APATAP 2025 Conference Program

APATAP is delighted to announce the draft program for our 2025 Conference. Please scroll down to see the bios of our presenters, followed by the conference schedule. Please note that the program may be subject to change without notice.

For more information, please email info@apatap.org.au.

Meet the Presenters

  • Stephen Hart

    Workshop: Violence Risk Triage Using the AVRT

  • Gene Deisinger

    Day 1 Keynote: Ethical Equilibrium: Navigating Politics, Pressures, & Professional Standards

  • Emma Shakespeare

    De-escalating Defiance: Police Body-Worn Cameras & Sovereign Citizens

  • Kwek Boon Siang

    “I Tell Him Everything”: Interviewer Qualities & Disclosure

  • Kristian Risti

    Ethical Concerns in Campus Threat Assessment

  • Amanda Thompson

    Mitigating Threats Through Inter-Agency Collaboration

  • C. Joshua Villines

    Building & Sustaining DEI in BTAM Teams

  • Rachael McDermott, Emma Edwards, Kaylene Kilham

    When the Assessor Becomes the Target

  • Nicole Teo

    The Dark Side of Leadership

  • Darren Balsom

    Case Study on Intimate Partner Violence

  • Stephanie Leite

    Ethics Tabletops

  • Karthigan Subramaniam

    Exploring the Ethical Dilemmas of Human-AI Companionships & AI-Enabled Crimes

  • Jaclyn Fox

    The New Insider Threat

  • Halitha Banu

    Digital Echoes During Crisis

  • Lee Hui Min

    Digital Echoes During Crisis

  • Prashant Nayak

    Day 2 Keynote: DESCRIPTION TO BE UPDATED SOON

Workshop Day - Wednesday, 17 September 2025

  • Dr Annabel Chan, President of APATAP will officially open the Workshop Day of the Conference.

  • Violence risk triage is a process to identify, prioritize, and respond to cases in which there are reasonable concerns that someone poses a risk of violence. The Aid for Violence Risk Triage (AVRT) is a tool, based on reviews of practice and legal standards and pilot testing in diverse settings, that helps professionals triage violence risk in a structured and time-effective manner. In this workshop, participants will learn to:

    • Define violence risk triage, differentiating it from the more comprehensive process of violence risk/threat assessment and management

    • Describe the general process of violence risk triage and how it may differ across settings

    • Outline the structure of the Aid for Violence Risk Triage (AVRT)

    • Administer the AVRT, based on the completion of practice cases

    • Communicate findings and opinions based on the AVRT in oral and written reports

  • Item description
  • Item deViolence risk triage is a process to identify, prioritize, and respond to cases in which there are reasonable concerns that someone poses a risk of violence. The Aid for Violence Risk Triage (AVRT) is a tool, based on reviews of practice and legal standards and pilot testing in diverse settings, that helps professionals triage violence risk in a structured and time-effective manner. In this workshop, participants will learn to:

    • Define violence risk triage, differentiating it from the more comprehensive process of violence risk/threat assessment and management

    • Describe the general process of violence risk triage and how it may differ across settings

    • Outline the structure of the Aid for Violence Risk Triage (AVRT)

    • Administer the AVRT, based on the completion of practice cases

    • Communicate findings and opinions based on the AVRT in oral and written reportsscription

  • Item description
  • Violence risk triage is a process to identify, prioritize, and respond to cases in which there are reasonable concerns that someone poses a risk of violence. The Aid for Violence Risk Triage (AVRT) is a tool, based on reviews of practice and legal standards and pilot testing in diverse settings, that helps professionals triage violence risk in a structured and time-effective manner. In this workshop, participants will learn to:

    • Define violence risk triage, differentiating it from the more comprehensive process of violence risk/threat assessment and management

    • Describe the general process of violence risk triage and how it may differ across settings

    • Outline the structure of the Aid for Violence Risk Triage (AVRT)

    • Administer the AVRT, based on the completion of practice cases

    • Communicate findings and opinions based on the AVRT in oral and written reports

  • Item description
  • Violence risk triage is a process to identify, prioritize, and respond to cases in which there are reasonable concerns that someone poses a risk of violence. The Aid for Violence Risk Triage (AVRT) is a tool, based on reviews of practice and legal standards and pilot testing in diverse settings, that helps professionals triage violence risk in a structured and time-effective manner. In this workshop, participants will learn to:

    • Define violence risk triage, differentiating it from the more comprehensive process of violence risk/threat assessment and management

    • Describe the general process of violence risk triage and how it may differ across settings

    • Outline the structure of the Aid for Violence Risk Triage (AVRT)

    • Administer the AVRT, based on the completion of practice cases

    • Communicate findings and opinions based on the AVRT in oral and written reports

  • Dr Annabel Chan, President of APATAP will officially close the Workshop Day of the Conference.

