SlideShare a Scribd company logo
1 of 45
Download to read offline
Matthew Doherty, Senior Vice President
Robert Davis, Senior Vice President
Michael Crane, Esq., CPP, CFE, Senior Vice President
and Regis Becker, CPP, Chief Ethics and Compliance Officer
from The Pennsylvania State University
The Role of Protective Intelligence in Managing Threats
Associated with Targeted Violence and the Active Shooter
© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
AGENDA
PART I
Why We're Here: Context and Mindset
PART II
Know Your Enemy: Threat Assessment
and Protective Intelligence
PART III
Practicing Prevention:
Critical Issues and Insights
2
© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
PART I
Why We're Here:
Context and Mindset
Michael Crane, Esq., CPP, CFE
Senior Vice President, Hillard Heintze
3
© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com 4
Employers must maintain
“a place of employment
which is free from
recognized hazards that
are causing or are likely to
cause death or serious
physical harm ...”
OSHA/MOSHA
Protecting the Workplace: A Top Priority
© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
Protecting the Workplace: A New Risk
5
Family of Navy Yard shooting
victim files wrongful-death claim
• $37.5 million suit alleges the Navy and
the Department of Veterans Affairs
overlooked or missed a series of red flags
that should have alerted them to the
troubled history of the shooter.
• The action could inspire other
victims’ families to seek legal
advice or file lawsuits.
© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
Protecting the Workplace: Foreseeability
6
Beware of the warning signs
Was the ABB Power Plant shooting preventable?
• Known to be disgruntled, unhappy at work and angry at the company.
• Friends said he complained about pressure and conflict with supervisors.
• Part of a class-action lawsuit against the company
over pension plan and 401(k) fees and expenses.
• Subject purchased two of the four weapons
he used in the incident only the day before –
an AK-47 and a 12-gauge shotgun.
© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
Common Roadblocks: Overcoming the Barriers
Multiple factors impede workplace
violence prevention
• Lack of awareness about the knowable
indicators of a potential attack.
• Poor understanding of risk and
mitigation measures.
• Limited cross-functional collaboration
and information sharing.
• Absence of an overall strategy to address
targeted violence prevention.
7
© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
Targeted Violence: Understanding and Addressing the Risk
Targeted Violence is any incident of violence where a known or knowable
attacker selects a particular target prior to their violent attack.
8
© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
A Proactive Approach: Prevention and Early Intervention
To manage threats associated with targeted
violence and the active shooter, we must
first gain an understanding of the factors
that may indicate potential risk.
This includes:
• Dispelling prevailing beliefs about attackers.
• Understanding the pre-attack process.
• Learning the processes involved in behavioral
threat assessment and protective intelligence.
© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
PART II
Know Your Enemy:
Threat Assessment and
Protective Intelligence
Matthew Doherty, Senior Vice President
10
© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com 11
Exceptional Case Study Project
The U.S. Secret Service and National Institute of Justice
FIVE-YEAR STUDY
Examined the thinking and behavior of
83 attackers from 1949 to 1996.
74 ATTACKS
• 6 attacks were carried out by 16 individuals
who were members of a group.
• 68 attacks were carried out by
individuals acting alone.
• 24 of the 83 attackers were interviewed.
Early Research: A Crucial Body of Knowledge
© 2014 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
Early Research: A Crucial Body of Knowledge
12
Prior to the Study, we had these prevailing beliefs about attackers:
MYTH 2:
They are mentally ill
MYTH 3:
They make a direct threat
MYTH 1:
They fit a distinct profile
FACT 1:
Attackers do not fit
one descriptive or
demographic profile
FACT 2:
Mental illness rarely
plays a key role
in attacker behavior
FACT 3:
Persons who pose an
actual threat most often do
not make a threat
© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com 13
Targeted Violence: Understanding and Addressing the Risk
What was learned about
the pre-attack process?
• An understandable and often discernible
process of thinking and behavior.
• Stems from an interaction among the potential
attacker, past stressful events, a current
situation and the target.
• A potential attacker’s behavior is vital to
identifying his or her intentions. The attacker’s
thinking, planning and logistical preparations
have to be detected and interrupted.
© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
Attackers have motives.
• Achieve fame and notoriety.
• Law enforcement-assisted suicide.
• Bring national attention to a
perceived problem.
14
Attackers have common backgrounds.
• Despair. Depression. Suicidal thoughts.
• History of harassing or stalking.
• Major loss or change in life.
• Few arrests for violent crimes.
Attackers select targets.
• Based on their motives and
the accessibility of the target.
• Often consider more than
one target.
Targeted Violence: Understanding and Addressing the Risk
© 2014 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
Targeted Violence: Understanding and Addressing the Risk
15
What are “attack-related behaviors”?
• Interest or obsession with violence
• Develop attack plan
• Approach or visit site of attack
• Attempted assault or actual attack
• Attempt to penetrate security
• Approach or visit site with weapon
© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com 16
Targeted Violence: Understanding and Addressing the Risk
Assess potential threats from
the outside, looking in.
• Always remember that the question
at the core of a threat assessment is
not “Has the subject made a threat?”
but “Does the subject pose a threat?”
• Investigations are behavior-based
rather than statement-based.
• Information sharing is key
to prevention.
© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
Prevention: Behavioral Threat Assessment
What is Behavioral Threat
Assessment?
The process of gathering and assessing
information about persons who may have the
interest, motive, intention and capability of
committing an act of targeted violence.
Threat Assessment is the approach
supported by the Exceptional Case Study
Project findings.
17
© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
Prevention: Behavioral Threat Assessment
Behavioral threat assessment – three key processes
18
Manage
The threat the
individual poses
Assess
If the individual poses a
risk – gather information
from multiple sources
Identify
Individuals who have
the idea or intent
of attacking
© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
Profiling
Automated
Decision-
Making
Structured
Clinical
Assessment /
Guided
Professional
Judgment
Prevention: Behavioral Threat Assessment
Various approaches to assessing the likelihood
of violence exist. Most are effective in one or
more respects – but ineffective in others.
19
© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com 20
What motivated the subject to make the
statement or take the action which caused
him or her to come to our attention?1
Prevention: Protective Intelligence - Ten Key Questions
© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
What has the subject communicated to
anyone concerning his or her intentions?
21
2
Prevention: Protective Intelligence - Ten Key Questions
© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
Has the subject shown inappropriate interest
in assassins, weapons, militant ideas or
mass murders?
22
3
Protective Intelligence: Ten Key Questions
© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
Is there evidence that the subject has
engaged in attack-related behavior
targeting our protectee(s)?
23
4
Prevention: Protective Intelligence - Ten Key Questions
© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
Does the subject have a history of mental illness
involving command hallucinations, delusional
ideas, feelings of persecution, etc.?
24
5
Prevention: Protective Intelligence - Ten Key Questions
© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
Does the subject have the ability to
plan and execute a violent action against
one of our protectees?
25
6
Prevention: Protective Intelligence - Ten Key Questions
© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
Is there evidence that the subject is
experiencing desperation and/or despair?
26
7
Prevention: Protective Intelligence - Ten Key Questions
© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
Is what the subject says consistent
with his or her actions?
27
8
Protective Intelligence: Ten Key Questions
© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
Is there concern among those who know
the subject that he or she might take
action based on inappropriate ideas?
28
9
Prevention: Protective Intelligence - Ten Key Questions
© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
Are there factors in the subject’s life or
environment which might increase or decrease
the likelihood of the subject attempting to
attack a protectee?
29
10
Prevention: Protective Intelligence - Ten Key Questions
© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
Real-life Context: Case Studies
Managing a Stalker Incident
An anonymous caller reported one of the
firm’s receptionists was slandering its
management team. The company quickly
learned the caller was known to their
employee and had been stalking her for
over a year. Calls to local law
enforcement resulted in an initial flurry of
incident reports and administrative filings,
but progress in the case quickly stalled.
30
© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
Real-life Context: Case Studies
A Former Employee’s
Potential for Violence
A disgruntled former employee
began sending inappropriate
emails to current employees.
The client needed to assess the
individual’s potential for violence.
31
© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
Real-life Context: Case Studies
The Facebook Threat
An employee in an East Coast branch
office posted threatening statements
about company personnel on his
Facebook wall along with several pictures
of himself posing with weapons.
32
© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com 33
PART III
Practicing Prevention:
Critical Issues and Insights
Robert Davis, Senior Vice President
© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
Targeted workplace violence
in the United States
On average, 1.7 million people annually are victims of violent crime
while working – including an average of 700 homicides per year.
34
Best Practices: Critical Issues to Keep in Mind
© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
Best Practices: Critical Issues to Keep in Mind
35
U.S. Workplace Homicides
by Type, 2011-2012
© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
Best Practices: Critical Issues to Keep in Mind
36
We must be PREPARED.
An Active Shooter is an individual actively
engaged in killing or attempting to kill people
in a confined and populated area.
• 37% of attacks ended in less than 5 minutes
• Average attack lasted 12 minutes
• 74% of attackers entered through main entrance
• 51% of attacks occurred in workplace
We must do everything possible
to PREVENT active shooter events.
© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
Active
Shooter
Plan
Active Shooter Plan: Four Key Components
37
An Active Shooter Plan
Consists of Four
Key Components
• Prevent & Mitigate
• Prepare
• Respond
• Recover
© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
Active Shooter Plan: Prevent and Mitigate
• Workplace Violence Prevention
(Pre-Employment Screening and EAP)
• Threat Assessment
• Active Shooter Training
• Active Shooter Committee
38
© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
Active Shooter Plan: Prepare
Take a leadership role
in the pre-planning and
training process with:
• First Responders, including
police, fire and medical
• All departments
• Key stakeholders, including
management, human
resources and leadership
39
© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
Active Shooter Plan: Respond
Follow DHS Guidelines
RUN > HIDE > FIGHT
• Implementation of internal and external
emergency management plans
• Coordinated Incident Command Posts
• Media Relations Center
40
© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
Active Shooter Plan: Recover
• Restoration of normal operations –
internal and external
• Debriefings
• Post-incident press conferences
• Multi-disciplinary debriefings
• After-action report
41
© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
Best Practices: Critical Issues to Keep in Mind
Internal investigations
are controlled by
the organization
External investigations
are controlled by law
enforcement agencies
© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
Best Practices: Critical Issues to Keep in Mind
Why workplace violence prevention is not
best left to law enforcement.
43
• Traditional law enforcement primarily focuses on
post-event operations – investigating, seizing evidence,
arresting suspects and prosecuting the accused.
• Unless law enforcement officials have received specific
training on violence prevention, they are not likely to take
advantage of information reported to them in an effective
manner.
• In a worst-case scenario, they may entirely fail to
respond in any meaningful way.
© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
ASIS Standard on Workplace Violence
Provides an overview of
policies, processes and
protocols organizations can
adopt to help:
• Identify and prevent threatening
behaviors and violence affecting
the workplace, and
• Better address and resolve threats and
violence that have actually occurred.
44
© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
Questions and Discussion
45
Matthew Doherty
Senior Vice President
matthew.doherty@hillardheintze.com
Michael Crane, Esq., CPP, CFE
Senior Vice President
michael.crane@hillardheintze.com
Robert Davis
Senior Vice President
robert.davis@hillardheintze.com
30 South Wacker Drive, Suite 1400
Chicago, Illinois 60606
312.869.8500
Regis W. Becker, CPP
Chief Ethics & Compliance Officer
The Pennsylvania State University
rwb32@psu.edu

