<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Jan Davenport, Author at Behavioral Threat Assessment Software by USA Software</title>
	<atom:link href="https://threatassessmenttracking.com/author/jand/feed/" rel="self" type="application/rss+xml" />
	<link>https://threatassessmenttracking.com/author/jand/</link>
	<description>Track, Monitor, Manage, Data Share</description>
	<lastBuildDate>Mon, 04 Oct 2021 19:32:50 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
	<item>
		<title>Sue Klebold, Mother of Columbine Shooter</title>
		<link>https://threatassessmenttracking.com/2019/12/20/sue-klebold-mother-of-columbine-shooter/</link>
					<comments>https://threatassessmenttracking.com/2019/12/20/sue-klebold-mother-of-columbine-shooter/#respond</comments>
		
		<dc:creator><![CDATA[Jan Davenport]]></dc:creator>
		<pubDate>Fri, 20 Dec 2019 18:37:43 +0000</pubDate>
				<category><![CDATA[Campus]]></category>
		<category><![CDATA[K-12]]></category>
		<guid isPermaLink="false">https://threatassessmenttracking.com/?p=949</guid>

					<description><![CDATA[<p>This past summer I was with the USA Software Team as a Behavioral Threat Assessment  vendor at the Association of Threat Assessment Professionals (ATAP) meeting in Anaheim, CA.  I had heard Sue Klebold speak at a Ted Talk so, when I saw she was a keynote speaker, I was ecstatic. SUE KLEBOLD HAD COURAGE  [...]</p>
<p>The post <a href="https://threatassessmenttracking.com/2019/12/20/sue-klebold-mother-of-columbine-shooter/">Sue Klebold, Mother of Columbine Shooter</a> appeared first on <a href="https://threatassessmenttracking.com">Behavioral Threat Assessment Software by USA Software</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="fusion-fullwidth fullwidth-box fusion-builder-row-1 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling" style="--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;" ><div class="fusion-builder-row fusion-row"><div class="fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last" style="--awb-bg-size:cover;"><div class="fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy"><div class="fusion-text fusion-text-1"><p>This past summer I was with the USA Software Team as a Behavioral Threat Assessment  vendor at the Association of Threat Assessment Professionals (ATAP) meeting in Anaheim, CA.  I had heard Sue Klebold speak at a Ted Talk so, when I saw she was a keynote speaker, I was ecstatic.</p>
<p><strong>SUE KLEBOLD HAD COURAGE</strong></p>
<p>This beautiful woman had the courage to present herself and her story about her son Dillon. Along with Eric Harris, he shot and killed 12 students at Columbine High School in Littleton, Colo. Sue has subsequently tried to make sense of what happened. As a result, she has devoted her life to suicide prevention and mental health.</p>
<p>Her audience was 1,000 threat assessment and law enforcement professionals.  I felt privileged to listen to this woman because I knew the words would be raw and authentic. The message that stuck with me was this:</p>
<p><strong>HER MESSAGE</strong></p>
<p><em>“I should have listened more.”</em> Looking back, Sue said she believes Dillon was being bullied at school. He and his friend Eric had been arrested for tampering with the lockers and this brought the two of them together as a team. He became depressed and suicidal. However, he was able to cover this to his own family while he planned with his friend.</p>
<p><strong>DIFFERENT PERSPECTIVE</strong></p>
<p>I have to admit, listening to this mother speak about her son and what she has gone through, certainly gave me a different perspective. Moreover, it was very emotional.  She got a tearful standing ovation from me and the rest of the 999 people in the room.</p>
<p><a href="https://www.ted.com/speakers/sue_klebold">For more information click here</a></p>
</div><div class="fusion-clearfix"></div></div></div></div></div>
<p>The post <a href="https://threatassessmenttracking.com/2019/12/20/sue-klebold-mother-of-columbine-shooter/">Sue Klebold, Mother of Columbine Shooter</a> appeared first on <a href="https://threatassessmenttracking.com">Behavioral Threat Assessment Software by USA Software</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://threatassessmenttracking.com/2019/12/20/sue-klebold-mother-of-columbine-shooter/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The 10 Findings of Targeted School Violence, NTAC</title>
		<link>https://threatassessmenttracking.com/2019/12/19/the-10-findings-of-targeted-school-violence/</link>
					<comments>https://threatassessmenttracking.com/2019/12/19/the-10-findings-of-targeted-school-violence/#respond</comments>
		
