Se ha denunciado esta presentación.
Utilizamos tu perfil de LinkedIn y tus datos de actividad para personalizar los anuncios y mostrarte publicidad más relevante. Puedes cambiar tus preferencias de publicidad en cualquier momento.
Matthew Doherty, Senior Vice President
Robert Davis, Senior Vice President
Michael Crane, Esq., CPP, CFE, Senior Vice Pres...
© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
AGENDA
PART I
Why We're Here: Context and Mi...
© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
PART I
Why We're Here:
Context and Mindset
M...
© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com 4
Employers must maintain
“a place of employ...
© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
Protecting the Workplace: A New Risk
5
Famil...
© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
Protecting the Workplace: Foreseeability
6
B...
© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
Common Roadblocks: Overcoming the Barriers
M...
© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
Targeted Violence: Understanding and Address...
© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
A Proactive Approach: Prevention and Early I...
© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
PART II
Know Your Enemy:
Threat Assessment a...
© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com 11
Exceptional Case Study Project
The U.S. S...
© 2014 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
Early Research: A Crucial Body of Knowledge
...
© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com 13
Targeted Violence: Understanding and Addr...
© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
Attackers have motives.
• Achieve fame and n...
© 2014 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
Targeted Violence: Understanding and Address...
© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com 16
Targeted Violence: Understanding and Addr...
© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
Prevention: Behavioral Threat Assessment
Wha...
© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
Prevention: Behavioral Threat Assessment
Beh...
© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
Profiling
Automated
Decision-
Making
Structu...
© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com 20
What motivated the subject to make the
st...
© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
What has the subject communicated to
anyone ...
© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
Has the subject shown inappropriate interest...
© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
Is there evidence that the subject has
engag...
© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
Does the subject have a history of mental il...
© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
Does the subject have the ability to
plan an...
© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
Is there evidence that the subject is
experi...
© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
Is what the subject says consistent
with his...
© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
Is there concern among those who know
the su...
© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
Are there factors in the subject’s life or
e...
© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
Real-life Context: Case Studies
Managing a S...
© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
Real-life Context: Case Studies
A Former Emp...
© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
Real-life Context: Case Studies
The Facebook...
© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com 33
PART III
Practicing Prevention:
Critical ...
© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
Targeted workplace violence
in the United St...
© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
Best Practices: Critical Issues to Keep in M...
© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
Best Practices: Critical Issues to Keep in M...
© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
Active
Shooter
Plan
Active Shooter Plan: Fou...
© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
Active Shooter Plan: Prevent and Mitigate
• ...
© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
Active Shooter Plan: Prepare
Take a leadersh...
© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
Active Shooter Plan: Respond
Follow DHS Guid...
© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
Active Shooter Plan: Recover
• Restoration o...
© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
Best Practices: Critical Issues to Keep in M...
© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
Best Practices: Critical Issues to Keep in M...
© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
ASIS Standard on Workplace Violence
Provides...
© 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com
Questions and Discussion
45
Matthew Doherty
...
Próxima SlideShare
Cargando en…5
×

Hillard Heintze ASIS Presentation Active Shooter

Hillard Heintze ASIS Presentation on managing threats associated with targeted violence and the active shooter