Conference Day 1 - Thursday, 18 September 2025

  • Dr Annabel Chan, President of APATAP will officially open Day 1 of the Conference.

  • In the practice of behavioral threat assessment and management, professionals often face complex and dynamic challenges in addressing and navigating societal politics, organizational pressures, professional standards and ethics, and personal morals. This presentation will discuss and explore some of the key challenge points, and offer perspectives for maintaining ethical equilibrium and professional integrity.

  • Policing agencies across Australia have reported a concerning rise in sovereign citizen encounters. Characterised by conspiracy beliefs and anti-authority sentiment, sovereign citizens are part of a decentralized movement that rejects local, state, and federal laws, often believing that the government itself is illegitimate. Their interactions with law enforcement frequently involve noncompliance, verbal defiance, and, in some cases, escalation to violence—posing a significant operational and officer safety risk.

    This presentation explores whether procedural justice policing can serve as a risk mitigation strategy, reducing the likelihood of sovereign citizen encounters escalating into threats or violence. Utilising over 200 body-worn camera (BWC) videos from the Queensland Police Service (QPS), this research systematically analyses police interactions with sovereign citizens, primarily in road traffic stops. Using a rigorous systematic social observation methodology, this study codes key elements of these interactions, including procedural justice indicators (voice, neutrality, respect, and trust), escalation patterns, and ideological expressions. By identifying behavioral patterns and risk factors, this research assesses whether procedural justice techniques—such as respectful communication and fairness—can de-escalate confrontational encounters and reduce threats to officers.

    Findings from this study will inform frontline policing and threat assessment professionals by identifying early warning signs of sovereign citizen ideology, and offering evidence-based strategies to manage these encounters safely. Additionally, this research contributes to theoretical discussions on applying procedural justice policing to interactions with anti-government movements—an emerging challenge for law enforcement. A secondary outcome is the development of a typology of sovereign citizen behaviors, enhancing risk assessment and intervention strategies for policing and security agencies.

  • Specifically, this presentation will focus on three primary challenges: 1) practical, 2) moral (ethical), and 3) legal. Some practical problems with the use of AI include a hindrance of critical thinking regarding why someone decided to engage in violence, what violence they might choose to engage in the future, and how we might prevent violence from occurring. Output from AI technologies simply tells threat assessors what to think rather than how to think about violence. Ethical problems with the use of AI include the potential for AI to be unfair in some cases, as the algorithm may include consideration of protected statuses (e.g., age, gender, culture, orientation) in risk estimates, possibly even unbeknownst to the operator. Finally, legal problems include the possibility that AI technology may be admissible in court due to the fact that operators can explain how but not why the AI algorithm reaches a final decision, yet defensible decisions require clear reasoning. Because of these challenges, reliance on AI exposes both threat assessment professionals and their clients to potential liability.

  • Sex offenders usually present with low disclosure during interviews in forensic settings due to shame, fear of discrimination and personal safety, or denial of their offences or deviant sexual interests. In turn, the comprehensiveness and accuracy of forensic psychological risk assessments are undermined. This study used a qualitative research method to understand the experiences of adult male incarcerated sex offenders as they undergo a forensic risk and needs assessment interview conducted by correctional professionals to establish its association with their willingness to cooperate and disclose during the interview. Thematic analysis of data from semi-structured interviews with 20 adult male incarcerated sex offenders established numerous themes related to interviewer characteristics, interview setting and extra-interview factors. Policy and practical implications to enhance interviewer practices to facilitate disclosure by sex offenders will be discussed.

