More Related Content Similar to Hillard Heintze ASIS Presentation Active Shooter (20) Hillard Heintze ASIS Presentation Active Shooter1. Matthew Doherty, Senior Vice President
Robert Davis, Senior Vice President
Michael Crane, Esq., CPP, CFE, Senior Vice President
and Regis Becker, CPP, Chief Ethics and Compliance Officer
from The Pennsylvania State University
The Role of Protective Intelligence in Managing Threats
Associated with Targeted Violence and the Active Shooter
2. Ā© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
AGENDA
PART I
Why We're Here: Context and Mindset
PART II
Know Your Enemy: Threat Assessment
and Protective Intelligence
PART III
Practicing Prevention:
Critical Issues and Insights
2
3. Ā© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
PART I
Why We're Here:
Context and Mindset
Michael Crane, Esq., CPP, CFE
Senior Vice President, Hillard Heintze
3
4. Ā© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com 4
Employers must maintain
āa place of employment
which is free from
recognized hazards that
are causing or are likely to
cause death or serious
physical harm ...ā
OSHA/MOSHA
Protecting the Workplace: A Top Priority
5. Ā© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
Protecting the Workplace: A New Risk
5
Family of Navy Yard shooting
victim files wrongful-death claim
ā¢ $37.5 million suit alleges the Navy and
the Department of Veterans Affairs
overlooked or missed a series of red flags
that should have alerted them to the
troubled history of the shooter.
ā¢ The action could inspire other
victimsā families to seek legal
advice or file lawsuits.
6. Ā© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
Protecting the Workplace: Foreseeability
6
Beware of the warning signs
Was the ABB Power Plant shooting preventable?
ā¢ Known to be disgruntled, unhappy at work and angry at the company.
ā¢ Friends said he complained about pressure and conflict with supervisors.
ā¢ Part of a class-action lawsuit against the company
over pension plan and 401(k) fees and expenses.
ā¢ Subject purchased two of the four weapons
he used in the incident only the day before ā
an AK-47 and a 12-gauge shotgun.
7. Ā© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
Common Roadblocks: Overcoming the Barriers
Multiple factors impede workplace
violence prevention
ā¢ Lack of awareness about the knowable
indicators of a potential attack.
ā¢ Poor understanding of risk and
mitigation measures.
ā¢ Limited cross-functional collaboration
and information sharing.
ā¢ Absence of an overall strategy to address
targeted violence prevention.
7
8. Ā© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
Targeted Violence: Understanding and Addressing the Risk
Targeted Violence is any incident of violence where a known or knowable
attacker selects a particular target prior to their violent attack.
8
9. Ā© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
A Proactive Approach: Prevention and Early Intervention
To manage threats associated with targeted
violence and the active shooter, we must
first gain an understanding of the factors
that may indicate potential risk.
This includes:
ā¢ Dispelling prevailing beliefs about attackers.
ā¢ Understanding the pre-attack process.
ā¢ Learning the processes involved in behavioral
threat assessment and protective intelligence.
10. Ā© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
PART II
Know Your Enemy:
Threat Assessment and
Protective Intelligence
Matthew Doherty, Senior Vice President
10
11. Ā© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com 11
Exceptional Case Study Project
The U.S. Secret Service and National Institute of Justice
FIVE-YEAR STUDY
Examined the thinking and behavior of
83 attackers from 1949 to 1996.
74 ATTACKS
ā¢ 6 attacks were carried out by 16 individuals
who were members of a group.
ā¢ 68 attacks were carried out by
individuals acting alone.
ā¢ 24 of the 83 attackers were interviewed.
Early Research: A Crucial Body of Knowledge
12. Ā© 2014 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
Early Research: A Crucial Body of Knowledge
12
Prior to the Study, we had these prevailing beliefs about attackers:
MYTH 2:
They are mentally ill
MYTH 3:
They make a direct threat
MYTH 1:
They fit a distinct profile
FACT 1:
Attackers do not fit
one descriptive or
demographic profile
FACT 2:
Mental illness rarely
plays a key role
in attacker behavior
FACT 3:
Persons who pose an
actual threat most often do
not make a threat
13. Ā© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com 13
Targeted Violence: Understanding and Addressing the Risk
What was learned about
the pre-attack process?
ā¢ An understandable and often discernible
process of thinking and behavior.