  • Sé el primero en comentar

Hillard Heintze ASIS Presentation Active Shooter

  1. 1. Matthew Doherty, Senior Vice President Robert Davis, Senior Vice President Michael Crane, Esq., CPP, CFE, Senior Vice President and Regis Becker, CPP, Chief Ethics and Compliance Officer from The Pennsylvania State University The Role of Protective Intelligence in Managing Threats Associated with Targeted Violence and the Active Shooter
  2. 2. © 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com AGENDA PART I Why We're Here: Context and Mindset PART II Know Your Enemy: Threat Assessment and Protective Intelligence PART III Practicing Prevention: Critical Issues and Insights 2
  3. 3. © 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com PART I Why We're Here: Context and Mindset Michael Crane, Esq., CPP, CFE Senior Vice President, Hillard Heintze 3
  4. 4. © 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com 4 Employers must maintain “a place of employment which is free from recognized hazards that are causing or are likely to cause death or serious physical harm ...” OSHA/MOSHA Protecting the Workplace: A Top Priority
  5. 5. © 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com Protecting the Workplace: A New Risk 5 Family of Navy Yard shooting victim files wrongful-death claim • $37.5 million suit alleges the Navy and the Department of Veterans Affairs overlooked or missed a series of red flags that should have alerted them to the troubled history of the shooter. • The action could inspire other victims’ families to seek legal advice or file lawsuits.
  6. 6. © 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com Protecting the Workplace: Foreseeability 6 Beware of the warning signs Was the ABB Power Plant shooting preventable? • Known to be disgruntled, unhappy at work and angry at the company. • Friends said he complained about pressure and conflict with supervisors. • Part of a class-action lawsuit against the company over pension plan and 401(k) fees and expenses. • Subject purchased two of the four weapons he used in the incident only the day before – an AK-47 and a 12-gauge shotgun.
  7. 7. © 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com Common Roadblocks: Overcoming the Barriers Multiple factors impede workplace violence prevention • Lack of awareness about the knowable indicators of a potential attack. • Poor understanding of risk and mitigation measures. • Limited cross-functional collaboration and information sharing. • Absence of an overall strategy to address targeted violence prevention. 7
  8. 8. © 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com Targeted Violence: Understanding and Addressing the Risk Targeted Violence is any incident of violence where a known or knowable attacker selects a particular target prior to their violent attack. 8
  9. 9. © 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com A Proactive Approach: Prevention and Early Intervention To manage threats associated with targeted violence and the active shooter, we must first gain an understanding of the factors that may indicate potential risk. This includes: • Dispelling prevailing beliefs about attackers. • Understanding the pre-attack process. • Learning the processes involved in behavioral threat assessment and protective intelligence.
  10. 10. © 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com PART II Know Your Enemy: Threat Assessment and Protective Intelligence Matthew Doherty, Senior Vice President 10
  11. 11. © 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com 11 Exceptional Case Study Project The U.S. Secret Service and National Institute of Justice FIVE-YEAR STUDY Examined the thinking and behavior of 83 attackers from 1949 to 1996. 74 ATTACKS • 6 attacks were carried out by 16 individuals who were members of a group. • 68 attacks were carried out by individuals acting alone. • 24 of the 83 attackers were interviewed. Early Research: A Crucial Body of Knowledge
  12. 12. © 2014 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com Early Research: A Crucial Body of Knowledge 12 Prior to the Study, we had these prevailing beliefs about attackers: MYTH 2: They are mentally ill MYTH 3: They make a direct threat MYTH 1: They fit a distinct profile FACT 1: Attackers do not fit one descriptive or demographic profile FACT 2: Mental illness rarely plays a key role in attacker behavior FACT 3: Persons who pose an actual threat most often do not make a threat
  13. 13. © 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com 13 Targeted Violence: Understanding and Addressing the Risk What was learned about the pre-attack process? • An understandable and often discernible process of thinking and behavior. • Stems from an interaction among the potential attacker, past stressful events, a current situation and the target. • A potential attacker’s behavior is vital to identifying his or her intentions. The attacker’s thinking, planning and logistical preparations have to be detected and interrupted.
  14. 14. © 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com Attackers have motives. • Achieve fame and notoriety. • Law enforcement-assisted suicide. • Bring national attention to a perceived problem. 14 Attackers have common backgrounds. • Despair. Depression. Suicidal thoughts. • History of harassing or stalking. • Major loss or change in life. • Few arrests for violent crimes. Attackers select targets. • Based on their motives and the accessibility of the target. • Often consider more than one target. Targeted Violence: Understanding and Addressing the Risk
  15. 15. © 2014 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com Targeted Violence: Understanding and Addressing the Risk 15 What are “attack-related behaviors”? • Interest or obsession with violence • Develop attack plan • Approach or visit site of attack • Attempted assault or actual attack • Attempt to penetrate security • Approach or visit site with weapon
  16. 16. © 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com 16 Targeted Violence: Understanding and Addressing the Risk Assess potential threats from the outside, looking in. • Always remember that the question at the core of a threat assessment is not “Has the subject made a threat?” but “Does the subject pose a threat?” • Investigations are behavior-based rather than statement-based. • Information sharing is key to prevention.
  17. 17. © 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com Prevention: Behavioral Threat Assessment What is Behavioral Threat Assessment? The process of gathering and assessing information about persons who may have the interest, motive, intention and capability of committing an act of targeted violence. Threat Assessment is the approach supported by the Exceptional Case Study Project findings. 17
  18. 18. © 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com Prevention: Behavioral Threat Assessment Behavioral threat assessment – three key processes 18 Manage The threat the individual poses Assess If the individual poses a risk – gather information from multiple sources Identify Individuals who have the idea or intent of attacking
  19. 19. © 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com Profiling Automated Decision- Making Structured Clinical Assessment / Guided Professional Judgment Prevention: Behavioral Threat Assessment Various approaches to assessing the likelihood of violence exist. Most are effective in one or more respects – but ineffective in others. 19