More Related Content

Viewers also liked

Invisible rivalry Second Draft
Invisible rivalry Second DraftInvisible rivalry Second Draft
Invisible rivalry Second DraftCurtis Groombridge
 
1 athletics track events, field events & road events (1)
1 athletics track events, field events & road events (1)1 athletics track events, field events & road events (1)
1 athletics track events, field events & road events (1)isabellara2000
 
Rab kie kit dak bk kb n 2014
Rab kie kit dak bk kb n 2014Rab kie kit dak bk kb n 2014
Rab kie kit dak bk kb n 2014Asaka Cv
 
Innovation Day Post Event Report Conceptia (2)
Innovation Day   Post Event Report Conceptia (2)Innovation Day   Post Event Report Conceptia (2)
Innovation Day Post Event Report Conceptia (2)Cherian Joseph
 
η πρωτη μου εμπειρια στην ενσωματωση τεχνολογιας στην εκπαίδευση
η πρωτη μου εμπειρια στην ενσωματωση τεχνολογιας στην εκπαίδευσηη πρωτη μου εμπειρια στην ενσωματωση τεχνολογιας στην εκπαίδευση
η πρωτη μου εμπειρια στην ενσωματωση τεχνολογιας στην εκπαίδευσηMargarita Agapiou
 
Final major project evaluation revisited
Final major project evaluation revisitedFinal major project evaluation revisited
Final major project evaluation revisitedJack Dixon
 
