| Peer-Reviewed

Introduction Risk Assessment Method Threatening Letters: A Structured Approach for Disturbing and Threatening Letters

Received: 12 May 2021    Accepted: 4 June 2021    Published: 16 June 2021
Views:       Downloads:
Abstract

The Risk Assessment Method Threatening Letters (RAT in brief) provides assessors such as forensic psychologists working for law enforcement and justice departments with a structured assessment method for threatening letters. On the basis of an assessment framework and guidelines, threatening letters will be analysed according to eighteen characteristics. The purpose is to arrive at a risk definition regarding the chances that a person will resort to violence, and to apply risk management to individuals who make threats. With the development of the RAT, efforts have been made regarding the identification of threat level of persons whose identity has not yet been established or who have not been detained, due to the absence of a criminal file. With an assessment form, the presence and relevance of eighteen characteristics divided into: content words (9), emotion words (5), linguistic features (3) and details (1), are examined in disturbing and threatening letters. The content analysis allows assessors to encode a text in binary units of measurement (present or not present) and is based on a combination of empirical knowledge and professional judgement. The objective concerns individuals who are posting (repeated) threatening or disturbing letters on social media and whose authorship must be reviewed to reveal background characteristics for the writer, in the case: 1. they are written anonymously; 2. they are intimidating in nature; 3. they undermine faith in social institutions. Its scope includes public figures such as representatives of the government who frequently are subject to threat or violence. However, the RAT is equally useful for the interpretation of threats aimed at other persons in whose cases the nature and seriousness of the type of threat is also of importance.

Published in International Journal of Information and Communication Sciences (Volume 6, Issue 2)
DOI 10.11648/j.ijics.20210602.14
Page(s) 46-54
Creative Commons

This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited.

Copyright

Copyright © The Author(s), 2021. Published by Science Publishing Group

Keywords

Risk Management, Forensic-linguistic Text Analysis, Treat Assessment, Social Media, Social Unrest

