside the college community.
Moving Forward
In the next chapter, we will offer an approach to rating the risk of violence as it relates to written content. This approach is based on an expert system model, which focuses on drawing the best practices of evidenced-based research into a model that is useful for members of a BIT/ CARE team to address the potential for violence.This is a practical method that seeks an approach that provides clarity wrhen balancing the challenges outlined in the first part of this book.
References
Alicea, ]. (2015). Kean community on high alert after threats on twitter. Retrieved on December 13, 2019 from http://kutower.eom/2015/l 1/18/kean-community-threatened-after-peaceful- rallv-on-campus-last-night/
Association ofThreat Assessment Professionals (ATAP). (2006). Risk assessment guideline elements for violence (RAGE- V): Considerations for assessing the risk of future violent behavior. Sacramento, CA: ATAP. Calhoun, F., & Weston, S. (2009). Threat assessment and management strategies: Identfymg the Howlers and Hunters. Boca Raton, FL: CRC Press.
Craig, D. (2015). Origin of a threat: What is the ‘Beta Uprising?’ Retrieved on December 13, 2019 from https://www.phillyvoice.com/what-beta-uprising/
Cohen v. California, 403 U.S. 15, 1971.
De Becker, G. (2019). www.mosaicmethod.com
Fein, R., Vossekuil, B., & Holden, G. (1995). Threat assessment: An approach to targeted violence.
Research in action. Washington, DC: National Institute of Justice.
Gawande, A. (2011). The checklist manfesto. New York: Picador Paper.
GlobalGrind Staff. (2012). “Die, all of you”: T. J. Lane, alleged gunmen in high school shooting, writes chilling letter (details). GlobalGrind. Retrieved on December 13, 2019 from https:// globalgrind.com/1796904/tj-lane-alleged-gunmen-chardon-high-school-shooting-letter-die- all-you-details/
Hart, S., & Logan, C. (2011). Formulation of violence risk using evidence-based assessment: The structured professional judgment approach, hi P. Sturmey & M. McMurran (Eds.), Forensic case formulation (pp. S3—106). Chichester, England:Wiley-Blackwell.
Homeland Security. (2019). Fusion centers. Retrieved on March 6, 2020 from https://www.dhs. gov/fusion-centers
Levine, R. (2012). Tatro vs. The University of Minnesota. Retrieved on March 19, 2020 from https: / / www.aclu-mn.org/en/cases/tatro-v-uni versity-minnesota Lewis, T. (2016). Black Kean University Grad jailed for tweeting racist threats. Retrieved on December 13, 2019 from https: / /www.essence.com/news/black-kean-university-grad-jailed- tweeting-racist-threats /
Meloy, J.R. (2001). Communicated threats and violence toward public and private targets: Discerning differences between those who stalk and attack. Journal of Forensic Science 46, 1211-1213.
Mohandie, K. (2014).Threat assessment in schools. In J.R. Meloy & J. Hoffman (Eds.), The international handbook of threat assessment (pp. 126—147). New York: Oxford University Press.
O’Toole M.E. (2002). The school shooter:A threat assessment perspective. Quantico,VA: FBI.
O’Toole, M.E. (2014). The mission-oriented shooter: A new type of mass killer. Journal (^Violence and Gender, 1(1), 9—10.
Pow, H. (2012). You don’t even know ****ing terror yet. Daily Mail Online. Retrieved on December 13, 2019 from https://www.dailymail.co.uk/news/article-2235785/Jared-Cano-case-Cell- phone-video-shows-Florida-student-planned-blow-school-foiled-2011-attack.html
Rodger, E. (2014). My twisted world. Retrieved on December 13, 2019 from https://www.docu- mentcloud.org/do cuments/1173808-elliot-rodger-manifesto.html
Scalora, M., Simons, A., & Vansly, S. (2010, February). Campus safety: Assessing and managing threats. FBI Law Enforcement Bulletin, 79(2), 1-10.
Sokolow, B. ,Van Brunt, B., Lewis,W., Schiemann, M., Murphy, A., & Molnar, J. (2019). The NaBITA risk rubric. King of Prussia, PA: The National Behavioral Intervention Team Association.
Speer, R. (2014, May 28). A selfie-era killer: Social media and Elliot Rodger. The New York Post. Retrieved from http: / /nypost.com/2014/05 /28/a-selfie-era-killer-social-media-and-elliot-rodgei7
Tanenbaum, M. (2015). FBI, ATF: Threat of violence against “University near Philadelphia” on Monday. Retrieved December 13, 2019 from https://www.phillyvoice.com/fbi-atf-threat- violence-university-philadelphia/
Tatro v. U. of Minnesota, 800 N. W.2d 811,2011.
Teicher-Khadaroo, S. (2011, August 19). Columbine lessons may have prevented Tampa school shooting. The Christian Science Monitor. Retrieved on June 14th from https://www.csmonitor. com / US A / Education / 2009/0420/p02 s04-usgn. html
Tinker v. Des Moines, 393 U.S. 503, 1968.
Turner, J., & Gelles, M. (2003). Threat assessment:A risk management approach. New York: Routledge.
Van Brunt, B. (2012). Ending campus violence: New approaches to prevention. New York: Routledge.
Van Brunt, B. (2015a). Harm to others: The assessment and treatment of dangerousness. Alexander, VA.: American Counseling Association.
Van Brunt, B. (2015b). Violence risk assessment of the written word (VRAW2). Journal of Behavioral Intervention Teams (JBIT), 3, 12—25.
Van Brunt, B., & Pescara-Kovach, P. (2019). Debunking the myths: Mental illness and mass shootings. Journal ofViolence and Gender, 6(1), 53—63.
Van Brunt, B., & Solomon, J. (2019). Threat case studies. King of Prussia, PA:The National Behavioral Intervention Team Association.
Warren, L., Mullen, P, & McEwan, T. (2014). Explicit threats of violence. In J. R. Meloy & J. Hoffmann (Eds.), The international handbook of threat assessment (pp. 18—38). New York: Oxford University Press.