SlideShare una empresa de Scribd logo
1 de 33
MANAGING THREATS ASSOCIATED WITH
TARGETED VIOLENCE AND THE ACTIVE SHOOTER
Why We’re Here:
Protecting the Workplace
HILLARD HEINTZE © 2016 | Protecting What Matters2
Employers must maintain “a place of
employment which is free from recognized
hazards that are causing or are likely to
cause death or serious physical harm ...”
OSHA/MOSHA
HILLARD HEINTZE © 2016 | Protecting What Matters3
PROTECTING THE WORKPLACE: A TOP PRIORITY
HILLARD HEINTZE © 2016 | Protecting What Matters
Family of Navy Yard shooting victim
files $37.5 million wrongful-death claim
• Suit alleged the Navy and the Department of
Veterans Affairs overlooked or missed a series of red
flags that should have alerted them to the troubled
history of the shooter.
• The action could inspire other victims’ families to
seek legal advice or file lawsuits.
4
PROTECTING THE WORKPLACE: A NEW RISK
Common corporate “roadblocks”
to workplace violence prevention
HILLARD HEINTZE © 2016 | Protecting What Matters5
PROTECTING THE WORKPLACE: OVERCOMING THE BARRIERS
• Lack of awareness about the “knowable”
indicators of a potential attack
• Poor understanding of risk and mitigation measures
• Absence an targeted violence prevention strategy
• Shortfalls in policy creation and training,
sustained executive sponsorship and
sufficient security-related funding
Prevention and Early
Intervention
To manage threats associated with
targeted violence and the active
shooter, we must first gain an
understanding of the factors that
may indicate potential risk.
HILLARD HEINTZE © 2016 | Protecting What Matters6
PROTECTING THE WORKPLACE: A PROTECTIVE APPROACH
HILLARD HEINTZE © 2016 | Protecting What Matters
Know Your Enemy:
Threat Assessment
and Protective Intelligence
7
HILLARD HEINTZE © 2016 | Protecting What Matters
Targeted Violence is any incident
of violence where a known or
knowable attacker selects a
particular target prior to their
violent attack.
8
WHAT IS TARGETED VIOLENCE?
MYTH 1:
They fit a distinct profile
MYTH 2:
Mentally ill attackers are
irrational in their planning
MYTH 3:
They make a direct threat
FACT 1:
Attackers do not fit
one descriptive or
demographic profile.
FACT 2:
Mentally ill attackers
have developed organized
and rational attack plans.
FACT 3:
Persons who pose an
actual threat most often
do not make a threat.
9
WHAT WE HAVE LEARNED ABOUT ATTACKERS
HILLARD HEINTZE © 2016 | Protecting What Matters
HILLARD HEINTZE © 2016 | Protecting What Matters
Attackers
have motives
• Achieve fame
and notoriety
• Law-enforcement-
assisted suicide
• Bring national
attention to a
perceived problem
10
WHAT WE HAVE LEARNED ABOUT ATTACKERS
Attackers
select targets
• Based on their
motives and
the accessibility
of the target
• Often consider
more than
one target
Attackers have
common backgrounds
• Despair - depression -
suicidal thoughts
• History of harassing
or stalking
• Major loss or
change in life
• Few arrests for
violent crimes
HILLARD HEINTZE © 2016 | Protecting What Matters
What are “attack-related behaviors”?
• Interest or obsession with violence
• Develop attack plan
• Approach or visit site of attack
• Attempted assault or actual attack
• Attempt to penetrate security
• Approach or visit site with weapon
11
WHAT WE HAVE LEARNED ABOUT ATTACKERS
HILLARD HEINTZE © 2016 | Protecting What Matters
The pre-attack process is an understandable,
often discernible process of thinking and behavior
• Stems from an interaction among the potential
attacker, past stressful events, a current situation
and the target
• Often brings clear signs of propensity towards violence
that signal a potential attacker’s intentions
• The attacker’s thinking, planning and logistical
preparations must be detected and interrupted
12
UNDERSTANDING AND ADDRESSING THE RISK