		<dc:creator><![CDATA[Jan Davenport]]></dc:creator>
		<pubDate>Thu, 19 Dec 2019 19:52:24 +0000</pubDate>
				<category><![CDATA[K-12]]></category>
		<guid isPermaLink="false">https://threatassessmenttracking.com/?p=937</guid>

					<description><![CDATA[<p>The National Threat Assessment Center (NTAC) studied 41 actual incidents of targeted school violence that occurred at K-12 schools in the US from 2008-2017. This is 20 years of research. 20 years that we as parents, teachers, law enforcement etc, have been doing little except hope it doesn't happen again. Until Parkland. And Sandy  [...]</p>
<p>The post <a href="https://threatassessmenttracking.com/2019/12/19/the-10-findings-of-targeted-school-violence/">The 10 Findings of Targeted School Violence, NTAC</a> appeared first on <a href="https://threatassessmenttracking.com">Behavioral Threat Assessment Software by USA Software</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="fusion-fullwidth fullwidth-box fusion-builder-row-2 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling" style="--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;" ><div class="fusion-builder-row fusion-row"><div class="fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last" style="--awb-bg-size:cover;"><div class="fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy"><div class="fusion-text fusion-text-2"><p>The National Threat Assessment Center (NTAC) studied 41 actual incidents of targeted school violence that occurred at K-12 schools in the US from 2008-2017. This is 20 years of research. 20 years that we as parents, teachers, law enforcement etc, have been doing little except hope it doesn&#8217;t happen again. Until Parkland. And Sandy Hook. And Santa Fe. And now, Saugus. Time for wringing our hands is over. In short, we CAN make a change to save our children.</p>
<p>The NTAC analysis is timely and in a nutshell it has painfully revealed the following:</p>
<p><em><strong>The 10 NTAC Findings on </strong></em><em><strong>Targeted School Violence</strong></em></p>
<ol>
<li>There is no profile of a student attacker, nor type of school</li>
<li>Attackers usually had multiple motives, the most common being a grievance with a classmate</li>
<li>Most attackers used firearms, and most often obtained from home</li>
<li>Most attackers had experienced psychological, behavioral and or neurological/developmental delays or cognitive deficits</li>
<li>Half of the attackers had interests in violent topics</li>
<li>All attackers experienced social stressors involving their relationships with peers and or romantic partners</li>
<li>Nearly every attacker experienced negative home life factors</li>
<li>Most attackers were victims of bullying, which was often observed by others</li>
<li>Most attackers had a history of school disciplinary actions, and many had prior contact with law enforcement</li>
<li>All attackers exhibited concerning behaviors. Most elicited concern from others, and most communicated their intent to attack (aka, &#8220;leakage&#8221;).</li>
</ol>
<p><strong>There is a solution!</strong></p>
<p>Behavioral Threat Assessment (BTA) is a proven solution that can be used to help mitigate threats. BTA can help identify the warning signs outlined in the Secret Service findings and help prevent targeted school violence. The ball is rolling. It would be doubtful, at this stage of the game, to hear people are not preparing to manage these scary situations.</p>
<p>We can help!  Call 800-872-1931</p>
</div><div class="fusion-clearfix"></div></div></div></div></div>
<p>The post <a href="https://threatassessmenttracking.com/2019/12/19/the-10-findings-of-targeted-school-violence/">The 10 Findings of Targeted School Violence, NTAC</a> appeared first on <a href="https://threatassessmenttracking.com">Behavioral Threat Assessment Software by USA Software</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://threatassessmenttracking.com/2019/12/19/the-10-findings-of-targeted-school-violence/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Documentation of Threat Assessments</title>
		<link>https://threatassessmenttracking.com/2019/12/17/documentation-of-threat-assessments/</link>
					<comments>https://threatassessmenttracking.com/2019/12/17/documentation-of-threat-assessments/#respond</comments>
		
		<dc:creator><![CDATA[Jan Davenport]]></dc:creator>
		<pubDate>Tue, 17 Dec 2019 20:41:17 +0000</pubDate>
				<category><![CDATA[Campus]]></category>
		<category><![CDATA[K-12]]></category>
		<category><![CDATA[Documentation]]></category>
		<guid isPermaLink="false">https://threatassessmenttracking.com/?p=901</guid>

