WEBVTT Kind: captions Language: en 00:00:10.234 --> 00:00:13.384 Hello and welcome to a webinar on the targeted. 00:00:13.384 --> 00:00:16.604 violence and terrorism Prevention grant program fiscal year. 00:00:16.604 --> 00:00:19.924 2022. Notice of funding opportunity. 00:00:23.754 --> 00:00:26.944 My name's David O'Leary. I'm an associate director in the center. 00:00:26.944 --> 00:00:30.144 for Prevention Programs and Partnership who jointly. 00:00:30.144 --> 00:00:33.364 run this program with FEMA, the Federal Emergency. 00:00:33.364 --> 00:00:34.344 Management Agency. 00:00:41.164 --> 00:00:44.574 The vision and mission of the Center for Prevention programs. 00:00:44.574 --> 00:00:48.284 and Partnerships is to seek a resilient America where communities. 00:00:49.544 --> 00:00:53.554 Our united to help end targeted violence and terrorism our. 00:00:53.554 --> 00:00:56.774 mission is to work with the whole of society. 00:00:56.774 --> 00:00:59.854 to build local prevention frameworks, and we'll talk about some. 00:00:59.854 --> 00:01:02.834 of these definitions. Some of these terms and definitions soon. 00:01:04.334 --> 00:01:07.664 We accomplished this through the grant program by funding. 00:01:07.664 --> 00:01:10.734 programs with a public health approach, which focuses on the. 00:01:10.734 --> 00:01:14.054 health and well being of individuals and their communities. It's. 00:01:14.054 --> 00:01:16.404 multidisciplinary and it's backed up by evidence. 00:01:28.544 --> 00:01:31.574 This year, in 2022, Congress provided. 00:01:31.574 --> 00:01:34.634 $20 million for award that. 00:01:34.634 --> 00:01:38.154 we will administer this program in two application tracks. 00:01:38.154 --> 00:01:41.214 A promising practices track where there are 8. 00:01:41.214 --> 00:01:44.434 ght project types where applicants can apply to do 1. 00:01:44.434 --> 00:01:46.064 e or more of those project types. 00:01:46.884 --> 00:01:50.134 Or an innovation track where we're looking. 00:01:50.134 --> 00:01:53.654 to try innovative ideas with robust evaluation. 00:01:53.654 --> 00:01:55.834 to ensure that we can take a. 00:01:57.474 --> 00:02:00.484 Identify promising practices from innovative programs. 00:02:02.624 --> 00:02:05.874 This year, applications are due on May 16th on. 00:02:05.874 --> 00:02:09.404 Monday at 5:00 PM. 00:02:09.404 --> 00:02:12.734 That'll be roughly a little bit more than 30 days. 00:02:12.734 --> 00:02:14.094 to apply. 00:02:14.614 --> 00:02:17.824 And we hope that people start their applications. 00:02:17.824 --> 00:02:18.814 as soon as possible. 00:02:22.914 --> 00:02:25.524 We expect the awards to be announced in September. 00:02:27.924 --> 00:02:31.314 This year for the grant program, we've selected 5 priorities. 00:02:31.314 --> 00:02:34.634 that help that we hope applicants will consider. 00:02:34.634 --> 00:02:36.484 when they develop their applications. 00:02:37.394 --> 00:02:40.424 They are implementing prevention capabilities and small and mid. 00:02:40.424 --> 00:02:41.534 sized communities. 00:02:42.524 --> 00:02:45.774 Advancing equity and awards and engaging underserved communities. 00:02:45.774 --> 00:02:46.494 and prevention. 00:02:48.614 --> 00:02:51.844 Addressing online aspects of terrorism and targeted violence. 00:02:53.024 --> 00:02:56.034 Preventing domestic violent extremism and enhancing local. 00:02:56.034 --> 00:02:58.314 threat assessment and management capabilities. 00:03:00.514 --> 00:03:03.864 The eligible applicants for this program are. 00:03:03.864 --> 00:03:07.184 local governments, Indian tribal governments. 00:03:07.184 --> 00:03:09.404 state and territorial governments. 00:03:10.214 --> 00:03:14.234 And that includes not just the main. 00:03:15.324 --> 00:03:18.534 The executive branch of the jurisdiction, but. 00:03:18.534 --> 00:03:22.254 any agency or school. 00:03:22.254 --> 00:03:25.654 or department of those governments. 00:03:25.654 --> 00:03:27.514 is eligible to apply to this program. 00:03:28.934 --> 00:03:32.104 Also eligible, or nonprofits with five. 00:03:32.104 --> 00:03:35.524 status and in accredited. 00:03:35.524 --> 00:03:39.104 institutions of higher education. Importantly. 00:03:39.104 --> 00:03:42.064 this program is for us based entities. 00:03:42.784 --> 00:03:45.374 Conducting projects in the United States. 00:03:52.774 --> 00:03:56.164 This year, we're specifically highlighting the way our center. 00:03:56.164 --> 00:03:59.514 has implemented a. 00:03:59.514 --> 00:04:02.604 philosophy of a public health approach to violence. 00:04:02.604 --> 00:04:06.204 prevention, and we are looking for. 00:04:06.204 --> 00:04:09.584 a lot of these elements to be seen in our applications. 00:04:09.584 --> 00:04:12.884 So why do we use a public health approach to violence? 00:04:12.884 --> 00:04:15.924 prevention? Because it aims to protect the health safety. 00:04:15.924 --> 00:04:17.224 and well being of everyone. 00:04:17.774 --> 00:04:20.844 It brings together multidisciplinary experts and it lists. 00:04:20.844 --> 00:04:23.864 its input from a diverse range of stakeholders and it's. 00:04:23.864 --> 00:04:25.124 backed up by evidence. 00:04:27.364 --> 00:04:30.524 When I think of a public health approach, I like to think of an example. 00:04:30.524 --> 00:04:33.574 of the late 90s and early 2000s. 00:04:33.574 --> 00:04:36.794 anti youth tobacco campaigns the most. 00:04:36.794 --> 00:04:40.284 the one that stands out the most to me is the truth campaign. 00:04:41.504 --> 00:04:44.754 Which was a media campaign to encourage. 00:04:44.754 --> 00:04:47.854 kids not to smoke or use tobacco products, but. 00:04:47.854 --> 00:04:51.094 it also elicited peers. 00:04:51.094 --> 00:04:54.544 to pressure their peers. So in addition. 00:04:54.544 --> 00:04:57.754 to it made it uncool and it made. 00:04:57.754 --> 00:05:00.854 it so that peers would. 00:05:00.854 --> 00:05:04.214 potentially intervene. I remember myself as a team. 00:05:04.214 --> 00:05:07.294 having a friend come up to. 00:05:07.294 --> 00:05:10.294 me and say, oh, you smell like cigarettes. I don't hang out with people who smoke. 00:05:10.394 --> 00:05:12.214 And I didn't really smoke after that. 00:05:13.124 --> 00:05:16.514 But in addition to a public campaign like that. 00:05:16.514 --> 00:05:19.814 and peer pressure and in engaging peers. 00:05:19.814 --> 00:05:23.194 in other parts of the community, there was also policy changes. 00:05:23.194 --> 00:05:26.704 that encouraged more stings that convenience stores there. 00:05:26.704 --> 00:05:30.054 was programs to prohibit teens from. 00:05:30.054 --> 00:05:32.814 playing school sports if they were caught with tobacco products. 00:05:33.334 --> 00:05:36.384 UM, there were changes in. 00:05:36.384 --> 00:05:39.804 UM, ID laws and things like that. So you really. 00:05:39.804 --> 00:05:43.584 full court press from all elements of society. 00:05:43.584 --> 00:05:47.084 is what's needed to have a successful public health. 00:05:47.244 --> 00:05:48.954 A program. 00:05:51.944 --> 00:05:55.894 Right, just some definitions quickly when? 00:05:55.894 --> 00:05:59.284 we talk about targeted violence, it's essentially an umbrella. 00:05:59.284 --> 00:06:02.514 term. The definitions a little bulky. 00:06:02.514 --> 00:06:06.424 it refers to any intentional act against a pre identified target. 00:06:07.504 --> 00:06:10.854 On that, targets perceived identity or affiliation that is intended. 00:06:10.854 --> 00:06:13.974 to intimidate or coerce or generate publicity. 00:06:13.974 --> 00:06:15.774 about a perpetrators grievance. 00:06:17.784 --> 00:06:19.494 So for example. 00:06:24.694 --> 00:06:25.214 UM. 00:06:29.114 --> 00:06:32.254 You may not know the. 00:06:32.254 --> 00:06:35.364 individual may not have a specific ideology that they. 00:06:39.154 --> 00:06:42.344 Sometimes we think of these as workplace or. 00:06:42.344 --> 00:06:45.364 school shootings. We can think of it as. 00:06:45.484 --> 00:06:48.594 Attacks. 00:06:48.594 --> 00:06:51.614 on houses of worship, depending. 00:06:51.614 --> 00:06:54.634 on the individual's grievance, it may not. 00:06:54.634 --> 00:06:58.614 be some larger ideology or organized. 00:06:58.614 --> 00:07:01.714 terrorist group. It may be an individual who for. 00:07:01.714 --> 00:07:03.954 whatever reason, is targeting. 00:07:04.194 --> 00:07:08.004 It's. 00:07:08.864 --> 00:07:13.034 Person group of people because of their perceived identity. Terrorism. 00:07:13.034 --> 00:07:16.364 is part of targeted violence and it refers. 00:07:16.364 --> 00:07:19.874 to violence committed in the name of an ideology to further a political. 00:07:19.874 --> 00:07:20.934 or social agenda. 