References
[1] Atteveldt, van, W., Velden, van der, M. A. C. G. & Boukes, M. (2021). The Validity of Sentiment Analysis: Comparing Manual Annotation, Crowd-Coding, Dictionary Approaches and Machine Learning Algorithms. Communication Methods and Measures (online).
[2] Bateman, A. L. & Salfati, C. G. (2007). An examination of behavioral consistency using individual behaviors or groups of behaviors in serial homicide. Behavioral Sciences and the Law, 25, p. 527-544.
[3] Bijleveld, C. C. J. H. (2013). Methoden en technieken van onderzoek in de criminologie. Den Haag Broom Criminologie.
[4] Bogaerts, S., Okur, P., Willems, M., Knaap, L. van der, Spreen, M., Aertsen, I. (2012). Solistische dreigers Ontwikkeling van een instrument voor risicotaxatie van solistische dreigers. School of Behavioral Sciences: Tilburg University.
[5] Bovenkerk, F. (2005). Bedreigingen in Nederland, Willem Pompe Instituut. Universiteit Utrecht.
[6] Brunt, van B. (2015). Violent Risk Assessment of the Written Word (VRAW). The journal of campus Behavioral Intervention, 3, 12-24.
[7] Canter, D. (2000). Offender profiling and criminal differentiation. Legal and Criminal Psychology, 5, p. 23-46.
[8] Chapman, H. A., Kim, D. A., Susskind, J. M. & Anderson, A. K. (2009). In Bad Taste: Evidence for the Oral Origins of Moral Disgust. Science 323, p. 1222-1226.
[9] Chung, C. & Pennebaker, J. (2007). The Psychological Functions of Function Words. Social Communication, 343-359.
[10] Coulthard, M. & Johnson, A. (2010). The Routeledge Handbook of Forensic Linguistics. Londen & New York: Routeledge Taylor & Francis Group.
[11] De Groot, I. N. J., Drost, L. F., Boutellier, J. C. J. (2009). Bedreigers van politici. Risico’s en interventiemogelijkheden. Verwey Jonker Instituut, Utrecht.
[12] Diekhuis-Kuiper, M. L. (2017). Het woord en de daad. Kenmerken van dreigbrieven en de intenties waarmee ze geschreven werden. Boomcriminologie.
[13] Dietz, P. E., & Martell, D. A. (2010). Commentary: Approaching and Stalking Public Figures. A Prerequisite to Attack. Journal of the American Academy of Psychiatry and the Law, 38, p. 341-348.
[14] Funk, J. B., Balacci, H. B., Pasold, T., & Baumgartner, J. (2004). Violence exposure in reallife, video games, television, movies, and the internet: is there desensitization? Journal of Adolescence, 27, 23-39.
[15] Ferguson, C. J., Coulson, M., Barnett, J. (2011). Psychological Profiles of School Shooters: Positive Directions and One Big Wrong Turn. Journal of Police Crisis Negotiations. 11 (2): 141–158.
[16] Geurts, R., Granhag, P. A., Ask, K., & Vrij, A. (2016). Taking threats to the lab: Introducing an experimental paradigm for studying verbal threats. Journal of Threat Assessment and Management 3 (1), 53-64.
[17] Hart, S. D., & Logan, C. (2011). Formulation of Violence Risk using evidence-based assessments: The Structured Professional Judgement Approach. In P. Sturmey & M. McMurran (Eds.), Forensic case formulation (pp. 83-106). Chichester, UK: Wiley-Blackwell.
[18] James, D. V., MacKenzie, R. D., Farnham, F. R. (2014). The Communications Threat Assessment Vragenlijst (CTAP-25). Intelligence, 2.
[19] Jolley, D., Douglas, K. M., Leite, A. C., Schrader, T. (2019). Belief in conspiracy theories and intentions to engage in everyday crime. British Journal of Social Psychology.
[20] Jopeck, E. J. (2000). Five steps to risk reduction: Learn to identify and reduce risk by following these five steps. Security Management, 44 (8), p. 97-98, p. 100-102.
[21] Kemper, R., & Ruig, L. de (2009). Tussen agressiebeleid en praktijk: Aanpak van agressie en geweld in de publieke sector. Zoetermeer: Research voor Beleid.
[22] Lammers, J., Pelzer, B., Hendrickx, J., Eisinga, R. (2007). Categorische Data Analyse met SPSS, Inleiding in loglineaire analysetechnieken. Assen, Van Gorcum.
[23] Meloy, J. R., James, D. V., Mullen, P. E., Pathé, M. T., Farnham, F. R., Preston, L. F., Darnley, B. J. (2011). Factors Associated with Escalation and Problematic Approaches Toward Public Figures. Journal of Forensic.
[24] Pennebaker, J. W. (2011). The secret life of pronouns. What our words say about us. New York: Bloomsbury Press.
[25] Rottweiler, B., P. Gill, P. (2020). Conspiracy Beliefs and Violent Extremist Intentions: The Contingent Effects of Self-efficacy, Self-control and Law-related Morality. European Research Council.
[26] Smith, S. S. (2006). From violent words to violent deeds. Assessing risk from threatening communications. Washington: Georgetown University.
[27] Sparkes Guglielmo, S. (2015). Cognitive distortion: propositions and possible worlds. Journal of Rational Emotive & Cognitive-Behaviour Therapy.
[28] Stoddard, S. A., Varela, J. J., & Zimmerman, M. A. (2015). Future expectations, attitude toward violence, and bullying perpetration during early adolescents: a mediation evaluation. Nursing Research, 64 (6), 422-433.
[29] Van der Meer, B. B., Bootsma, L., Meloy, R. (2012). Disturbing Communications and problematic approaches to the Dutch Royal Family. The journal of Forensic Psychiatry & Psychology, 1-19, iFirst article.
[30] Van der Meer, B. B., & Diekhuis, M. L. (2013). Collecting and Assessing Information for Threat Assessment. In R. Meloy & J. Hoffmann (Eds). International Handbook of Threat Assessment, part I, 3. New York: Oxford.
[31] Verkes, R. J. (2018). Behandeling van personen met agressief gedrag. In J. W. Hummelen, R. J. Verkes en M. J. F. van der Wolf. Forensische psychiatrie en de rechtspraktijk (pp. 419-434). Utrecht: De Tijdstroom.
[32] Vrij, A. (2010). Detecting Lies and Deceit (2nd ed.). Pitfalls and Opportunities. Chichester: John Wiley & Sons, Ltd.
[33] Welbers, K., Atteveldt, van, W. & Benoit, K. (2017), Text Analysis in R. Communication Methods and Measures, 11 (4), 245-265.
Cite This Article
  • APA Style

    Margaret Diekhuis-Kuiper. (2021). Introduction Risk Assessment Method Threatening Letters: A Structured Approach for Disturbing and Threatening Letters. International Journal of Information and Communication Sciences, 6(2), 46-54. https://doi.org/10.11648/j.ijics.20210602.14

    Copy | Download

    ACS Style

    Margaret Diekhuis-Kuiper. Introduction Risk Assessment Method Threatening Letters: A Structured Approach for Disturbing and Threatening Letters. Int. J. Inf. Commun. Sci. 2021, 6(2), 46-54. doi: 10.11648/j.ijics.20210602.14

