Journal of Threat Assessment and ManagementThe CTAP, a Threat Assessment Tool for the Initial Evaluation of Concerningor Threatening Communications: Development and Inter-Rater ReliabilityDavid V. James, Philip Allen, Andrew Wolfe Murray, Rachel D. MacKenzie, Junyi Yang, Alice De Silva, and Frank R. FarnhamOnline First Publication, January 31, 2022. http://dx.doi.org/10.1037/tam0000173
CITATIONJames, D. V., Allen, P., Wolfe Murray, A., MacKenzie, R. D., Yang, J., De Silva, A., & Farnham, F. R. (2022, January 31). TheCTAP, a Threat Assessment Tool for the Initial Evaluation of Concerning or Threatening Communications: Developmentand Inter-Rater Reliability. Journal of Threat Assessment and Management. Advance online publication.http://dx.doi.org/10.1037/tam0000173
The CTAP, a Threat Assessment Tool for the Initial Evaluationof Concerning or Threatening Communications:
Development and Inter-Rater Reliability
David V. James, Philip Allen, Andrew Wolfe Murray, Rachel D. MacKenzie,Junyi Yang, Alice De Silva, and Frank R. FarnhamTheseus Risk Management Ltd., Chippenham, United Kingdom
Best practice in threat assessment requires the use of standardised, evidence-based toolsto assist in case formulation. Considerable numbers of such tools have been developed foruse in risk assessment in criminal justice, mental health and community settings:instruments have been published for the threat assessment of cases in specific areas,such as workplace violence, school violence, stalking, and terrorism. However, there hasbeen less attention to a more general and common problem faced regularly by politicians,public companies, those in the talent industry, and others in the public eye. That is howthe recipients of problematic or threatening communications can judge which of theseneed referral to security departments or police for further investigation; and how agenciesreceiving such referrals can reach initial conclusions as to which cases require prioritisa-tion and which do not. Relevant risks in this area concern not simply violence, the focus ofmost threat assessment instruments, but also persistence, escalation, disruption offunction, reputational damage, financial loss, and psychological harm. The Communica-tions Threat Assessment Protocol (CTAP) is a structured professional judgement tool forthe initial threat assessment of unwanted communications, designed to fill this gap. Thisarticle details the background to the CTAP and its development into a manualised threatassessment instrument for use both in the private sphere and in policing contexts. It reportsthe first evaluation of the reliability of the CTAP. The results of this study are promising interms of the use of CTAP in the initial assessment of problematic communications.
Public Significance StatementWhen people in public life receive bizarre or threatening communications, some formof system is needed to help them divide these into ones to bin and ones that needfurther examination by security departments or police. Further, such departments needa means to make an initial threat assessment in order to triage such referrals—and onethat can be done quickly in response to limited information. The CommunicationsThreat Assessment Protocol provides such a system, the background to which andreliability of which is illustrated in this paper.
Keywords: threat assessment, threatening communications, screening tools, structuredprofessional judgement, policing
ThisdocumentiscopyrightedbytheAmerican
Psychological
Associationoroneofitsallied
publishers.
Thisarticleisintended
solely
forthepersonaluse
oftheindividual
userandisnotto
bedisseminated
broadly.
David V. James https://orcid.org/0000-0002-5046-8045Philip Allen https://orcid.org/0000-0003-3912-8071Junyi Yang https://orcid.org/0000-0003-2322-3525The group that designed and conducted this study
included the authors of the CTAP (David V. James, Rachel
D. MacKenzie, Frank R. Farnham). Two of the group (PhilipAllen and Andrew Wolfe Murray) are directors of Theseus,which produces the CTAP manual.Correspondence concerning this article should be
addressed to David V. James, Theseus Risk ManagementLtd., 6 Prince Maurice House, Chippenham SN14 6LH,United Kingdom. Email: [email protected]
1
Journal of Threat Assessment and Management© 2022 American Psychological AssociationISSN: 2169-4842 https://doi.org/10.1037/tam0000173
In the field of threat assessment, the use ofstandardised tools by multidisciplinary teams de-fines best practice (Meloy et al.,2021,p. 16).Suchtools provide a systematic, structured means ofassessing risk, and comprise an aide-mémoirewhich assists the assessors in making sure thatall relevant factors are considered in their evalua-tion (Skeem & Monahan, 2011), whilst allowingfor the consideration of idiosyncratic factors in agiven case. A considerable number of risk assess-ment instruments is available for examining risksin different spheres. Indeed, Singh et al. (2014)identified at least 400 structured risk assessmentmeasures for violence alone that are used byprofessionals working in health, criminal jus-tice, and the general community. Specialist vo-lumes detail the role of risk assessment tools in avariety of settings, including the workplace, thepublic figure context, schools, stalking, and terror-ism, with a particular emphasis on risk of violence(e.g., Douglas & Otto, 2020; Meloy & Hoffmann,2021; Wormith et al., 2020).In the design of these tools, a differentiation
can be made between risk assessment and threatassessment. Risk assessment generally involvesconsideration of a case in a review setting, wherethere is little time-pressure and a considerableamount of information is available about the case.Threat assessment, by contrast, concerns themaking of decisions quickly, based on limitedinformation, in order to determine the level ofimmediate response. As such, threat assessmenttools incorporate a screening role. Examples ofrisk assessment tools in the area of harassment,intrusive behaviours and the making of threatswould include the Guidelines for Stalking Assess-ment and Management (SAM; Kropp et al., 2008)and the Stalking Risk Profile (SRP; MacKenzie etal., 2009), whereas an example of a threat assess-ment tool would be the Screening Assessment forStalking and Harassment (SASH; James &Sheridan, 2020; McEwan et al., 2017).The risk factors incorporated into these tools are
generally data items which have been shown to bestatistically associated with the outcome in questionin previous research studies. Rather than individualprediction, which is not possible, such instrumentsconcern the allocation, based on group data, of anindividual into a general risk band according to thenumber and/or nature of the risk factors which areshowntobepresentintheircase.Inriskassessment,there tend to be three such groups, high, mediumand low (Meloy et al., 2012). Some risk assessment
instruments incorporate “red flag” indicators, thepresence of one of which is sufficient to determinethat an individual should be considered high risk.With threat assessment instruments, by contrast,what is being assessed is not a comprehensivejudgement as to risk, but a preliminary determina-tion as to the level of concern (and thereforepriority for further assessment or intervention)which should be accorded to the individual underassessment (Scalora, Baumgartner, Zimmerman,et al., 2002). Risk assessment instruments, andsome threat assessment tools, generally enableconclusions to be drawn, not only as to the levelof problem, but as to how it can be managed orreduced.Whatever the type of tool, it is necessary to
ensure that its results are both reliable and valid—in other words, that it produces consistent andreproducible results between investigators andover time, and that it measures what it is supposedto measure. This involves exercises in the mea-surement of inter-rater and test–retest reliability,and of predictive validity. Also relevant is theconcept of construct validity in terms of whetherthe content of the instrument items completelyrepresents the construct, and whether scores cor-relate with those from other instrumentsassessingthe same construct (Cook & Beckman, 2006).Eventually, it is relevant to investigate the utilityof tools, in other words how useful and acceptablethey are found in practice (Hart & Logan, 2011).New tools are usually based upon a systematicreview of the relevant scientific and professionalliteratures, and refined through various forms ofpractical evaluation, before being subject to for-mal reliability and validity testing. The presentstudy concerns the development and reliability ofthe Communications Threat Assessment Protocol(CTAP; James, MacKenzie, et al., 2014), a threatassessment tool for the initial evaluation of con-cerning or threatening communications.
Threatening and ConcerningCommunications
Those in the public eye, or whose jobs arepublic-facing, receive letters and electronic com-munications from members of the general publicbecause of who they are, what they do, or whothey work for. This applies amongst others topoliticians, public officials, the CEOs and em-ployees of major companies, sports and media
ThisdocumentiscopyrightedbytheAmerican
Psychological
Associationoroneofitsallied
publishers.
Thisarticleisintended
solely
forthepersonaluse
oftheindividual
userandisnotto
bedisseminated
broadly.
2 JAMES ET AL.
personalities, and creative artists. The majority ofsuch communications concern legitimate enquiry,reasonable complaint, requests for help, or fanmail. However, a significant minority will bestrange, bizarre, angry or inappropriate in content.In a proportion, the writer may seem mentallyunwell. Some cases will constitute persistent orquerulent complaining, some amount to cam-paigns of harassment, and a few will be inappro-priately amorous. Sometimes, communicationswill be received which contain direct or indirectthreats. These may concern reputational or finan-cial damage, persistent unwanted intrusion, ormore rarely, physical violence. Even where nosuch threats are included, the communicationsmay be psychologically upsetting or distressingtothose receiving them, they may cause disruptionof function, and valuable time and resources maybe consumed in dealing with them.The majority of such inappropriate, aggressive
or threatening communications are harmless,but some are not. The problem is how to separatethe two. The dangers, should this not be doneeffectively, are either that warnings of futureharm are missed, with potential adverse con-sequences, or alternatively that costly investi-gative and security resources are spent on caseswhere they are not required. In the operationalsituation, there are two levels at which practicalguidance is needed as to which cases warrantfurther attention and which can safely beignored. The first concerns those who open orreceive correspondence, whether that be indi-vidual addressees, their correspondence staff, orpublic-facing departments such as customerrelations or complaints handlers. Here, a briefand simple screening process or filter is neces-sary for deciding which cases to refer on tosecurity departments or risk managers. Thesecond level concerns guidance as to the initialthreat assessment and management of cases bythe risk managers, security staff or policingteams to which such cases are referred. Itspurpose is to avoid missing risk, to preventunnecessary distress from over-estimating risk,to avoid unnecessary expense, and to point towardsa suitable investigative response. Rather than anuanced risk assessment involving detailedinformation and an absence of time pressure,it concerns the making of quick decisions inresponse to limited information in a dynamic,real-time setting. The CTAP was evolved to fulfilthese functions.
The Knowledge Base
Literature
There is a considerable background body ofpublished research to assist in the construction ofsuch tools. This has been expertly summarisedelsewhere (Meloy, 2014; Meloy et al., 2004, 2011,2021), and the account here will be limited to thebroad brush. Formal study of the attacks on publicfigures began in the nineteenth century with thework of Régis in France and Laschi and Lombrosoin Italy (Farnham & Busch, 2016; James, 2015;Laschi & Lombroso, 1886; Régis, 1890). Modernresearch into this area was greatly advanced byDietz and Martell’s (1989) report “MentallyDisordered Offenders in Pursuit of Celebritiesand Politicians,” an unpublished work of 619pages plus appendices in which was buried atreasure-trove of information about the character-istics of concerning correspondence and asso-ciations withsubsequent approach. Unfortunately,this was robbed of context in the two associatedpublications (Dietz, Matthews, Martell, et al.,1991; Dietz, Matthews, Van Duyne, et al., 1991),as mental illness was excluded from the accountfor“securityreasons”(Dietz&Martell,2010).TheU.S. Secret Service’s Exceptional Case StudyProject on lethal and near-lethal attacks, whichhad considerable influence, examined an historicalcohort of 83 cases and found that 61% of indivi-duals had a history of psychiatric problems, 43%of delusional ideas, and 10% of violent com-mand hallucinations (Fein & Vossekuil, 1998):this compares with a point prevalence of psychoticillness in the general community of around 0.4%(Kirkbride et al., 2012). A further historical exer-cise looking at judicial figures was contributed byCalhoun (1998). Scalora and colleagues then pro-duced a series of studies of problematic contactstowards members of the U.S. Congress and factorsassociated with subsequent approach (Marquez &Scalora, 2011; Scalora, Baumgartner, Hatch-Maillette, et al., 2002; Scalora, Baumgartner,Zimmerman, et al., 2002; Scalora et al., 2003;Schoeneman et al., 2011; Schoeneman-Morriset al., 2007), which form the foundation of recentwork in this area and aided subsequent research inthe United Kingdom. As regards sectors otherthan politicians, Meloy and colleagues advancedknowledge of problematic communications tocelebrities (Meloy, Mohandie, et al., 2008), andthere are the beginnings of work on inappropriate
ThisdocumentiscopyrightedbytheAmerican
Psychological
Associationoroneofitsallied
publishers.
Thisarticleisintended
solely
forthepersonaluse
oftheindividual
userandisnotto
bedisseminated
broadly.
CTAP: DEVELOPMENT AND INTER-RATER RELIABILITY 3
approaches to corporate figures (Hoffman &Sheridan, 2008; Meloy, Amman, et al., 2021).In parallel, conceptual work has taken place onthe subjects of warning behaviours (Meloy et al.,2012) and leakage (Meloy & O’Toole, 2011).Inthe U.K., the Fixated Research Group (FRG)
produced a 300-page report in 2006 and publishednine research papers in peer-reviewed journals(James, 2010; James et al., 2007, 2008, 2009;James, McEwan, et al., 2010; James, Meloy,et al., 2010; James, Mullen, et al., 2010; Meloyet al., 2004; Mullen et al., 2009). These papersconcerned concerning communications to theBritish royal family and to politicians, the role ofmentalillness,andfactorsthatpredictedpersistence,approach and attack. The relation of the FRG’sfindings to the U.S. literature is set out by Mullenet al. (2008). It is from the work of the FRG, both intermsofitsinvestigationsandresearchpublications,that the CTAP was initially developed.