Team's lack of responsibility - sources and solutions
Team's lack of responsibility - sources and solutionsTeam's lack of responsibility - sources and solutions
Team's lack of responsibility - sources and solutionsEvgeniy Labunskiy
 
Media Creativity F13 Agency Tour1
Media Creativity F13 Agency Tour1Media Creativity F13 Agency Tour1
Media Creativity F13 Agency Tour1Murray Christenson
 
グリーンズ編集学校@名古屋第一期 一回目
グリーンズ編集学校@名古屋第一期 一回目グリーンズ編集学校@名古屋第一期 一回目
グリーンズ編集学校@名古屋第一期 一回目Yoshihiro Kanematsu
 
Douglas Arellanes - Find a way or make one: Transforming the news media by sh...
Douglas Arellanes - Find a way or make one: Transforming the news media by sh...Douglas Arellanes - Find a way or make one: Transforming the news media by sh...
Douglas Arellanes - Find a way or make one: Transforming the news media by sh...Rockit Conference
 
The Lithuanian Economy - No 5, August 5, 2011
The Lithuanian Economy - No 5, August 5,  2011The Lithuanian Economy - No 5, August 5,  2011
The Lithuanian Economy - No 5, August 5, 2011Swedbank
 
4 channel relay driver remote
4 channel relay driver remote4 channel relay driver remote
4 channel relay driver remoteBien Morfe
 

Viewers also liked (17)

War against Identity Theft and Phising attack
War against Identity Theft and Phising attack War against Identity Theft and Phising attack
War against Identity Theft and Phising attack
 
Invisible rivalry Second Draft
Invisible rivalry Second DraftInvisible rivalry Second Draft
Invisible rivalry Second Draft
 
Live Your Dream JCI konferencija 2012
Live Your Dream JCI konferencija 2012Live Your Dream JCI konferencija 2012
Live Your Dream JCI konferencija 2012
 
1 athletics track events, field events & road events (1)
1 athletics track events, field events & road events (1)1 athletics track events, field events & road events (1)
1 athletics track events, field events & road events (1)
 
Rab kie kit dak bk kb n 2014
Rab kie kit dak bk kb n 2014Rab kie kit dak bk kb n 2014
Rab kie kit dak bk kb n 2014
 
Gothic styles
Gothic stylesGothic styles
Gothic styles
 
Record labels
Record labelsRecord labels
Record labels
 
Innovation Day Post Event Report Conceptia (2)
Innovation Day   Post Event Report Conceptia (2)Innovation Day   Post Event Report Conceptia (2)
Innovation Day Post Event Report Conceptia (2)
 
η πρωτη μου εμπειρια στην ενσωματωση τεχνολογιας στην εκπαίδευση
η πρωτη μου εμπειρια στην ενσωματωση τεχνολογιας στην εκπαίδευσηη πρωτη μου εμπειρια στην ενσωματωση τεχνολογιας στην εκπαίδευση
η πρωτη μου εμπειρια στην ενσωματωση τεχνολογιας στην εκπαίδευση
 
PORTFOLIO NAVIN
PORTFOLIO NAVINPORTFOLIO NAVIN
PORTFOLIO NAVIN
 
Final major project evaluation revisited
Final major project evaluation revisitedFinal major project evaluation revisited
Final major project evaluation revisited
 
Team's lack of responsibility - sources and solutions
Team's lack of responsibility - sources and solutionsTeam's lack of responsibility - sources and solutions
Team's lack of responsibility - sources and solutions
 
Media Creativity F13 Agency Tour1
Media Creativity F13 Agency Tour1Media Creativity F13 Agency Tour1
Media Creativity F13 Agency Tour1
 
グリーンズ編集学校@名古屋第一期 一回目
グリーンズ編集学校@名古屋第一期 一回目グリーンズ編集学校@名古屋第一期 一回目
グリーンズ編集学校@名古屋第一期 一回目
 
Douglas Arellanes - Find a way or make one: Transforming the news media by sh...
Douglas Arellanes - Find a way or make one: Transforming the news media by sh...Douglas Arellanes - Find a way or make one: Transforming the news media by sh...
Douglas Arellanes - Find a way or make one: Transforming the news media by sh...
 
The Lithuanian Economy - No 5, August 5, 2011
The Lithuanian Economy - No 5, August 5,  2011The Lithuanian Economy - No 5, August 5,  2011
The Lithuanian Economy - No 5, August 5, 2011
 
4 channel relay driver remote
4 channel relay driver remote4 channel relay driver remote
4 channel relay driver remote
 

Similar to The Role of Protective Intelligence in Managing Threats Associated with Targeted Violence and the Active Shooter

Hillard Heintze Presentation to ATAP - Part 1
Hillard Heintze Presentation to ATAP - Part 1Hillard Heintze Presentation to ATAP - Part 1
Hillard Heintze Presentation to ATAP - Part 1Hillard Heintze
 
Hillard Heintze Presentation to ATAP - Part 2
Hillard Heintze Presentation to ATAP - Part 2Hillard Heintze Presentation to ATAP - Part 2
Hillard Heintze Presentation to ATAP - Part 2Hillard Heintze
 
Breach Response Matters: Effectively Handling Health Care Cyber Security Inci...
Breach Response Matters: Effectively Handling Health Care Cyber Security Inci...Breach Response Matters: Effectively Handling Health Care Cyber Security Inci...
Breach Response Matters: Effectively Handling Health Care Cyber Security Inci...Polsinelli PC
 
Emotion Drives Behavior: Building a Data Narrative
Emotion Drives Behavior: Building a Data NarrativeEmotion Drives Behavior: Building a Data Narrative
Emotion Drives Behavior: Building a Data Narrativeevolve24
 
Comprehensive Active Shooter Incident Management
Comprehensive Active Shooter Incident ManagementComprehensive Active Shooter Incident Management
Comprehensive Active Shooter Incident ManagementWilliam Penfield
 
Cyber Crime Threat Landscape - A Focus on the Financial Industry
Cyber Crime Threat Landscape - A Focus on the Financial IndustryCyber Crime Threat Landscape - A Focus on the Financial Industry
Cyber Crime Threat Landscape - A Focus on the Financial IndustryWilliam McBorrough
 
Hillard Heintze Presentation to ATAP - Part 4
Hillard Heintze Presentation to ATAP - Part 4Hillard Heintze Presentation to ATAP - Part 4
Hillard Heintze Presentation to ATAP - Part 4Hillard Heintze
 
Hillard Heintze Presentation to ATAP - Part 3
Hillard Heintze Presentation to ATAP - Part 3Hillard Heintze Presentation to ATAP - Part 3
Hillard Heintze Presentation to ATAP - Part 3Hillard Heintze
 
Managing Risk or Reacting to Compliance
Managing Risk or Reacting to ComplianceManaging Risk or Reacting to Compliance
Managing Risk or Reacting to ComplianceEvan Francen
 
The risk of risks reputation risk and resiliency Linda LOCKE
The risk of risks reputation risk and resiliency Linda LOCKEThe risk of risks reputation risk and resiliency Linda LOCKE
The risk of risks reputation risk and resiliency Linda LOCKEİtibar Yönetimi Enstitüsü
 
Active Shooter - The New Cyber
Active Shooter - The New CyberActive Shooter - The New Cyber
Active Shooter - The New CyberCBIZ, Inc.
 