Assess potential threats
from the outside looking in
• Always remember that the question at the core of a
threat assessment is not “Has the subject made a
threat?” but “Does the subject pose a threat?”
• Investigations are behavior-based rather than
statement-based
• Information sharing is key to prevention
HILLARD HEINTZE © 2016 | Protecting What Matters13
UNDERSTANDING AND ADDRESSING THE RISK
HILLARD HEINTZE © 2016 | Protecting What Matters
Potential workplace violence
situations can happen at any time
of the day or night.
Every company must make it their mission
to prevent such incidents from occurring by
ensuring that all reports of potential
workplace violence are investigated and
documented in an effective and
consistent manner.
14
UNDERSTANDING AND ADDRESSING THE RISK
Workplace Violence includes but is not limited to physical violence,
threats or threatening behavior communicated through verbal, written,
electronic or physical means.
15
UNDERSTANDING AND ADDRESSING THE RISK
HILLARD HEINTZE © 2016 | Protecting What Matters
Ensure a Workplace Violence
Prevention Policy is in place
To provide guidance to employees on
preventing acts of workplace violence,
your policy should cover five key areas:
• Identifying Prohibited Behaviors
• Courtesy, Respect and Safety
• Zero Tolerance
• Action and Enforcement
• Notification of Protective and
Restraining Orders
16
UNDERSTANDING AND ADDRESSING THE RISK
HILLARD HEINTZE © 2016 | Protecting What Matters
Prohibited Behaviors
• Causing physical injury
• Making threatening remarks
• Exhibiting aggressive or hostile behavior
that creates a reasonable fear of injury
• Stalking, threatening, harassing anyone
while on the job or with the use of the
organization’s resources
• Intentionally damaging employer property
or property of another employee
• Possession of a weapon while on company
property or while on company business
17
WORKPLACE VIOLENCE PREVENTION POLICY
HILLARD HEINTZE © 2016 | Protecting What Matters
1. Identify
Prohibited
Behaviors
Code of Conduct
All employees – including
supervisors and temporary
employees - customers, vendors
and guests will treat each other
with courtesy and respect at all
times and maintain a safe
working environment.
18
WORKPLACE VIOLENCE PREVENTION POLICY
HILLARD HEINTZE © 2016 | Protecting What Matters
2. Courtesy,
Respect
and Safety
Zero Tolerance
• Prohibits harassment, intimidation, threats
and disruptive behavior that causes fear
and acts of violence.
• Prohibits retaliation against an employee
who reports incidents of workplace violence.
• Prohibits knowingly and intentionally
submitting false claims of workplace
violence.
19
WORKPLACE VIOLENCE PREVENTION POLICY
HILLARD HEINTZE © 2016 | Protecting What Matters
3. Zero
Tolerance
Be Proactive
• Investigate all reports of workplace violence
• Train specific individuals who will be
responsible for the assessment and
management of workplace violence
investigations
• Violation of this policy will lead to
disciplinary action
20
WORKPLACE VIOLENCE PREVENTION POLICY
HILLARD HEINTZE © 2016 | Protecting What Matters
4. Action and
Enforcement
Be Aware
All individuals who apply for
or obtain a protective or
restraining order must provide
Security with a copy.
21
WORKPLACE VIOLENCE PREVENTION POLICY
HILLARD HEINTZE © 2016 | Protecting What Matters
5. Notification
of Protective
or Restraining
Orders
HILLARD HEINTZE © 2015 | Protecting What Matters
• A history of threats or violent acts,
including threats or
violence occurring during
employment.
• Propensity to use violence to project
power, control others
or respond to stress or conflict.
• Threats, bullying or other
threatening behavior.
• Aggressive outbursts or comments.
22
WORKPLACE VIOLENCE PREVENTION
• Excessive displays
of anger.