Threat Assessment Services
A number of threat assessment services in thepublic and private sectors over the last 25 yearshas published broad detail of their threat assess-ment approach (for instance, Cawood & Corcaran,2003; Calhoun & Weston, 2003, 2009; de Becker,1996;Fein&Vossekuil,2000;McElhaney,2004).Accounts are available of the work of the LosAngeles Police Threat Assessment Unit (Bixleret al., 2021; Dunn, 2014); the U.S. Secret Service(Fein & Vossekuil, 1998); the U.S. Capitol PoliceThreat Assessment Section (Scalora et al., 2008);and a range of other threat assessment services andapproaches (Meloy & Hoffmann, 2014, 2021;Meloy, Sheridan, et al., 2008a, 2008b). Perhapsthe most has been written in recent years aboutthe Fixated Threat Assessment Centres(FTACs), which developed out of the work ofthe Fixated Research Group. Based on its re-commendations, the U.K.’s Office of Security andCounter-Terrorism (OSCT) and the Departmentof Health financed the establishment of a unit toassess and manage the risk to politicians and theroyal family from individuals who write con-cerning letters or make concerning approaches.This, the U.K. FTAC, is a police unit, within theMetropolitan Police Service’s protection com-mand, but one which is jointly staffed by policeofficers and forensic psychiatrists, psychologistsandnursesfromtheU.K.’sNationalHealthService(NHS).The rationale and operating practices of the
FTACs have been extensively described (Barry-Walshet al., 2020; James et al., 2014; Wilson et al.,2018, 2019, 2021). It was within this unit that thefoundations of the CTAP were developed.TheFTACmodelwassubsequentlyreplicatedin
the Netherlands (Nelen et al., 2012, 2013; Sizoo &vanNobelen,2021),Queensland(Pathéetal.,2015,2017; Pathé, Haworth, et al., 2016; Pathé, Lowry,et al., 2016), in the Australian state of Victoria,in Western Australia, in New South Wales, inCanberra (Riddle et al., 2019), and in Wellington,New Zealand. The extent of the problem of threatsand disturbing correspondence to members ofparliament from lone individuals has meanwhilebeen established in a number of jurisdictions(Akhtar & Morrison, 2019; Bjelland & Bjørgo,2014; Brottsförebygganderådet(CrimePreventionCouncil), 2012; De Groot et al., 2010; Every-Palmer et al., 2015; Hamers et al., 2010; James,Farnham, et al., 2016; James, Sukhwal, et al., 2016;Muller et al., 2010; Narud & Dahl, 2015; Nijdamet al., 2008; Wallin & Wallin, 2014). Outcomestudies from the U.K. FTAC have been published(James & Farnham, 2016; James, Kerrigan, et al.,2010),andfurtherresearch onriskfactorshas beenproduced from the FTAC database (Clemmowet al., 2021; Gill et al., 2021). Other researchinvolving the FTACs has demonstrated the closesimilarities between non-ex-intimate stalkers inthe general population and those who harass orpursue public figures (James et al., 2014; James,McEwan, et al., 2010; McEwan et al., 2012; Pathé,2017). This is important in that it enables researchon risk factors in stalking to be translated acrossinto the field of risk assessment in public figures.
Assessment Tools
Individual threat assessment units and depart-ments will have their own internal data collectionand assessment procedures, though few will besubject to research scrutiny. However, a numberof structured assessment approaches have beendeveloped and published in recent years to aid inthe assessment and management of risk in situa-tions where inappropriate communications andapproaches occur. For instance, the aforemen-tioned SAM, SRP and SASH concern stalking:the Workplace Assessment of Violence Risk-21(WAVR-21; White & Meloy, 2016) and theCawood Assessment Grid (CAG; Cawoodet al., 2020) concern workplace violence; theTerrorist Radicalization Assessment Protocol-18
ThisdocumentiscopyrightedbytheAmerican
Psychological
Associationoroneofitsallied
publishers.
Thisarticleisintended
solely
forthepersonaluse
oftheindividual
userandisnotto
bedisseminated
broadly.
4 JAMES ET AL.
(TRAP-18) concerns lone terrorist activity(Meloy, 2016). Exercises have been undertakento establish their reliability and validity (Cawoodet al., 2020; Meloy, 2018; Meloy et al., 2013).With the notable exception of the stalking instru-ments, most emphasis in this area is focussed ontheriskofviolenceandseriousphysicalharm.Thisis understandable in terms of their development inenvironments where firearms can be acquired bymembers of the public. However, it leaves some-thing of a gap. As described above, those in thepublic eye are in need of some general means ofdifferentiating between concerning communica-tions which they can safely ignore, and thosewhich they need to take seriously and pass on totheirsecuritydepartments.Securitydepartmentsinmajor companies and other organisations need ameans of threat (rather than risk) assessment toaid in their initial prioritisation of responses toworrying contacts, a form of “screening in” and“screeningout”(Shafferetal.,2020).Andwhereasviolence is evidently important, it is rare and otherforms of risk (e.g., persistence, escalation, dis-ruption of function, reputational damage, financialloss, and psychological harm) are often of moreimmediate day-to-day concern. Attending to theseneedsistherolethattheCTAPwasdesignedtofill.
Nature of the CTAP
The CTAP comprises two parts: a preliminaryQuick Correspondence Screen (QCS), and themain CTAP itself. The QCS is designed to becompleted by those to whom communications areaddressed or their staff. It comprises 18 itemsconcerning the content of the communication. Ifany item on the list is present, the letter shouldbe referred to the security or threat assessmentdepartment for more detailed examination, usingthe CTAP. If none are present, the communicationneedsnofurtheraction.TheCTAPitselfisdesignedto be used by security managers, threat assessors orpolice who have undergone training in its use. Itcontains 25 items, each of which is associatedwith increased risk. The CTAP is contained in a55-paged manual which includes: an introduction,instructions for use, descriptions of the 25 CTAPitems, instructions for allocation of concern level,frameworkforinitialmanagementplans,andguide-linesforcaseswhichdonotproveamenabletorapidresolution.The nature of each CTAP item is described in
turn on a separate page, with illustrations where
necessary, and the specification for each possiblecoding set out. For most items, there are twopossible codings—yes or no. For others, a third“?” coding is defined. Guidance is given as to howto allocate cases into low, medium or high concerncategories. The CTAP is not totalled into a simple“score. ” Whilst a higher number of positives islikely to be associated with a higher level ofconcern, the items are not equal in value, nor inlikelihood of occurrence. Some of the factors arerarely encountered: however, their significancewhen present is such that it is important that theyare always considered. Five of the factors are“red flag” items associated with a high risk ofviolence, such that the presence of one item aloneis sufficient to render the case of high concern untilshown otherwise. Use of the CTAP requires priorattendance at an approved, standardised trainingsession, in person or on-line, lasting 4 hr andincorporating discussion about the practical appli-cation of the CTAP that may be peculiar to thedelegates’ organisation, most usually concerningissues of business structure, reporting processes,and company policy regarding communicationwith the general public. The CTAP manual hasbeen translated into Dutch and Norwegian.The CTAP has been in use over the last 7 years
by major international corporations, financialinstitutions and non-governmental organisations,family offices and the management teams of arange of sporting, acting, presenting and musicaltalent, security departments of elected assemblies,by policing departments, including the NetherlandsNational Police, and by various public agencies andcharities.
Aims of the Study
ThisarticlesetsoutthebackgroundtotheCTAPand its development, before presenting the find-ings of inter-rater and test–retest reliability studies,and considering ways of evaluating its ability effec-tively to accord casesan appropriatelevelofpriority.It is the first part of the evaluation project, the secondpart of which will look at the validity of the CTAP.
Development of the CTAP and QCS
This section describes the identification of theproblem with which the CTAP was designed todeal, the sources used in its construction, its evo-lution, the factors determining its format, and itsadaptation to the non-governmental sector.
ThisdocumentiscopyrightedbytheAmerican
Psychological
Associationoroneofitsallied
publishers.
Thisarticleisintended
solely
forthepersonaluse
oftheindividual
userandisnotto
bedisseminated
broadly.
CTAP: DEVELOPMENT AND INTER-RATER RELIABILITY 5
The Nature of the Problem
The ur-version of what was subsequently devel-oped into the CTAP was a product of the U.K.FTAC. The first problems faced by the develop-ment team in establishing FTAC were twofold.How should referrals to the new unit (mainlyconcerning correspondence, but also people tryingto gain access to Royal and government buildings)be selected (or limited)? And how could a stan-dardised system be set up for deciding which caseswarranted further assessment and determining thepriority that they were afforded within limitedresources? The FRG had already identified thestark problems within the existing systems. Theabsence of a suitable system for filtering casesfor referral had seriously hampered attempts onthe part of Royalty Protection police to assessinappropriate and threatening communications tomembersoftheroyalfamily.Theirhouseholdshadbeen forwarding all letters that seemed odd orconcerning, these amounting to some 11,000 ayear. The few officers who were attempting todeal with them were overwhelmed, and the back-log had stretched to 6-months, by which time therewas littlethatcouldbedone withmostofthe lettersother than logging them. By contrast, the cor-respondence office at 10 Downing Street waswell-staffed and efficient, and correspondencehandlers were adept at identifying at least a pro-portion of thosecommunicationswhich weremostconcerning. However, the system fell down in thewaythesewerehandled.Themostworryingletterswere given to the Prime Minister’s personal pro-tection officers who, it transpired upon investiga-tion, placed them in a cardboard box under a desk.Such “out of sight, out of mind” approachesproved to be a relatively common phenomenon,not just in government departments, but in privatecompanies, where worrying letters were oftensimply placed in the “mad drawer” without anyfurther action. Given the low base-rate of vio-lence, inaction in the great majority of suchcases will be without consequence. However,the consequences of inaction can be so severethat systems need to be in place to assess risk,even where the chances of an adverse outcomeoccurring are low. The task, then, was to design ascreening or filter instrument for use by correspon-dence offices, and to create a risk assessmentprotocol for the initial assessment of concerningcommunications in the new FTAC.
Examining Best Practice Elsewhere
The development team visited relevant organi-sations in Europe and the U.S. engaged in similarforms of threat assessment in order to study theirprocesses and schedules. Some proved more rele-vant to FTAC’s purposes than others. The U.S.Secret Service placed such value on their mainprotectee that their methods appeared over-inclu-sive. The methods of the Behavioral Analysis Unitin Virginia were focussed on their various func-tions in assisting U.S. law enforcement agencies ininvestigations of specific crimes and were over-concentrated for FTAC purposes on the mainte-nance of specialised databases and the use ofrelatively complicated methods, such as textualanalysis and the employment of algorithms. Theexperience of the Swedish Security Police inStockholm was directly relevant in that thecountry possessed both a parliament and a con-stitutional monarchy, and there had been devel-opments in threat assessment procedures in theaftermath of the assassination of Olaf Palme,including a collaboration in case assessmentbetween the Security Police and forensic psy-chologists and psychiatrists from the KarolinskaInstitute. A similar, but less developed, servicewas operating in the Norwegian Police SecurityService. However, the most useful source ofprocedural material was the Capitol Police ThreatAssessment Section in Washington D.C. (Scaloraetal.,2008),whereMarioScaloraoftheUniversityof Nebraska had devised and supervised a sched-ule with a prominent psychological componentto evaluate threatening and harassing contactstowards members of Congress (Marquez &Scalora, 2011; Scalora, Baumgartner, Hatch-Maillette, et al., 2002; Scalora, Baumgartner,Zimmerman, et al., 2002; Scalora et al., 2003,2008; Schoeneman et al., 2011). The trove ofmaterial collected on these trips comprised a seriesof protocols, lists of risk factors, risk grids, andof less practical relevance, lists of key words toidentify in correspondence (including multiplesynonyms for kill, bomb, shoot, and engagementin procreational activity).
Examining the Literature
Extensive searching of the literature on riskassessment, threat assessment, violence, violenceand mental illness, and stalking and harassment
ThisdocumentiscopyrightedbytheAmerican
Psychological
Associationoroneofitsallied
publishers.
Thisarticleisintended
solely
forthepersonaluse
oftheindividual
userandisnotto
bedisseminated
broadly.
6 JAMES ET AL.
was conducted. Opinions and advice were alsosought directly from experts in the field. Theresearch publications by the FRG referred toabove were directly relevant to the identificationof statistical associations with adverse outcomes,these associations ineffect constituting riskfactors.An example is that of “end-of-tether” languagewhich, since its inclusion in the FRG publications,has been recognised as an important form ofwarning behaviour (Meloy et al., 2012) and beenadopted asan indicator for violence risk, notjust intheCTAP,butinotherriskassessmentinstrumentssuchas the Stalking RiskProfile(MacKenzie et al.,2009) and the TRAP-18 (Meloy, 2016; Meloy &Gill, 2016). Other than statistical analyses, his-torical case studies were also informative in theconsideration of relevant warning behaviours, par-ticularly where the phenomena in question wererare. An illustration is the factor which eventuallybecame item 23 of the CTAP, “Delusions involv-ing horrific or frightening beliefs, which threatenthe individual’s or others’ existence or physicalintegrity.” Two of a series of examples were Adel-heid Streidel’s stabbing of politician, OscarLafontaine, to bring attention to the abduction ofpeople to underground killing factories where newbeings were constructed from their body parts, theremaining flesh being sold as sausages in butchers’shops across Germany: and Dieter Kaufmann’sshootingoftheGermaninteriorminister,WolfgangSchäuble, to try and stop the beaming into hisbody by state transmitters of alternating pain andintense homosexual lust. Both had taken mattersinto their own hands when their multiple com-plaints to the authorities had come to nothing(James et al., 2007).Table 1 sets out some links to supporting
literature for each of the 25 CTAP items, togetherwith references to other risk assessment instru-ments in which similar items have been incor-porated. This list is intended as illustrative, notexhaustive. It should be noted that the QCS itemsare simplified versions of CTAP items. As such,the table is also relevant to the locating of the QCSitems within the literature.