00:07:21.654 --> 00:07:24.864 We have foreign terrorist organizations like. 00:07:24.864 --> 00:07:28.274 Al Qaeda and ISIS. We have domestic terrorist movements. 00:07:28.834 --> 00:07:32.094 UM like anti government? 00:07:33.594 --> 00:07:37.204 Conspiracy theory based movements. Militia, violent. 00:07:37.204 --> 00:07:40.384 xtremist movements, so we do have quite. 00:07:40.384 --> 00:07:43.564 a lot of different types of ideologies that. 00:07:43.564 --> 00:07:46.834 can impact that can cause violence in. 00:07:46.834 --> 00:07:50.324 the United States and from foreign organizations. 00:07:50.324 --> 00:07:53.484 It's very important to note that in the United States, the. 00:07:53.484 --> 00:07:56.504 ideology, regardless of the cause that supports. 00:07:56.504 --> 00:07:59.744 is protected. But the force or violence on its behalf. 00:07:59.744 --> 00:08:02.684 is not. So we're really focused in this program. 00:08:02.754 --> 00:08:06.354 On violence and not the ideology or ideas. 00:08:11.244 --> 00:08:14.394 Radicalization of mobilization of violence. So. 00:08:14.394 --> 00:08:17.674 radicalization of violence is the process whereby an individual. 00:08:17.674 --> 00:08:21.094 comes to believe that the threat of violence or use of unlawful. 00:08:21.094 --> 00:08:24.314 violence is necessary or even justified to accomplish a goal. 00:08:24.314 --> 00:08:27.414 This isn't always a linear process. 00:08:28.494 --> 00:08:31.894 And it can take many months or years. 00:08:31.894 --> 00:08:35.024 and people can become more. 00:08:35.024 --> 00:08:36.364 or less radicalized. 00:08:40.774 --> 00:08:43.904 Mobilization of violence is the process by which. 00:08:43.904 --> 00:08:47.124 individuals take action to prepare for or. 00:08:47.124 --> 00:08:50.854 engage in violence or material support of violence to advance their cause. 00:08:52.134 --> 00:08:55.724 These are important because they're at various points depending. 00:08:55.724 --> 00:08:59.144 on where an individual might be will determine what the. 00:08:59.144 --> 00:09:02.354 correct course of action would be to protect the. 00:09:02.354 --> 00:09:03.584 individual on the community. 00:09:08.334 --> 00:09:11.234 This is an illustration to try to identify. 00:09:12.634 --> 00:09:16.014 How prevention works in the case of radicalization. 00:09:17.414 --> 00:09:20.884 You can picture it radicalization or that radicalization. 00:09:20.884 --> 00:09:23.924 of violence as the process of falling off. 00:09:23.924 --> 00:09:24.494 a Cliff. 00:09:26.334 --> 00:09:28.074 And so to prevent that. 00:09:29.614 --> 00:09:32.904 The first thing you can do is put the fence up so that people. 00:09:32.904 --> 00:09:34.664 it's harder to fall off the Cliff. 00:09:35.344 --> 00:09:38.414 And that's primary prevention includes things. 00:09:38.414 --> 00:09:41.604 like raising awareness and other. 00:09:41.604 --> 00:09:45.064 job programs, resilience programs. 00:09:45.064 --> 00:09:48.264 training and education, things that increase protective and risk. 00:09:52.014 --> 00:09:55.204 If that fence is broken, or if that community. 00:09:55.204 --> 00:09:58.664 never had a fence, we wanna look at secondary. 00:09:58.664 --> 00:10:01.684 prevention topics. So when somebody has already on. 00:10:01.684 --> 00:10:04.904 that path to radicalization, we can potentially. 00:10:04.904 --> 00:10:05.434 catch them. 00:10:06.574 --> 00:10:09.784 And provide the right interventions and the right. 00:10:09.784 --> 00:10:12.904 services to take them off that path. 00:10:12.904 --> 00:10:16.084 and that can include referral. 00:10:16.084 --> 00:10:19.164 services, interventions, bystander interventions. 00:10:19.164 --> 00:10:22.664 as well as formal threat assessment and management interventions. 00:10:24.044 --> 00:10:27.054 But next we have tertiary prevention. 00:10:27.054 --> 00:10:30.454 This is to prevent recidivism by those who have. 00:10:30.454 --> 00:10:33.974 planned to or committed acts of targeted violence or terrorism it. 00:10:33.974 --> 00:10:37.494 can also be a place to institute. 00:10:37.494 --> 00:10:41.074 programs where things may be escalating. 00:10:41.074 --> 00:10:44.134 to violence. For example racist graffiti. 00:10:44.134 --> 00:10:47.314 on a Community Center. You might. That individual might. 00:10:47.314 --> 00:10:50.484 get caught, and we may want to punish them for that. 00:10:50.484 --> 00:10:53.994 we also want to consider that we don't want to enhance. 00:10:53.994 --> 00:10:55.354 the grievance with the punishment. 00:10:55.694 --> 00:10:59.014 And so we wanna make sure that individual is supported. 00:10:59.014 --> 00:11:02.024 and is deescalated from violence. 00:11:02.024 --> 00:11:05.104 and doesn't escalate or if it was a violent act. 00:11:05.104 --> 00:11:05.924 to begin with. 00:11:06.214 --> 00:11:09.424 To ensure that. 00:11:09.424 --> 00:11:12.804 they don't. 00:11:13.484 --> 00:11:14.684 Have read any recidivism. 00:11:18.264 --> 00:11:20.714 So thinking about those. 00:11:22.104 --> 00:11:25.254 How those different phases fit into building projects? 00:11:25.254 --> 00:11:26.584 in your communities? 00:11:28.124 --> 00:11:31.574 We are looking to build local prevention frameworks which includes. 00:11:31.574 --> 00:11:34.734 this area and the blue as well as this area in the in. 00:11:34.734 --> 00:11:36.754 en so. 00:11:36.834 --> 00:11:37.324 Umm. 00:11:39.664 --> 00:11:41.034 For many years. 00:11:42.864 --> 00:11:45.914 DHS and the federal government, state and local governments. 00:11:45.914 --> 00:11:49.194 have relied on intelligence. 00:11:49.194 --> 00:11:52.774 and law enforcement to stop terrorist attacks. 00:11:52.774 --> 00:11:56.154 or targeted violence. And. 00:11:56.154 --> 00:11:59.614 the issue is that sometimes there aren't any signals. 00:11:59.614 --> 00:12:02.814 in communities to identify that. 00:12:02.814 --> 00:12:05.914 beforehand, and so part of prevention is to make sure we. 00:12:05.914 --> 00:12:08.974 have the program such that people are less likely to do it and also. 00:12:08.974 --> 00:12:12.754 we can pick up on those signals. So we'll be talking about some of the risk factors. 00:12:12.834 --> 00:12:16.524 And behavioral indicators as protective factors. 00:12:16.524 --> 00:12:19.744 in the next few slides, but think. 00:12:19.744 --> 00:12:22.954 about the types of projects that we want to fit in and how they might. 00:12:22.954 --> 00:12:25.894 fit into the timeline of things. So we have. 00:12:26.384 --> 00:12:29.524 A local prevention framework and some of the projects. 00:12:29.524 --> 00:12:32.644 that we fund and I'll show that on the next slide trust building. 00:12:32.644 --> 00:12:35.664 engagement Awareness building intervention. 00:12:36.944 --> 00:12:40.054 These are all things that can be part of a. 00:12:40.054 --> 00:12:43.094 part of a community LED. 00:12:43.094 --> 00:12:44.174 effort, such that. 00:12:45.034 --> 00:12:48.274 Individuals never get to the point where they've committed a crime. 00:12:48.274 --> 00:12:51.864 and we need to bring in law enforcement or prosecutors. 00:12:51.864 --> 00:12:54.524 in this era investigation arrest. So. 00:12:54.934 --> 00:12:58.244 Sometimes things get reported. 00:12:58.244 --> 00:13:01.544 to law enforcement and it is it doesn't rise to the level of any. 00:13:01.544 --> 00:13:04.804 of anything that they can prosecute or charge an. 00:13:04.804 --> 00:13:08.034 individual with. And in that case you want to be your. 00:13:08.034 --> 00:13:11.104 program to be in touch with law enforcement so that they could refer some of those. 00:13:11.104 --> 00:13:14.424 cases to you, to a community. 00:13:14.424 --> 00:13:17.664 based intervention program or resilience. 00:13:17.664 --> 00:13:20.784 building program. On the other side of this. 00:13:20.784 --> 00:13:24.024 as individuals are caught arrested. 00:13:24.024 --> 00:13:26.464 or prosecuted or given some sort of diversion. 00:13:26.994 --> 00:13:30.024 We want to ensure again that we have programs in place. 00:13:30.024 --> 00:13:31.704 to stop recidivism. 00:13:35.024 --> 00:13:38.304 So those that kind of those images? 00:13:38.304 --> 00:13:39.724 show the same. 00:13:41.064 --> 00:13:44.174 So these I'm sorry these project types are oriented in the same. 00:13:44.174 --> 00:13:45.704 way that those previous images. 00:13:46.964 --> 00:13:50.114 So these first four project types are all. 00:13:50.114 --> 00:13:53.294 about early prevention, youth resilient civic engagement. 00:13:53.294 --> 00:13:56.614 media literacy and critical thinking initiatives and. 00:13:56.614 --> 00:13:59.794 nd raising societal awareness. We get to the secondary. 