  • Monash University’s Safer Community Unit responds to and investigates concerning and threatening behaviour that impacts the safety and wellbeing of students, staff and the broader public. In responding to these concerns, a range of traditional assessment measures and processes are used along with a range of digital tools to monitor, investigate and respond to potential threats. As technology advances, the sources of information available to assess these threats continue to grow and the far-reaching access to personal information continues to push the boundaries of what is ethically right for entities to access in the pursuit of safety.

    Through a review of multiple case studies that include direct threats to the University, political conflicts such as the encampments seen across multiple Universities last year and immediate welfare concerns, we will highlight the various tools which assist SCU in reviewing potential threats, including CCTV and internet search history reviews, Wireless Access Point monitoring on campuses and more.

    In this presentation, we will explore how far the ethical line can be pushed in using information readily available to SCU as threat assessment professionals to maintain the safety of students, staff and the public and further explore the ethical concerns that may arise from the use of these tools.

    In this presentation, I will discuss the nature of community and belief formation and transmission in extremist virtual spaces. In addition, I will explore the nuances regarding "trolling" and the use of humour as a means of transmission, as well as the role of memes and shared communication strategies in online extremist communities. Utilizing an original dataset of extremist group manifestos, I will discuss the findings of a reflexive thematic analysis that explores the relationship between language use in online settings and offline violence. Finally, I will discuss the nature of data collection in the virtual space, the challenges, and practical steps for interpreting this data. The presentation will finish with primary takeaways for practitioners and recommendations for practitioners in multiple spaces (such as law enforcement, threat assessors, and psychologists) on applying the knowledge presented to their fields.

  • The Western Australian Fixated Threat Assessment Centre (WA FTAC) is a joint WA Police/Department of Health unit embedded within the State Security Investigation Group (SSIG), part of WA Police Counter Terrorism and Emergency Response. WA FTAC provides specialist mental health/threat assessment and consultation for individuals who are identified as potentially on a pathway to targeted violence, whether driven by personal grievance, pathological fixation or radicalisation/extremist ideological beliefs, and where conjoint mental health issues are suspected or established. This presentation will provide an overview of the structure and charter of WA FTAC, including a synopsis of current and emerging trends within the broader socio-political context in WA. Three brief case examples will be discussed to demonstrate the operational capabilities of WA FTAC across the three arms of its charter. These will include a fixated individual engaging in threatening communications towards a public office holder, a school-based mass casualty threat, and a young person espousing violent extremist views and suspected of being radicalised online. Each case example will illustrate WA FTAC’s threat assessment and management process from initial identification through to the implementation of risk-mitigation strategies. A central theme across all three cases is the emphasis on inter-agency collaboration in the effective identification and management of risk, which is uniquely afforded by the FTAC model.

    This presentation will cover

    - The development, structure and charter of the WA FTAC, including an overview of common referral subtypes.

    - A brief review of current and emerging trends in the FTAC and security operations/counter-terrorism threat landscape. Broader socio-political issues, such as the enduring impacts of the Covid pandemic and international political events/conflicts (for example the rise of extreme right-wing and anti-Semitic ideologies), and their nexus with FTAC will be discussed.

    - Each case example will highlight the operational capabilities of WAFTAC, showcasing how cases progress from the initial reported threat/concern, threat assessment and management planning process, and the implementation of risk mitigation strategies.

    - Each case example will particularly illustrate the unique utility of the FTAC model in facilitating cross-agency collaboration in the threat assessment and management process.

  • Diversity, Equity, and Inclusion (DEI) – concepts that seem fundamentally positive in academic discourse – are currently facing considerable political backlash in some locales. This creates a particular challenge for BTAM teams because diversity is an unambiguous necessity in the operation of teams that assess and manage potential threats of violence.

    This session opens with an evidence-based review of the essential nature of DEI in behavioral threat assessment, both at the assessment stage and the management stage. That is followed by a summation of the current challenges facing BTAM teams who wish to promote diversity, with specific attention to K-12, university, and government settings in the United States. Finally, the session concludes with practical guidance on implementing and sustaining a DEI-informed approach when: building teams, training teams, conducting assessments, and creating management plans.

    • Research and practices supporting DEI in behavioral threat assessment

    • Legal, political, and community challenges to implementing DEI

    • Priorities and practices for creating diverse BTAM teams

    • Training goals for diverse BTAM teams

    • How does DEI-informed practice change threat assessment?

