Predicting Violent Behavior

Predicting Violent Behavior

TASK FORCE REPORT: Predicting Violent Behavior August 2012 This report is a product of the Defense Science Board (DSB). The DSB is a Federal Advisory Committee established to provide independent advice to the Secretary of Defense. Statements, opinions, conclusions, and recommendations in this report do not necessarily represent the official position of the Department of Defense. The DSB Task Force on Resilient Military Systems and the Advanced Cyber Threat completed its information gathering in February 2012. This report is UNCLASSIFIED and releasable to the public. DEFENSE SCIENCE BOARD | DEPARTMENT OF DEFENSE Table of Contents Table of Contents ............................................................................................................................ iv List of Tables and Figures ................................................................................................................ vi 1.0 Executive Summary ................................................................................................................... 1 1.1 Introduction .................................................................................................................. 1 1.2 Terms of Reference and Task Force Membership ........................................................ 1 1.3 Overall Conclusions ....................................................................................................... 2 1.4 Targeted Violence ......................................................................................................... 2 1.5 Task Force Goals ........................................................................................................... 3 1.6 Current Situation ........................................................................................................... 3 1.7 Prevention Rather Than Prediction .............................................................................. 4 1.8 Recommended Strategy ............................................................................................... 4 1.8.1 Threat Management Approaches – Near Term ............................................................ 4 1.8.2 Information Sharing Limitations ................................................................................... 7 1.8.3 Science and Technology .............................................................................................. 10 1.9 Conclusions ................................................................................................................. 11 2.0 Introduction ............................................................................................................................ 12 2.1 Background and Context ............................................................................................. 12 2.2 Refining Scope and Focusing Questions ..................................................................... 13 2.3 Low Incidence/High Consequence .............................................................................. 13 2.4 Where We Are Today .................................................................................................. 16 2.5 Final Report Roadmap ................................................................................................ 17 3.0 Behavioral Approaches: Near Term ........................................................................................ 18 3.1 Targeted Violence: Prevention v. Prediction, Definition, & Common Misperceptions18 3.2 Examples of Targeted Violence: Mass Casualty Events .............................................. 19 3.3 Threat Assessment and Threat Management ............................................................ 20 3.4 Threat Management Units .......................................................................................... 21 3.5 TMU Operations .......................................................................................................... 27 3.6 Recommendations ...................................................................................................... 32 4.0 Limitations on Sharing Information ........................................................................................ 33 4.1 Privacy Act and HIPAA Privacy Rule ............................................................................ 33 DSB TASK FORCE REPORT Table of Contents| iv Predicting Violent Behavior DEFENSE SCIENCE BOARD | DEPARTMENT OF DEFENSE 4.2 Privacy Issues: Perceptions and Faulty Implementation ............................................ 34 4.3 Religious Practice ........................................................................................................ 35 4.4 Information Sharing Limitations--Organizational ....................................................... 36 4.5 Personnel Records Information Sharing ..................................................................... 36 4.6 National Threat Information Sharing .......................................................................... 37 4.7 Information Sharing Today ......................................................................................... 38 4.8 External Information Sharing ...................................................................................... 39 4.9 Recommendations ...................................................................................................... 40 5.0 Future Paths: Science and Technology ................................................................................... 42 5.1. Behavioral Science Data Collection and Analysis ....................................................... 43 5.2. Resilience Training and Assessment Programs ........................................................... 44 5.3. Biomarkers .................................................................................................................. 47 5.4. Recommendations ...................................................................................................... 47 6.0 Summary of Recommendations ............................................................................................. 49 Appendix 1. Terms of Reference................................................................................................... 52 Appendix 2. Task Force Membership ........................................................................................... 54 Appendix 3. Briefings Received ..................................................................................................... 55 Appendix 4. Responses to Terms of Reference Tasking ............................................................... 58 Appendix 5. Briefer Questionnaire ............................................................................................... 64 Appendix 6. Concerning Behaviors (as distinguished from Behavioral Indicators) ...................... 66 Appendix 7. Example Entities that Operate TMUs ....................................................................... 67 Appendix 8. Threat Triage Questions ........................................................................................... 68 Appendix 9. TMU-Related Legislation from Virginia .................................................................... 69 Appendix 10. Action Memo .......................................................................................................... 74 Appendix 11. Privacy Act: Blanket Routine Uses .......................................................................... 76 Appendix 12. HIPAA ...................................................................................................................... 78 Appendix 13. Prediction: Why It Won’t Work .............................................................................. 79 Appendix 14. Biomarkers in Research and Literature .................................................................. 81 Appendix 15. Definitions ............................................................................................................... 84 Appendix 16. Acronyms ................................................................................................................ 85 Bibliography .................................................................................................................................. 89 DSB TASK FORCE REPORT Table of Contents| v Predicting Violent Behavior DEFENSE SCIENCE BOARD | DEPARTMENT OF DEFENSE List of Tables and Figures Table 1. Summary of the Terms of Reference ................................................................................. 1 Table 2. Examples of Targeted Violence ....................................................................................... 14 Table 3. Misperceptions about Targeted Violence ..................................................................... 19 Table 4. Expected Results of Screening for Violent Behavior ........................................................ 80 Figure 1. U.S. Active Duty Military Deaths 1980-2010 ................................................................. 15 Figure 2. Homicide as a percentage of U.S. Active Duty Deaths 1980-2010 ................................ 15 Figure 3. TMUs in the public and private sectors ......................................................................... 22 Figure 4. Headquarters and Field TMU Reporting Schematic (NCIS) ........................................... 29 Figure 5. Notional Stress Response Curves ..................................................................................

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    104 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us