Parallel Development With Other RiskAssessment Instruments
Two other assessment instruments were devel-oped in parallel with the CTAP, the Stalking RiskProfile and the SASH. The three CTAP authors
include the lead author and a co-author of the SRP,and two of the four authors of the SASH. Thework on the Stalking Risk Profile contributed threeimportant ideas which assisted in the constructionof the CTAP: that it is important to considerdomains of risk other than violence, specificallythe risks of persistence, escalation, disruptionof function, reputational damage, financial loss,and psychological harm to those upon whomthe unwanted behaviours are focussed; that riskfactors will differ according to the domain of risk;and that risk in each domain is likely to varyaccording to underlying motivation. The SRPalso provided a model in terms of the descriptionand scoring of risk items and their manualisation,and it contains an addendum on the structuredassessment of risk to public figures. The SRP andthe SASH, like the CTAP, incorporate the idea of“red flag” items, the presence of any one of whichautomatically means that the case is rated as beingof high concern. There is an overlap in risk itemsincluded in the three instruments, and the CTAPincorporates four of the five “red-flag” items forviolence contained in the SRP. The SASH usesthe low, moderate and high concern levels adoptedby the CTAP, rather than risk levels. The SASHmanual follows the same format as that of theCTAP.Reliabilityandpredictivevaliditystudiesofboth the SRP and the SASH have been published(Hehemann et al., 2017; McEwan et al., 2018).
Evolution of the Fixated Threat AssessmentCentres Correspondence Screen and InitialThreat Screen
Correspondence Screen
Initial experience at FTAC of dealing withcorrespondence offices demonstrated the futilityof trying to impart an effective understanding ofthreat assessment to their staff, or of relying onindividuals’ experience and personal judgement.The rapid turn-over of employees in these rolesmeant that it was unrealistic to expect them toengage in any evaluation process, and instead itwas necessary to have a simple screen for them tofollow which covered no more than one side ofpaper. The items had to be written in a way thatwas easy to comprehend. In order to flag up a casefor referral, the presence of any one characteristicdescribed—in other words, the scoring of a singleitem as present—had to be the determining factor,so that no further judgement was needed. FTAC
ThisdocumentiscopyrightedbytheAmerican
Psychological
Associationoroneofitsallied
publishers.
Thisarticleisintended
solely
forthepersonaluse
oftheindividual
userandisnotto
bedisseminated
broadly.
CTAP: DEVELOPMENT AND INTER-RATER RELIABILITY 7
ThisdocumentiscopyrightedbytheAmerican
Psychological
Associationoroneofitsallied
publishers.
Thisarticleisintended
solely
forthepersonaluse
oftheindividual
userandisnotto
bedisseminated
broadly.
Tab
le1
CTAPItem
sandLinks
totheLiterature
CTAPitem
Somelinksto
theliterature
1.Threats
Threatsin
stalkingareassociated
withviolence,particularlyin
ex-intimates
(e.g,.Churcher&
Nesca,2013).Threatsto
publicfigureshaveyet
tobedisaggregated
accordingto
motivation;in
undifferentiated
samples,threatsare
negativelyassociated
withviolence.Seriousviolence
iscommonly
preceded
bythreats,even
ifmostthreatsarenot
followed
byviolence.Threatsshould
alwaysbetaken
seriouslyin
publicfigure
risk
assessment(M
eloyet
al.,2011).
Threatsarearisk
factorin
theSAM
(Kropp
etal.,2008)
andtheSASH
(McE
wan,Strand,et
al.,2017),as
aredirect
threatsin
theTRAP-18(M
eloy,
2016).
2.Declarationofintention
Declarationofintentto
approachisasignificantassociationwithapproachin
publicfigurecases(Schoenem
anetal.,2011),
andastrongassociationofapproachin
theFTACdata(G
illet
al.,2021).Itisassociated
withapproachcasesin
Dietz
andMartell’s
(1989)work
onpoliticians,as
isstatingaparticulartimeorplace
when
somethingwould
occur.
Itisarisk
factorfordisruptionin
thepublicfigure
sectionoftheSRP(M
acKenzieet
al.,2009).
3.Evidence
ofdisplacement
Mention
oftravel
isassociated
withapproachto
politicians(D
ietz
&Martell,1989),as
areknownprevioustrips
tothevicinityofthepolitician.Seekingproximityisarisk
factorin
theSASH
(McE
wan,Strand,et
al.,2017)
4.Extrem
esofanger
Anger
isadriver
ofviolentoffendingin
general
(Novaco,2011,2013),arisk
factorforviolence
inpsychoticpatients
(Monahan
etal.,2001,
p.58),andamediatorbetweenvariousform
sofdelusionandviolence
(Coid
etal.,2013).
Elevated
anger
isarisk
factorin
theSRP(M
acKenzieet
al.,2009)andin
theSAM
(Kropp
etal.,2008).Moral
outrageisarisk
factorin
theTRAP-18(M
eloy,
2016).
5.Escalationin
anger
orincreasingpreoccupation
Escalationhas
beenfoundto
bean
associationofapproachin
celebrities
(Meloy,
Mohandie,et
al.,2008,p.41).
Anescalation
ofbehaviourisarisk
factorintheSAM
(Kroppetal.,2008)andintheSASH(M
cEwan,S
trand,etal.,2017).
6.Highly
personal
questforjustice
Themajor
role
of“fixation”
inthisfieldhas
beendescribed
(Mullen
etal.,2009)together
withitsoverlap
withpersistentcomplainingandwithquerulance,whichisassociated
withescalationandsometim
esviolent
outcomes
(Mullen
&Lester,2006).Reference
toinjusticeorviolatedrightsareastrongindicationofapproach
inpublicofficial
cases(Schoenem
anet
al.,2011).Those
pursuingan
agendain
theroyal
familystudieswere
more
likelysuccessfullyto
breachsecurity
barriers,to
achieveproxim
ityto
theirtarget,to
carryaweapon
andto
engagein
intimidatingbehaviour(Fixated
ResearchGroup,2006).
7.Dem
andsto
change
behaviour
Theim
portance
ofdem
andsto
change
behaviour
isnotonlythat
they
areinappropriateandintrusivein
crossinga
boundarybetweenpublicandpersonal
roles,but
that
they
show
evidence
ofasense
ofentitlem
entwhichim
plies
alack
ofconstraintbysocial
norm
s.Such
dem
andsareoften
infusedwithanger.Theassociated
sense
ofentitlem
ent
isarisk
factorforpersistence
intheSRP(M
acKenzieet
al.,2009).
8.Dem
andformoney/apology
Themakingofdem
andsandclaimsofentitlem
entareassociated
withapproachinpolitician
cases(Schoenem
anetal.,2011),
asarehelp-seekingrequests.Multiple
approaches
aresignificantly
more
likelythan
single
approaches
inthose
usingdem
andlanguagein
royal
familycases(Fixated
ResearchGroup,2006).Dem
andsforspecificoutcomes
whichareunlikely
tobemet
aremore
likelyto
engender
anger
andbeassociated
withpersistence
andescalation.
Failuresto
satisfycomplaintsarearisk
factorin
theSRP(M
acKenzieet
al.,2009).
9.Prolificcorrespondence
Itisaconsistentfindingin
thisfieldthat
intensity
ofcontact
isassociated
withapproach(M
eloy
etal.,2011).
Thiscanbemanifestin
volumeofcommunications,number
ofpeoplecontacted,andnumber
ofdifferentmethods
ofcontact
used.
Multiple
communicationsareassociated
withpersistentapproachto
mem
bersoftheRoyal
Fam
ily
(Jam
eset
al.,2009).Multiple
communicationsarearisk
factorin
thepublicfiguresectionoftheSRP
(MacKenzieet
al.,2009).
8 JAMES ET AL.
ThisdocumentiscopyrightedbytheAmerican
Psychological
Associationoroneofitsallied
publishers.
Thisarticleisintended
solely
forthepersonaluse
oftheindividual
userandisnotto
bedisseminated
broadly.
Tab
le1(continued)
CTAPitem
Somelinksto
theliterature
10.Awarenessofpersonal
details
Knowledgeofprivatedetailsnotin
thepublicdomainrepresentsadegreeofdeterminationandactiveintrusion.
Awarenessofvictim
location
isaprerequisiteto
approach.Itisarisk
factorin
theSRP(M
acKenzieet
al.,2009).
11.History
ofintrusive
behaviours
Previous
stalkinghas
beenlinked
toincreasedlikelihoodoffuture
stalking.A
history
ofintrusivebehaviours
isarisk
factorin
theSRP(M
acKenzieet
al.,2009)
andin
theSASH
(McE
wan,Strand,et
al.,2017).
12.End-of-tether
language
Theim
portance
oflastresortthinkingwas
recognised
incase
materialfrom
theFixated
ResearchGroup(2006),
andwas
adoptedas
ared-flag
risk
factorin
theSRP(M
acKenzieet
al.,2009)andin
theSASH
(McE
wan,
Strand,et
al.,2017).Itisawarningbehaviourin
theclassificationofMeloy
etal.(2012),andincorporatedinto
the
TRAP-18(M
eloy,2016).
13.Suicidal
ideation
Stalkersareatincreasedrisk
ofsuicide,anduptoathirdreportsuicidalideation
(McE
wan
etal.,2010;Mohandieetal.,2006).
Cases
ofattempted
orcompletedhomicide-suicidehavebeenreportedin
celebrity
cases(Schlesinger,2006)and
widelyin
thepress,as
wellas
beingarecognised
phenomenon
inex-intimatestalkingcases.Suicidal
ideation
may
actas
adisinhibitingfactor,in
that
those
notexpectingto
liveareunder
fewer
constraints.Itcanalso
be
associated
withideasofdem
onstratingvictim
status
andinducingregretin
thosewhoareperceived
ashaving
harmed
one.
Suicidal
ideationisared-flag
indicatorin
theSRP(M
acKenzieet
al.,2009).
14.Sexually
aggressivelanguageorfantasies
Sexuallyinappropriatelanguageisnotassociated
withmoreintrusive
behavioursorapproach,butitcauses
particulardistress
whichrequires
intervention.More
aggressivefantasies
arearisk
factorforassaultin
predatory
stalkercasesin
theSRP(M
acKenzieet
al.,2009).
15.Interestin
attackersorviolentextrem
ism
Interestin
attackersandviolentextrem
ism
isrecognised
asarisk
factorin
loneactorgrievance.Itisawarningbehaviourin
theclassificationofMeloy
etal.(2012),andarisk
item
intheTRAP-18(M
eloy,
2016).
16.Referencesto
weapons
Therelevance
ofweaponswas
noted
byMeloy,
Sheridan,et
al.(2008b,
p.25).Possession
offirearmsisassociated
withapproach(Schoenem
anet
al.,2011).A
history
ofweaponpossessionwas
significantly
associated
with
attemptingto
beach
security
barriersam
ongstFTACapproachersandtherewas
asignificant
associationbetween
approachandhistory
ofconcealingweapons(G
illet
al.,2021).Accessto
oraffinitywithweaponsisarisk
factorin
theSRP(M
acKenzieet
al.,2009).
17.Knownhistory
ofviolence
Previous
violence
isapredictoroffuture
violence
inboth
mentallydisordered
andnon-disordered
offenders
(Bontaetal.,1998).Stalkerswithahistory
ofviolence
aremorelikelytobeviolent(seemeta-analysis:Churcher&Nesca,
2013).Problematic
approachersto
publicfiguresaresignificantly
more
likelyto
haveahistory
ofviolence
than
communicators(G
illetal.,2021;S
calora,B
aumgartner,H
atch-M
aillette,etal.,2002).P
revious
violence
isarisk
factorin
theTRAP-18(M
eloy,
2016)
andin
theSASH
(McE
wan,Strand,et
al.,2017).
18.Homicidal
ideation
Enquiryabouthom
icidal
ideation
isastandardelem
entofviolence
risk
assessmentandincorporatedinto
risk
assessmenttoolssuch
astheClassificationofViolence
Risk(COVR;Monahan
etal.,2006).Homicidalideationisgreatly
increasedin
seriouspsychoticillnesses(Carboneet
al.,2020).Itwas
foundto
bean
omnibusrisk
factorin
aprison
sample
(DeL
isiet
al.,2017).Itisaredflag
item
forviolence
risk
intheSRP(M
acKenzieet
al.,2009).Itisgenerally
conceptualised
along
similar
lines
tosuicidal
ideation.
19.Delusionsoflovingrelationship
Erotomania
isassociated
withintrusivenessandwithahighdegreeofpersistence
intheabsence
ofintervention
(McE
wan
etal.,2009;McE
wan,Strand,etal.,2017),as
isintimacy-seekingmotivation(Jam
es,McE
wan,etal.,2010).
Erotomania
isarisk
factorin
theSRP(M
acKenzieet
al.,2009).
(table
continues)
CTAP: DEVELOPMENT AND INTER-RATER RELIABILITY 9
ThisdocumentiscopyrightedbytheAmerican
Psychological
Associationoroneofitsallied
publishers.
Thisarticleisintended
solely
forthepersonaluse
oftheindividual
userandisnotto
bedisseminated
broadly.
Tab
le1(continued)
CTAPitem
Somelinksto
theliterature
20.Delusionsofjealousy
Thisitem
includes
delusional
jealousy
andjealousy
inrelationshipswhicharedelusional.Pathological
jealousy
isassociated
withassault(M
ullen
&Maack,1985;S
ilvaetal.,1998),and
jealousy
withindelusionalrelationships(although
uncommonin
other
settings)
ispresumed
tobesimilar.