    • How does DEI-informed practice change threat management?

  • Through multiple case studies we aim to explore the challenges faced by behavioural threat assessors when they become the target of serious threats when working with high-risk individuals. Although these cases may have been technically ‘closed’ years earlier, the professionals involved—both the clinicians and their team—found themselves at the centre of targeted threats, highlighting the long-lasting risks faced by those in the field of behavioural threat assessment.

    These cases offer an experience of the vulnerabilities inherent  in the field of threat assessment, emphasising the importance of proactive safety planning and robust institutional support for professionals exposed to personal threats as a result of their work. They also highlight the complications that arise when an institution fails to adequately respond to the unique risks that impact these teams.

    These reflections aim to explore both the psychological and procedural responses required to safeguard the clinician and the team, the impact of the threat on the professional environment, and the changes needed to enhance safety protocols for behavioural threat assessors. In acknowledging ‘what went wrong’ and reflecting on the challenges within these case studies, our goal is to apply the lessons learned to refine and enhance threat assessment practices, ultimately creating a safer and more resilient system.

    In conclusion, this collection advocates for a comprehensive, trauma-informed approach to both threat prevention and response, ensuring the safety and well-being of individuals in high-risk threat assessment roles, and promoting a more adaptive and responsive professional environment.

  • Dr Annabel Chan, President of APATAP will officially close Day 1 of the Conference.

Conference Day 2 - Fr 19 September 2025

  • Dr Annabel Chan, President of APATAP will officially open Day 2 of the Conference.

  • Since the beginning of time, leaders have been prevalent in a variety of situations. Every organisation is dependent on its leaders to progress and achieve its goals. However, the organisation would suffer negative consequences when leaders derail. Hence, to combat these negative consequences, it is important to understand why leaders would exhibit derailing behaviours. This paper seeks to address the research question of what factors contribute to leadership derailment in high stress environments. The research method adopted an interpretative phenomenological approach, which explored the contributing factors through the sensemaking of leaders’ sharings on their perspectives and experiences with leadership derailment in high stress environments. Four main constructs were deductively derived from literature review. Qualitative interviews were conducted with 99 senior leaders from a local government agency. Data analysis of the completed responses from 47 participants yielded individual level factors as the primary contributor to leadership derailment in high stress environments, with the key factors of lack of self-awareness and cognitive inflexibility. Work-related factors highlighted the lack of job-fit and lack of training before postings. Organisational factors featured the lack of clarity on leadership and lack of opportunity for failure. Departmental level factors underlined the lack of psychological safety. The construct of protective factors was inductively derived, and stressed the importance of the presence of psychological safety. Implications and recommendations of the research to tackle leadership derailment in high stress environments would also be discussed.

    Today we will discuss how current systems can not only fail to protect neurodivergent queer people, but can in fact put them at greater risk of harm. We will explore ways to make risk assessment accessible and affirming, and apply an intersectional lens to safety planning.

    Presented by Emerson Osterberg, who brings a wealth of clinical expertise along with their lived-experience as neurodivergent and trans, this session will test your assumptions about what safety can look like, equipping you with greater skills and knowledge to support this made-vulnerable population.

  • Darren Balsom will present a comprehensive case study on intimate partner violence involving foreign nationals. The study aims to thoroughly examine various factors contributing to the vulnerability of the victim, the intricate dynamics of offender behavior, and the manifold complexities encountered in managing offenders while ensuring the provision of comprehensive support to the victims.

    Additionally, the case study will delve into best practices for supporting victims, considering cultural sensitivities and legal frameworks that differ across jurisdictions. Emphasis will be placed on the importance of fostering resilience and empowerment among victims, as well as advocating for policy changes to enhance protective measures and services available to them.

  • You find yourself frozen, unable to act. The problem is not the employee or student that has made a threat, but you – should you act? How invasive can you be? My friend, you are facing the most diabolical aspect of threat assessment – an ethical dilemma. This session will be a loud, rollicking, and laughter filled good time as we sit together with our peers and work through a series of tabletop exercises focused on the ethical quandaries we all face. You will gain both concrete answers and learn strategies for processing the situations in your future.