					<description><![CDATA[<p>Behavioral Threat Assessment legislation has been making the rounds in most states.  Typically, there is language around the use of a “documentation instrument” to assist in tracking the assessments.  Let’s take a closer look as to how documentation actually works. As a result of the school shootings, there have been a number of experts  [...]</p>
<p>The post <a href="https://threatassessmenttracking.com/2019/12/17/documentation-of-threat-assessments/">Documentation of Threat Assessments</a> appeared first on <a href="https://threatassessmenttracking.com">Behavioral Threat Assessment Software by USA Software</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="fusion-fullwidth fullwidth-box fusion-builder-row-3 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling" style="--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;" ><div class="fusion-builder-row fusion-row"><div class="fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last" style="--awb-bg-size:cover;"><div class="fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy"><div class="fusion-text fusion-text-3"><p><span style="font-weight: 400;">Behavioral Threat Assessment legislation has been making the rounds in most states.  Typically, there is language around the use of a “documentation instrument” to assist in tracking the assessments.  Let’s take a closer look as to how documentation actually works.</span></p>
<p><span style="font-weight: 400;">As a result of the school shootings, there have been a number of experts who have emerged in the industry. Some are educators, some are from law enforcement and, most notably, the U.S. Secret Service. </span></p>
<p><strong>Documentation</strong></p>
<p><span style="font-weight: 400;">Documentation tools have been developed to track and collect important data whenever there was an threat/incident at a school. For example, was the subject male or female, location and date of incident, etc. In the past, the goal was to collect data, but that thought process has shifted recently. The importance of collecting meaningful data beyond the &#8220;what, when and where&#8221; has become the Behavioral Threat Assessment Model. These models help track/identify warning signs, unresolved grievances, bullying and so on, that can assist in mitigating the threat. They have been the backbone of the majority of behavioral threat assessment trainings that have taken place nationwide and been adopted by many school districts.</span></p>
<p><span style="font-weight: 400;">It’s clear that teachers and administrators are not case managers. In fact, the school system as a whole was never set up to case manage its students.  There are school counselors who assist with a variety of issues with teacher input, but there has been minimal documentation requirements overall. </span></p>
<p><strong>This is all new!! </strong></p>
<p><span style="font-weight: 400;">I just filled out the forms from one of the more popular threat assessment &#8220;instruments&#8221;. Great questions but&#8230;the first segment, the Threat Form took me ½ hour to complete. That did not factor in other records review, like a prior incident, interviewing the subject, the target, and the witness, and creating a Behavior Intervention Plan.  I didn’t get to the mental health assessment.  That has to be done by another specialty. It includes a parent interview and then Behavioral Threat Assessment Team discussion and tracking of the student and their behavior.  And more documentation&#8230;</span></p>
<p><span style="font-weight: 400;">Oh, did I mention I had multiple phone calls and people leaning in my office doorway with documentation worthy details about other cases.  I am writing, writing, writing as fast as I can, hoping to remember what they said?!</span></p>
<p><span style="font-weight: 400;">The point is, assuming one gets it all down, at the end of the day, it typically goes in a nice manila folder, labeled with a new name sticker with the first few letters of the last name and Student ID number for privacy.  All neatly alphabetized in my locked file cabinet. Yet, who else knows of all my efforts??? So 1985.</span></p>
<p><b>The information is critical, but the communication of the information among BTA team members is the only hope of truly managing and mitigating a threat.</b></p>
<p><span style="font-weight: 400;">By now you must be using these forms and understand the time they take. Some schools are reporting up to 10 assessments per day!  Leaving spaces blank may not serve you in the event a threat is actually carried out. Like the form says, “you will want documentation to show that you made a defensible effort to assess the threat.”</span></p>
<p><strong>A Better Way to Document. And share&#8230;</strong></p>
<p>There is a better way to document, still use these important models, and share this data. If the above scenario is familiar to you, please give USA Software a call today and at least get a Demo. 1-800-872-1931.</p>
</div><div class="fusion-clearfix"></div></div></div></div></div>
<p>The post <a href="https://threatassessmenttracking.com/2019/12/17/documentation-of-threat-assessments/">Documentation of Threat Assessments</a> appeared first on <a href="https://threatassessmenttracking.com">Behavioral Threat Assessment Software by USA Software</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://threatassessmenttracking.com/2019/12/17/documentation-of-threat-assessments/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Highlights of Behavioral Threat Assessment Software</title>
		<link>https://threatassessmenttracking.com/2019/12/16/were-you-the-one-picked-to-get-info-on-bta-software-well-here-it-is-7-highlights-for-the-team-to-discuss/</link>
					<comments>https://threatassessmenttracking.com/2019/12/16/were-you-the-one-picked-to-get-info-on-bta-software-well-here-it-is-7-highlights-for-the-team-to-discuss/#comments</comments>
		