21.Beliefin
shared
pastordestiny
Non-erotomanic
delusionsofshared
pastordestinyareassociated
withincreasedintrusivenessandpersistence.
Forinstance,thosewithdelusional
familyties
weresignificantlymore
likelyto
approachin
Royal
Fam
ilyCases
and
significantly
more
likelyto
makemultiple
rather
than
single
approaches.(Fixated
ResearchGroup,2006).
Delusionsofaspecialrelationship
areincluded
under
“delusionsrelatedto
stalking”as
arisk
factorin
theSRP
(MacKenzieet
al.,2009).
22.Beliefpeopleareim
posters
orpossessed
Theassociationsofdelusional
misidentificationsyndromes
withviolence
havebeennoted
incollectionsofcase
studies
(Silvaet
al.,1996)andfound
incommunitysamplesondelusionsandviolence
(Coid
etal.,2013).
23.Threat
topersonal
integrity
Findingsabouttheassociationbetweenthreat-control-overridesymptomsandviolence
(Linket
al.,1998)
appear
tobebornout
infurther
work
(e.g.,Hodginset
al.,2003).Such
high-riskpsychotic
phenomenaareared-flag
indicatorforviolence
risk
intheSRP(M
acKenzieet
al.,2009).Threat-control-overridesymptomsareassociated
withproblematic
approachbehaviourtowardspublicofficials(Schoenem
anet
al.,2011).
24.Beliefin
owndivinityoronadivinemission
Seriousviolence
has
beensignificantlyassociated
withgrandiosity
inthose
withschizophrenia
(Swansonet
al.,2006).
Grandiosity
significantlydifferentiated
betweenthose
whoapproached
U.S.celebrities
from
thosewhodid
not
(Dietz
&Martell,1989).Itisassociated
withapproachin
publicofficial
cases(Schoenem
anet
al.,2011)andin
problematicapproachtowardamem
beroftheBritish
RoyalFam
ily(Jam
es,M
cEwan,etal.,2010).Those
withdelusions
ofdivinepurpose
wereidentified
intheFixated
ResearchGroup
(2006)reportas
aparticularlydifficultgroup
untram
melledbyinhibitionsorboundaries.Extrem
esofgrandiosity
arearisk
factorin
thepublicfigure
section
oftheSRP(M
acKenzieet
al.,2009).
25.Gutreaction
Gutfeelingsconstituteassociativeprocesses
whichareintuitiveandnotim
mediately
accessible
toconscious
awareness,butarevaluable,in
particularin
those
withexperience
ofagiven
field(Slovic
etal.,2004).Whereas
they
arenosubstitute
forevidence-based
assessment,they
arean
adjunct
whichshould
not
beignored
(McE
wan,Strand,et
al.,2017).
Note.
CTAP=CommunicationsThreatAssessm
entProtocol;SAM
=StalkingAssessm
entandManagem
ent;SASH=ScreeningAssessm
entforStalkingandHarassm
ent;FTAC=
Fixated
Threat
Assessm
entCentre;
TRAP-18=
TerroristRadicalizationAssessm
entProtocol-18;SRP=
StalkingRiskProfile.
10 JAMES ET AL.
adopted a liaison system, with a police officer anda community psychiatric nurse assigned to each ofthe main referring correspondence sections. Thisprovided a feed-back mechanism as to whichfeatures or wording of the screen caused problemsto any individuals. In addition, the referrals toFTAC each day, made using the screen, consti-tuted a daily exercise in examining its efficacy incorrectly identifying cases suitable for referral—inother words, in the identification of false positives.Such cases were then discussed with the originat-ing correspondence offices to ascertain the reasonsfor the case being referred. The FTAC liaison staffalso undertook regular examination during thedevelopment period of samples of letters fromtheir linked correspondence offices which hadbeen thought inappropriate in some way but hadnotbeen referred toFTACon the basis of using thescreen. In other words, this was a regular exercisein ascertaining the presence of false negatives.The wording in the screen was adapted through
experience of its use on several thousand cases. Inaddition, the original list of some thirty items inthe screen was reduced over time for two reasons:firstly, someitemswerenever scoredaspositive—largely because they necessitated knowledge whichcould rarely be obtained from the presentingmaterial; secondly, some items almost alwaysco-occurred becausethey wereineffectmeasuringthe same thing. It proved possible to add inadditional items which concerned a pattern ofbehaviour, because the royal households kept acomputerised database of correspondents. Thefinal version of the screen covered similar contentto that of the CTAP, but in simplified form.As a specific exercise in searching for false
negatives, a sample of the Home Secretary’s mailwas examined, the correspondence office havingremoved all that simply concerned core business.FTAC police staff used the correspondence screenonasampleof283inappropriatecommunications:those that were not flagged up by the screen werethen examined by FTAC consultant forensicpsychiatrists to ascertain whether cases had been“missed” by the screen which should have occa-sioned sufficient concern for referral. None wasidentified in the sample.
Initial Threat Screen
The initial FTAC threat assessment tool wasapplied to all new referrals, enabling a judgementas to whether the case was of low, moderate or
high concern, this determining the priority ofintervention. Low concern cases were logged,but no other action taken. Moderate concern caseswere taken on for further investigation and man-agement. High concern cases were dealt with as anurgent priority.The threat assessment tool started as a grid, but
then changed in form into a series of items con-cerning the subject’s characteristics or behaviour,grouped into thematic sections and incorporating“red-flag” items. The list of items was developedfrom the sources described above. It concernednot simply violence, the base rate of which is low,but also the areas of persistence, escalation, dis-ruption, impairment of function, psychologicalharm, and reputational damage. The original listcomprised 65 items and concerned the assess-ment both of concerning communications andconcerning approaches. Its length was unwieldyand impractical, and as it was developed over6 years and used on some 6,000 cases, its wasreduced to 38 items through processes similar tothose described for the correspondence screenabove—co-occurrence and unavailability of data.It was necessary for the items to include bothcharacteristics which were relatively commonand those which were rare but of considerableimportance when present.This, together with theuse of “red-flag” items, meant that the determiningof concern level using the tool could not involve asummation of scores, but required a defined pro-cess,withinstructionsastowhich cases should fallinto which level. This determined that those usingthe tool required formal instruction in its use.
Development of the CTAP and QCS for Usein the Private Sector
The catalyst for the development of the pub-lished CTAP from the initial work at FTAC wasthe recognition of the need for a structured profes-sional judgement tool concerning initial assess-ment of unwanted communications for use in theprivate sphere, given that no sufficiently specia-lisedtoolwasavailableinthatarea,whilstitshouldremain relevant to police settings. It needed to be acomprehensive, fully-fledged and self-containedpackage, rather than a step in the operating proto-colofapolicingunit.And,whilsttheproblemsthatthe CTAP seeks to address are fundamentally thesame in the private sphere, there are differenceswhich need to be taken into account. Private firms
ThisdocumentiscopyrightedbytheAmerican
Psychological
Associationoroneofitsallied
publishers.
Thisarticleisintended
solely
forthepersonaluse
oftheindividual
userandisnotto
bedisseminated
broadly.
CTAP: DEVELOPMENT AND INTER-RATER RELIABILITY 11
tend to be larger, more complex and more multi-national in nature than their public sector counter-parts: they rely heavily on on-line platforms andelectronicformsofcommunication,andhavedoneso for longer than organisations in the publicsphere, and the management of complaint andgrievance tends to be part of core business to agreater extent than in the public sphere. Of note,private organisations tend to be more sensitive to abroader range of risks, in particular the reputa-tional, the financial and the risk of disruption, andthey do not have access to the same range ofinformation sources and powers of interventionthatpolicingorganisationsroutinelyemploy.Thereis also a wider range of organisational roles inprivate organisations to which the use of a struc-tured threat assessment process is relevant—forinstance, security, communications, operations,human resources and legal managers, so care-fully thought-out training packages needed to beincorporated into the development of a relevantsystem. A clearer recognition and understandingof the needs of organisations in the private spherewas achieved by the authors through its interac-tions with corporate entities and through corporatecase-work, insights which were incorporatedinto the development work on the CTAP. Takinginto account the above concerns, the eventualCTAP was produced incorporating 25 core items.The development of the QCS paralleled that of theCTAP. Both cover the same ground, in that theQCS reflects in simpler fashion the content ofthe CTAP.
Reliability Testing: Method
Study Sample
The study sample concerned 102 consecutivecases referred for risk assessment and/or manage-ment to Theseus, a risk assessment company. Thiswaschosenbecausethecompany was setupontheFTAC model and adopted FTAC’s data collectionand risk assessment methodology. It was also thesetting in which the final form of the CTAP wasdeveloped. Fifty of the cases came from the cor-porateworld, 38concerned the talent sector and14were private clients. Each of the 102 cases wasexamined and scored independently on both theCTAP and QCS by two separate raters, neither ofwhom was a trained psychologist or psychiatrist,and neither of whom was an author of the CTAP.
Both worked at Theseus and had been trained inthe use of the CTAP. This was not an exercise thatinvolved vignettes or that was necessarily limitedto single pieces of correspondence: rather, it con-cerned “real world” cases, in which the informa-tion available to the raters was that presented atreferral. The amount of material varied betweencases from very little to considerable, generallyaccording to how long the behaviour of concernhad been occurring. Some cases included summa-riesfromthereferrers,whilstotherswerelimitedtothe correspondence itself. The number of items ofcorrespondence per relevant case ranged fromone to several hundred. Of the 102 cases rated,97 (95.1%) involved correspondence, of which 41also involved some form of intrusive behaviour,ranging from turning up at the person’s place ofwork to attempts at approaching the addressee.Five cases involved some form of approach, with-out correspondence. Whilst the CTAP is intendedfor written communications, these were includedinthesample,usingrecordsofverbaloutput,asthesample was intended to represent the “real world”of threat assessment work.
Inter-Rater Reliability Procedure
Both the CTAP and the QCS were rated foreach case, and the results (together with a rangeof other data items) were entered into a databaseusing SPSS, version 26 (IBM Corp, 2019). Inter-rater reliability was then calculated for each itemin the CTAP and the QCS. Particular note wastaken of the level of agreement on “red flag”items, as the presence of one of these determinesan overall “high concern” finding, independentof any other scoring. Inter-rater reliability wasthen examined for the outcome measures of theQCS and of the CTAP. For the QCS, the out-come decision was whether the case neededreferral to someone else, this being determinedby the scoring of at least one QCS item as positive.For the CTAP, inter-rater agreement on concernlevel judgement in each case was compared.This was seen as a particularly important metric,both because it represented the main outcomemeasure of the CTAP rating, and because it incor-porated a further element of judgement by eachrater, the translation of the findings on the individ-ualCTAPitemsintoanoverall concernjudgementin the manner set out in the CTAP manual.The total scores for the QCS and the CTAP
were then calculated in each case for each rater,
ThisdocumentiscopyrightedbytheAmerican
Psychological
Associationoroneofitsallied
publishers.
Thisarticleisintended
solely
forthepersonaluse
oftheindividual
userandisnotto
bedisseminated
broadly.
12 JAMES ET AL.
and the inter-rater reliability of the total scoreswas calculated. It should be noted that the total-ling of scores is not part of the procedure for usingeither theQCSortheCTAP. TheQCSis designedto give a “positive” result, if only one item isjudged present. And the CTAP contains a mixtureof rare and relatively common risk factors, whichcannot simply be summated, as well as incorpo-rating “red flag” items, the presence of one alonebeing sufficient for the case to be judged as beingof high concern. Nevertheless, it was decided toinclude this measure as a further form of check oninter-rater consistency.
Test–Retest
Twenty cases were then randomly selectedfrom the first part of the database and rated againon the CTAP by one of the original raters at aminimum of 2 years after the original rating,without reference to the original rating results.The two ratings were then compared to give mea-sures of test–retest reliability for the individualCTAP items and for the concern judgement. Theperiod of 2 years was selected as long enough forthe rater no longer to retain memory of the originalratings.
Concern Levels
Lastly, the concern level from the initial CTAPrating for each case was compared with the con-cernlevelatthepointTheseusclosedthecasefromits books or last received feedback on progress.Thereasoningforthiswasasfollows.TheCTAPisnot a predictive instrument, given that it does notaim to reach a judgement on future risk, but ratherto aid those engaged in the initial assessment of acase to decide upon the need for, and priority tobe accorded to, any initial intervention. As such,the CTAP is not open to any simple exercise inassessing predictive validity. However, it ispossible to use a change in concern levels togain some indication as to its performance. TheCTAP is balanced conservatively to accord pri-ority to a case presenting with certain definedfeatures until further information can be gath-ered which will either confirm the need forfurther intervention, or enable the concern levelto be reduced. In other words, it is designed toavoid false negatives. Were it to be failing to dothis, then it would be expected that there wouldbe a proportion of cases in which the concern
level would rise subsequent to the initial assess-ment. Consequently, the absence of any increasein concern level between initial and final contactwould constitute evidence that the CTAP wasnot underestimating initial concern. Alterna-tively, if the CTAP were consistently overesti-mating the priority that should be accorded tocases, then it would be expected that there wouldbe a high proportion of cases initially rated asmoderate or high concern which were subse-quently reduced to low. Finally, if the initiallevel of priority suggested by the initial CTAPapplication were appropriate, then a proportionof cases would have been reduced in concernlevel through Theseus intervention, given thatpart of its purpose is to aid in the drawing up andexecution of management plans to reduce orcontain threat. It would not be anticipated thatall cases would be reduced to a low level ofconcern, in part because risk containment doesnot necessarily equate to risk reduction, and inpart because those receiving suggested manage-ment plans may choose not to put them intoeffect.