TITLE IX CONFLICTS & ROLES: MHA NASPA Law Conference 2011
TITLE IX CONFLICTS & ROLES: MHA NASPA Law Conference 2011TITLE IX CONFLICTS & ROLES: MHA NASPA Law Conference 2011
TITLE IX CONFLICTS & ROLES: MHA NASPA Law Conference 2011Margolis Healy
 
Prepare to Care: Supporting Personnel Following a Tragedy
Prepare to Care: Supporting Personnel Following a TragedyPrepare to Care: Supporting Personnel Following a Tragedy
Prepare to Care: Supporting Personnel Following a TragedyDorie Jones, M.Div, MSW
 
Step Into Security Webinar - Threat Assessments in Schools
Step Into Security Webinar - Threat Assessments in SchoolsStep Into Security Webinar - Threat Assessments in Schools
Step Into Security Webinar - Threat Assessments in SchoolsKeith Harris
 
An Invitation to Hack: Wiley Rein and HackerOne Webinar on Vulnerability Disc...
An Invitation to Hack: Wiley Rein and HackerOne Webinar on Vulnerability Disc...An Invitation to Hack: Wiley Rein and HackerOne Webinar on Vulnerability Disc...
An Invitation to Hack: Wiley Rein and HackerOne Webinar on Vulnerability Disc...HackerOne
 
“New” Misconduct Challenges and Solutions for Investigating as We Move to a ...
“New” Misconduct Challenges and Solutions for Investigating as We Move to a ...“New” Misconduct Challenges and Solutions for Investigating as We Move to a ...
“New” Misconduct Challenges and Solutions for Investigating as We Move to a ...Case IQ
 
Crisis Communications: Manage (and Avoid) Crises with Media Monitoring
Crisis Communications: Manage (and Avoid) Crises with Media MonitoringCrisis Communications: Manage (and Avoid) Crises with Media Monitoring
Crisis Communications: Manage (and Avoid) Crises with Media MonitoringCARMA
 

Similar to The Role of Protective Intelligence in Managing Threats Associated with Targeted Violence and the Active Shooter (20)

Hillard Heintze Presentation to ATAP - Part 1
Hillard Heintze Presentation to ATAP - Part 1Hillard Heintze Presentation to ATAP - Part 1
Hillard Heintze Presentation to ATAP - Part 1
 
Hillard Heintze Presentation to ATAP - Part 2
Hillard Heintze Presentation to ATAP - Part 2Hillard Heintze Presentation to ATAP - Part 2
Hillard Heintze Presentation to ATAP - Part 2
 
Breach Response Matters: Effectively Handling Health Care Cyber Security Inci...
Breach Response Matters: Effectively Handling Health Care Cyber Security Inci...Breach Response Matters: Effectively Handling Health Care Cyber Security Inci...
Breach Response Matters: Effectively Handling Health Care Cyber Security Inci...
 
Emotion Drives Behavior: Building a Data Narrative
Emotion Drives Behavior: Building a Data NarrativeEmotion Drives Behavior: Building a Data Narrative
Emotion Drives Behavior: Building a Data Narrative
 
Comprehensive Active Shooter Incident Management
Comprehensive Active Shooter Incident ManagementComprehensive Active Shooter Incident Management
Comprehensive Active Shooter Incident Management
 
Cyber Crime Threat Landscape - A Focus on the Financial Industry
Cyber Crime Threat Landscape - A Focus on the Financial IndustryCyber Crime Threat Landscape - A Focus on the Financial Industry
Cyber Crime Threat Landscape - A Focus on the Financial Industry
 
Hillard Heintze Presentation to ATAP - Part 4
Hillard Heintze Presentation to ATAP - Part 4Hillard Heintze Presentation to ATAP - Part 4
Hillard Heintze Presentation to ATAP - Part 4
 
Hillard Heintze Presentation to ATAP - Part 3
Hillard Heintze Presentation to ATAP - Part 3Hillard Heintze Presentation to ATAP - Part 3
Hillard Heintze Presentation to ATAP - Part 3
 
Risk in the changing world – Opportunity or threat
Risk in the changing world – Opportunity or threatRisk in the changing world – Opportunity or threat
Risk in the changing world – Opportunity or threat
 
Managing Risk or Reacting to Compliance
Managing Risk or Reacting to ComplianceManaging Risk or Reacting to Compliance
Managing Risk or Reacting to Compliance
 
The risk of risks reputation risk and resiliency Linda LOCKE
The risk of risks reputation risk and resiliency Linda LOCKEThe risk of risks reputation risk and resiliency Linda LOCKE
The risk of risks reputation risk and resiliency Linda LOCKE
 
Active Shooter - The New Cyber
Active Shooter - The New CyberActive Shooter - The New Cyber
Active Shooter - The New Cyber
 
TITLE IX CONFLICTS & ROLES: MHA NASPA Law Conference 2011
TITLE IX CONFLICTS & ROLES: MHA NASPA Law Conference 2011TITLE IX CONFLICTS & ROLES: MHA NASPA Law Conference 2011
TITLE IX CONFLICTS & ROLES: MHA NASPA Law Conference 2011
 
Reputation and Traceabilty of the Food Supply Chain
Reputation and Traceabilty of the Food Supply ChainReputation and Traceabilty of the Food Supply Chain
Reputation and Traceabilty of the Food Supply Chain
 
Crisis management
Crisis managementCrisis management
Crisis management
 
Prepare to Care: Supporting Personnel Following a Tragedy
Prepare to Care: Supporting Personnel Following a TragedyPrepare to Care: Supporting Personnel Following a Tragedy
Prepare to Care: Supporting Personnel Following a Tragedy
 
Step Into Security Webinar - Threat Assessments in Schools
Step Into Security Webinar - Threat Assessments in SchoolsStep Into Security Webinar - Threat Assessments in Schools
Step Into Security Webinar - Threat Assessments in Schools
 
An Invitation to Hack: Wiley Rein and HackerOne Webinar on Vulnerability Disc...
An Invitation to Hack: Wiley Rein and HackerOne Webinar on Vulnerability Disc...An Invitation to Hack: Wiley Rein and HackerOne Webinar on Vulnerability Disc...
An Invitation to Hack: Wiley Rein and HackerOne Webinar on Vulnerability Disc...
 