		<dc:creator><![CDATA[Jan Davenport]]></dc:creator>
		<pubDate>Mon, 16 Dec 2019 19:53:58 +0000</pubDate>
				<category><![CDATA[Campus]]></category>
		<category><![CDATA[K-12]]></category>
		<category><![CDATA[Behavioral Threat Assessment Software]]></category>
		<guid isPermaLink="false">https://threatassessmenttracking.com/?p=876</guid>

					<description><![CDATA[<p>Were you the one picked to get the 411 on available BTA software to bring back to your team? If you were, here are 7 highlights behavioral threat assessment software your team may want to know about: Keeping this kind of information by hand, on paper, is so 1985 and dangerous!! Risk cannot be  [...]</p>
<p>The post <a href="https://threatassessmenttracking.com/2019/12/16/were-you-the-one-picked-to-get-info-on-bta-software-well-here-it-is-7-highlights-for-the-team-to-discuss/">Highlights of Behavioral Threat Assessment Software</a> appeared first on <a href="https://threatassessmenttracking.com">Behavioral Threat Assessment Software by USA Software</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="fusion-fullwidth fullwidth-box fusion-builder-row-4 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling" style="--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;" ><div class="fusion-builder-row fusion-row"><div class="fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last" style="--awb-bg-size:cover;"><div class="fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy"><div class="fusion-text fusion-text-4"><p><span style="font-weight: 400;">Were you the one picked to get the 411 on available BTA software to bring back to your team? If you were, here are 7 highlights behavioral threat assessment software your team may want to know about:</span></p>
<ol>
<li><span style="font-weight: 400;"> Keeping this kind of information by hand, on paper, is so 1985 and dangerous!! Risk cannot be kept in a desk drawer…</span></li>
</ol>
<ol start="2">
<li><span style="font-weight: 400;"> You’re on the behavioral threat assessment team and a teacher. How are you supposed to know what the SRO (police) is doing?  This is the way to communicate effectively. </span></li>
</ol>
<ol start="3">
<li><span style="font-weight: 400;"> This is a browser-based utility, so your team can access </span><i><span style="font-weight: 400;">all</span></i><span style="font-weight: 400;"> information, any time day or night&#8230; from your phone, your laptop, whatever you got, cuz nothin’ ever happens at a convenient time.  You’ll be in the loop, no matter what.</span></li>
</ol>
<ol start="4">
<li><span style="font-weight: 400;"> We got Analytics! Like when the Superintendent calls and says, “BTW, I’m on my way to a board meeting, how many behavioral threat assessments have we done to date?” Yikes, but wait&#8230; you have the answer, pronto! With charts and graphs! </span></li>
</ol>
<ol start="5">
<li><span style="font-weight: 400;"> Early Warnings: How about getting an email every Monday morning listing who has had 4 or more assessments over the past 180 days? Or which schools in your District have had 10 or more assessments in the last week?</span></li>
</ol>
<ol start="6">
<li><span style="font-weight: 400;"> Accountability: We track the team assignments. Who was supposed to call to make sure a student went to anger-management classes? Did they do it?  Was someone on vacation? Who will take the responsibility to follow up?</span></li>
</ol>
<ol start="7">
<li><span style="font-weight: 400;"> Complete Case Management: Dates, times, tasks, interventions, outcomes, pix, pdf docs&#8230;the whole thing. Right there at your fingertips.</span></li>
</ol>
<p>There it is, just hit copy and print. Now, get to your meeting. lol</p>
</div><div class="fusion-clearfix"></div></div></div></div></div>
<p>The post <a href="https://threatassessmenttracking.com/2019/12/16/were-you-the-one-picked-to-get-info-on-bta-software-well-here-it-is-7-highlights-for-the-team-to-discuss/">Highlights of Behavioral Threat Assessment Software</a> appeared first on <a href="https://threatassessmenttracking.com">Behavioral Threat Assessment Software by USA Software</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://threatassessmenttracking.com/2019/12/16/were-you-the-one-picked-to-get-info-on-bta-software-well-here-it-is-7-highlights-for-the-team-to-discuss/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
	</channel>
</rss>