Statistical Analysis
To ascertain a coefficient of agreement betweenthe two raters on categorical variables, specificallythe ratings for each item on CTAP and QCS,Cohen’s kappa (κ) was used (Cohen, 1960),kappa being a means of ascertaining the propor-tion of cases in which there was agreementwhich takes account of the level of agreementthat would be expected based simply on chance(Agresti, 2013). Kappa values greater that zerorepresent better-than-chance agreement betweenthe two raters, to a maximum value of +1, whichindicates perfect agreement. Different classifi-cations have been suggested for the strength ofagreement based on the value of Cohen’s κ. Here,the guidelines used were taken from Altman(1999), originally adapted from Landis andKoch (1977). A value of less than 0.20 is classi-fied as poor agreement; 0.21–0.40 fair; 0.41–0.60 moderate; 0.61–0.80 good; and 0.81–1.00very good. Confidence intervals were calculatedas ±(1.96 × SE).To compare total scores for the CTAP between
raters and total scores for the QCS between raters,the intraclass correlation coefficient (ICC) wasused, ICC being a measure which reflects bothdegree of correlation and agreement between
ThisdocumentiscopyrightedbytheAmerican
Psychological
Associationoroneofitsallied
publishers.
Thisarticleisintended
solely
forthepersonaluse
oftheindividual
userandisnotto
bedisseminated
broadly.
CTAP: DEVELOPMENT AND INTER-RATER RELIABILITY 13
measurements. Selecting from the ten forms ofmodel set out by McGraw and Wong (1996), atwo-way random model was used, absoluteagreement type, single rater, this being selectedto allow generalisation from the current raters to alarger set of possible raters. The ICC values wereinterpreted according to the thresholds set out byShrout (1998): virtually none (0.00–0.10), slight(0.11–0.40),fair(0.41–0.60),moderate(0.61–0.80),and substantial (0.80–1.0).To examine the correlation between total
CTAP scores and total QCS scores for each rater,and to compare judgements as to concern level,Kendall’s tau-b (τb) was used (Agresti, 2010;Kendall, 1938). Test–retest reliability was exam-ined using Cohen’s κ.
Results
Inter-Rater Reliability for CTAP Items
The percentage agreement and kappa values,with 95% confidence intervals, are given for theCTAP in Table 2, together with the proportion ofpositive responses by each rater for each item.Some items were infrequently scored as present,with there being no cases in this sample whichwere positive for Item 24. Of the 25 items, kappawas not calculated for three items for the followingreasons: Item 20, sample too small to calculate;Item 24, no data; Item 25, score for Rater 1 is aconstant. For 16 of the 25 items, the kappa valuefell withinthe band 0.81–1.00. Items1, 6, 9, 14, 15fell within the band 0.61–0.80. One item, Item 21,producedtheresultκ=0.499(0.301–0.697)whichis in the “moderate” agreement band. Percentageagreement fell below 95% for only five items (1, 6,9, 11, and 21).
“Red Flag” CTAP Items
Of the five items, the percentage agreementrangedbetween97%and100%.Thespecifickappavalues for each item with 95% confidence limitswere as follows: end-of-tether’ language 0.830[0.642–1.000]; suicidal ideation 1.000; homi-cidal ideation 0.913 [0.756–1.000]; and threat topersonal integrity 0.936 [0.811–1.000]. One redflag item (delusions of jealousy) was present intoo few cases (two) to allow the calculation of akappa value.
Inter-Rater Reliability for QCS Items
The percentage agreement and kappa values forthe 18 QCS items, with 95% confidence intervals,are given in Table 3, together with the proportionof cases in which each rater found each itempositive/present. For Items 1 and 15, kappa wasnotcalculated,asatleastoneraterproportionwasaconstant. For the remaining 16 items, kappa fellinto the agreement band 0.81–1.00. All casesscored at least one positive item for each rater.Percentage agreement for the eighteen items laybetween 90% and 100%
Total CTAP and QCS Scores
The intraclass correlation coefficient (ICC) fortotal CTAP score between raters was 0.962, 95%CI [0.944–0.974]. For total QCS score, the ICCwas 0.954, 95% CI [0.932–0.969].
Level of Concern
There was a strong positive correlationbetween the judgements as to level of concernτb = 0.899, p < .001. There was absolute agree-ment in 92% of cases.
Test–Retest Reliability
Therewas100%agreementbetweentheoriginaltestandthere-teston19ofthe 25items.Percentageagreement and Kappa values (all p < .005), with95% confidence intervals, were as follows for theremaining items: Item 1; 80%, 0.718 [0.432–1.000]: Item 3; 95%, 0.898 [0.704–1.000]: Item5; 95%, 0.900 [0.710–1.000]: Item 11; 95%, 0.886[0.670–1.000]: Item 19; 90%, 0.750 [0.427–1.000]: Item 21; 95%, 0.623 [0.166–1.000].
Change in Concern Levels
At initial assessment, 14 cases (13.7%) wereassessed as being of low concern, 57 cases(55.9%) as of moderate concern, and 31 cases(30.4%) as of high concern. Theseus interventionlasted less than 2 months in 86 cases (84.3%),between 2 months and 1 year in 12 cases (11.7%),including one case which was still open, andbetween 1 and 3 years in 4 cases (3.9%). Atthe end of Theseus’ involvement, all the lowconcern cases remained as low concern. Of the57 cases of moderate concern, 22 (39%) remained
ThisdocumentiscopyrightedbytheAmerican
Psychological
Associationoroneofitsallied
publishers.
Thisarticleisintended
solely
forthepersonaluse
oftheindividual
userandisnotto
bedisseminated
broadly.
14 JAMES ET AL.
of moderate concern and 35 (61%) had beenreduced to low concern. None had increased tohighconcern.Ofthe31casesofhighconcern,onecase (3%) remained of high concern, this beingthe case that was still open: of the remainder, 23(74%) had been reduced to moderate concern and7 (23%) to low concern.
Discussion
The CTAP is unusual in being designed spe-cifically for the purpose of allocating priority inthe initial assessment of concerning communica-tions and for the making of quick decisions inresponse to limited information in a dynamic,
ThisdocumentiscopyrightedbytheAmerican
Psychological
Associationoroneofitsallied
publishers.
Thisarticleisintended
solely
forthepersonaluse
oftheindividual
userandisnotto
bedisseminated
broadly.
Table 2Inter-Rater Reliability of CTAP Items
Item (brief characterisation)Percentageagreement
Proportion of yesresponses
(Rater 1, Rater 2) (%)
Kappa[95% CI]
in all cases, p < .005
1. Threats 88.24 48, 51 0.806[0.708–0.904]
2. Declaration of intent 97.06 42, 45 0.940[0.873–1.000]
3. Evidence of displacement 96.08 43, 45 0.920[0.844–0.996]
4. Extremes of anger 97.06 17, 17 0.929[0.833–1.000]
5. Escalation in anger 97.06 36, 39 0.937[0.866-1.000]
6. Quest for justice 91.00 17, 18 0.744[0.587–0.901]
7. Demands to change behaviour 95.00 36, 37 0.892[0.800–0.984]
8. Demand for money/apology 97.03 26, 23 0.919[0.829–1.000]
9. Prolific correspondence 91.18 27, 26 0.771[0.628–0.914]
10. Awareness of personal details 96.04 36, 32 0.911[0.827–0.995]
11. History of intrusive behaviours 92.08 28, 34 0.818[0.698-0.938]
12. End-of-tether 97.06 6, 8 0.830[0.642–1.000]
13. Suicidal ideation 100 8, 8 1.00014. Sexually aggressive 95.01 6, 7 0.666
[0.411–0.921]15. Interest in attackers 99.00 2, 3 0.795
[0.403–1.000]16. Reference to weapons 97.06 10, 9 0.942
[0.828–1.000]17. History of violence 98.97 3, 4 0.905
[0.721–1.000]18. Homicidal ideation 99.02 4, 4 0.913
[0.756–1.000]19. Delusions of love 96.08 19, 18 0.900
[0.804–0.996]20. Delusions of jealousy 98.04 1, 1 Sample too small to calculate21. Belief in shared destiny 85.30 8, 7 0.499
[0.301–0.697]22. Imposters or possessed 100 3, 3 1.00023. Threat to personal integrity 99.02 8, 9 0.936
[0.811–1.000]24. Belief in own divinity 100 0, 0 No data25. Gut reaction 98.04 100, 99 Not calculable: score for Rater 1 a constant
Note. CTAP = Communications Threat Assessment Protocol.
CTAP: DEVELOPMENT AND INTER-RATER RELIABILITY 15
real-time setting. It constitutes a promising instru-ment designed to have considerable utility in arange of settings, its strengths being that: it is ageneral tool looking at risk as a whole, rather thansimply violence; it is designed to have wide appli-cability; it incorporates standardised approachesboth for recipients of communications (or theircorrespondence staff),and forthe securityor threatassessment personnel who are required to conductan initial evaluation of correspondence referred tothem; it has been evolved over a number of yearsthrough practical application, which renders itstraightforward and user-friendly.The foundations of the CTAP were laid through
dailyuseofearlieriterationsinapolice/NHSthreatassessment setting over an 8-year period on real
cases as they unfolded, the cases being manythousand in number. It incorporates knowledgeaccumulated by leading threat assessment agen-ciesontwocontinents,aswellasleadingexpertsinthe fields of threat, harassment, stalking and vio-lence and mental illness. The items of the CTAPare firmly anchored in research evidence, as illus-trated in Table 1. It was developed alongside twoother instruments, the SRP and the SASH, withwhich it shares some content and structural fea-tures, and both of which have been shown to haveuseful reliability and predictive validity. Its even-tual development into the comprehensive, self-containedCTAPpackagefollowedtherecognitionof the need for a structured professional judgementtool for use in the private sphere, and involved a
ThisdocumentiscopyrightedbytheAmerican
Psychological
Associationoroneofitsallied
publishers.
Thisarticleisintended
solely
forthepersonaluse
oftheindividual
userandisnotto
bedisseminated
broadly.
Table 3Inter-Rater Reliability for QCS Items
ItemPercentageagreement
Proportion of yes responses(Rater 1, Rater 2) (%)
Kappa[95% CI]
in all cases, p < .005
1. 100 100, 100 Not computed as case proportions areconstants.
2. 99% 53, 54 0.980[0.941–1.000]
3. 98% 25, 25 0.947[0.875–1.000]
4. 96% 45, 45 0.920[0.845–0.996]
5. 99% 12, 13 0.954[0.866–1.000]
6. 98% 34, 32 0.955[0.894–1.000]
7. 95% 28, 31 0.883[0.783–0.983]
8. 90% 26, 26 0.742[0.591–0.893]
9. 99% 11, 10 0.947[0.843–1.000]
10. 100% 7, 7 1.00011. 98% 6, 6 0.823
[0.584–1.000]12. 98% 13, 11 0.906
[0.777–1.000]13. 96% 33, 33 0.912
[0.828–0.996]14. 97% 8, 10 0.878
[0.712–1.000]15. 99% 0, 1 Not computed: figure for Rater 1 is a constant.16. 94% 25, 27 0.845
[0.725–0.965]17. 94% 21, 24 0.857
[0.736–0.976]18. 96% 30, 34 0.911
[0.823–0.997]
Note. QCS = Quick Correspondence Screen.
16 JAMES ET AL.
further step—the incorporation of the perspectiveand requirements of non-public organisations.Additional experience of its use has been accu-mulated over 7 years in the assessment of casesinvolving prominent individuals, celebrities andcorporate entities. Overall, its provenance andresearch roots go some way to establishing itscontent validity.This is the first study that has examined the
reliability of the CTAP. The results for inter-raterreliability are encouraging; the CTAP demon-strated very good agreement for most of its items.One CTAP item (belief in shared destiny) pro-duced a disappointing kappa value of 0.499, 95%CI [0.301–0.697], which is in the moderatelygood agreement band, with confidence intervalsranging from fair to good. This item requires therater to make a judgement as to the degree ofconviction that is present in the mind of the indi-vidual under consideration. It may be that this is amore difficult judgement to make than with factualitems: or it may be that the wording of the CTAP orthe training module offer insufficient guidance.It is of note that the test–retest reliability was alsopoorest on this item.It is particularly important that there should be
good inter-rater reliability on the “red flag” items,given their particular role in determining that acase should be judged of high concern. Agree-ment was in the very good range for the four itemsfor which it was possible to calculate results.However, for one red flag item (delusions ofjealousy), there were insufficient cases in thesample of 102 to allow analysis. This is under-standable in terms of the way the CTAP is con-structedtoincludebothrelativelycommonfeaturesand uncommon characteristics which, when pres-ent, are of such importance that their incorporationinto a threat assessment instrument is warranted. Alarger sample and/or repetition of this exercise witha sample of different origin would be necessary totest reliability more robustly for this item.The test–retest reliability for the CTAP was
examined on a smaller sample of twenty caseswith at least 2 years between evaluations. Agree-ment fell in the “very good” range for 21 of the25 items and in the “good” range for the remain-der. This is promising, though repeating theexercise on a larger sample would be desirable.But of particular note in this study was the highlevel of agreement between raters as to level ofconcern. This is a separate part of the CTAPprocess, for which instructions are given in the
manual.Evidently, it is not only of importance thatthere is inter-rater agreement on the individualCTAP items: there needs also to be consistencybetween raters in the manner that these are con-verted into a judgement as to level of concern, thisafter all being the final “product” of the exercise.The final part of this study concerned an indi-
cator as to whether the level of concern allocated islikely tohave been appropriate. The purpose of theCTAP is to triage cases at initial assessment intothree concern levels as an indication of the prioritythat they should be accorded. As explained indetail above, the pattern of change in priority levelbetween initial assessment and case closure canoffer information as to whether the CTAP is notpronetogivingfalsenegatives,ora preponderanceof false positives. The results indicate that neitheris likely to have been the case. There is little in theliterature with which to compare these particularmeasures (James, Kerrigan, et al., 2010), but thisstudy suggests that they may be of use. Given thatthe CTAP’s purpose is not a predictive one, ex-ercises in predictive validity present problems indesign. A companion paper to this one examinesthe ability of CTAP items to distinguish betweenthose concerning correspondents who go on toapproach and those that do not, and examines therelationship between CTAP items and persistence.