  20. 20. © 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com 20 What motivated the subject to make the statement or take the action which caused him or her to come to our attention?1 Prevention: Protective Intelligence - Ten Key Questions
  21. 21. © 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com What has the subject communicated to anyone concerning his or her intentions? 21 2 Prevention: Protective Intelligence - Ten Key Questions
  22. 22. © 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com Has the subject shown inappropriate interest in assassins, weapons, militant ideas or mass murders? 22 3 Protective Intelligence: Ten Key Questions
  23. 23. © 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com Is there evidence that the subject has engaged in attack-related behavior targeting our protectee(s)? 23 4 Prevention: Protective Intelligence - Ten Key Questions
  24. 24. © 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com Does the subject have a history of mental illness involving command hallucinations, delusional ideas, feelings of persecution, etc.? 24 5 Prevention: Protective Intelligence - Ten Key Questions
  25. 25. © 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com Does the subject have the ability to plan and execute a violent action against one of our protectees? 25 6 Prevention: Protective Intelligence - Ten Key Questions
  26. 26. © 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com Is there evidence that the subject is experiencing desperation and/or despair? 26 7 Prevention: Protective Intelligence - Ten Key Questions
  27. 27. © 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com Is what the subject says consistent with his or her actions? 27 8 Protective Intelligence: Ten Key Questions
  28. 28. © 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com Is there concern among those who know the subject that he or she might take action based on inappropriate ideas? 28 9 Prevention: Protective Intelligence - Ten Key Questions
  29. 29. © 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com Are there factors in the subject’s life or environment which might increase or decrease the likelihood of the subject attempting to attack a protectee? 29 10 Prevention: Protective Intelligence - Ten Key Questions
  30. 30. © 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com Real-life Context: Case Studies Managing a Stalker Incident An anonymous caller reported one of the firm’s receptionists was slandering its management team. The company quickly learned the caller was known to their employee and had been stalking her for over a year. Calls to local law enforcement resulted in an initial flurry of incident reports and administrative filings, but progress in the case quickly stalled. 30
  31. 31. © 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com Real-life Context: Case Studies A Former Employee’s Potential for Violence A disgruntled former employee began sending inappropriate emails to current employees. The client needed to assess the individual’s potential for violence. 31
  32. 32. © 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com Real-life Context: Case Studies The Facebook Threat An employee in an East Coast branch office posted threatening statements about company personnel on his Facebook wall along with several pictures of himself posing with weapons. 32
  33. 33. © 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com 33 PART III Practicing Prevention: Critical Issues and Insights Robert Davis, Senior Vice President
  34. 34. © 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com Targeted workplace violence in the United States On average, 1.7 million people annually are victims of violent crime while working – including an average of 700 homicides per year. 34 Best Practices: Critical Issues to Keep in Mind
  35. 35. © 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com Best Practices: Critical Issues to Keep in Mind 35 U.S. Workplace Homicides by Type, 2011-2012
  36. 36. © 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com Best Practices: Critical Issues to Keep in Mind 36 We must be PREPARED. An Active Shooter is an individual actively engaged in killing or attempting to kill people in a confined and populated area. • 37% of attacks ended in less than 5 minutes • Average attack lasted 12 minutes • 74% of attackers entered through main entrance • 51% of attacks occurred in workplace We must do everything possible to PREVENT active shooter events.
  37. 37. © 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com Active Shooter Plan Active Shooter Plan: Four Key Components 37 An Active Shooter Plan Consists of Four Key Components • Prevent & Mitigate • Prepare • Respond • Recover
  38. 38. © 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com Active Shooter Plan: Prevent and Mitigate • Workplace Violence Prevention (Pre-Employment Screening and EAP) • Threat Assessment • Active Shooter Training • Active Shooter Committee 38
  39. 39. © 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com Active Shooter Plan: Prepare Take a leadership role in the pre-planning and training process with: • First Responders, including police, fire and medical • All departments • Key stakeholders, including management, human resources and leadership 39
  40. 40. © 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com Active Shooter Plan: Respond Follow DHS Guidelines RUN > HIDE > FIGHT • Implementation of internal and external emergency management plans • Coordinated Incident Command Posts • Media Relations Center 40
  41. 41. © 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com Active Shooter Plan: Recover • Restoration of normal operations – internal and external • Debriefings • Post-incident press conferences • Multi-disciplinary debriefings • After-action report 41
  42. 42. © 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com Best Practices: Critical Issues to Keep in Mind Internal investigations are controlled by the organization External investigations are controlled by law enforcement agencies
  43. 43. © 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com Best Practices: Critical Issues to Keep in Mind Why workplace violence prevention is not best left to law enforcement. 43 • Traditional law enforcement primarily focuses on post-event operations – investigating, seizing evidence, arresting suspects and prosecuting the accused. • Unless law enforcement officials have received specific training on violence prevention, they are not likely to take advantage of information reported to them in an effective manner. • In a worst-case scenario, they may entirely fail to respond in any meaningful way.
  44. 44. © 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com ASIS Standard on Workplace Violence Provides an overview of policies, processes and protocols organizations can adopt to help: • Identify and prevent threatening behaviors and violence affecting the workplace, and • Better address and resolve threats and violence that have actually occurred. 44
  45. 45. © 2015 HILLARD HEINTZE LLC | Protecting What Matters | www.hillardheintze.com Questions and Discussion 45 Matthew Doherty Senior Vice President matthew.doherty@hillardheintze.com Michael Crane, Esq., CPP, CFE Senior Vice President michael.crane@hillardheintze.com Robert Davis Senior Vice President robert.davis@hillardheintze.com 30 South Wacker Drive, Suite 1400 Chicago, Illinois 60606 312.869.8500 Regis W. Becker, CPP Chief Ethics & Compliance Officer The Pennsylvania State University rwb32@psu.edu

×