00:13:59.794 --> 00:14:03.074 prevention here with threat assessment and management teams, bystander. 00:14:03.074 --> 00:14:06.374 training and referral services, and then tertiary. 00:14:06.374 --> 00:14:09.634 prevention with recidivism reduction, reintegration. So. 00:14:09.634 --> 00:14:12.894 these are the 8 project types that applicants can apply. 00:14:12.894 --> 00:14:15.344 in the promising practices track. 00:14:17.164 --> 00:14:20.204 You can apply for one or more of them and. 00:14:20.204 --> 00:14:23.734 we're looking for projects based on the type to fit somewhere. 00:14:23.734 --> 00:14:27.234 roughly in the target funding amount if you deviate. 00:14:27.234 --> 00:14:30.274 significantly from that target funding amount we're looking for. 00:14:30.274 --> 00:14:35.254 a specific justification for that deviation in the application, so. 00:14:35.694 --> 00:14:38.804 You wanna make sure that? 00:14:40.514 --> 00:14:43.584 That you add up the types of categories. 00:14:43.584 --> 00:14:46.724 and you're in your accounting for which types of projects, so. 00:14:46.724 --> 00:14:49.864 you can select to apply for one of these project types. 00:14:49.864 --> 00:14:52.884 or more. So for example, if you applied for. 00:14:52.884 --> 00:14:56.114 this first project type and the third. 00:14:56.114 --> 00:14:59.204 d 5th, that would be a total of. 00:14:59.204 --> 00:15:02.454 500,000 in target funding if. 00:15:02.454 --> 00:15:04.014 you were doing those three projects. 00:15:05.374 --> 00:15:08.394 We also have an innovation track. We reserve about 25. 00:15:11.224 --> 00:15:14.354 For innovation programs as a result. 00:15:14.354 --> 00:15:17.934 that track is very competitive and. 00:15:17.934 --> 00:15:21.014 so we encourage you if you have a project that fits in one of. 00:15:21.014 --> 00:15:23.774 the promising practices types that you apply in that track. 00:15:25.084 --> 00:15:28.114 But we also really want to hear and. 00:15:28.114 --> 00:15:31.174 see your innovative ideas. So if you have a. 00:15:31.174 --> 00:15:34.414 project that doesn't fit in those or is working with a new. 00:15:34.414 --> 00:15:37.894 target population or maybe taking. 00:15:37.894 --> 00:15:41.034 a significant departure from some of these types we. 00:15:41.034 --> 00:15:44.574 want to hear it. Some of the best ideas we've had, they. 00:15:44.574 --> 00:15:47.754 do, they don't come out of Washington DC or inside the Beltway. 00:15:47.754 --> 00:15:50.114 They come from around the country. 00:15:51.294 --> 00:15:54.324 So please do think about those and we'd love to have. 00:15:54.324 --> 00:15:55.204 those submissions. 00:15:57.274 --> 00:16:00.564 A little bit more information. In our last fiscal. 00:16:00.564 --> 00:16:04.264 year, the average award was approximately 540,000. 00:16:04.974 --> 00:16:07.984 So a number, a lot of them were. 00:16:07.984 --> 00:16:11.084 applying for multiple project types or were putting in funding. 00:16:11.084 --> 00:16:13.494 You're the high end of the innovation track. 00:16:16.874 --> 00:16:19.884 We are looking for projects to run for 24 months. That's the period. 00:16:19.884 --> 00:16:23.254 of performance. There's very limited ability to. 00:16:23.254 --> 00:16:24.874 have no cost extensions. 00:16:25.314 --> 00:16:28.404 So we expect to have. 00:16:28.404 --> 00:16:31.814 some type projects schedules built into the program. 00:16:33.654 --> 00:16:36.844 The projects will start in October of this year and. 00:16:36.844 --> 00:16:39.244 run through the end of fiscal year 2024. 00:16:41.614 --> 00:16:45.404 All right. I just want to go into a little bit more details about prevention. 00:16:45.404 --> 00:16:48.664 and how you can develop. 00:16:48.664 --> 00:16:52.424 a program and some of the elements that you might need so. 00:16:52.424 --> 00:16:55.624 when we talk about whole of society engagement. 00:16:55.624 --> 00:16:58.854 like this is a departure from whole of government, really we're looking. 00:16:58.854 --> 00:16:59.594 at government. 00:17:00.274 --> 00:17:03.464 In some cases, but really we're looking. 00:17:03.464 --> 00:17:07.084 for nonprofit community organizations. 00:17:07.084 --> 00:17:10.464 faith based advocacy organizations, schools. 00:17:10.464 --> 00:17:13.824 and education, technology, health, and well being all. 00:17:13.824 --> 00:17:15.764 of these part all of these elements. 00:17:19.034 --> 00:17:19.564 Umm. 00:17:20.584 --> 00:17:24.054 Of society or needed to. 00:17:24.054 --> 00:17:27.634 have an impact on prevention. You can think of. 00:17:28.994 --> 00:17:32.674 You can think of how you could do some really good work in schools. 00:17:32.674 --> 00:17:36.244 and then there's a change in law that's. 00:17:36.244 --> 00:17:39.754 controversial and destroys a lot of the trust building that was done in the schools. 00:17:39.754 --> 00:17:41.774 Or you could have. 00:17:41.924 --> 00:17:45.124 An incident in a violent. 00:17:45.124 --> 00:17:48.574 incident in town or something controversial. 00:17:48.574 --> 00:17:51.944 happen that can really, if you're not connected. 00:17:51.944 --> 00:17:54.964 to all these elements of society, it's the work you're doing. 00:17:54.964 --> 00:17:58.064 in one place can be negated. 00:17:58.064 --> 00:18:00.144 by something that's happening in a different sector. 00:18:02.304 --> 00:18:05.934 So I want the next couple slides go over some core elements of our program. 00:18:07.394 --> 00:18:10.634 The first is our commitment to protection of civil rights and civil liberties. 00:18:11.344 --> 00:18:14.534 In part, building prevention programs relies. 00:18:14.534 --> 00:18:17.594 on trust in bringing all those elements of society. 00:18:17.594 --> 00:18:20.814 together and also by reinforcing our core values. 00:18:20.814 --> 00:18:23.904 as a nation. So we want. 00:18:23.904 --> 00:18:26.954 to be very clear that programs and projects funded under this. 00:18:26.954 --> 00:18:30.914 opportunity do not chill. 00:18:30.914 --> 00:18:34.134 the rights of individuals to speak freely or to peacefully. 00:18:34.134 --> 00:18:37.254 protest, and we want to make clear that. 00:18:37.254 --> 00:18:40.434 projects funded under this cannot profile or target or. 00:18:40.434 --> 00:18:42.164 discriminate against individuals. 00:18:43.114 --> 00:18:46.234 Based on any protected classes. 00:18:46.234 --> 00:18:49.724 or on exercising their constitutional. 00:18:49.724 --> 00:18:50.204 rights. 00:18:51.104 --> 00:18:51.504 Umm. 00:18:54.934 --> 00:18:58.564 And so we want to ensure that any type of work in prevention. 00:18:58.564 --> 00:19:00.074 does not. 00:19:00.154 --> 00:19:03.284 Does not. It's not based on people's. 00:19:03.284 --> 00:19:04.244 speech. 00:19:06.164 --> 00:19:09.274 Also important to this are the protections. 00:19:09.274 --> 00:19:12.914 of individuals who participate in the programs of their personal privacy. 00:19:13.894 --> 00:19:16.924 Our grant program prohibits recipients from providing. 00:19:16.924 --> 00:19:19.944 the personally identifiable information. 00:19:19.944 --> 00:19:23.474 of individuals participating in the grant program. 00:19:23.474 --> 00:19:26.804 So, for example, if you apply for a threat assessment. 00:19:26.804 --> 00:19:30.124 and management project and you intake. 00:19:30.124 --> 00:19:33.794 a case, you are not allowed to provide that persons name. 00:19:33.794 --> 00:19:36.864 or date of birth, Social Security number, phone, email address, or. 00:19:36.864 --> 00:19:40.354 any other identifying information to DHS. 00:19:41.214 --> 00:19:44.244 In part, DHS does not have the authority to. 00:19:44.244 --> 00:19:47.824 use it, and so we would have to destroy it, but also. 00:19:47.824 --> 00:19:51.204 we want to ensure that participating in a prevention program. 00:19:51.204 --> 00:19:54.264 is voluntary and does not put. 00:19:54.264 --> 00:19:58.044 anybody on a list or involve any sort of. 00:19:58.874 --> 00:20:02.084 Tracking or monitoring of those individuals these. 00:20:02.084 --> 00:20:05.104 we are looking for community programs to help solve. 00:20:05.104 --> 00:20:08.484 problems in their own communities and so. 00:20:08.484 --> 00:20:11.584 we want to ensure that people are aware of that protection so. 00:20:11.584 --> 00:20:14.024 that people are feel free to participate. 00:20:14.484 --> 00:20:17.734 UM, in prevention activities in their communities. 00:20:19.264 --> 00:20:22.434 DHS does collect information. 00:20:22.434 --> 00:20:25.774 from grant recipients. 00:20:25.774 --> 00:20:28.394 for the purposes of measuring performance. 00:20:29.374 --> 00:20:32.404 We instruct the recipients. 00:20:32.404 --> 00:20:35.884 to anonymize that data before it sent to us or to aggregate. 