  • As Artificial Intelligence (AI) increasingly integrates into our daily lives, its implications for criminality—particularly concerning murder and suicide—necessitate critical examination. This presentation will explore AI’s dual role as both an enabler of criminal acts and a potential tool for prevention and intervention.

    We will begin by analyzing case studies illustrating how AI technologies, such as autonomous systems and deepfake applications, have been used to facilitate serious crimes, including murder. In parallel, we will investigate AI's capacity to identify risk factors for suicidal behavior, emphasizing the role of machine learning algorithms in predicting suicidal ideation and guiding timely interventions.

    A significant focus will be placed on the ethical considerations surrounding the deployment of AI in these contexts. We will discuss issues such as algorithmic bias, privacy concerns, and the potential for misuse by law enforcement. The presentation will highlight the moral responsibilities of developers, policymakers, and practitioners in ensuring that AI systems promote justice and public safety without infringing on individual rights.

    Finally, we will propose a collaborative framework that brings together technologists, law enforcement, mental health professionals, and ethicists to address these challenges. By fostering a multidisciplinary dialogue, we aim to develop proactive strategies that mitigate the risks associated with AI-driven criminality while harnessing its potential for positive social impact. This comprehensive approach will enhance our understanding of AI’s role in society and inform effective policy responses.

    In recent years, the rapid advancement of artificial intelligence (AI) has sparked intense debate over its ethical implications and potential for misuse. The presentation explores the multifaceted ethical challenges posed by AI technologies. It examines the intersection of AI with criminal behaviour and how it may contribute to harmful outcomes, both intentionally and unintentionally. The presentation aims to foster a nuanced understanding of AI’s dual potential for benefit and harm, while addressing the responsibilities of policymakers, technology developers, and society at large in mitigating risks associated with AI systems.

  • From FBI agent Robert Hanssen’s espionage for Moscow, to mass leakers like Edward Snowden and Chelsea Manning, the shape of insider threat is evolving. Much has been written about how new technologies allow individuals to publicize classified information without the involvement of a third party; however, there is a less discussed aspect of evolving insider threat. The commercial availability of mass amounts of personal data can now be used to target individuals most likely to engage in actions against their organization. The current paper explores this new threat landscape. Specifically, I analyze commercially available data in light of the literature on insider threat, showcasing how an external actor can target individuals with specific vulnerabilities or propensities for engaging in acts against their organization. This includes targeting those high in psychological traits such as narcissism, psychosocial attributes like difficulties with anger management or substance abuse, and recent life stressors such as divorce or financial downturns. Through this paper, I illustrate that it is possible for an external actor to build a cohort of individuals with psychosocial predispositions and recent life stressors that make them vulnerable to engaging in insider threat. Cross-referenced with available data on military status or employment in other government organizations, this may allow external actors to target individuals with classified access who are most likely to engage in actions against the state. Finally, I show how this data points not only to who should be targeted (i.e., vulnerable individuals) but how, with data segments delivering insight into individuals’ unique motivations and desires. Ultimately, this analysis seeks to map the evolving landscape of commercially available data in order to inform relevant parties of its potential use for insider threat.

  • In an increasingly interconnected world, social media platforms serve as a barometer for public sentiment, especially during crises. This study leverages Natural Language Processing (NLP) and Machine Learning (ML) techniques to analyse social media content, focusing on recent safety and security threats (e.g., 2024 Southport Stabbing). To enhance the granularity of our analysis, we apply a combination of Topic Modelling and Generative AI to the extracted data, identifying distinct profiles of online responses. These profiles provide a nuanced understanding of public sentiment, highlighting variations in reactions based on cultural, geographical, and psychological factors.

    The findings from this research offer practical implications for crisis management and public safety. By understanding the spectrum of online reactions, policymakers and crisis managers can better anticipate and manage public responses during emergencies. Additionally, this study sheds light on the psychological impact of global events on online users, emphasising the ripple effects of crises across borders. This study underscores the importance of integrating technological tools in understanding human behaviour during critical events. It also provides a framework for proactive crisis communication strategies, fostering resilience and preparedness in an era where crises transcend geographical boundaries.

  • Dr Annabel Chan, President of APATAP will officially close Day 2 of the Conference.