Evolution of Mass Murder:

From the Texas Tower Shooting to ISIS

Conference: May 23–24, 2016
Texas A&M University, College Station, Texas

View Agenda


Cancellation/Refund Policy

Register Here   

Conference Hotel Reservations

Courtyard Marriott College Station – 3939 Highway 6 South  College Station, Texas
A limited number of discounted rooms are being offered for conference attendees until April 20, 2016. The group rate can not be guaranteed after this time.
$ 114 Single & Double Occupancy
Refer to "Psych. Conference" when making a reservation.

Conference Location

The conference will be held at the Memorial Student Center (MSC), Robert M. Gates Ballroom, Room 2400, located on the campus of Texas A&M University in College Station, Texas

Travel/Parking at the Conference

CEUs:  Continuing Education Credit & Professional Development Hours

Grievance Procedure

Grievances about the conference must be submitted in writing to:

Texas A&M University Office of Continuing Education
Attn: Program Coordinator
MS 1245
College Station, TX 77843-1245

Attendance Requirements

To receive credit, you must be present for the entire conference. You are required to sign in at the beginning of the conference. Those arriving more than 15 minutes after the scheduled start time or leaving before the conference is completed will not receive CE credits. All attendees must complete a Program Evaluation to receive their CE certificate.

Conference Objectives   View Agenda

Monday's Objectives, attendees will:

  1. Learn the five major characteristics of the Mission Oriented Shooter.
  2. Learn at least two distinctions between Injustice Collector and Dangerous Injustice Collector.
  3. Learn the biopsychosocial model of assessment within a threat assessment context.
  4. Learn the phases of development for a mass shooter.
  5. Be able to explain "radicalization" process within a threat assessment context.

Tuesday's Objectives, attendees will:

  1. Learn eight warning behaviors that  immediately precede targeted violence by individual terrorists which demand active risk management.
  2. Learn the ten risk characteristics for monitoring of individuals of concern for terrorist acts.
  3. Learn the theory and rationale for the Terrorist Radicalization Assessment Protocol
  4. Learn all of the findings from the current research on the Terrorist Radicalization Assessment Protocol.
  5. See how the Terrorist Radicalization Assessment Protocol is applied to individual cases, both jihadist and extreme right wing ideologies.

 back to top of page