“New” Misconduct Challenges and Solutions for Investigating as We Move to a ...
“New” Misconduct Challenges and Solutions for Investigating as We Move to a ...“New” Misconduct Challenges and Solutions for Investigating as We Move to a ...
“New” Misconduct Challenges and Solutions for Investigating as We Move to a ...
 
Crisis Communications: Manage (and Avoid) Crises with Media Monitoring
Crisis Communications: Manage (and Avoid) Crises with Media MonitoringCrisis Communications: Manage (and Avoid) Crises with Media Monitoring
Crisis Communications: Manage (and Avoid) Crises with Media Monitoring
 

Recently uploaded

DIGHA CALL GIRL 92628/1154 DIGHA CALL GI
DIGHA CALL GIRL 92628/1154 DIGHA CALL GIDIGHA CALL GIRL 92628/1154 DIGHA CALL GI
DIGHA CALL GIRL 92628/1154 DIGHA CALL GINiteshKumar82226
 
RAJKOT CALL GIRLS 92628/71154 RAJKOT CAL
RAJKOT CALL GIRLS 92628/71154 RAJKOT CALRAJKOT CALL GIRLS 92628/71154 RAJKOT CAL
RAJKOT CALL GIRLS 92628/71154 RAJKOT CALNiteshKumar82226
 
Low Rate Russian Call Girls In Lajpat Nagar ➡️ 7836950116 Call Girls Service ...
Low Rate Russian Call Girls In Lajpat Nagar ➡️ 7836950116 Call Girls Service ...Low Rate Russian Call Girls In Lajpat Nagar ➡️ 7836950116 Call Girls Service ...
Low Rate Russian Call Girls In Lajpat Nagar ➡️ 7836950116 Call Girls Service ...riyasharma00119
 
9891550660 Call Girls In Noida Sector 62 Short 1500 Night 6000
9891550660 Call Girls In Noida Sector 62 Short 1500 Night 60009891550660 Call Girls In Noida Sector 62 Short 1500 Night 6000
9891550660 Call Girls In Noida Sector 62 Short 1500 Night 6000teencall080
 
Call Now ☎9870417354|| Call Girls in Noida Sector 18 Escort Service Noida N.C.R.
Call Now ☎9870417354|| Call Girls in Noida Sector 18 Escort Service Noida N.C.R.Call Now ☎9870417354|| Call Girls in Noida Sector 18 Escort Service Noida N.C.R.
Call Now ☎9870417354|| Call Girls in Noida Sector 18 Escort Service Noida N.C.R.riyadelhic riyadelhic
 
Call Girls in Saket (delhi) call me [8264348440 ] escort service 24X7
Call Girls in Saket (delhi) call me [8264348440 ] escort service 24X7Call Girls in Saket (delhi) call me [8264348440 ] escort service 24X7
Call Girls in Saket (delhi) call me [8264348440 ] escort service 24X7soniya singh
 
Call Now ☎9870417354|| Call Girls in Gurgaon Sector 13 Escort Service Gurgaon...
Call Now ☎9870417354|| Call Girls in Gurgaon Sector 13 Escort Service Gurgaon...Call Now ☎9870417354|| Call Girls in Gurgaon Sector 13 Escort Service Gurgaon...
Call Now ☎9870417354|| Call Girls in Gurgaon Sector 13 Escort Service Gurgaon...riyadelhic riyadelhic
 
Radhika Call Girls In Jaipur 9358660226 Escorts service
Radhika Call Girls In Jaipur 9358660226 Escorts serviceRadhika Call Girls In Jaipur 9358660226 Escorts service
Radhika Call Girls In Jaipur 9358660226 Escorts servicerahul222jai
 
SURAT CALL GIRL 92628/71154 SURAT CALL G
SURAT CALL GIRL 92628/71154 SURAT CALL GSURAT CALL GIRL 92628/71154 SURAT CALL G
SURAT CALL GIRL 92628/71154 SURAT CALL GNiteshKumar82226
 
💚😋Bangalore Escort Service Call Girls, ₹5000 To 25K With AC💚😋
💚😋Bangalore Escort Service Call Girls, ₹5000 To 25K With AC💚😋💚😋Bangalore Escort Service Call Girls, ₹5000 To 25K With AC💚😋
💚😋Bangalore Escort Service Call Girls, ₹5000 To 25K With AC💚😋Sheetaleventcompany
 
VAPI CALL GIRL 92628/71154 VAPI CALL GIR
VAPI CALL GIRL 92628/71154 VAPI CALL GIRVAPI CALL GIRL 92628/71154 VAPI CALL GIR
VAPI CALL GIRL 92628/71154 VAPI CALL GIRNiteshKumar82226
 
Call Girls in Rawalpindi | 🍆💦 03280288848
Call Girls in Rawalpindi | 🍆💦 03280288848Call Girls in Rawalpindi | 🍆💦 03280288848
Call Girls in Rawalpindi | 🍆💦 03280288848Ifra Zohaib
 
Call Girls | 😏💦 03274100048 | Call Girls Near Me
Call Girls | 😏💦 03274100048 | Call Girls Near MeCall Girls | 😏💦 03274100048 | Call Girls Near Me
Call Girls | 😏💦 03274100048 | Call Girls Near MeIfra Zohaib
 
+91-9310611641 Russian Call Girls In New Delhi Independent Russian Call Girls...
+91-9310611641 Russian Call Girls In New Delhi Independent Russian Call Girls...+91-9310611641 Russian Call Girls In New Delhi Independent Russian Call Girls...
+91-9310611641 Russian Call Girls In New Delhi Independent Russian Call Girls...teencall080
 
Russian Call Girls in Goa %(9316020077)# Russian Call Girls in Goa By Russi...
Russian Call Girls  in Goa %(9316020077)# Russian Call Girls  in Goa By Russi...Russian Call Girls  in Goa %(9316020077)# Russian Call Girls  in Goa By Russi...
Russian Call Girls in Goa %(9316020077)# Russian Call Girls in Goa By Russi...Goa Call Girls Service Goa escort agency
 