Limitations
This is the first such study of the CTAP andconfirmation of its results by other groups wouldbe desirable in order to offer a firmer foundationforitsconclusions andtoensure thatitsresultscanbe generalised. The study involved two raters,and its repetition with a greater number would beinstructive. As regards the QCS, the results hereshould be treated with caution, in that a corre-spondence screen intended for use by correspon-dence handlers was completed by individualsdirectly involved in threat assessment. This mighthave resulted in an artificially good performanceof the QCS in terms of inter-rater reliability.A limitation of the CTAP itself is that it em-
ploys the use of a manual and requires standar-dised training. However, it is not unique in thisrespect, thetraininglastshalfaday,andtheCTAPitself can be completed quickly by those familiarwith its use. A limitation of the present study isthat there were insufficient cases concerning twoof the CTAP items to produce kappa values. Thisis the consequence of using real world cases,
ThisdocumentiscopyrightedbytheAmerican
Psychological
Associationoroneofitsallied
publishers.
Thisarticleisintended
solely
forthepersonaluse
oftheindividual
userandisnotto
bedisseminated
broadly.
CTAP: DEVELOPMENT AND INTER-RATER RELIABILITY 17
rather than constructed vignettes. However, theuse of real cases in a threat assessment setting isalso one of the strengths of the study, given thatinitial case material does not always contain cleardata and often involves a degree of ambiguitywhich can make cases more difficult to rate.
Directions for Future Research
As stated above, this study has been the first ofa two-part project, the second part of whichconcerns the predictive validity of the CTAP.The first need is for the repetition of these studies,using similar methodology and training, to see ifthe results are replicated. This should ideally beundertaken on case series from different origins,bothinterms ofsector(e.g.,policing) andintermsof country, population configuration, and lan-guage. It would be preferable if these were inde-pendent of the authors of the CTAP, given thatthere is some evidence of a researcher allegianceeffect in studies conducted by the authors of riskassessment instruments (Singh et al., 2013). AsfortheQCS,thereisevidentlyscopeforrepetitionof inter-rater reliability exercises using lightlytrained correspondence personnel (the skillsetfor which it is intended), rather than threat asses-sors,asthis wouldgive amore accurate indicationof real-world conditions. Finally, it is likely thatthere are other approaches to the standardisedassessment of concerning correspondence whichhave yet to be published. It would be a usefulexercise if the performance of these could bemeasured against the CTAP, given the currentabsence of published instruments with which theCTAP could be compared.
Conclusion
The CTAP has been widely used in differentsettings over the last 7 years, and developmentversions for a longer period still. The CTAPappears to be a useful tool in the identificationand initial prioritisation of concerning commu-nications, both in the public and private spheres.However, this is the first published study relatingits content to the background literature on riskfactors and evaluating the tool’s reliability. Itsresults are encouraging. It suggests that CTAPhas a firm, up-to-date research base and that boththe CTAP and the QCS can be applied reliably.The CTAP appears to be a useful addition to the
stock of instruments which encourage systematicand defensible threat assessment practice.
References
Agresti, A. (2010). Analysis of ordinal categoricaldata (2nd ed.). Wiley. https://doi.org/10.1002/9780470594001
Agresti, A. (2013). Categorical data analysis (3rded.). Wiley.
Akhtar, S., & Morrison, C. M. (2019). The prevalenceand impact of online trolling of UK Members ofParliament. Computers in Human Behavior, 99,322–327. https://doi.org/10.1016/j.chb.2019.05.015
Altman, D. G. (1999). Practical statistics for medicalresearch. Chapman & Hall/CRC Press.
Barry-Walsh, J., James, D. V., & Mullen, P. E. (2020).Fixated Threat Assessment Centers: Preventing harmand facilitating care in public figure threat cases andthose thought to be at risk of lone-actor grievance-fueled violence. CNS Spectrums, 25, 630–637.https://doi.org/10.1017/S1092852920000152
Bixler, B. S., Dunn, J., & Grundland, T. (2021).Operations of the Los Angeles Police Threat Man-agement Unit and Crisis Support Response Section.In J. R. Meloy & J. Hoffmann (Eds.), Internationalhandbook of threat assessment (2nd ed., pp. 545–570). Oxford University Press.
Bjelland, H. F., & Bjørgo, T. (2014). Trusler og trus-selhendelser mot politikere: En spørreundersøkelseblant norske stortingsrepresentanter og regjerings-medlemmer [Threats and threat events against politi-cians: A survey of Norwegian members of parliamentand government officials]. Politihøgskolen.
Bonta, J., Law, M., & Hanson, K. (1998). The predictionof criminal and violent recidivism among mentallydisordered offenders: A meta-analysis. PsychologicalBulletin, 123(2), 123–142. https://doi.org/10.1037/0033-2909.123.2.123
Brottsförebyggande rådet (Crime Prevention Council).(2012). Politikernas Trygghets undersökning 2012:Förtroendevaldas utsatthet och oro för hot, våld ochtrakasserier Rapport 2012:14 [Politicians: The secu-rity survey 2012: Elected officials vulnerability andconcern for the threats, violence and harassment.Report 2012:14]. Fritzes.
Calhoun, F. S. (1998). Hunters and Howlers: Threatsand violence against federal judicial officials in theUnited States, 1789–1993. Department of Justice,U.S. Marshals Service.
Calhoun, F. S., & Weston, S. W. (2003). Contemporarythreat management. Specialized Training Services.
Calhoun, F. S., & Weston, S. W. (2009). Threatassessment and management strategies. CRC Press.
Carbone, J. T., Holzer, K. J., Vaughn, M. G., &DeLisi, M. (2020). Homicidal ideation and forensicpsychopathology: Evidence from the 2016 Nation-wide Emergency Department Sample (NEDS).
ThisdocumentiscopyrightedbytheAmerican
Psychological
Associationoroneofitsallied
publishers.
Thisarticleisintended
solely
forthepersonaluse
oftheindividual
userandisnotto
bedisseminated
broadly.
18 JAMES ET AL.
Journal of Forensic Sciences, 65(1), 154–159.https://doi.org/10.1111/1556-4029.14156
Cawood, J. S., & Corcaran, M. H. (2003). Violenceassessment and Intervention: The practitioner’shandbook. CRC Press. https://doi.org/10.1201/9780203500057
Cawood, J. S., Scalora, M. J., & Viñas-Racionero, R.(2020). The Cawood assessment grid for organisa-tional (workplace) violence: Initial testing fir inter-rater reliability and predictive validity. Journal ofThreat Assessment and Management, 7, 200–213.https://doi.org/10.1037/tam0000153
Churcher, F. P., & Nesca, M. (2013). Risk factors forviolence in stalking perpetration: A meta-analysis.FWU Journal of Social Sciences, 7, 100–112.
Clemmow, C., Gill, P., Corner, E., Farnham, F.,Taylor, R., Wilson, S., Taylor, A., & James, D.(2021) A data-driven classification of outcome be-haviours in those who cause concern to Britishpublic figures. Psychology, Public Policy, andLaw, 27(4), 509–521. https://doi.org/10.1037/law0000269
Cohen, J. (1960). A coefficient of agreement fornominal scales. Educational and PsychologicalMeasurement, 20, 37–46. https://doi.org/10.1177/001316446002000104
Coid, J. W., Ullrich, S., Kallis, C., Keers, R., Barker,D., Cowden, F., & Stamps, R. (2013). The relation-ship between delusions and violence: Findings fromthe East London first episode psychosis study.JAMA Psychiatry, 70(5), 465–471. https://doi.org/10.1001/jamapsychiatry.2013.12
Cook, D. A., & Beckman, T. J. (2006). Currentconcepts in validity and reliability for psychometricinstruments: Theory and application. The AmericanJournal of Medicine, 119(2), 166.e7–166.e16. https://doi.org/10.1016/j.amjmed.2005.10.036
de Becker, G. (1996). The gift of fear. Random House.De Groot, I. N. J., Drost, L. F., Boutellier, J. C. J., &Voerman, B. E. (2010). Bedreigers van politici:Risicos en interventiemogelijkheden [People whothreaten politicians: Risks and intervention possi-bilities]. Verwey-Jonker Instituut.
DeLisi, M., Tahja, K., Drury, A. J., Caropreso, D.,Elbert, M. J., & Heinrichs, T. (2017). The criminol-ogy of homicidal ideation: Associations with criminalcareers and psychopathology among federal correc-tional clients. American Journal of Criminal Justice,42, 554–573. https://doi.org/10.1007/s12103-016-9371-5
Dietz, P., & Martell, D. A. (2010). Commentary:Approaching and stalking public figures—A pre-requisite to attack. The Journal of the AmericanAcademy of Psychiatry and the Law, 38(3), 341–348. http://www.jaapl.org/content/38/3/341
Dietz, P., Matthews, D., Van Duyne, C., Martell, D.,Parry, C., Stewart, T., van Duyne, C., & Crowder, J.
(1991) Threatening and otherwise inappropriate let-ters to Hollywood celebrities. Journal of ForensicSciences, 36, 185–209. https://doi.org/10.1520/JFS13019J. ISSN 0022-1198.
Dietz, P. E., & Martell, D. A. (1989). Mentally disor-dered offenders in pursuit of celebrities and poli-ticians. National Institute of Justice.
Dietz, P. E., Matthews, D. B., Martell, D. A., Stewart,T. M., Hrouda, D. R., & Warren, J. (1991). Threat-ening and otherwise inappropriate letters to membersof the United States Congress. Journal of ForensicSciences, 36(5), 1445–1468. https://doi.org/10.1520/JFS13165J
Douglas, K. S., & Otto, R. K. (Eds.). (2020). Handbookof violence risk assessment (2nd ed.). Routledge.https://doi.org/10.4324/9781315518374
Dunn, J. (2014). The Los Angeles Police DepartmentThreat Management Unit. In J. R. Meloy &J. Hoffmann (Eds.), International handbook ofthreat assessment (pp. 285–298). Oxford UniversityPress.
Every-Palmer, S., Barry-Walsh, J., & Pathé, M.(2015). Harassment, stalking, threats and attackstargeting New Zealand politicians: A mental healthissue. The Australian and New Zealand Journal ofPsychiatry, 49, 634–641. https://doi.org/10.1177/0004867415583700
Farnham, F. R., & Busch, K. G. (2016). Internationalperspectives on the protection of public officials.Behavioral Sciences & the Law, 34, 597–601.https://doi.org/10.1002/bsl.2266
Fein, R. A., & Vossekuil, B. (1998). Preventing attackson public officials and public figures: A secretservice perspective. In J. R. Meloy (Ed.), The psy-chology of stalking (pp. 175–191). Academic Press.
Fein, R. A., & Vossekuil, B. (1999). Assassination inthe United States: An operational study of recentassassins, attackers, and near-lethal approachers.Journal of Forensic Sciences, 44(2), 321–333.https://doi.org/10.1520/JFS14457J
Fein, R. A., & Vossekuil, B. (2000). Protective intel-ligence and threat assessment investigations: Aguide for state and local law enforcement officials.U.S. Dept. of Justice, Office of Justice Programs,National Institute of Justice.
Fixated Research Group. (2006). Report of the fixatedresearch group. Home Office.
Gill, P., Corner, E., Farnham, F., Wilson, S., March-ment, Z., Taylor, A., Taylor, R., & James, D.(2021). Predictors of varying levels of risks posedby fixated individuals to British public figures.Journal of Forensic Sciences, 66(4), 1364–1376.https://doi.org/10.1111/1556-4029.14708
Hamers, H., Borgesius, E., & Verschure, S. (2010).Mensen met een psychische stoornis die publiekepersonen bedreigen: Een aanpak gericht op zorg[People with mental disorders who threaten public
ThisdocumentiscopyrightedbytheAmerican
Psychological
Associationoroneofitsallied
publishers.
Thisarticleisintended
solely
forthepersonaluse
oftheindividual
userandisnotto
bedisseminated
broadly.
CTAP: DEVELOPMENT AND INTER-RATER RELIABILITY 19
figures: an approach focused on facilitating care].Zorg Consult.