00:20:35.884 --> 00:20:39.544 it in a way that we can't identify who the individuals are that participated. 00:20:39.544 --> 00:20:42.764 But it's very important as we. 00:20:42.764 --> 00:20:45.924 run this program as we as we are developing. 00:20:45.924 --> 00:20:49.444 the promising and best practices and prevention that. 00:20:49.444 --> 00:20:52.804 we do a strong job evaluating our programs. 00:20:52.804 --> 00:20:54.284 and so. 00:20:56.524 --> 00:20:59.914 We need to have some data collection by the recipient so we can assess. 00:20:59.914 --> 00:21:03.104 and evaluate the whether or not they are achieving. 00:21:03.104 --> 00:21:03.894 their outcomes. 00:21:05.954 --> 00:21:09.154 Additionally, we provide training on. 00:21:09.154 --> 00:21:12.434 how on how not to provide PII to us and. 00:21:12.434 --> 00:21:15.554 if it is provided repeatedly. 00:21:15.554 --> 00:21:18.624 it'll be a violation of their award terms and. 00:21:18.624 --> 00:21:21.734 we will take corrective actions with that recipient as well as delete. 00:21:21.734 --> 00:21:23.634 any data that they provided to us. 00:21:25.494 --> 00:21:28.604 Those recipients are also, if they do, collect PII and. 00:21:28.604 --> 00:21:29.444 they don't have to. 00:21:30.604 --> 00:21:33.934 They must have a privacy policy describing and what information. 00:21:33.934 --> 00:21:37.014 is collected and how it's used, and we also provide. 00:21:37.014 --> 00:21:40.454 guidance on how to minimize the information collected. 00:21:40.454 --> 00:21:42.674 at's necessary to run the program. 00:21:44.524 --> 00:21:47.594 Additionally, some of our performance measures may. 00:21:47.594 --> 00:21:50.674 trigger the definite the. 00:21:50.674 --> 00:21:54.114 federal definition of research when they're collected and. 00:21:54.114 --> 00:21:57.614 so in that those cases, there's additional privacy. 00:21:57.614 --> 00:22:00.994 protections because those projects are run through. 00:22:00.994 --> 00:22:04.114 an Institutional Review Board which helps protect. 00:22:04.114 --> 00:22:05.954 individuals and research programs. 00:22:11.094 --> 00:22:14.224 All right, to get into a little bit more detail about how. 00:22:14.224 --> 00:22:17.264 about some of the things that we want to think about. 00:22:17.264 --> 00:22:20.384 and how we want programs to influence these factors that. 00:22:20.384 --> 00:22:23.844 contribute to the radicalization of violence so. 00:22:23.844 --> 00:22:26.874 first and foremost, I'll start with the disclaimer at the disclaimer. 00:22:26.874 --> 00:22:30.264 at the bottom. There's all these factors here and no single. 00:22:30.264 --> 00:22:33.624 factor is predictive or necessarily leads. 00:22:33.624 --> 00:22:37.104 to radicalization. And in fact, someone could have. 00:22:37.104 --> 00:22:40.224 all of these factors in their life. 00:22:40.224 --> 00:22:42.284 and not radicalized to violence. So. 00:22:43.384 --> 00:22:46.394 But there are a number of factors like job loss. 00:22:46.394 --> 00:22:49.454 break up, discrimination, mistrust of. 00:22:49.454 --> 00:22:52.774 overnment, tension with law enforcement perceived. 00:22:52.774 --> 00:22:54.084 injustice towards a group. 00:22:54.754 --> 00:22:57.874 All of these are factors that can impact radicalization. 00:22:57.874 --> 00:23:01.844 of violence, and we can look at programs on how to mitigate. 00:23:01.844 --> 00:23:02.924 some of these factors. 00:23:04.134 --> 00:23:07.884 We can break them into risk and protective factors so. 00:23:07.884 --> 00:23:11.104 risk factor is something that increases the likelihood that. 00:23:11.104 --> 00:23:14.324 someone would become a perpetrator of targeted violence, whereas. 00:23:14.324 --> 00:23:17.344 a protective factor decreases that likelihood. 00:23:19.364 --> 00:23:21.564 If you think about some of these words over here. 00:23:21.684 --> 00:23:24.274 If somebody was connected. 00:23:25.264 --> 00:23:26.274 Had attachment. 00:23:27.184 --> 00:23:30.564 Was involved and had trust and success. 00:23:31.214 --> 00:23:34.384 That's somebody who's very likely to not be. 00:23:34.384 --> 00:23:37.704 swayed or radicalized. 00:23:37.704 --> 00:23:40.744 to violence because they have a lot of these positive. 00:23:40.744 --> 00:23:43.384 things going on in their lives where. 00:23:46.064 --> 00:23:49.254 Resulting to violence would be very. 00:23:49.254 --> 00:23:52.434 unlikely, whereas if they had instability. 00:23:52.434 --> 00:23:55.454 or if they'd had previous involvement with violence. 00:23:55.454 --> 00:23:58.954 or conflict or addiction, they might be more likely. 00:23:58.954 --> 00:23:59.814 to seek. 00:23:59.914 --> 00:24:02.984 UM to commit violence in the name of agreements. 00:24:02.984 --> 00:24:06.074 Again, not predictive, but just. 00:24:06.074 --> 00:24:09.484 factors that as a community and building community. 00:24:09.484 --> 00:24:12.604 programs, we can think about what impacts do we wanna have. 00:24:12.604 --> 00:24:13.544 on these factors. 00:24:15.234 --> 00:24:18.264 So when we talk about terrorism, some of the risk factors and this is. 00:24:18.264 --> 00:24:21.734 from a study at the Department of Justice, National Institutes of Justice. 00:24:26.224 --> 00:24:27.744 History of criminal violence. 00:24:28.604 --> 00:24:31.624 Associating with terrorists, membership and an extremist group. 00:24:32.234 --> 00:24:36.254 Having a deep commitment to an extremist ideology? Psychological. 00:24:36.254 --> 00:24:37.904 issues, unemployment. 00:24:38.624 --> 00:24:42.144 Low socio economic status. Difficulty in relationships. 00:24:42.144 --> 00:24:44.804 having suffered abuse. So none of these things. 00:24:45.854 --> 00:24:49.084 In and of themselves, they're specifically illegal. 00:24:49.084 --> 00:24:52.574 or even really activities. These are states of mind. 00:24:53.174 --> 00:24:55.884 The things that have happened to the individual. 00:24:56.574 --> 00:24:59.954 And so these aren't predictive and there's these aren't behaviors. 00:24:59.954 --> 00:25:03.274 And just having these, we would not say anybody. 00:25:03.274 --> 00:25:07.554 should take action with an individual for having any one of these activities. 00:25:09.274 --> 00:25:12.384 These are just risk factors that we want to be aware of when we build. 00:25:12.384 --> 00:25:17.184 community programs. The minute I'm gonna talk about indicators here. 00:25:17.184 --> 00:25:20.444 are some indicators for targeted violence. So from another study. 00:25:20.444 --> 00:25:23.604 that was looking at the larger phenomenon of targeted violence. 00:25:23.604 --> 00:25:27.084 versus just terrorism, but a lot of them are very much the same social. 00:25:27.084 --> 00:25:30.624 isolation, psychological issues, criminal history. 00:25:31.314 --> 00:25:32.544 Job loss, right? 00:25:35.304 --> 00:25:39.214 So the reason why we work. 00:25:39.214 --> 00:25:42.254 on targeted violence and terrorism, while they might be. 00:25:42.254 --> 00:25:44.354 seeing very different phenomenon. 00:25:44.794 --> 00:25:47.924 The same risk factors and. 00:25:47.924 --> 00:25:51.004 indicators that are prevalent in somebody. 00:25:51.004 --> 00:25:54.564 who has commits workplace violence based on agreements. 00:25:55.424 --> 00:25:58.694 Are similar to those of somebody who. 00:25:58.774 --> 00:26:01.824 So joins a terrorist organization and. 00:26:01.824 --> 00:26:04.934 commits a an attack in that group's name. 00:26:08.164 --> 00:26:11.654 So we want to flip that and look at protective factors. 00:26:13.034 --> 00:26:16.094 So having self-esteem, having strong ties to. 00:26:16.094 --> 00:26:16.864 the community. 00:26:17.554 --> 00:26:21.184 Having a new under nuanced understanding of ideologies, including religion. 00:26:22.074 --> 00:26:25.364 Parental involvement, exposure and nonviolent. 00:26:25.364 --> 00:26:26.964 belief systems and narratives. 00:26:27.794 --> 00:26:30.984 This is a big one. Diversity of nonviolent outlets for addressing. 00:26:30.984 --> 00:26:34.124 grievances. Societal inclusion, the. 00:26:34.124 --> 00:26:37.144 ability to process emotions and healthy and productive ways. 00:26:37.144 --> 00:26:40.604 resources to address trauma and mental health issues in. 00:26:40.604 --> 00:26:43.684 view. Imagine a community or an individual that has. 00:26:43.684 --> 00:26:46.764 all of these protective factors in their life. 00:26:46.764 --> 00:26:49.824 It would be very difficult for someone to come along. 00:26:49.824 --> 00:26:53.224 or for an individual to go online and radicalize. 00:26:53.224 --> 00:26:56.564 themselves or be radicalized by another individual. 