• Verbal abuse or
harassment by any means
or medium.
• Harboring grudges.
• Inability to handle criticism,
habitually
making excuses and
blaming others.
Learn to identify behaviors of concern
HILLARD HEINTZE © 2015 | Protecting What Matters23
WORKPLACE VIOLENCE PREVENTION
• Chronic, unsubstantiated
complaints about
persecution or injustice
(a “victim mindset”)
• Obsessive intrusion upon
others or persistent unwanted
romantic pursuit.
• Erratic, impulsive or bizarre
behavior that has generated
fear among co-workers.
• Suicidal or homicidal thoughts or ideas.
• High degree of emotional distress.
• Apparent impulsivity
and/or low tolerance
of frustration.
• Fascination with weapons.
• Preoccupation with
violent themes of revenge and/or
unusual interest in violent acts.
Learn to identify behaviors of concern
HILLARD HEINTZE © 2016 | Protecting What Matters
Practicing Prevention:
Critical Issues and Insights
24
HILLARD HEINTZE © 2016 | Protecting What Matters
Managing a Stalker Incident
An anonymous caller reported one of the firm’s
receptionists was slandering its management
team. The company quickly learned the caller was
known to their employee and had been stalking
her for over a year.
Calls to local law enforcement resulted in an initial
flurry of incident reports and administrative filings,
but progress in the case quickly stalled.
25
REAL-LIFE CONTEXT: CASE STUDIES
HILLARD HEINTZE © 2016 | Protecting What Matters
A Former Employee’s
Potential for Violence
A disgruntled former employee began sending
inappropriate emails to current employees.
The client needed to assess the individual’s
potential for violence.
26
REAL-LIFE CONTEXT: CASE STUDIES
The Facebook Threat
An employee in an East Coast
branch office posted threatening
statements about company
personnel on his Facebook wall
along with several pictures of
himself posing with weapons.
27
REAL-LIFE CONTEXT: CASE STUDIES
HILLARD HEINTZE © 2016 | Protecting What Matters
HILLARD HEINTZE © 2016 | Protecting What Matters
Targeted workplace violence
in the United States
On average, 1.7 million people annually are victims of
violent crime while working – including an average
of 700 homicides per year.
28
CRITICAL ISSUES TO KEEP IN MIND
HILLARD HEINTZE © 2016 | Protecting What Matters
The Active Shooter
We must do everything possible to PREVENT active shooter events
• 37% of attacks ended in less than 5 minutes
• Average attack lasted 12 minutes
• 74% of attackers entered through a main entrance
• 51% of attacks occurred in the workplace
29
CRITICAL ISSUES TO KEEP IN MIND
An Active Shooter Plan
is an essential
component of a every
company’s overall
Emergency
Management Plan.
30
THE FOUR-PART ACTIVE SHOOTER PLAN
HILLARD HEINTZE © 2016 | Protecting What Matters
HILLARD HEINTZE © 2016 | Protecting What Matters
Internal investigations
are controlled by
the organization
31
CRITICAL ISSUES TO KEEP IN MIND
External
investigations
are controlled by
law enforcement
agencies
Workplace violence prevention
is not best left to law enforcement
CRITICAL ISSUES TO KEEP IN MIND
HILLARD HEINTZE © 2016 | Protecting What Matters32
Traditional law enforcement primarily focuses
on post-event operations – investigating,
seizing evidence, arresting suspects and
prosecuting the accused.
Unless law enforcement officials have received
specific training on violence prevention, they
are not likely to take advantage of information
reported to them in an effective manner.
Provides an overview of policies,
processes and protocols
organizations can adopt
• Identify and prevent threatening
behaviors and violence affecting
the workplace
• Better address and resolve threats and
violence that have actually occurred
HILLARD HEINTZE © 2016 | Protecting What Matters33
ASIS STANDARD ON WORKPLACE VIOLENCE