Hart, S., & Logan, C. (2011). Formulation of violencerisk using evidence-based assessments: the structuredprofessional judgement approach. In P. Sturmey &M. McMurran (Eds.), Forensic case formulation(1st ed., pp. 83–107). Wiley. https://doi.org/10.1002/9781119977018.ch4
Hehemann, K., van Nobelen, D., Brandt, C., & McEwan,T. E. (2017). The reliability and predictive valid-ity of the Screening Assessment for Stalking andHarassment (SASH). Journal of Threat Assessmentand Management, 4(3), 164–177. https://doi.org/10.1037/tam0000085
Hodgins, S., Hiscoke, U. L., & Freese, R. (2003). Theantecedents of aggressive behavior among men withschizophrenia: A prospective investigation of pa-tients in community treatment. Behavioral Sciencesand The Law, 21(4), 523–546. https://doi.org/10.1002/bsl.540
Hoffman, J., & Sheridan, L. (2008). Stalking, threat-ening and attacking corporate figures. In J. R.Meloy, L. Sheridan, & J. Hoffman (Eds.), Stalking,threatening and attacking public figures: A psycho-logical and behavioral analysis (pp. 123–142).Oxford University Press. https://doi.org/10.1093/med:psych/9780195326383.003.0006
IBM Corp. (2019). SPSS statistics, version 26.0.James, D. V. (2010). Protecting the prominent? Aresearch journey with Paul Mullen. CriminalBehaviour and Mental Health, 20(3), 242–250.https://doi.org/10.1002/cbm.769
James, D. V. (2015). Another helping of “intellectualhash”: Commentary on “Assassins of Rulers” (Mac-Donald, 1912). Journal of Threat Assessment andManagement, 1, 228–240. https://doi.org/10.1037/tam0000027
James, D. V., & Farnham, F. R. (2016). Outcome andefficacy of interventions by a public figure threatassessment and management unit: A mirrored studyof concerning behaviors and police contacts beforeand after intervention. Behavioral Sciences & theLaw, 34, 660–680. https://doi.org/10.1002/bsl.2255
James, D. V., Farnham, F. R., Sukhwal, S., Jones, K.,Carlisle, J., & Henley, S. (2016). Aggressive/intrusivebehaviours, harassment and stalking of membersof the United Kingdom parliament: A prevalencestudy and cross-national comparison. Journal ofForensic Psychiatry & Psychology, 27, 177–197.https://doi.org/10.1080/14789949.2015.1124908
James, D. V., Farnham, F. R., & Wilson, S. P. (2014).The Fixated Threat Assessment Centre: Implement-ing a joint policing and psychiatric approach to riskassessment and management in public figure threatcases. In J. R. Meloy & J. Hoffmann (Eds.), Interna-tional handbook of threat assessment (pp. 299–320).Oxford University Press.
James, D. V., Kerrigan, T., Forfar, R., Farnham, F., &Preston, L. (2010). The Fixated Threat AssessmentCentre: Preventing harm and facilitating care. Journalof Forensic Psychiatry & Psychology, 21, 521–536.https://doi.org/10.1080/14789941003596981
James,D. V.,MacKenzie, R. D.,& Farnham,F.R. (2014).Communications Threat Assessment Protocol-25:Guidelines for the initial assessment of problem-atic communications. Theseus.
James, D. V., McEwan, T. E., MacKenzie, R. D.,Meloy, J. R., Mullen, P. E., Pathé, M. T., Farnham,F. R., Preston, L. F., & Darnley, B. (2010).Persistence in stalking: A comparison of associa-tions in general forensic and public figure samples.Journal of Forensic Psychiatry & Psychology,21, 283–305. https://doi.org/10.1080/14789940903388994
James, D. V., Meloy, J. R., Mullen, P. E., Pathé, M. T.,Farnham, F. R., Preston, L. F., & Darnley, B. J.(2010). Abnormal attentions toward the BritishRoyal family: Factors associated with approachand escalation. The Journal of the American Acad-emy of Psychiatry and the Law, 38, 329–340. http://www.fixatedthreat.com/perch/resources/factors-associated-with-approach-and-escalation.pdf
James, D. V., Mullen, P. E., Meloy, J. R., Pathé, M. T.,Farnham, F. R., Preston, L., & Darnley, B. (2007).The role of mental disorder in attacks on Europeanpoliticians 1990–2004. Acta Psychiatrica Scandi-navica, 116, 334–344. https://doi.org/10.1111/j.1600-0447.2007.01077.x
James, D. V., Mullen, P. E., Meloy, J. R., Pathé, M. T.,Preston, L., Darnley, B., Farnham, F. R., & Scalora,M. J. (2010). Stalkers and harassers of Britishroyalty: An exploration of proxy behaviours forviolence. Behavioral Sciences & the Law, 29(1),64–80. https://doi.org/10.1002/bsl.922
James, D. V., Mullen, P. E., Pathé, M. T., Meloy, J. R.,Farnham, F. R., Preston, L., & Darnley, B. (2008).Attacks on the British Royal family: The role ofpsychotic illness. The Journal of the AmericanAcademy of Psychiatry and the Law, 36, 59–67.https://fixatedthreat.com/perch/resources/attacks-on-the-british-royal-family.pdf
James, D. V., Mullen, P. E., Pathé, M. T., Meloy, J. R.,Preston, L. F., Darnley, B., & Farnham, F. R.(2009). Stalkers and harassers of royalty: The roleof mental illness and motivation. PsychologicalMedicine, 39(9), 1479–1490. https://doi.org/10.1017/S0033291709005443
James, D. V., & Sheridan, L. P. (2020). What worksin risk assessment in stalking cases? In J. S.Wormith, L. A. Craig, & T. E. Hogue (Eds.),The Wiley handbook of what works in violence riskmanagement: Theory, research and practice (pp.527–542). Wiley. https://doi.org/10.1002/9781119315933.ch27
ThisdocumentiscopyrightedbytheAmerican
Psychological
Associationoroneofitsallied
publishers.
Thisarticleisintended
solely
forthepersonaluse
oftheindividual
userandisnotto
bedisseminated
broadly.
20 JAMES ET AL.
James, D. V., Sukhwal, S., Farnham, F. R., Evans, J.,Barrie, C., Taylor, A., & Wilson, S. P. (2016).Harassment and stalking of members of the UnitedKingdom Parliament: Associations and consequences.Journal of Forensic Psychiatry & Psychology,27, 309–330. https://doi.org/10.1080/14789949.2015.1124909
Kendall, M. (1938). A new measure of rank correlation.Biometrika, 30(1–2), 81–89. https://doi.org/10.2307/2332226
Kirkbride, J. B., Errazuriz, A., Croudace, T. J., Morgan,C., Jackson, D., Boydell, J., Murray, R. M., & Jones,P. B. (2012). Incidence of schizophrenia andother psychoses in England, 1950–2009: A sys-tematic review and meta-analyses [Bottom of Form].PLOS ONE, 7(3), Article e31660. https://doi.org/10.1371/journal.pone.0031660
Kropp, P. R., Hart, S. D., & Lyon, D. R. (2008).Guidelines for Stalking Assessment and Management(SAM): User manual. ProActive ReSolutions Inc.
Landis, J. R., & Koch, G. G. (1977). The measurementof observer agreement for categorical data. Biometrics,33, 159–174. https://doi.org/10.2307/2529310
Laschi, M., & Lombroso, C. (1886). Le délit politique[Political crime]. In Actes du Premier CongrèsInternational d’Anthropologie Criminelle, Rome,1885 (pp. 379–389). Bocca Frères.
Link, B. G., Stueve, A., & Phelan, J. (1998). Psychoticsymptoms and violent behaviors: Probing the com-ponents of “threat/control-override” symptoms.Social Psychiatry and Psychiatric Epidemiology,33(Suppl. 1), S55–S60. https://doi.org/10.1007/s001270050210
MacKenzie, R. D., McEwan, T. E., Pathé, M. T.,James, D. V., Ogloff, J. R. P., & Mullen, P. E.(2009). The stalking risk profile: Guidelines for theassessment and management of stalkers. Stalk Inc.
Marquez, A., & Scalora, M. J. (2011). Problematicapproach of legislators: Differentiating stalking fromisolated incidents. Criminal Justice and Behavior,38(11), 1115–1126. https://doi.org/10.1177/0093854811420847
McElhaney, M. (2004) Aggression in the workplace:Preventing and managing high-risk behaviour.Author House.
McEwan, T. E., MacKenzie, R. D., Mullen, P. E., &James, D. V. (2012). Approach and escalation instalking. Journal of Forensic Psychiatry & Psychology,23(3), 392–409. https://doi.org/10.1080/14789949.2012.679008
McEwan, T. E., Mullen, P. E., & MacKenzie, R.(2009). A study of the predictors of persistence instalking situations. Law and Human Behavior,33(2), 149–158. https://doi.org/10.1007/s10979-008-9141-0
McEwan, T. E., Mullen, P. E., & MacKenzie, R.(2010). Suicide amongst stalkers. Journal of
Forensic Psychiatry & Psychology, 2(4), 514–520.https://doi.org/10.1080/14789940903564370
McEwan, T. E., Shea, D. E., Daffern, M., MacKenzie,R. D., Ogloff, J. R. P., & Mullen, P. E. (2018). Thereliability and predictive validity of the stalking riskprofile. Assessment, 25(2), 259–276. https://doi.org/10.1177/1073191116653470
McEwan, T. E., Strand, S. M., MacKenzie, R. D., &James, D. V. (2017). Screening Assessment forStalking and Harassment (SASH): Guidelines forapplication and interpretation. Stalk Inc.
McGraw, K. O., & Wong, S. P. (1996). Forminginferences about some intraclass correlation coeffi-cients. Psychological Methods, 1, 30–46. https://doi.org/10.1037/1082-989X.1.1.30
Meloy, J. R. (2014). Approaching and attacking publicfigures: A contemporary analysis of communica-tions and behavior. Journal of Threat Assessmentand Management, 1(4), 243–261. https://doi.org/10.1037/tam0000024
Meloy, J. R. (2016) TRAP-18 (Terrorist Radicali-zation Assessment Protocol-18). User manual(version 1.0). Global Institute of ForensicResearch, Inc.
Meloy, J. R. (2018). The operational development andempirical testing of the Terrorist RadicalizationAssessment Protocol (TRAP-18). Journal of Per-sonality Assessment, 100(5), 483–492. https://doi.org/10.1080/00223891.2018.1481077
Meloy, J. R., Amman, M., & Hoffman, J. (2021).Public figure stalking and attacks. In J. R. Meloy &J. Hoffmann (Eds.), International handbook ofthreat assessment (2nd ed., pp. 166–188). OxfordUniversity Press. https://doi.org/10.1093/med-psych/9780190940164.003.0009
Meloy, J. R., & Gill, P. (2016). The lone-actor terroristand the TRAP-18. Journal of Threat Assessmentand Management, 3(1), 37–52. https://doi.org/10.1037/tam0000061
Meloy, J. R., & Hoffmann, J. (Eds.). (2014). Inter-national handbook of threat assessment. OxfordUniversity Press.
Meloy, J. R., & Hoffmann, J. (Eds.). (2021). Inter-national handbook of threat assessment (2nd ed.).Oxford University Press. https://doi.org/10.1093/med-psych/9780190940164.001.0001
Meloy, J. R., Hoffmann, J., Deisinger, E. R. D., &Hart, S. (2021). Threat assessment and threat man-agement. In J. R. Meloy & J. Hoffmann (Eds.),International handbook of threat assessment (2nd ed.,pp. 3–21). Oxford University Press. https://doi.org/10.1093/med-psych/9780190940164.003.0001
Meloy, J. R., Hoffmann, J., Guldimann, A., & James,D. (2012). The role of warning behaviors in threatassessment: An exploration and suggested typology.Behavioral Sciences & the Law, 30, 256–279. https://doi.org/10.1002/bsl.999
ThisdocumentiscopyrightedbytheAmerican
Psychological
Associationoroneofitsallied
publishers.
Thisarticleisintended
solely
forthepersonaluse
oftheindividual
userandisnotto
bedisseminated
broadly.
CTAP: DEVELOPMENT AND INTER-RATER RELIABILITY 21
Meloy, J. R., James, D. V., Farnham, F. R., Mullen,P. E., Pathé, M., Darnley, B., & Preston, L. (2004). Aresearch review of public figure threats, approaches,attacks, and assassinations in the United States.Journal of Forensic Sciences, 49(5), 1086–1093.https://doi.org/10.1520/JFS2004102
Meloy, J. R., James, D. V., Mullen, P. E., Pathé, M. T.,Farnham, F. R., Preston, L. F., & Darnley, B. J.(2011). Factors associated with escalation and prob-lematic approaches toward public figures. Journalof Forensic Sciences, 56(Suppl. 1), S128–S135.https://doi.org/10.1111/j.1556-4029.2010.01574.x
Meloy, J. R., Mohandie, K., & Green, M. (2008). Aforensic investigation of those who stalk celebrities.In J. R. Meloy, L. Sheridan, & J. Hoffman (Eds.),Stalking, threatening and attacking public figures(pp. 37–54). Oxford University Press. https://doi.org/10.1093/med:psych/9780195326383.003.0002
Meloy, J. R., & O’Toole, M. E. (2011). The concept ofleakage in threat assessment. Behavioral Sciences &the Law, 29(4), 513–527. https://doi.org/10.1002/bsl.986
Meloy, J. R., Sheridan, L., & Hoffman, J. (Eds.).(2008a). Stalking, threatening and attacking publicfigures: A psychological and behavioral analysis.Oxford University Press. https://doi.org/10.1093/med:psych/9780195326383.001.0001
Meloy, J. R., Sheridan, L., & Hoffman, J. (2008b).Public figure stalking, threats and attacks: the stateof the science. In J. R. Meloy, L. Sheridan, & J.Hoffman (Eds.), Stalking, threatening and attackingpublic figures (pp. 3–34). Oxford University Press.https://doi.org/10.1093/med:psych/9780195326383.003.0001
Meloy, J. R., White, S. G., & Hart, S. (2013).Workplace assessment of targeted violence risk:The development and reliability of the WAVR-21.Journal of Forensic Sciences, 58(5), 1353–1358.https://doi.org/10.1111/1556-4029.12196
Mohandie, K., Meloy, J. R., McGowan, M. G., &Williams, J. (2006). The RECON typology of stalking:Reliability and validity based upon a large sampleof North American stalkers. Journal of ForensicSciences, 51, 147–155. https://doi.org/10.1111/j.1556-4029.2005.00030.x
Monahan, J., Steadman, H., Silver, E., Appelbaum, P.,Robbins, P., Mulvey, E., Roth, L., Grisso, T., &Banks, S. (2001). Rethinking risk assessment: TheMacArthur study of mental disorder and violence.Oxford University Press.