00:26:56.564 --> 00:26:58.844 because they have all these positive things going on. 00:26:58.924 --> 00:27:02.024 In their lives. And so when we build these community programs, we. 00:27:02.024 --> 00:27:04.724 wanna think about ways to enhance these elements. 00:27:07.694 --> 00:27:11.324 So now these are indicators that may that actually. 00:27:11.324 --> 00:27:14.554 are things that people can do. These are behaviors or activities. 00:27:14.554 --> 00:27:17.984 that people can do that should elicit a response. 00:27:17.984 --> 00:27:21.504 from peers or programs. 00:27:21.504 --> 00:27:22.864 that have been established. 00:27:24.264 --> 00:27:27.354 But people don't have the knowledge on what to do or we don't have the. 00:27:27.354 --> 00:27:30.554 projects in place. So again, as an example. 00:27:30.554 --> 00:27:33.914 of indicators that might elicit, you may want to intervene. 00:27:33.914 --> 00:27:35.974 or start doing something with that individual. 00:27:36.724 --> 00:27:39.864 These, and again, some of these are not necessarily. 00:27:39.864 --> 00:27:43.074 llegal, which is why we're not asking for a law enforcement intervention. We're. 00:27:43.074 --> 00:27:46.714 asking for community based intervention, so expressing. 00:27:46.714 --> 00:27:50.074 acceptance of violence as a necessary means to achieve goals. 00:27:50.074 --> 00:27:51.314 ideological goals. 00:27:52.274 --> 00:27:55.524 Consuming, sharing, retweeting, linking to violent extremist. 00:27:55.524 --> 00:27:56.154 videos. 00:27:56.954 --> 00:28:00.144 Or violent extremists participating in online. 00:28:00.144 --> 00:28:02.424 sites or groups that promote violent extremism. 00:28:03.574 --> 00:28:06.804 Expressing a desire to hurt others or approval of past attacks. 00:28:06.804 --> 00:28:08.694 or verbalizing their intent. 00:28:10.084 --> 00:28:13.314 Or making violent outbursts think of. 00:28:13.314 --> 00:28:16.334 pushing a chair and yelling in a. 00:28:16.334 --> 00:28:19.494 classroom or at a community or school board. 00:28:19.494 --> 00:28:22.594 meeting. That's a violent outburst again. 00:28:22.594 --> 00:28:25.894 it's not an assault, necessarily. It might not. It might be disturbing. 00:28:25.894 --> 00:28:28.954 the peace, but a lot of times those are discretionary and. 00:28:28.954 --> 00:28:32.494 again, with youth, you wouldn't necessarily go there, but that might be. 00:28:32.494 --> 00:28:35.574 an in an opportunity to sit down with the person and say what's going. 00:28:35.574 --> 00:28:39.094 on in your life? What are some resources that might be necessary? 00:28:39.094 --> 00:28:40.814 And they might be intake to a. 00:28:41.154 --> 00:28:44.244 Threat assessment or management team or? 00:28:44.244 --> 00:28:46.134 might be referred to other services. 00:28:48.734 --> 00:28:50.714 Here are some additional indicators. 00:28:52.664 --> 00:28:56.414 Engaged in prior threatening our concerning communication making. 00:28:56.414 --> 00:28:59.834 statements verbally, visually earned, writing that we're not necessarily. 00:28:59.834 --> 00:29:02.894 threatening, but we're concerning for example, paranoid. 00:29:02.894 --> 00:29:06.034 statements, sharing videos of previous mass attacks. 00:29:06.034 --> 00:29:09.134 or vague statements about imminent death. Again, these are. 00:29:10.114 --> 00:29:13.524 And preoccupies the preoccupation or fixation with the person. 00:29:13.524 --> 00:29:16.544 activity, or ideology such that it impacts. 00:29:16.544 --> 00:29:17.204 their life. 00:29:19.344 --> 00:29:22.474 Know preoccupation, preoccupation on previous attacks. 00:29:22.474 --> 00:29:25.814 Again, these are all things that should be troubling to. 00:29:25.814 --> 00:29:29.974 a family member, coworker, a teacher, a. 00:29:29.974 --> 00:29:31.484 faith leader, et cetera. 00:29:34.454 --> 00:29:37.604 So now what can we do about it? When we talked about some of the? 00:29:37.604 --> 00:29:40.824 projects you can do here, but just on the larger sense. 00:29:41.694 --> 00:29:45.004 I'm gonna come back to that slide. Just not a larger sense. 00:29:47.594 --> 00:29:50.684 There was a study by the Secret Service that comes out. I think this is. 00:29:50.684 --> 00:29:53.984 an annual report, but 2/3 of attackers. 00:29:53.984 --> 00:29:57.044 the exhibited behaviors that elicit concern in other people. 00:29:57.044 --> 00:30:00.334 s. So thinking of those risks for. 00:30:00.334 --> 00:30:03.894 those indicators that were concerning, that's. 00:30:03.894 --> 00:30:07.764 what we're talking about in 2/3 of attacks, bystanders saw. 00:30:07.764 --> 00:30:10.394 that. And in more than half of the attacks. 00:30:11.214 --> 00:30:14.284 Those behaviors concerned others to the point that the observer feared for. 00:30:14.284 --> 00:30:16.564 their safety of themselves or others. 00:30:17.844 --> 00:30:21.574 No, they didn't always report that or intervene, obviously. 00:30:21.574 --> 00:30:24.834 if you feel for your own safety, you shouldn't intervene. But. 00:30:24.834 --> 00:30:28.504 we wanna have an ability for people to express. 00:30:28.504 --> 00:30:32.354 these concerns to a community based program. 00:30:34.404 --> 00:30:37.624 Bystanders can be family or friends, peers, colleagues. 00:30:37.624 --> 00:30:40.724 community leaders have talked about a number of days we have. 00:30:40.724 --> 00:30:43.854 resources where by stairs can be trained and they can. 00:30:43.854 --> 00:30:47.034 identify if they when safe to prevent. 00:30:47.034 --> 00:30:50.914 the attacks themselves or provide service or resources. 00:30:50.914 --> 00:30:52.954 or referrals to intervention programs. 00:30:54.564 --> 00:30:57.774 We've talked a little bit about threat assessment and management teams. 00:30:57.774 --> 00:30:59.754 That's one of the priorities this year. 00:31:01.444 --> 00:31:04.474 And so one of a threat. 00:31:04.474 --> 00:31:07.654 assessment identifies individual who exhibit that threatening our concerning. 00:31:07.654 --> 00:31:10.934 behavior. We're just talking about gathers information to assess. 00:31:10.934 --> 00:31:14.454 whether they pose a risk or harm, and it identifies appropriate. 00:31:14.454 --> 00:31:15.254 interventions. 00:31:16.984 --> 00:31:20.004 You wanna do this with a multidisciplinary team people? 00:31:20.004 --> 00:31:23.104 with different professional backgrounds, for example, mental health. 00:31:23.104 --> 00:31:26.214 and social service providers, administrators, medical personnel. 00:31:26.214 --> 00:31:29.654 law enforcement, technology experts, faith leaders and others. 00:31:29.654 --> 00:31:32.694 with early intervention, these teams could. 00:31:32.694 --> 00:31:36.054 be led by a non law enforcement professionals and may only involve. 00:31:36.054 --> 00:31:39.134 law enforcement for consultation, but it's crucial. 00:31:39.134 --> 00:31:42.254 if a threat does escalate in many instances, the. 00:31:42.254 --> 00:31:45.794 people on these teams will be mandatory reporters in their states. 00:31:45.794 --> 00:31:47.294 So for example. 00:31:47.374 --> 00:31:49.754 The threshold for that is fear of. 00:31:51.534 --> 00:31:54.694 Threat of harm to or others or imminent. 00:31:54.694 --> 00:31:57.844 threat of harm or self to others. So it's really important that. 00:31:59.714 --> 00:32:03.324 That there is connection and there is a protocol for raising. 00:32:03.324 --> 00:32:04.504 it to law enforcement. 00:32:04.954 --> 00:32:06.324 If. 00:32:07.324 --> 00:32:10.734 That situation occurs and as I referred to earlier. 00:32:10.734 --> 00:32:13.774 a lot of times people call the police with. 00:32:13.774 --> 00:32:16.814 all sorts of petty concerns or all sorts of. 00:32:16.814 --> 00:32:20.054 concerns that the police don't have any resources to deal with. 00:32:20.054 --> 00:32:23.414 So in those instances, that's. 00:32:23.414 --> 00:32:26.654 when law enforcement, when they say we don't think a crime has been committed. 00:32:26.654 --> 00:32:29.994 they can also refer them back to the community, to. 00:32:29.994 --> 00:32:33.074 olve that. Think of the number of cases where the FBI. 00:32:33.074 --> 00:32:36.334 interviewed attackers. The FBI had interviews. 00:32:37.744 --> 00:32:41.154 Entire brother Boston Marathon bomber. 00:32:41.154 --> 00:32:43.884 The FBI interviewed Omar Mateen prior to him. 00:32:45.574 --> 00:32:48.644 Attacking the Pulse nightclub and killing 40. 00:32:48.644 --> 00:32:52.084 people there. So again law enforcement. 00:32:52.084 --> 00:32:55.114 may interview people that have concerning behaviors, but. 00:32:55.114 --> 00:32:58.144 at that time they hadn't committed a crime and so. 00:32:58.144 --> 00:33:01.344 we need programs to be able to deal with folks in those situations. 