Call US Pooja📞 9892124323 ✅Call Girls In Mira Road ( Mumbai ) secure service...
Call US  Pooja📞 9892124323 ✅Call Girls In Mira Road ( Mumbai ) secure service...Call US  Pooja📞 9892124323 ✅Call Girls In Mira Road ( Mumbai ) secure service...
Call US Pooja📞 9892124323 ✅Call Girls In Mira Road ( Mumbai ) secure service...Pooja Nehwal
 
Best VIP Call Girls Noida Sector 23 Call Me: 8700611579
Best VIP Call Girls Noida Sector 23 Call Me: 8700611579Best VIP Call Girls Noida Sector 23 Call Me: 8700611579
Best VIP Call Girls Noida Sector 23 Call Me: 8700611579diyaspanoida
 
CALL GIRLS 9999288940 women seeking men Locanto No Advance North Goa
CALL GIRLS 9999288940 women seeking men Locanto No Advance North GoaCALL GIRLS 9999288940 women seeking men Locanto No Advance North Goa
CALL GIRLS 9999288940 women seeking men Locanto No Advance North Goadelhincr993
 

Recently uploaded (20)

DIGHA CALL GIRL 92628/1154 DIGHA CALL GI
DIGHA CALL GIRL 92628/1154 DIGHA CALL GIDIGHA CALL GIRL 92628/1154 DIGHA CALL GI
DIGHA CALL GIRL 92628/1154 DIGHA CALL GI
 
RAJKOT CALL GIRLS 92628/71154 RAJKOT CAL
RAJKOT CALL GIRLS 92628/71154 RAJKOT CALRAJKOT CALL GIRLS 92628/71154 RAJKOT CAL
RAJKOT CALL GIRLS 92628/71154 RAJKOT CAL
 
Low Rate Russian Call Girls In Lajpat Nagar ➡️ 7836950116 Call Girls Service ...
Low Rate Russian Call Girls In Lajpat Nagar ➡️ 7836950116 Call Girls Service ...Low Rate Russian Call Girls In Lajpat Nagar ➡️ 7836950116 Call Girls Service ...
Low Rate Russian Call Girls In Lajpat Nagar ➡️ 7836950116 Call Girls Service ...
 
9891550660 Call Girls In Noida Sector 62 Short 1500 Night 6000
9891550660 Call Girls In Noida Sector 62 Short 1500 Night 60009891550660 Call Girls In Noida Sector 62 Short 1500 Night 6000
9891550660 Call Girls In Noida Sector 62 Short 1500 Night 6000
 
➥🔝9953056974 🔝▻ Anand Vihar Call-girl in Women Seeking Men 🔝Delhi🔝 NCR
➥🔝9953056974 🔝▻ Anand Vihar Call-girl in Women Seeking Men 🔝Delhi🔝 NCR➥🔝9953056974 🔝▻ Anand Vihar Call-girl in Women Seeking Men 🔝Delhi🔝 NCR
➥🔝9953056974 🔝▻ Anand Vihar Call-girl in Women Seeking Men 🔝Delhi🔝 NCR
 
Call Now ☎9870417354|| Call Girls in Noida Sector 18 Escort Service Noida N.C.R.
Call Now ☎9870417354|| Call Girls in Noida Sector 18 Escort Service Noida N.C.R.Call Now ☎9870417354|| Call Girls in Noida Sector 18 Escort Service Noida N.C.R.
Call Now ☎9870417354|| Call Girls in Noida Sector 18 Escort Service Noida N.C.R.
 
Call Girls in Saket (delhi) call me [8264348440 ] escort service 24X7
Call Girls in Saket (delhi) call me [8264348440 ] escort service 24X7Call Girls in Saket (delhi) call me [8264348440 ] escort service 24X7
Call Girls in Saket (delhi) call me [8264348440 ] escort service 24X7
 
Call Now ☎9870417354|| Call Girls in Gurgaon Sector 13 Escort Service Gurgaon...
Call Now ☎9870417354|| Call Girls in Gurgaon Sector 13 Escort Service Gurgaon...Call Now ☎9870417354|| Call Girls in Gurgaon Sector 13 Escort Service Gurgaon...
Call Now ☎9870417354|| Call Girls in Gurgaon Sector 13 Escort Service Gurgaon...
 
Radhika Call Girls In Jaipur 9358660226 Escorts service
Radhika Call Girls In Jaipur 9358660226 Escorts serviceRadhika Call Girls In Jaipur 9358660226 Escorts service
Radhika Call Girls In Jaipur 9358660226 Escorts service
 
SURAT CALL GIRL 92628/71154 SURAT CALL G
SURAT CALL GIRL 92628/71154 SURAT CALL GSURAT CALL GIRL 92628/71154 SURAT CALL G
SURAT CALL GIRL 92628/71154 SURAT CALL G
 
💚😋Bangalore Escort Service Call Girls, ₹5000 To 25K With AC💚😋
💚😋Bangalore Escort Service Call Girls, ₹5000 To 25K With AC💚😋💚😋Bangalore Escort Service Call Girls, ₹5000 To 25K With AC💚😋
💚😋Bangalore Escort Service Call Girls, ₹5000 To 25K With AC💚😋
 
Call Girls In Goa For Fun 9316020077 By Goa Call Girls For Pick Up Night
Call Girls In  Goa  For Fun 9316020077 By  Goa  Call Girls For Pick Up NightCall Girls In  Goa  For Fun 9316020077 By  Goa  Call Girls For Pick Up Night
Call Girls In Goa For Fun 9316020077 By Goa Call Girls For Pick Up Night
 
VAPI CALL GIRL 92628/71154 VAPI CALL GIR
VAPI CALL GIRL 92628/71154 VAPI CALL GIRVAPI CALL GIRL 92628/71154 VAPI CALL GIR
VAPI CALL GIRL 92628/71154 VAPI CALL GIR
 
Call Girls in Rawalpindi | 🍆💦 03280288848
Call Girls in Rawalpindi | 🍆💦 03280288848Call Girls in Rawalpindi | 🍆💦 03280288848
Call Girls in Rawalpindi | 🍆💦 03280288848
 
Call Girls | 😏💦 03274100048 | Call Girls Near Me
Call Girls | 😏💦 03274100048 | Call Girls Near MeCall Girls | 😏💦 03274100048 | Call Girls Near Me
Call Girls | 😏💦 03274100048 | Call Girls Near Me
 
+91-9310611641 Russian Call Girls In New Delhi Independent Russian Call Girls...
+91-9310611641 Russian Call Girls In New Delhi Independent Russian Call Girls...+91-9310611641 Russian Call Girls In New Delhi Independent Russian Call Girls...
+91-9310611641 Russian Call Girls In New Delhi Independent Russian Call Girls...
 