Monahan, J., Steadman, H. J., Appelbaum, P. S.,Grisso, T., Mulvey, E. P., Roth, L. H., Robbins,P. C., Banks, S., & Silver, E. (2006). The classifica-tion of violence risk. Behavioral Sciences & the Law,24(6), 721–730. https://doi.org/10.1002/bsl.725
Mullen, P., James, D., Meloy, J. R., Pathé, M. T.,Farnham, F. R., Preston, L., Darnley, B., & Berman,
J. (2009). The fixated and the pursuit of public figures.Journal of Forensic Psychiatry & Psychology, 20,33–47. https://doi.org/10.1080/14789940802197074
Mullen, P. E., James, D. V., Meloy, J. R., Pathé, M.,Farnham, F., Preston, L., & Darnley, B. (2008). Therole of psychotic illnesses in attacks on publicfigures. In J. R. Meloy, L. Sheridan, & J. Hoffman(Eds.), Stalking, threatening and attacking publicfigures: A psychological and behavioral analysis(pp. 55–82). Oxford University Press. https://doi.org/10.1093/med:psych/9780195326383.003.0003
Mullen, P. E., & Lester, G. (2006). Vexatious litigantsand unusually persistent complainants and peti-tioners: From querulous paranoia to querulousbehaviour. Behavioral Sciences & the Law, 24(3),333–349. https://doi.org/10.1002/bsl.671
Mullen, P. E., & Maack, L. H. (1985). Jealousy,pathological jealousy and aggression. In D. P.Farrington & J. Gunn (Eds.), Aggression and dan-gerousness (pp. 103–126). Wiley.
Muller, E. R., Bron, R. P., de Hoog, D., & van derVarst, L. P. (2010). De aanpak van verwardebedreigers in Nederland [The approach to threatsby people with mental health disorders in TheNetherlands]. COT Instituut voor Veiligheids-enCrisismanagement [COT Institute for Safety andCrisis Management].
Narud, K., & Dahl, A. V. (2015). Stalking experiencesreported by Norwegian members of parliamentcompared to a general population sample. Journalof Forensic Psychiatry & Psychology, 26(1), 116–131. https://doi.org/10.1080/14789949.2014.981564
Nelen, H., Leeuw, B., Bakker, F., & Herrenberg, T.(2012). Pilot Dreigingsmanagement: Een ex anteevaluatie [Pilot threat management: an ex anteevaluation]. WODC, Ministerie van Veiligheid enJustitie [Research and Documentation Centre, Ministryof Justice].
Nelen, H., Mol, M., Plaisier, J., & Peters, M. (2013).Pilot dreigingsmanagement. De implementatie enwijze van uitvoering onder de loep [Threat man-agement pilot. Implementation and performanceunder the microscope]. WODC, Ministerie vanVeiligheid en Justitie [Research and DocumentationCentre, Ministry of Justice].
Nijdam, M. J, Olff, M., de Vries, M., Martens, W. J., &Gersons, B. P. R. (2008). Psychosociale effectenvan dreigingen beveiliging. [Psycho-social effects ofthreats and security]. NCTb [National Coordinatorfor Counter-Terrorism].
Novaco, R. W. (2011). Anger dysregulation: Driver ofviolent offending. Journal of Forensic Psychiatry &Psychology, 22(5), 650–668. https://doi.org/10.1080/14789949.2011.617536
Novaco, R. W. (2013). Reducing anger-related offending:What works. In L. A. Craig, L. Dixon, & T. A. Gannon(Eds.), What works in offender rehabilitation: An
ThisdocumentiscopyrightedbytheAmerican
Psychological
Associationoroneofitsallied
publishers.
Thisarticleisintended
solely
forthepersonaluse
oftheindividual
userandisnotto
bedisseminated
broadly.
22 JAMES ET AL.
evidence-based approach to assessment and treatment(pp. 211–236). Wiley Blackwell. https://doi.org/10.1002/9781118320655.ch12
Pathé, M. (2017). Stalking public figures: The fixatedloner. In W. S. G. Petherick (Ed.), The psychologyof criminal and antisocial behavior (pp. 295–320).Academic Press. https://doi.org/10.1016/B978-0-12-809287-3.00009-2
Pathé, M., Haworth, D., & Lowry, T. (2016). Managingthe risk posed by fixated persons at major events: Ajoint police-mental health intelligence approach.Journal of Policing, Intelligence and Counter Terror-ism, 11(1), 63–72. https://doi.org/10.1080/18335330.2016.1161226
Pathé, M. T., Haworth, D. J., Goodwin, T., Holman,A. G., Amos, S. J., & Day, L. (2017). Establishing ajoint agency response to the threat of lone-actorgrievance-fuelled violence. Journal of ForensicPsychiatry & Psychology, 29(1), 37–52. https://doi.org/10.1080/14789949.2017.1335762
Pathé, M. T., Lowry, T. J., Haworth, D. J., Webster, D.,Winterbourne, P., & Briggs, C. J. (2015). Assessingand managing the threat posed by fixated personsin Australia. Journal of Forensic Psychiatry &Psychology, 26(4), 425–438. https://doi.org/10.1080/14789949.2015.1037332
Pathé, M. T., Lowry, T. J., Haworth, D. J., Winter-bourne, P., & Day, L. (2016). Public figure fixation:Cautionary findings for mental health practitioners.Behavioral Sciences & the Law, 34(5), 681–692.https://doi.org/10.1002/bsl.2252
Régis, E. (1890). Les régicides dans l’histoire et dansle présent [‘Regicides’ in history and the present day].Maloine.
Riddle, F. J., Ferriman, M., Farmer, D. G., & Baillie,K. M. (2019). Towards a national strategy formanaging fixated persons in Australia. The Journalof Psychiatry & Law, 26(3), 457–467. https://doi.org/10.1080/13218719.2018.1506722
Scalora, M. J., Baumgartner, J. V., Hatch-Maillette,M. A., Covell, C. N., Palarea, R. E., Krebs, J. A.,Washington, D. O., Zimmerman, W., & Callaway, D.(2002). Risk factors for approach behavior towardthe U.S. congress. Journal of Threat Assessment,2, 35–55. https://doi.org/10.1300/J177v02n02_03
Scalora, M. J., Baumgartner, J. V., & Plank, G. L.(2003). The relationship of mental illness to targetedcontact behavior toward state government agenciesand officials. Behavioral Sciences & the Law, 21,239–249. https://doi.org/10.1002/bsl.525
Scalora, M. J., Baumgartner, J. V., Zimmerman, W.,Callaway, D., Hatch Maillette, M. A., Covell, C. N.,Palarea, R. E., Krebs, J. A., & Washington, D. O.(2002). An epidemiological assessment of prob-lematic contacts to members of congress. Journalof Forensic Sciences, 47, 1360–1364. https://doi.org/10.1520/JFS15575J
Scalora, M. J., Zimmerman, W. J., & Wells, D. G.(2008). Use of threat assessment for the protectionof the United States Congress. In J. R. Meloy, L.Sheridan, & J. Hoffman (Eds.), Stalking, threat-ening and attacking public figures: A psychologicaland behavioral analysis (pp. 425–434). OxfordUniversity Press. https://doi.org/10.1093/med:psych/9780195326383.003.0019
Schlesinger, L. B. (2006). Celebrity stalking, homi-cide, and suicide: A psychological autopsy. Inter-national Journal of Offender Therapy andComparative Criminology, 50(1), 39–46. https://doi.org/10.1177/0306624X05276461
Schoeneman, K. A., Scalora, M. J., Darrow, C. D.,McLawsen, J. E., Chang, G. H., & Zimmerman,W. J. (2011). Written content indicators of prob-lematic approach behavior toward political officials.Behavioral Sciences & the Law, 29, 284–301.https://doi.org/10.1002/bsl.977
Schoeneman-Morris, K. A., Scalora, M. J., Chang,G. H., Zimmerman, W. J., & Garner, Y. (2007). Acomparison of email versus letter threat contactstoward members of the United States Congress.Journal of Forensic Sciences, 52, 1142–1147.https://doi.org/10.1111/j.1556-4029.2007.00538.x
Shaffer, C. S., Fuller, E. K., & Guy, L. S. (2020).Brief and emerging violence risk assessmentmeasures. In K. S. Douglas & R. K. Otto (Eds.),Handbook of violence risk assessment (2nd ed.,pp. 52–69). Routledge. https://doi.org/10.4324/9781315518374-4
Shrout, P. E. (1998). Measurement reliability andagreement in psychiatry. Statistical Methods inMedical Research, 7, 301–317. https://doi.org/10.1177/096228029800700306
Silva, A. J., Ferrari, M. M., Leong, G. B., & Penny, G.(1998). The dangerousness of persons withdelusional jealousy. The Journal of the AmericanAcademy of Psychiatry and the Law, 26(4),607–623.
Silva, J. A., Harry, B. E., Leong, G. B., & Weinstock, R.(1996). Dangerous delusional misidentificationand homicide. Journal of Forensic Sciences, 41(4),641–644.
Singh, J. P., Desmarais, S. L., Hurducas, C., Arbach-Lucioni, K., Condemarin, C., Dean, K., Doyle, M.,Folino, J. O., Godoy-Cervera, V., Grann, M., Ho,R. M. Y., Large, M. M., Nielsen, L. H., Pham, T. H.,Rebocho, M. F., Reeves, K. A., Rettenberger, M.,de Ruiter, C., Seewald, K., & Otto, R. K. (2014).International perspectives on the practical applicationof violence risk assessment: A global survey of44 countries. International Journal of ForensicMental Health, 13, 193–206. https://doi.org/10.1080/14999013.2014.922141
Singh, J. P., Grann, M., & Fazel, S. (2013). Authorshipbias in violence risk assessment? A systematic review
ThisdocumentiscopyrightedbytheAmerican
Psychological
Associationoroneofitsallied
publishers.
Thisarticleisintended
solely
forthepersonaluse
oftheindividual
userandisnotto
bedisseminated
broadly.
CTAP: DEVELOPMENT AND INTER-RATER RELIABILITY 23
and meta-analysis. PLOS ONE, 8, Article e72484.https://doi.org/10.1371/journal.pone.0072484
Sizoo, B. B., & van Nobelen, D. (2021). Effectivenessof interventions by the Threat Management Team ofthe Netherlands Police Agency: A retrospectivestudy. Journal of Threat Assessment and Management,8(1–2), 36–47. https://doi.org/10.1037/tam0000159
Skeem, J., & Monahan, J. (2011). Current directions inviolence risk assessment. Current Directions inPsychological Science, 20(1), 38–42. https://doi.org/10.1177/0963721410397271
Slovic, P., Finucane, M. L., Peters, E., & MacGregor,D. G. (2004). Risk as analysis and risk as feelings:Some thoughts about affect, reason, risk, and ratio-nality. Risk Analysis: An Official Publication of theSociety for Risk Analysis, 24(2), 311–322. https://doi.org/10.1111/j.0272-4332.2004.00433.x
Swanson, J. W., Swartz, M. S., Van Dorn, R. A., Elbogen,E. B., Wagner, H. R., Rosenheck, R. A., Stroup, T. S.,McEvoy, J. P., & Lieberman, J. A. (2006). A nationalstudyof violent behavior inpersons withschizophrenia.Archives of General Psychiatry, 63(5), 490–499.https://doi.org/10.1001/archpsyc.63.5.490
Wallin, L., & Wallin, S. (2014). Politikernas trygghet-sundersökning 2013: Utsatthet och oro för trakas-serier, hot och våld [Politicians security survey 2013:Vulnerability and concern—Harassment, threats andviolence]. National Council for Crime Prevention.
White, S. G., & Meloy, J. R. (2016). The WAVR-21: Astructured professional guide for the workplaceassessment of violence risk (3rd ed.). SpecialisedTraining Services.
Wilson, S., Dempsey, C., Farnham, F., Manze, T., &Taylor, T. (2018). Stalking risks to celebrities andpublic figures. British Journal of Psychiatric Advances,24, 152–160. https://doi.org/10.1192/bja.2017.22
Wilson, S., Farnham, F., Taylor, A., & Taylor, R.(2019). Reflections on working in public-figurethreat management. Medicine, Science and theLaw, 59(4), 275–281. https://doi.org/10.1177/0025802419861168
Wilson, S. P., Pathé, M. T., Farnham, F. R., & James,D. V. (2021). The fixated threat assessment centers.In J. R. Meloy & J. Hoffmann (Eds.), Internationalhandbook of threat assessment (2nd ed., pp. 475–491).Oxford University Press.
Wormith, J. S., Craig, L. A., & Hogue, T. E. (Eds.).(2020). The Wiley handbook of what works inviolence risk management: Theory, researchand practice. Wiley. https://doi.org/10.1002/9781119315933
Received June 22, 2021Revision received November 30, 2021
Accepted December 12, 2021 ▪
ThisdocumentiscopyrightedbytheAmerican
Psychological
Associationoroneofitsallied
publishers.
Thisarticleisintended
solely
forthepersonaluse
oftheindividual
userandisnotto
bedisseminated
broadly.
24 JAMES ET AL.