00:33:01.344 --> 00:33:04.764 as well. So we can provide them the resources before. 00:33:10.534 --> 00:33:13.584 We've talked a little bit about local prevention framework, so I want to talk about. 00:33:13.584 --> 00:33:16.604 those ingredients. These are some of the objectives of our. 00:33:16.604 --> 00:33:17.744 our grant program as well. 00:33:19.914 --> 00:33:23.624 They're going to engage the broader set of local stakeholders. 00:33:25.234 --> 00:33:28.934 They create awareness of radicalization to the violence process. 00:33:30.774 --> 00:33:33.914 They look at both risk fact increasing awareness. 00:33:33.914 --> 00:33:36.144 of risk factors and protective factors. 00:33:37.564 --> 00:33:40.794 People in that community have the ability to act on their awareness training. 00:33:40.794 --> 00:33:42.194 and help members their community. 00:33:44.814 --> 00:33:48.084 And they have access to multidisciplinary threat assessment and management. 00:33:48.084 --> 00:33:51.324 teams, as well as a variety of local programs. 00:33:51.324 --> 00:33:55.204 that address Rick risk factors and provide protective factors. 00:33:58.444 --> 00:34:00.494 I wanna go back to. 00:34:02.184 --> 00:34:04.114 A previous slide here. 00:34:07.154 --> 00:34:10.164 Because I talked about one of our priorities, threat assessment. 00:34:10.164 --> 00:34:14.184 another priority is preventing. 00:34:14.184 --> 00:34:17.324 domestic violent extremism. So I wanna highlight some. 00:34:17.324 --> 00:34:20.704 of the grievances that domestic terrorist movements. 00:34:23.674 --> 00:34:26.764 Because this kind of speaks to what their targets. 00:34:26.764 --> 00:34:29.834 are many targets in. 00:34:29.834 --> 00:34:32.904 the United States by target of targeted violence. 00:34:32.904 --> 00:34:36.104 are those of marginalized communities. So. 00:34:36.104 --> 00:34:39.364 racial, ethnic and religious minorities. 00:34:39.364 --> 00:34:41.654 LGBTQ communities. 00:34:43.114 --> 00:34:44.304 As well as. 00:34:46.394 --> 00:34:47.874 I mentioned houses of worship. 00:34:48.394 --> 00:34:51.664 Or so I'm not so not just. 00:34:51.664 --> 00:34:55.194 mosques and synagogues, but black churches. 00:34:55.194 --> 00:34:58.804 that have been attacked. So we think about all these elements. 00:34:58.804 --> 00:35:01.174 and how they might impact. 00:35:01.534 --> 00:35:04.624 Grievances that you may have to. 00:35:04.624 --> 00:35:08.404 deal with as you're as you're thinking about how to prevent domestic. 00:35:08.404 --> 00:35:11.504 violent extremism, so that is another priority, so. 00:35:11.504 --> 00:35:15.464 thinking about these impacts as you develop your application can. 00:35:15.464 --> 00:35:16.004 be useful. 00:35:18.764 --> 00:35:19.284 Sorry. 00:35:21.824 --> 00:35:25.164 Alright, so I want to talk about some of the key program elements. 00:35:25.164 --> 00:35:28.234 and then we're going to go into some of the scoring criteria and some of. 00:35:28.234 --> 00:35:31.294 the resources that we have available to help you apply. 00:35:31.294 --> 00:35:32.044 to this program. 00:35:33.424 --> 00:35:36.434 So sustainability is a key program element we do. 00:35:36.434 --> 00:35:41.114 not fund the same organization to do the same work your fiscal. 00:35:41.114 --> 00:35:44.474 year over fiscal year. So we're looking for either expanded. 00:35:44.474 --> 00:35:47.664 topics that we haven't funded previously, but. 00:35:47.664 --> 00:35:50.814 we're looking for those capabilities that we fund to be. 00:35:50.814 --> 00:35:53.954 sustained after the period of performance we don't. 00:35:53.954 --> 00:35:57.194 have enough funding in this program to sustain projects. 00:35:57.194 --> 00:36:00.234 but we think that a lot of these types of programs can be. 00:36:00.234 --> 00:36:01.924 done with this initial seed money. 00:36:02.314 --> 00:36:06.084 And then, as members of the Community volunteers government. 00:36:06.084 --> 00:36:09.564 agencies, nonprofits, I. 00:36:09.564 --> 00:36:12.674 think we'll take this up as part of their work that they. 00:36:12.674 --> 00:36:15.024 do to make their communities a healthy place. 00:36:16.944 --> 00:36:20.124 We talked a little bit about measurement. I'm going to talk about the implementation. 00:36:20.124 --> 00:36:23.284 of measurement plan just a little bit more, but it's very important. 00:36:23.284 --> 00:36:26.834 that we measure our progress towards outcomes. 00:36:26.834 --> 00:36:29.924 and we have good measures in place to help identify whether. 00:36:29.924 --> 00:36:33.364 we're meeting our outcomes. In part this is because. 00:36:33.364 --> 00:36:36.924 prevention of targeted violence and terrorism is relatively. 00:36:36.924 --> 00:36:40.104 new and we are trying to build the data the. 00:36:40.104 --> 00:36:43.444 data sets, but also we want to be good stewards. 00:36:43.444 --> 00:36:46.474 of our limited taxpayer dollars and ensure that we are only. 00:36:46.474 --> 00:36:48.204 funding projects that are effective. 00:36:51.114 --> 00:36:54.324 We have a lot of technical assistance this year to help. 00:36:54.324 --> 00:36:57.024 first time or smaller applicants. 00:36:57.744 --> 00:37:01.534 So on our website you. 00:37:01.534 --> 00:37:02.234 can find. 00:37:03.114 --> 00:37:06.184 You can find all of these. 00:37:06.184 --> 00:37:09.524 resources videos on how to use our. 00:37:09.524 --> 00:37:12.664 two of our main grant systems and grants and grants. Gov. 00:37:15.324 --> 00:37:18.344 A white paper slick sheet on all the steps. 00:37:18.344 --> 00:37:21.434 you need to take to apply for the grant program, and then we. 00:37:21.434 --> 00:37:24.544 have individual sheets that talk about how to get some of. 00:37:24.544 --> 00:37:27.914 the register for some of the systems and get some of the. 00:37:27.914 --> 00:37:30.104 numbers and. 00:37:32.844 --> 00:37:35.934 Resources you need to apply we also. 00:37:35.934 --> 00:37:38.974 have a document that talks about other grant programs if. 00:37:38.974 --> 00:37:42.354 this isn't for you, we have some related grant programs. 00:37:42.354 --> 00:37:45.474 that might serve your needs and we. 00:37:45.474 --> 00:37:47.134 talk about them in that publication. 00:37:47.974 --> 00:37:51.284 And we have an entire prevention publication library. 00:37:51.284 --> 00:37:54.374 that talks about there's a paper on local prevention frameworks. 00:37:54.374 --> 00:37:57.764 There's a paper on threat assessment and management teams on. 00:37:57.764 --> 00:38:00.944 and so on. So please, if you're looking to learn more. 00:38:00.944 --> 00:38:05.104 about prevention, you can find them in that library additionally. 00:38:05.104 --> 00:38:08.434 one of the key documents that's required is an implementation of measurement. 00:38:08.434 --> 00:38:11.624 plan. And you can find a template for that here as. 00:38:11.624 --> 00:38:14.924 well as the guidance on how to fill that out. There's. 00:38:14.924 --> 00:38:17.344 also a one page guide, quick guidance. 00:38:18.004 --> 00:38:21.174 As well as a webinar on how to conduct measures and metrics. 00:38:21.174 --> 00:38:24.554 for prevention, and we'll have other webinars here as well. 00:38:29.414 --> 00:38:32.524 Stop sharing and pull up a different screen here. 00:38:38.504 --> 00:38:41.354 We also have a couple of really useful fact sheets. 00:38:42.114 --> 00:38:45.324 One that might be helpful for you is. 00:38:45.324 --> 00:38:48.924 this application. 00:38:48.924 --> 00:38:51.964 documents fact sheet or the OR the checklist. 00:38:51.964 --> 00:38:55.214 Here you can find all the required documents. 00:38:55.214 --> 00:38:58.284 that you're going to need to submit as part of this application. 00:38:59.604 --> 00:39:02.774 Including way, way where they need to be submitted so. 00:39:02.774 --> 00:39:05.994 some are submitted in grants.gov some are submitted. 00:39:05.994 --> 00:39:08.574 electronically and Ng grants. 00:39:09.584 --> 00:39:12.754 And some are attachments that you'll attach. 00:39:12.754 --> 00:39:14.774 as part of finalizing your application. 00:39:15.554 --> 00:39:16.084 UM. 00:39:16.874 --> 00:39:20.104 So we are looking for these elements in the project narrative in. 00:39:20.104 --> 00:39:23.284 a single PDF attachment, a cover page that has. 00:39:23.284 --> 00:39:25.024 all of these elements. 00:39:27.094 --> 00:39:30.324 The body which is going to cover the needs assessment program. 00:39:30.324 --> 00:39:33.784 design and I'll cover these when we talk about scoring in a minute and. 00:39:33.784 --> 00:39:36.824 then a number of appendices, right. So you're going to have the implementation. 