Russian Call Girls in Goa %(9316020077)# Russian Call Girls in Goa By Russi...
Russian Call Girls  in Goa %(9316020077)# Russian Call Girls  in Goa By Russi...Russian Call Girls  in Goa %(9316020077)# Russian Call Girls  in Goa By Russi...
Russian Call Girls in Goa %(9316020077)# Russian Call Girls in Goa By Russi...
 
Call US Pooja📞 9892124323 ✅Call Girls In Mira Road ( Mumbai ) secure service...
Call US  Pooja📞 9892124323 ✅Call Girls In Mira Road ( Mumbai ) secure service...Call US  Pooja📞 9892124323 ✅Call Girls In Mira Road ( Mumbai ) secure service...
Call US Pooja📞 9892124323 ✅Call Girls In Mira Road ( Mumbai ) secure service...
 
Best VIP Call Girls Noida Sector 23 Call Me: 8700611579
Best VIP Call Girls Noida Sector 23 Call Me: 8700611579Best VIP Call Girls Noida Sector 23 Call Me: 8700611579
Best VIP Call Girls Noida Sector 23 Call Me: 8700611579
 
CALL GIRLS 9999288940 women seeking men Locanto No Advance North Goa
CALL GIRLS 9999288940 women seeking men Locanto No Advance North GoaCALL GIRLS 9999288940 women seeking men Locanto No Advance North Goa
CALL GIRLS 9999288940 women seeking men Locanto No Advance North Goa
 

The Role of Protective Intelligence in Managing Threats Associated with Targeted Violence and the Active Shooter