Más contenido relacionado

Similar a How to Prevent An Active Shooter in Your Workplace

Background InformationWhile the tragedies at Columbine High Scho.docx
Background InformationWhile the tragedies at Columbine High Scho.docxBackground InformationWhile the tragedies at Columbine High Scho.docx
Background InformationWhile the tragedies at Columbine High Scho.docx
wilcockiris
 
Background InformationWhile the tragedies at Columbine High Scho.docx
Background InformationWhile the tragedies at Columbine High Scho.docxBackground InformationWhile the tragedies at Columbine High Scho.docx
Background InformationWhile the tragedies at Columbine High Scho.docx
jasoninnes20
 
08 ppt-workplace violence-final
08 ppt-workplace violence-final08 ppt-workplace violence-final
08 ppt-workplace violence-final
Roger Phillips
 
Chapter 16 Whistle-Blowing in NursingCopyright © 2
Chapter 16 Whistle-Blowing in NursingCopyright © 2Chapter 16 Whistle-Blowing in NursingCopyright © 2
Chapter 16 Whistle-Blowing in NursingCopyright © 2
EstelaJeffery653
 

Similar a How to Prevent An Active Shooter in Your Workplace (20)

Hillard Heintze Presentation to ATAP - Part 1
Hillard Heintze Presentation to ATAP - Part 1Hillard Heintze Presentation to ATAP - Part 1
Hillard Heintze Presentation to ATAP - Part 1
 
Hillard Heintze ASIS Presentation Active Shooter
Hillard Heintze ASIS Presentation Active ShooterHillard Heintze ASIS Presentation Active Shooter
Hillard Heintze ASIS Presentation Active Shooter
 
Hillard Heintze Presentation to ATAP - Part 2
Hillard Heintze Presentation to ATAP - Part 2Hillard Heintze Presentation to ATAP - Part 2
Hillard Heintze Presentation to ATAP - Part 2
 
Comprehensive Active Shooter Incident Management
Comprehensive Active Shooter Incident ManagementComprehensive Active Shooter Incident Management
Comprehensive Active Shooter Incident Management
 
When Violence Invades Your Family Entertainment Center (FEC)
When Violence Invades Your Family Entertainment Center (FEC)When Violence Invades Your Family Entertainment Center (FEC)
When Violence Invades Your Family Entertainment Center (FEC)
 
Webinar Harassment
Webinar HarassmentWebinar Harassment
Webinar Harassment
 
Workplace Violence Prevention by LM
Workplace Violence Prevention by LMWorkplace Violence Prevention by LM
Workplace Violence Prevention by LM
 
Workplace Domestic Violence
Workplace Domestic ViolenceWorkplace Domestic Violence
Workplace Domestic Violence
 
Hillard Heintze Presentation to ATAP - Part 4
Hillard Heintze Presentation to ATAP - Part 4Hillard Heintze Presentation to ATAP - Part 4
Hillard Heintze Presentation to ATAP - Part 4
 
Workplace violence-administration and management 2.pptx
Workplace violence-administration and management 2.pptxWorkplace violence-administration and management 2.pptx
Workplace violence-administration and management 2.pptx
 
B Part 10 Violence At Work By J Mc Cann
B  Part 10 Violence At Work By J Mc CannB  Part 10 Violence At Work By J Mc Cann
B Part 10 Violence At Work By J Mc Cann
 
Background InformationWhile the tragedies at Columbine High Scho.docx
Background InformationWhile the tragedies at Columbine High Scho.docxBackground InformationWhile the tragedies at Columbine High Scho.docx
Background InformationWhile the tragedies at Columbine High Scho.docx
 
Background InformationWhile the tragedies at Columbine High Scho.docx
Background InformationWhile the tragedies at Columbine High Scho.docxBackground InformationWhile the tragedies at Columbine High Scho.docx
Background InformationWhile the tragedies at Columbine High Scho.docx
 
Littler Global Employer Latin America Conference 2015 Health and Safety Ris...
Littler Global Employer Latin America Conference 2015   Health and Safety Ris...Littler Global Employer Latin America Conference 2015   Health and Safety Ris...
Littler Global Employer Latin America Conference 2015 Health and Safety Ris...
 
Hillard Heintze Presentation to ATAP - Part 3
Hillard Heintze Presentation to ATAP - Part 3Hillard Heintze Presentation to ATAP - Part 3
Hillard Heintze Presentation to ATAP - Part 3
 
08 ppt-workplace violence-final
08 ppt-workplace violence-final08 ppt-workplace violence-final
08 ppt-workplace violence-final
 
P19 active threat response steps toward mitigation_king_mc_evoy_6.12.19
P19 active threat response steps toward mitigation_king_mc_evoy_6.12.19P19 active threat response steps toward mitigation_king_mc_evoy_6.12.19
P19 active threat response steps toward mitigation_king_mc_evoy_6.12.19
 
Chapter 16 Whistle-Blowing in NursingCopyright © 2
Chapter 16 Whistle-Blowing in NursingCopyright © 2Chapter 16 Whistle-Blowing in NursingCopyright © 2
Chapter 16 Whistle-Blowing in NursingCopyright © 2
 
Hospital hostage master
Hospital hostage masterHospital hostage master
Hospital hostage master
 
indg69.pdf
indg69.pdfindg69.pdf
indg69.pdf
 

Último

Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
amitlee9823
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
amitlee9823
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
dollysharma2066
 
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Anamikakaur10
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
lizamodels9
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
amitlee9823
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
Abortion pills in Kuwait Cytotec pills in Kuwait
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
lizamodels9
 

Último (20)

Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
 

How to Prevent An Active Shooter in Your Workplace

  • 1. MANAGING THREATS ASSOCIATED WITH TARGETED VIOLENCE AND THE ACTIVE SHOOTER
  • 2. Why We’re Here: Protecting the Workplace HILLARD HEINTZE © 2016 | Protecting What Matters2
  • 3. Employers must maintain “a place of employment which is free from recognized hazards that are causing or are likely to cause death or serious physical harm ...” OSHA/MOSHA HILLARD HEINTZE © 2016 | Protecting What Matters3 PROTECTING THE WORKPLACE: A TOP PRIORITY
  • 4. HILLARD HEINTZE © 2016 | Protecting What Matters Family of Navy Yard shooting victim files $37.5 million wrongful-death claim • Suit alleged the Navy and the Department of Veterans Affairs overlooked or missed a series of red flags that should have alerted them to the troubled history of the shooter. • The action could inspire other victims’ families to seek legal advice or file lawsuits. 4 PROTECTING THE WORKPLACE: A NEW RISK
  • 5. Common corporate “roadblocks” to workplace violence prevention HILLARD HEINTZE © 2016 | Protecting What Matters5 PROTECTING THE WORKPLACE: OVERCOMING THE BARRIERS • Lack of awareness about the “knowable” indicators of a potential attack • Poor understanding of risk and mitigation measures • Absence an targeted violence prevention strategy • Shortfalls in policy creation and training, sustained executive sponsorship and sufficient security-related funding
  • 6. Prevention and Early Intervention To manage threats associated with targeted violence and the active shooter, we must first gain an understanding of the factors that may indicate potential risk. HILLARD HEINTZE © 2016 | Protecting What Matters6 PROTECTING THE WORKPLACE: A PROTECTIVE APPROACH
  • 7. HILLARD HEINTZE © 2016 | Protecting What Matters Know Your Enemy: Threat Assessment and Protective Intelligence 7
  • 8. HILLARD HEINTZE © 2016 | Protecting What Matters Targeted Violence is any incident of violence where a known or knowable attacker selects a particular target prior to their violent attack. 8 WHAT IS TARGETED VIOLENCE?
  • 9. MYTH 1: They fit a distinct profile MYTH 2: Mentally ill attackers are irrational in their planning MYTH 3: They make a direct threat FACT 1: Attackers do not fit one descriptive or demographic profile. FACT 2: Mentally ill attackers have developed organized and rational attack plans. FACT 3: Persons who pose an actual threat most often do not make a threat. 9 WHAT WE HAVE LEARNED ABOUT ATTACKERS HILLARD HEINTZE © 2016 | Protecting What Matters
  • 10. HILLARD HEINTZE © 2016 | Protecting What Matters Attackers have motives • Achieve fame and notoriety • Law-enforcement- assisted suicide • Bring national attention to a perceived problem 10 WHAT WE HAVE LEARNED ABOUT ATTACKERS Attackers select targets • Based on their motives and the accessibility of the target • Often consider more than one target Attackers have common backgrounds • Despair - depression - suicidal thoughts • History of harassing or stalking • Major loss or change in life • Few arrests for violent crimes
  • 11. HILLARD HEINTZE © 2016 | Protecting What Matters What are “attack-related behaviors”? • Interest or obsession with violence • Develop attack plan • Approach or visit site of attack • Attempted assault or actual attack • Attempt to penetrate security • Approach or visit site with weapon 11 WHAT WE HAVE LEARNED ABOUT ATTACKERS
  • 12. HILLARD HEINTZE © 2016 | Protecting What Matters The pre-attack process is an understandable, often discernible process of thinking and behavior • Stems from an interaction among the potential attacker, past stressful events, a current situation and the target • Often brings clear signs of propensity towards violence that signal a potential attacker’s intentions • The attacker’s thinking, planning and logistical preparations must be detected and interrupted 12 UNDERSTANDING AND ADDRESSING THE RISK
  • 13. Assess potential threats from the outside looking in • Always remember that the question at the core of a threat assessment is not “Has the subject made a threat?” but “Does the subject pose a threat?” • Investigations are behavior-based rather than statement-based • Information sharing is key to prevention HILLARD HEINTZE © 2016 | Protecting What Matters13 UNDERSTANDING AND ADDRESSING THE RISK
  • 14. HILLARD HEINTZE © 2016 | Protecting What Matters Potential workplace violence situations can happen at any time of the day or night. Every company must make it their mission to prevent such incidents from occurring by ensuring that all reports of potential workplace violence are investigated and documented in an effective and consistent manner. 14 UNDERSTANDING AND ADDRESSING THE RISK
  • 15. Workplace Violence includes but is not limited to physical violence, threats or threatening behavior communicated through verbal, written, electronic or physical means. 15 UNDERSTANDING AND ADDRESSING THE RISK HILLARD HEINTZE © 2016 | Protecting What Matters
  • 16. Ensure a Workplace Violence Prevention Policy is in place To provide guidance to employees on preventing acts of workplace violence, your policy should cover five key areas: • Identifying Prohibited Behaviors • Courtesy, Respect and Safety • Zero Tolerance • Action and Enforcement • Notification of Protective and Restraining Orders 16 UNDERSTANDING AND ADDRESSING THE RISK HILLARD HEINTZE © 2016 | Protecting What Matters
  • 17. Prohibited Behaviors • Causing physical injury • Making threatening remarks • Exhibiting aggressive or hostile behavior that creates a reasonable fear of injury • Stalking, threatening, harassing anyone while on the job or with the use of the organization’s resources • Intentionally damaging employer property or property of another employee • Possession of a weapon while on company property or while on company business 17 WORKPLACE VIOLENCE PREVENTION POLICY HILLARD HEINTZE © 2016 | Protecting What Matters 1. Identify Prohibited Behaviors