ā¢ Stems from an interaction among the potential
attacker, past stressful events, a current
situation and the target.
ā¢ A potential attackerās behavior is vital to
identifying his or her intentions. The attackerās
thinking, planning and logistical preparations
have to be detected and interrupted.
14. Ā© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
Attackers have motives.
ā¢ Achieve fame and notoriety.
ā¢ Law enforcement-assisted suicide.
ā¢ Bring national attention to a
perceived problem.
14
Attackers have common backgrounds.
ā¢ Despair. Depression. Suicidal thoughts.
ā¢ History of harassing or stalking.
ā¢ Major loss or change in life.
ā¢ Few arrests for violent crimes.
Attackers select targets.
ā¢ Based on their motives and
the accessibility of the target.
ā¢ Often consider more than
one target.
Targeted Violence: Understanding and Addressing the Risk
15. Ā© 2014 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
Targeted Violence: Understanding and Addressing the Risk
15
What are āattack-related behaviorsā?
ā¢ Interest or obsession with violence
ā¢ Develop attack plan
ā¢ Approach or visit site of attack
ā¢ Attempted assault or actual attack
ā¢ Attempt to penetrate security
ā¢ Approach or visit site with weapon
16. Ā© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com 16
Targeted Violence: Understanding and Addressing the Risk
Assess potential threats from
the outside, looking in.
ā¢ Always remember that the question
at the core of a threat assessment is
not āHas the subject made a threat?ā
but āDoes the subject pose a threat?ā
ā¢ Investigations are behavior-based
rather than statement-based.
ā¢ Information sharing is key
to prevention.
17. Ā© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
Prevention: Behavioral Threat Assessment
What is Behavioral Threat
Assessment?
The process of gathering and assessing
information about persons who may have the
interest, motive, intention and capability of
committing an act of targeted violence.
Threat Assessment is the approach
supported by the Exceptional Case Study
Project findings.
17
18. Ā© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
Prevention: Behavioral Threat Assessment
Behavioral threat assessment ā three key processes
18
Manage
The threat the
individual poses
Assess
If the individual poses a
risk ā gather information
from multiple sources
Identify
Individuals who have
the idea or intent
of attacking
19. Ā© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
Profiling
Automated
Decision-
Making
Structured
Clinical
Assessment /
Guided
Professional
Judgment
Prevention: Behavioral Threat Assessment
Various approaches to assessing the likelihood
of violence exist. Most are effective in one or
more respects ā but ineffective in others.
19
20. Ā© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com 20
What motivated the subject to make the
statement or take the action which caused
him or her to come to our attention?1
Prevention: Protective Intelligence - Ten Key Questions
21. Ā© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
What has the subject communicated to
anyone concerning his or her intentions?
21
2
Prevention: Protective Intelligence - Ten Key Questions
22. Ā© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
Has the subject shown inappropriate interest
in assassins, weapons, militant ideas or
mass murders?
22
3
Protective Intelligence: Ten Key Questions
23. Ā© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
Is there evidence that the subject has
engaged in attack-related behavior
targeting our protectee(s)?
23
4
Prevention: Protective Intelligence - Ten Key Questions
24. Ā© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
Does the subject have a history of mental illness
involving command hallucinations, delusional
ideas, feelings of persecution, etc.?
24
5
Prevention: Protective Intelligence - Ten Key Questions
25. Ā© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
Does the subject have the ability to
plan and execute a violent action against
one of our protectees?
25
6
Prevention: Protective Intelligence - Ten Key Questions
26. Ā© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
Is there evidence that the subject is
experiencing desperation and/or despair?
26
7
Prevention: Protective Intelligence - Ten Key Questions
27. Ā© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
Is what the subject says consistent
with his or her actions?
27
8
Protective Intelligence: Ten Key Questions
28. Ā© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
Is there concern among those who know
the subject that he or she might take
action based on inappropriate ideas?
28
9
Prevention: Protective Intelligence - Ten Key Questions
29. Ā© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
Are there factors in the subjectās life or
environment which might increase or decrease
the likelihood of the subject attempting to
attack a protectee?
29
10
Prevention: Protective Intelligence - Ten Key Questions
30. Ā© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
Real-life Context: Case Studies
Managing a Stalker Incident
An anonymous caller reported one of the
firmās receptionists was slandering its
management team. The company quickly
learned the caller was known to their
employee and had been stalking her for
over a year. Calls to local law
enforcement resulted in an initial flurry of
incident reports and administrative filings,
but progress in the case quickly stalled.