00:39:36.824 --> 00:39:37.684 and measurement plan. 00:39:38.724 --> 00:39:41.764 If you believe you're going to need to go through. 00:39:41.764 --> 00:39:44.814 you're doing research and you're going to need to go through an IRB. 00:39:44.814 --> 00:39:48.164 We look for you to provide that determination. 00:39:48.164 --> 00:39:48.934 request form. 00:39:50.174 --> 00:39:53.214 We're also looking for resumes or CVS of key personnel. 00:39:53.214 --> 00:39:54.694 and if you're working with. 00:39:55.914 --> 00:39:59.064 Outside organizations, we encourage you to do that, not just. 00:39:59.064 --> 00:40:02.204 s subrecipients or vendors, but sometimes you'll have. 00:40:02.204 --> 00:40:05.274 a volunteer organization that wants to support your program, even though. 00:40:05.274 --> 00:40:08.954 they're not getting funding. What we want to see that commitment to. 00:40:10.964 --> 00:40:14.934 But to the project with a letter of support also. 00:40:14.934 --> 00:40:18.474 if you want to submit letters of recommendation please. 00:40:18.474 --> 00:40:21.574 only just include them with your application and you can have up to. 00:40:21.574 --> 00:40:24.914 three, but those are optional and you don't need to include them but. 00:40:24.914 --> 00:40:28.054 you do not. We do not want you to send those letters of recommendation through. 00:40:28.054 --> 00:40:30.974 any other channel. Please just include them with your application. 00:40:34.134 --> 00:40:36.754 The notice of funding Opportunity Appendix C has. 00:40:37.534 --> 00:40:40.264 A lot more details on each of these items. 00:40:42.424 --> 00:40:45.684 Another fact sheet that we'd like you to review, there's. 00:40:45.684 --> 00:40:48.814 an overview fact sheet on the nofo it covers. 00:40:48.814 --> 00:40:50.564 most of what I've been. I've covered in this. 00:40:50.654 --> 00:40:53.484 In this presentation. 00:40:54.774 --> 00:40:58.094 Another helpful guide is this scoring guide. 00:40:58.904 --> 00:41:02.234 So this talks about how what in the in your. 00:41:02.234 --> 00:41:05.594 program narrative, which is either 10 pages for promising. 00:41:05.594 --> 00:41:09.074 practices or a maximum of 15 pages for. 00:41:10.774 --> 00:41:13.154 For innovation is. 00:41:14.394 --> 00:41:17.464 Is how it will be scored. So again these are all the these are. 00:41:17.464 --> 00:41:19.744 all the numbered elements of the program that needs assessment. 00:41:21.124 --> 00:41:24.484 We are looking for you to talk about the target population. 00:41:24.484 --> 00:41:27.854 that will actually receive the services, so if. 00:41:27.854 --> 00:41:29.854 you're working in. 00:41:32.274 --> 00:41:35.424 If you're working in a Springfield. 00:41:35.424 --> 00:41:38.944 and population 100,000. 00:41:38.944 --> 00:41:42.224 and you're doing a threat as you're doing a. 00:41:42.224 --> 00:41:43.734 training and awareness program. 00:41:44.464 --> 00:41:47.734 Your target population is not 100,000 because your hope. 00:41:47.734 --> 00:41:50.774 is to affect the entire community, your target. 00:41:50.774 --> 00:41:53.924 population is. What do you think the actual number of people you will reach with? 00:41:53.924 --> 00:41:56.934 that training is? Who are those people? Are they? 00:41:56.934 --> 00:42:00.094 professionals that are they force multipliers? 00:42:00.094 --> 00:42:03.794 like mental health practitioners, teachers, counselors. 00:42:03.794 --> 00:42:07.514 leaders, law enforcement officers, general. 00:42:07.514 --> 00:42:10.554 ublic? Or are they the general public? What is their background again? 00:42:10.554 --> 00:42:13.754 we like to know the demographics because we are looking. 00:42:13.754 --> 00:42:15.134 for multidisciplinary. 00:42:15.744 --> 00:42:18.884 Prod projects and we want to understand all. 00:42:18.884 --> 00:42:22.004 the different types of organizations you're bringing into your program. 00:42:22.004 --> 00:42:25.664 or that you will be interacting with this part of your program. 00:42:26.784 --> 00:42:28.664 The other thing we're looking for is. 00:42:29.544 --> 00:42:32.794 We don't want projects to recreate the wheel, we. 00:42:32.794 --> 00:42:36.394 are looking for you to identify. 00:42:36.394 --> 00:42:39.954 what are some prevention resources or some community. 00:42:39.954 --> 00:42:43.394 service resources that you could utilize. 00:42:43.394 --> 00:42:46.494 in developing your program. Is there already an after? 00:42:46.494 --> 00:42:49.554 school program where you could conduct a presentation at with? 00:42:49.554 --> 00:42:53.434 teens? Is there already on conflict resolution? 00:42:53.434 --> 00:42:56.964 or media literacy? Is there already a? 00:42:57.074 --> 00:43:00.594 211 or three. 00:43:00.594 --> 00:43:03.644 rvice provision hotline in your community. 00:43:03.644 --> 00:43:06.834 that you could train the operators on for referral. 00:43:06.834 --> 00:43:09.964 services for individuals radicalizing. So again we're. 00:43:09.964 --> 00:43:13.204 not looking for you to develop things if there are already present, so we. 00:43:13.204 --> 00:43:16.234 wanna see what's available in your community and that shows us that. 00:43:16.234 --> 00:43:19.354 you are integrated in your community and. 00:43:19.354 --> 00:43:20.134 you how to. 00:43:20.594 --> 00:43:23.644 Build multidisciplinary projects. 00:43:26.264 --> 00:43:29.354 The next section is the program design. It's the highest scored. 00:43:29.354 --> 00:43:31.784 section, so this is where we want to find out. 00:43:32.964 --> 00:43:36.484 What it is you're doing? What is your theory of change? We're. 00:43:36.484 --> 00:43:39.784 gonna take these resources. We're gonna conduct these activities. 00:43:39.784 --> 00:43:42.484 which will result in XY or Z. 00:43:43.164 --> 00:43:46.174 We have we have that webinar and. 00:43:46.174 --> 00:43:49.434 metrics and measurement. If this is confusing to you or you're not. 00:43:49.434 --> 00:43:52.774 you haven't heard of a theory of change before or a logic model. 00:43:54.074 --> 00:43:57.384 Please take a look at that webinar on our website. 00:43:57.384 --> 00:44:00.424 It's a really good primer on some of these concepts. 00:44:00.424 --> 00:44:04.374 and we'll help you with this part of the application so. 00:44:04.374 --> 00:44:07.424 we're really looking for what it is you're doing and why do you think. 00:44:07.424 --> 00:44:10.654 that will have the impact and how are you going to measure and again. 00:44:10.654 --> 00:44:14.144 again, that's within the IMP. It's a sport implementation. 00:44:14.144 --> 00:44:17.204 measure plan plan. We call it the IMP or. 00:44:17.204 --> 00:44:20.504 the because the Devils in the details, we really want to know. 00:44:20.504 --> 00:44:22.314 why, how. 00:44:23.184 --> 00:44:26.294 What you propose to do will have the desired outcome. 00:44:26.294 --> 00:44:27.744 or impact that you're seeking. 00:44:32.814 --> 00:44:33.234 Alright. 00:44:35.874 --> 00:44:39.304 Of the next section, organization and key personnel. 00:44:39.304 --> 00:44:42.564 what is your organization? What's their history? What are their capabilities? 00:44:42.564 --> 00:44:44.664 Who are the people working on the project? 00:44:45.264 --> 00:44:48.374 And what are their? What are their expertise that? 00:44:48.374 --> 00:44:51.394 are going to help you accomplish this project? This really helps us. 00:44:51.394 --> 00:44:54.404 identify the capacity of your organization. 00:44:54.404 --> 00:44:57.554 to get it done. Again, summarize that in the body and. 00:44:57.554 --> 00:45:01.384 you can have room for their CVS and resumes as. 00:45:01.384 --> 00:45:02.674 attachments. 00:45:03.844 --> 00:45:07.334 There's appendices again. I talked about sustainability. 00:45:07.334 --> 00:45:10.454 This is scored 15 out of 100 points. We really. 00:45:10.454 --> 00:45:13.554 want to know how are you going to sustain this? How? 00:45:13.554 --> 00:45:16.304 is this going to keep going? Because we really need to. 00:45:16.404 --> 00:45:19.584 Support projects that we. 00:45:19.584 --> 00:45:22.694 are not going to have to keep coming back and funding because we don't quite. 00:45:22.694 --> 00:45:23.914 have those resources. 00:45:25.934 --> 00:45:28.984 Another really important element is the budget. 00:45:28.984 --> 00:45:32.084 detail and narrative. This year we provided a little bit. 00:45:32.084 --> 00:45:35.264 more guidance in Appendix E. 00:45:35.264 --> 00:45:38.364 of our notice of funding opportunity on what we're looking for. 00:45:38.364 --> 00:45:41.494 in the type of detail. If you're going to use a vendor, how? 00:45:41.494 --> 00:45:44.714 much is that vendor by hour, what are the deliverables that you're? 00:45:44.714 --> 00:45:47.944 seeking out of them? How many hours per person? 