  • 18. Code of Conduct All employees – including supervisors and temporary employees - customers, vendors and guests will treat each other with courtesy and respect at all times and maintain a safe working environment. 18 WORKPLACE VIOLENCE PREVENTION POLICY HILLARD HEINTZE © 2016 | Protecting What Matters 2. Courtesy, Respect and Safety
  • 19. Zero Tolerance • Prohibits harassment, intimidation, threats and disruptive behavior that causes fear and acts of violence. • Prohibits retaliation against an employee who reports incidents of workplace violence. • Prohibits knowingly and intentionally submitting false claims of workplace violence. 19 WORKPLACE VIOLENCE PREVENTION POLICY HILLARD HEINTZE © 2016 | Protecting What Matters 3. Zero Tolerance
  • 20. Be Proactive • Investigate all reports of workplace violence • Train specific individuals who will be responsible for the assessment and management of workplace violence investigations • Violation of this policy will lead to disciplinary action 20 WORKPLACE VIOLENCE PREVENTION POLICY HILLARD HEINTZE © 2016 | Protecting What Matters 4. Action and Enforcement
  • 21. Be Aware All individuals who apply for or obtain a protective or restraining order must provide Security with a copy. 21 WORKPLACE VIOLENCE PREVENTION POLICY HILLARD HEINTZE © 2016 | Protecting What Matters 5. Notification of Protective or Restraining Orders
  • 22. HILLARD HEINTZE © 2015 | Protecting What Matters • A history of threats or violent acts, including threats or violence occurring during employment. • Propensity to use violence to project power, control others or respond to stress or conflict. • Threats, bullying or other threatening behavior. • Aggressive outbursts or comments. 22 WORKPLACE VIOLENCE PREVENTION • Excessive displays of anger. • Verbal abuse or harassment by any means or medium. • Harboring grudges. • Inability to handle criticism, habitually making excuses and blaming others. Learn to identify behaviors of concern
  • 23. HILLARD HEINTZE © 2015 | Protecting What Matters23 WORKPLACE VIOLENCE PREVENTION • Chronic, unsubstantiated complaints about persecution or injustice (a “victim mindset”) • Obsessive intrusion upon others or persistent unwanted romantic pursuit. • Erratic, impulsive or bizarre behavior that has generated fear among co-workers. • Suicidal or homicidal thoughts or ideas. • High degree of emotional distress. • Apparent impulsivity and/or low tolerance of frustration. • Fascination with weapons. • Preoccupation with violent themes of revenge and/or unusual interest in violent acts. Learn to identify behaviors of concern
  • 24. HILLARD HEINTZE © 2016 | Protecting What Matters Practicing Prevention: Critical Issues and Insights 24
  • 25. HILLARD HEINTZE © 2016 | Protecting What Matters Managing a Stalker Incident An anonymous caller reported one of the firm’s receptionists was slandering its management team. The company quickly learned the caller was known to their employee and had been stalking her for over a year. Calls to local law enforcement resulted in an initial flurry of incident reports and administrative filings, but progress in the case quickly stalled. 25 REAL-LIFE CONTEXT: CASE STUDIES
  • 26. HILLARD HEINTZE © 2016 | Protecting What Matters A Former Employee’s Potential for Violence A disgruntled former employee began sending inappropriate emails to current employees. The client needed to assess the individual’s potential for violence. 26 REAL-LIFE CONTEXT: CASE STUDIES
  • 27. The Facebook Threat An employee in an East Coast branch office posted threatening statements about company personnel on his Facebook wall along with several pictures of himself posing with weapons. 27 REAL-LIFE CONTEXT: CASE STUDIES HILLARD HEINTZE © 2016 | Protecting What Matters
  • 28. HILLARD HEINTZE © 2016 | Protecting What Matters Targeted workplace violence in the United States On average, 1.7 million people annually are victims of violent crime while working – including an average of 700 homicides per year. 28 CRITICAL ISSUES TO KEEP IN MIND
  • 29. HILLARD HEINTZE © 2016 | Protecting What Matters The Active Shooter We must do everything possible to PREVENT active shooter events • 37% of attacks ended in less than 5 minutes • Average attack lasted 12 minutes • 74% of attackers entered through a main entrance • 51% of attacks occurred in the workplace 29 CRITICAL ISSUES TO KEEP IN MIND
  • 30. An Active Shooter Plan is an essential component of a every company’s overall Emergency Management Plan. 30 THE FOUR-PART ACTIVE SHOOTER PLAN HILLARD HEINTZE © 2016 | Protecting What Matters
  • 31. HILLARD HEINTZE © 2016 | Protecting What Matters Internal investigations are controlled by the organization 31 CRITICAL ISSUES TO KEEP IN MIND External investigations are controlled by law enforcement agencies
  • 32. Workplace violence prevention is not best left to law enforcement CRITICAL ISSUES TO KEEP IN MIND HILLARD HEINTZE © 2016 | Protecting What Matters32 Traditional law enforcement primarily focuses on post-event operations – investigating, seizing evidence, arresting suspects and prosecuting the accused. Unless law enforcement officials have received specific training on violence prevention, they are not likely to take advantage of information reported to them in an effective manner.
  • 33. Provides an overview of policies, processes and protocols organizations can adopt • Identify and prevent threatening behaviors and violence affecting the workplace • Better address and resolve threats and violence that have actually occurred HILLARD HEINTZE © 2016 | Protecting What Matters33 ASIS STANDARD ON WORKPLACE VIOLENCE