    Copy | Download

    AMA Style

    Margaret Diekhuis-Kuiper. Introduction Risk Assessment Method Threatening Letters: A Structured Approach for Disturbing and Threatening Letters. Int J Inf Commun Sci. 2021;6(2):46-54. doi: 10.11648/j.ijics.20210602.14

    Copy | Download

  • @article{10.11648/j.ijics.20210602.14,
      author = {Margaret Diekhuis-Kuiper},
      title = {Introduction Risk Assessment Method Threatening Letters: A Structured Approach for Disturbing and Threatening Letters},
      journal = {International Journal of Information and Communication Sciences},
      volume = {6},
      number = {2},
      pages = {46-54},
      doi = {10.11648/j.ijics.20210602.14},
      url = {https://doi.org/10.11648/j.ijics.20210602.14},
      eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.ijics.20210602.14},
      abstract = {The Risk Assessment Method Threatening Letters (RAT in brief) provides assessors such as forensic psychologists working for law enforcement and justice departments with a structured assessment method for threatening letters. On the basis of an assessment framework and guidelines, threatening letters will be analysed according to eighteen characteristics. The purpose is to arrive at a risk definition regarding the chances that a person will resort to violence, and to apply risk management to individuals who make threats. With the development of the RAT, efforts have been made regarding the identification of threat level of persons whose identity has not yet been established or who have not been detained, due to the absence of a criminal file. With an assessment form, the presence and relevance of eighteen characteristics divided into: content words (9), emotion words (5), linguistic features (3) and details (1), are examined in disturbing and threatening letters. The content analysis allows assessors to encode a text in binary units of measurement (present or not present) and is based on a combination of empirical knowledge and professional judgement. The objective concerns individuals who are posting (repeated) threatening or disturbing letters on social media and whose authorship must be reviewed to reveal background characteristics for the writer, in the case: 1. they are written anonymously; 2. they are intimidating in nature; 3. they undermine faith in social institutions. Its scope includes public figures such as representatives of the government who frequently are subject to threat or violence. However, the RAT is equally useful for the interpretation of threats aimed at other persons in whose cases the nature and seriousness of the type of threat is also of importance.},
     year = {2021}
    }
    

    Copy | Download

  • TY  - JOUR
    T1  - Introduction Risk Assessment Method Threatening Letters: A Structured Approach for Disturbing and Threatening Letters
    AU  - Margaret Diekhuis-Kuiper
    Y1  - 2021/06/16
    PY  - 2021
    N1  - https://doi.org/10.11648/j.ijics.20210602.14
    DO  - 10.11648/j.ijics.20210602.14
    T2  - International Journal of Information and Communication Sciences
    JF  - International Journal of Information and Communication Sciences
    JO  - International Journal of Information and Communication Sciences
    SP  - 46
    EP  - 54
    PB  - Science Publishing Group
    SN  - 2575-1719
    UR  - https://doi.org/10.11648/j.ijics.20210602.14
    AB  - The Risk Assessment Method Threatening Letters (RAT in brief) provides assessors such as forensic psychologists working for law enforcement and justice departments with a structured assessment method for threatening letters. On the basis of an assessment framework and guidelines, threatening letters will be analysed according to eighteen characteristics. The purpose is to arrive at a risk definition regarding the chances that a person will resort to violence, and to apply risk management to individuals who make threats. With the development of the RAT, efforts have been made regarding the identification of threat level of persons whose identity has not yet been established or who have not been detained, due to the absence of a criminal file. With an assessment form, the presence and relevance of eighteen characteristics divided into: content words (9), emotion words (5), linguistic features (3) and details (1), are examined in disturbing and threatening letters. The content analysis allows assessors to encode a text in binary units of measurement (present or not present) and is based on a combination of empirical knowledge and professional judgement. The objective concerns individuals who are posting (repeated) threatening or disturbing letters on social media and whose authorship must be reviewed to reveal background characteristics for the writer, in the case: 1. they are written anonymously; 2. they are intimidating in nature; 3. they undermine faith in social institutions. Its scope includes public figures such as representatives of the government who frequently are subject to threat or violence. However, the RAT is equally useful for the interpretation of threats aimed at other persons in whose cases the nature and seriousness of the type of threat is also of importance.
    VL  - 6
    IS  - 2
    ER  - 

    Copy | Download

Author Information
  • Ministry of the Interior and Kingdom Relations, The Hague, The Netherlands

  • Sections