30
31. Ā© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
Real-life Context: Case Studies
A Former Employeeās
Potential for Violence
A disgruntled former employee
began sending inappropriate
emails to current employees.
The client needed to assess the
individualās potential for violence.
31
32. Ā© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
Real-life Context: Case Studies
The Facebook Threat
An employee in an East Coast branch
office posted threatening statements
about company personnel on his
Facebook wall along with several pictures
of himself posing with weapons.
32
33. Ā© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com 33
PART III
Practicing Prevention:
Critical Issues and Insights
Robert Davis, Senior Vice President
34. Ā© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
Targeted workplace violence
in the United States
On average, 1.7 million people annually are victims of violent crime
while working ā including an average of 700 homicides per year.
34
Best Practices: Critical Issues to Keep in Mind
35. Ā© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
Best Practices: Critical Issues to Keep in Mind
35
U.S. Workplace Homicides
by Type, 2011-2012
36. Ā© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
Best Practices: Critical Issues to Keep in Mind
36
We must be PREPARED.
An Active Shooter is an individual actively
engaged in killing or attempting to kill people
in a confined and populated area.
ā¢ 37% of attacks ended in less than 5 minutes
ā¢ Average attack lasted 12 minutes
ā¢ 74% of attackers entered through main entrance
ā¢ 51% of attacks occurred in workplace
We must do everything possible
to PREVENT active shooter events.
37. Ā© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
Active
Shooter
Plan
Active Shooter Plan: Four Key Components
37
An Active Shooter Plan
Consists of Four
Key Components
ā¢ Prevent & Mitigate
ā¢ Prepare
ā¢ Respond
ā¢ Recover
38. Ā© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
Active Shooter Plan: Prevent and Mitigate
ā¢ Workplace Violence Prevention
(Pre-Employment Screening and EAP)
ā¢ Threat Assessment
ā¢ Active Shooter Training
ā¢ Active Shooter Committee
38
39. Ā© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
Active Shooter Plan: Prepare
Take a leadership role
in the pre-planning and
training process with:
ā¢ First Responders, including
police, fire and medical
ā¢ All departments
ā¢ Key stakeholders, including
management, human
resources and leadership
39
40. Ā© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
Active Shooter Plan: Respond
Follow DHS Guidelines
RUN > HIDE > FIGHT
ā¢ Implementation of internal and external
emergency management plans
ā¢ Coordinated Incident Command Posts
ā¢ Media Relations Center
40
41. Ā© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
Active Shooter Plan: Recover
ā¢ Restoration of normal operations ā
internal and external
ā¢ Debriefings
ā¢ Post-incident press conferences
ā¢ Multi-disciplinary debriefings
ā¢ After-action report
41
42. Ā© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
Best Practices: Critical Issues to Keep in Mind
Internal investigations
are controlled by
the organization
External investigations
are controlled by law
enforcement agencies
43. Ā© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
Best Practices: Critical Issues to Keep in Mind
Why workplace violence prevention is not
best left to law enforcement.
43
ā¢ Traditional law enforcement primarily focuses on
post-event operations ā investigating, seizing evidence,
arresting suspects and prosecuting the accused.
ā¢ Unless law enforcement officials have received specific
training on violence prevention, they are not likely to take
advantage of information reported to them in an effective
manner.
ā¢ In a worst-case scenario, they may entirely fail to
respond in any meaningful way.
44. Ā© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
ASIS Standard on Workplace Violence
Provides an overview of
policies, processes and
protocols organizations can
adopt to help:
ā¢ Identify and prevent threatening
behaviors and violence affecting
the workplace, and
ā¢ Better address and resolve threats and
violence that have actually occurred.
44
45. Ā© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
Questions and Discussion
45
Matthew Doherty
Senior Vice President
matthew.doherty@hillardheintze.com
Michael Crane, Esq., CPP, CFE
Senior Vice President
michael.crane@hillardheintze.com
Robert Davis
Senior Vice President
robert.davis@hillardheintze.com
30 South Wacker Drive, Suite 1400
Chicago, Illinois 60606
312.869.8500
Regis W. Becker, CPP
Chief Ethics & Compliance Officer
The Pennsylvania State University
rwb32@psu.edu