00:45:47.944 --> 00:45:51.064 what percentage of their time is going to be spent on this and what is? 00:45:51.064 --> 00:45:51.814 their salary? 00:45:52.294 --> 00:45:55.314 UM, what sorts of supplies you're buying? What? 00:45:55.314 --> 00:45:58.384 are their estimated costs where? How many trips are you planning to take if? 00:45:58.384 --> 00:45:59.664 you put travel dollars in? 00:46:00.604 --> 00:46:04.024 And we do encourage you to put travel dollars in especially. 00:46:07.234 --> 00:46:10.364 At its lower lower ebb and at the moment. 00:46:10.364 --> 00:46:13.504 we are hoping that we will be able to do more travel and. 00:46:13.504 --> 00:46:16.724 sharing of best practices as part of this program and. 00:46:16.724 --> 00:46:20.164 so we'd like you to have funds available to participate. 00:46:20.164 --> 00:46:21.524 in those types of activities. 00:46:22.944 --> 00:46:26.214 Or if you need to travel as part of implementing the activities, of course. 00:46:26.214 --> 00:46:27.294 that that's allowable. 00:46:30.234 --> 00:46:33.464 And then there's a little bit of information on the selection process. 00:46:33.464 --> 00:46:37.254 So it is a, it's a bit of a rigorous process. 00:46:37.254 --> 00:46:40.324 each of each application is first. 00:46:40.324 --> 00:46:43.794 reviewed for completeness and eligibility and. 00:46:43.794 --> 00:46:47.004 then is if it's complete and eligible, it's assigned. 00:46:47.004 --> 00:46:50.464 to two scores who come up with their own. 00:46:50.464 --> 00:46:53.854 score and then come to a consensus score amongst them. 00:46:55.154 --> 00:46:58.204 After that, we and they also. 00:46:58.204 --> 00:47:01.304 provide notes. After that we convene a selection panel of. 00:47:01.304 --> 00:47:04.364 experts who will review the application. 00:47:04.364 --> 00:47:07.704 scores and the notes and apply the following selection criteria. 00:47:07.704 --> 00:47:11.124 So the first selection criteria is meeting the program. 00:47:11.124 --> 00:47:14.204 priorities. Our office is charged with. 00:47:14.204 --> 00:47:17.224 developing a slate of awards that. 00:47:17.224 --> 00:47:20.484 meets all of these priorities. Not necessarily each. 00:47:20.484 --> 00:47:24.024 application needs to meet every one of these priorities, but. 00:47:24.024 --> 00:47:25.304 the more these priorities. 00:47:25.374 --> 00:47:28.774 For application meets, the more likely you are to be selected. 00:47:28.774 --> 00:47:31.764 If you have. If you have a good score. 00:47:32.404 --> 00:47:35.474 If you're meeting program objectives again in. 00:47:35.474 --> 00:47:38.594 that slate of awards, we are trying to achieve a diversity. 00:47:38.594 --> 00:47:42.754 in project type. We're trying to avoid duplication. 00:47:42.754 --> 00:47:45.114 in a specific geographic location. 00:47:46.444 --> 00:47:49.634 We're looking for geographic diversity, not just in regions. 00:47:49.634 --> 00:47:52.814 but also in type. Again, one of the priorities is small. 00:47:52.814 --> 00:47:54.624 and mid sized communities this year. 00:47:56.644 --> 00:47:59.724 And we're looking to achieve diversity and eligible. 00:47:59.724 --> 00:48:03.004 applicant type. So we wanna see applicants from. 00:48:03.004 --> 00:48:06.134 all the types, so territories tribal. 00:48:06.134 --> 00:48:09.164 governments, states, nonprofits and universities. 00:48:09.164 --> 00:48:12.444 and then to maximize the use of the funds. 00:48:12.444 --> 00:48:15.784 So we may partially fund a project. 00:48:15.784 --> 00:48:18.874 So when you do submit your budget and your narrative. 00:48:18.874 --> 00:48:22.174 we're looking for you to outline which project types. 00:48:22.174 --> 00:48:25.424 you have and if any of them are severable so. 00:48:25.424 --> 00:48:28.884 if we are able to fund a portion of the project, we can clearly see. 00:48:29.504 --> 00:48:32.534 We can take the threat of that. We can fund the threat. 00:48:32.534 --> 00:48:35.724 assessment team and not you. 00:48:35.724 --> 00:48:38.754 recidivism reduction program or. 00:48:38.754 --> 00:48:41.994 one or vice versa. So please break out your budgets by. 00:48:41.994 --> 00:48:45.034 those project types. So if we are partially funding. 00:48:45.034 --> 00:48:48.154 to maximize the use of these funds, we are able. 00:48:48.154 --> 00:48:51.314 to easily see what we can partially fund. 00:48:56.594 --> 00:48:57.024 Alright. 00:48:59.944 --> 00:49:02.114 I'm gonna go back to my slides. 00:49:04.364 --> 00:49:05.314 That's not showing. 00:49:08.064 --> 00:49:11.154 Alright, we are winding up. I just want to talk about some of the. 00:49:11.154 --> 00:49:12.874 resources we have. 00:49:13.854 --> 00:49:14.884 Available. 00:49:20.824 --> 00:49:21.514 Alright. 00:49:24.454 --> 00:49:27.894 So I talked about all the items that are on our resource. 00:49:27.894 --> 00:49:30.994 that how to guides the instructional videos. Please start. 00:49:30.994 --> 00:49:34.064 there. A lot of your questions can be answered in those. 00:49:34.064 --> 00:49:35.104 in those guides. 00:49:37.024 --> 00:49:40.074 We will be holding additional webinars live webinars with the. 00:49:40.074 --> 00:49:43.654 ability to ask questions and if a large group or association. 00:49:43.654 --> 00:49:47.094 would like to host a webinar for their members, we are happy to schedule one. 00:49:47.554 --> 00:49:51.044 Schedule any of those as we have time allowable. 00:49:51.044 --> 00:49:54.204 We have an email help desk that's your next place to go. 00:49:54.204 --> 00:49:57.264 with questions. If you can't find the answers in any. 00:49:57.264 --> 00:50:00.284 of the materials, please don't hesitate to email us. 00:50:00.284 --> 00:50:03.424 and we can try to identify the right document or answer your. 00:50:03.424 --> 00:50:04.414 specific question. 00:50:05.604 --> 00:50:08.634 If you need to talk to us, we can set up a phone call or. 00:50:08.634 --> 00:50:11.714 a teams meeting on a limited basis upon. 00:50:11.714 --> 00:50:14.874 request, but we can't really. 00:50:14.874 --> 00:50:18.694 provide provide a ton of ton of topical feedback so. 00:50:19.334 --> 00:50:22.764 If you come and say, hey, this is my idea for a project. 00:50:22.764 --> 00:50:26.264 what do you think about it? I can't give you open ended feedback. 00:50:26.264 --> 00:50:29.374 but we can't answer questions like hey this. 00:50:29.374 --> 00:50:32.644 s is what I want to do. Which project type do you think it fits in best? 00:50:32.644 --> 00:50:35.774 nd we can help you identify and give you a little bit. 00:50:35.774 --> 00:50:38.264 more guidance to that regard. So we are able to do that. 00:50:39.284 --> 00:50:42.494 Like I said, we don't fund the same projects. 00:50:42.494 --> 00:50:45.934 for the same same applications for the same project. 00:50:45.934 --> 00:50:49.054 year over year. So many of our applications do. 00:50:49.054 --> 00:50:52.414 receive their the awards the first time they apply. 00:50:52.414 --> 00:50:55.494 that. If you are unsuccessful we will offer. 00:50:55.494 --> 00:50:58.594 an opportunity to request feedback calls later. 00:50:58.594 --> 00:51:01.774 this fall so you can potentially improve your application. 00:51:01.774 --> 00:51:04.914 for next year. And we also have regional prevention. 00:51:04.914 --> 00:51:08.184 coordinators. You find more information about them on our website. 00:51:09.014 --> 00:51:12.144 And they can assist you in making. 00:51:12.144 --> 00:51:15.604 partnerships or identifying programs in your area they. 00:51:15.604 --> 00:51:16.354 can help you with. 00:51:16.534 --> 00:51:20.004 Uhm, concepts of prevention. If you're looking for more background. 00:51:20.004 --> 00:51:23.104 on what prevention is in case studies in your area, they can be. 00:51:23.104 --> 00:51:26.144 of a huge support, but they cannot assist you with writing. 00:51:26.144 --> 00:51:29.184 your application, nor can any other federal. 00:51:29.184 --> 00:51:29.644 employee. 00:51:30.604 --> 00:51:33.694 Last I'll put in this plug to sign up for our. 00:51:33.694 --> 00:51:36.834 Gov delivery you can. 00:51:36.834 --> 00:51:40.474 do that, which is our mailing list and you can do that through. 00:51:40.474 --> 00:51:43.574 the DHS website by signing up. 00:51:43.574 --> 00:51:46.754 for the Center for Prevention programs and partnerships. 00:51:46.754 --> 00:51:49.974 Please, if you have any questions, email. 00:51:49.974 --> 00:51:53.534 us at our email helpdesk, terrorism prevention at HQ. 00:51:53.534 --> 00:51:56.814 dhs.gov and we're really excited to receive. 00:51:56.814 --> 00:51:58.894 your applications this year. Thank you.