  • 1. Matthew Doherty, Senior Vice President Robert Davis, Senior Vice President Michael Crane, Esq., CPP, CFE, Senior Vice President and Regis Becker, CPP, Chief Ethics and Compliance Officer from The Pennsylvania State University The Role of Protective Intelligence in Managing Threats Associated with Targeted Violence and the Active Shooter
  • 2. © 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com AGENDA PART I Why We're Here: Context and Mindset PART II Know Your Enemy: Threat Assessment and Protective Intelligence PART III Practicing Prevention: Critical Issues and Insights 2
  • 3. © 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com PART I Why We're Here: Context and Mindset Michael Crane, Esq., CPP, CFE Senior Vice President, Hillard Heintze 3
  • 4. © 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com 4 Employers must maintain “a place of employment which is free from recognized hazards that are causing or are likely to cause death or serious physical harm ...” OSHA/MOSHA Protecting the Workplace: A Top Priority
  • 5. © 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com Protecting the Workplace: A New Risk 5 Family of Navy Yard shooting victim files wrongful-death claim • $37.5 million suit alleges the Navy and the Department of Veterans Affairs overlooked or missed a series of red flags that should have alerted them to the troubled history of the shooter. • The action could inspire other victims’ families to seek legal advice or file lawsuits.
  • 6. © 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com Protecting the Workplace: Foreseeability 6 Beware of the warning signs Was the ABB Power Plant shooting preventable? • Known to be disgruntled, unhappy at work and angry at the company. • Friends said he complained about pressure and conflict with supervisors. • Part of a class-action lawsuit against the company over pension plan and 401(k) fees and expenses. • Subject purchased two of the four weapons he used in the incident only the day before – an AK-47 and a 12-gauge shotgun.
  • 7. © 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com Common Roadblocks: Overcoming the Barriers Multiple factors impede workplace violence prevention • Lack of awareness about the knowable indicators of a potential attack. • Poor understanding of risk and mitigation measures. • Limited cross-functional collaboration and information sharing. • Absence of an overall strategy to address targeted violence prevention. 7
  • 8. © 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com Targeted Violence: Understanding and Addressing the Risk Targeted Violence is any incident of violence where a known or knowable attacker selects a particular target prior to their violent attack. 8
  • 9. © 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com A Proactive Approach: Prevention and Early Intervention To manage threats associated with targeted violence and the active shooter, we must first gain an understanding of the factors that may indicate potential risk. This includes: • Dispelling prevailing beliefs about attackers. • Understanding the pre-attack process. • Learning the processes involved in behavioral threat assessment and protective intelligence.
  • 10. © 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com PART II Know Your Enemy: Threat Assessment and Protective Intelligence Matthew Doherty, Senior Vice President 10
  • 11. © 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com 11 Exceptional Case Study Project The U.S. Secret Service and National Institute of Justice FIVE-YEAR STUDY Examined the thinking and behavior of 83 attackers from 1949 to 1996. 74 ATTACKS • 6 attacks were carried out by 16 individuals who were members of a group. • 68 attacks were carried out by individuals acting alone. • 24 of the 83 attackers were interviewed. Early Research: A Crucial Body of Knowledge
  • 12. © 2014 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com Early Research: A Crucial Body of Knowledge 12 Prior to the Study, we had these prevailing beliefs about attackers: MYTH 2: They are mentally ill MYTH 3: They make a direct threat MYTH 1: They fit a distinct profile FACT 1: Attackers do not fit one descriptive or demographic profile FACT 2: Mental illness rarely plays a key role in attacker behavior FACT 3: Persons who pose an actual threat most often do not make a threat
  • 13. © 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com 13 Targeted Violence: Understanding and Addressing the Risk What was learned about the pre-attack process? • An understandable and often discernible process of thinking and behavior. • Stems from an interaction among the potential attacker, past stressful events, a current situation and the target. • A potential attacker’s behavior is vital to identifying his or her intentions. The attacker’s thinking, planning and logistical preparations have to be detected and interrupted.
  • 14. © 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com Attackers have motives. • Achieve fame and notoriety. • Law enforcement-assisted suicide. • Bring national attention to a perceived problem. 14 Attackers have common backgrounds. • Despair. Depression. Suicidal thoughts. • History of harassing or stalking. • Major loss or change in life. • Few arrests for violent crimes. Attackers select targets. • Based on their motives and the accessibility of the target. • Often consider more than one target. Targeted Violence: Understanding and Addressing the Risk
  • 15. © 2014 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com Targeted Violence: Understanding and Addressing the Risk 15 What are “attack-related behaviors”? • Interest or obsession with violence • Develop attack plan • Approach or visit site of attack • Attempted assault or actual attack • Attempt to penetrate security • Approach or visit site with weapon
  • 16. © 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com 16 Targeted Violence: Understanding and Addressing the Risk Assess potential threats from the outside, looking in. • Always remember that the question at the core of a threat assessment is not “Has the subject made a threat?” but “Does the subject pose a threat?” • Investigations are behavior-based rather than statement-based. • Information sharing is key to prevention.
  • 17. © 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com Prevention: Behavioral Threat Assessment What is Behavioral Threat Assessment? The process of gathering and assessing information about persons who may have the interest, motive, intention and capability of committing an act of targeted violence. Threat Assessment is the approach supported by the Exceptional Case Study Project findings. 17
  • 18. © 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com Prevention: Behavioral Threat Assessment Behavioral threat assessment – three key processes 18 Manage The threat the individual poses Assess If the individual poses a risk – gather information from multiple sources Identify Individuals who have the idea or intent of attacking
  • 19. © 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com Profiling Automated Decision- Making Structured Clinical Assessment / Guided Professional Judgment Prevention: Behavioral Threat Assessment Various approaches to assessing the likelihood of violence exist. Most are effective in one or more respects – but ineffective in others. 19
  • 20. © 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com 20 What motivated the subject to make the statement or take the action which caused him or her to come to our attention?1 Prevention: Protective Intelligence - Ten Key Questions
  • 21. © 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com What has the subject communicated to anyone concerning his or her intentions? 21 2 Prevention: Protective Intelligence - Ten Key Questions
  • 22. © 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com Has the subject shown inappropriate interest in assassins, weapons, militant ideas or mass murders? 22 3 Protective Intelligence: Ten Key Questions
  • 23. © 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com Is there evidence that the subject has engaged in attack-related behavior targeting our protectee(s)? 23 4 Prevention: Protective Intelligence - Ten Key Questions
  • 24. © 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com Does the subject have a history of mental illness involving command hallucinations, delusional ideas, feelings of persecution, etc.? 24 5 Prevention: Protective Intelligence - Ten Key Questions
  • 25. © 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com Does the subject have the ability to plan and execute a violent action against one of our protectees? 25 6 Prevention: Protective Intelligence - Ten Key Questions
  • 26. © 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com Is there evidence that the subject is experiencing desperation and/or despair? 26 7 Prevention: Protective Intelligence - Ten Key Questions
  • 27. © 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com Is what the subject says consistent with his or her actions? 27 8 Protective Intelligence: Ten Key Questions
  • 28. © 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com Is there concern among those who know the subject that he or she might take action based on inappropriate ideas? 28 9 Prevention: Protective Intelligence - Ten Key Questions
  • 29. © 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com Are there factors in the subject’s life or environment which might increase or decrease the likelihood of the subject attempting to attack a protectee? 29 10 Prevention: Protective Intelligence - Ten Key Questions
  • 30. © 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com Real-life Context: Case Studies Managing a Stalker Incident An anonymous caller reported one of the firm’s receptionists was slandering its management team. The company quickly learned the caller was known to their employee and had been stalking her for over a year. Calls to local law enforcement resulted in an initial flurry of incident reports and administrative filings, but progress in the case quickly stalled. 30
  • 31. © 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com Real-life Context: Case Studies A Former Employee’s Potential for Violence A disgruntled former employee began sending inappropriate emails to current employees. The client needed to assess the individual’s potential for violence. 31
  • 32. © 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com Real-life Context: Case Studies The Facebook Threat An employee in an East Coast branch office posted threatening statements about company personnel on his Facebook wall along with several pictures of himself posing with weapons. 32
  • 33. © 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com 33 PART III Practicing Prevention: Critical Issues and Insights Robert Davis, Senior Vice President
  • 34. © 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com Targeted workplace violence in the United States On average, 1.7 million people annually are victims of violent crime while working – including an average of 700 homicides per year. 34 Best Practices: Critical Issues to Keep in Mind
  • 35. © 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com Best Practices: Critical Issues to Keep in Mind 35 U.S. Workplace Homicides by Type, 2011-2012
  • 36. © 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com Best Practices: Critical Issues to Keep in Mind 36 We must be PREPARED. An Active Shooter is an individual actively engaged in killing or attempting to kill people in a confined and populated area. • 37% of attacks ended in less than 5 minutes • Average attack lasted 12 minutes • 74% of attackers entered through main entrance • 51% of attacks occurred in workplace We must do everything possible to PREVENT active shooter events.
  • 37. © 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com Active Shooter Plan Active Shooter Plan: Four Key Components 37 An Active Shooter Plan Consists of Four Key Components • Prevent & Mitigate • Prepare • Respond • Recover
  • 38. © 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com Active Shooter Plan: Prevent and Mitigate • Workplace Violence Prevention (Pre-Employment Screening and EAP) • Threat Assessment • Active Shooter Training • Active Shooter Committee 38
  • 39. © 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com Active Shooter Plan: Prepare Take a leadership role in the pre-planning and training process with: • First Responders, including police, fire and medical • All departments • Key stakeholders, including management, human resources and leadership 39
  • 40. © 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com Active Shooter Plan: Respond Follow DHS Guidelines RUN > HIDE > FIGHT • Implementation of internal and external emergency management plans • Coordinated Incident Command Posts • Media Relations Center 40
  • 41. © 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com Active Shooter Plan: Recover • Restoration of normal operations – internal and external • Debriefings • Post-incident press conferences • Multi-disciplinary debriefings • After-action report 41
  • 42. © 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com Best Practices: Critical Issues to Keep in Mind Internal investigations are controlled by the organization External investigations are controlled by law enforcement agencies
  • 43. © 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com Best Practices: Critical Issues to Keep in Mind Why workplace violence prevention is not best left to law enforcement. 43 • Traditional law enforcement primarily focuses on post-event operations – investigating, seizing evidence, arresting suspects and prosecuting the accused. • Unless law enforcement officials have received specific training on violence prevention, they are not likely to take advantage of information reported to them in an effective manner. • In a worst-case scenario, they may entirely fail to respond in any meaningful way.
  • 44. © 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com ASIS Standard on Workplace Violence Provides an overview of policies, processes and protocols organizations can adopt to help: • Identify and prevent threatening behaviors and violence affecting the workplace, and • Better address and resolve threats and violence that have actually occurred. 44
  • 45. © 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com Questions and Discussion 45 Matthew Doherty Senior Vice President matthew.doherty@hillardheintze.com Michael Crane, Esq., CPP, CFE Senior Vice President michael.crane@hillardheintze.com Robert Davis Senior Vice President robert.davis@hillardheintze.com 30 South Wacker Drive, Suite 1400 Chicago, Illinois 60606 312.869.8500 Regis W. Becker, CPP Chief Ethics & Compliance Officer The Pennsylvania State University rwb32@psu.edu