Notas del editor

  1. Following the Navy Yard shooting in Washington DC, the victims’ families sued the Navy and the Department of Veteran Affairs, alleging they overlooked red flags that should have alerted them to the troubled history of the shooter. This could inspire the families of victims killed in similar active shooter incidents to seek legal advice and file lawsuits. The 33-­page administrative claim also criticizes the security-clearance process. The suit on behalf of the family of Mary DeLorenzo Knight was filed in April in federal court in Tampa. The lawsuit named the Navy, the Department of Veterans Affairs and two defense contractors as defendants. It's seeking at least $37.5 million in damages Was it preventable? Alexis was previously cited by the Navy on at least eight occasions for misconduct. In 2004, he was arrested in Seattle, Washington for malicious mischief, after shooting out the tires of another man's vehicle in what he later described as the result of an anger-fueled "blackout.” In 2008, he was arrested in DeKalb County, Georgia for disorderly conduct. In 2010, he was arrested in Fort Worth for discharging a weapon within city limits. August 4, 2013 - Naval police were called to Alexis' hotel at Naval Station Newport and found that he had "taken apart his bed, believing someone was hiding under it, and observed that Alexis had taped a microphone to the ceiling to record the voices of people that were following him." At the time of the incident, he was working for the contractor at the base. August 23, 2013 - Alexis presented himself at a Providence, Rhode Island VA emergency room complaining of insomnia. August 28, 2013 - He sought treatment for insomnia in the emergency room of a VA medical center in Washington, D.C. September 14, 2013 - Two days before the massacre, Alexis visited a small arms range in Lorton, Virginia, and tested an AR-15 semiautomatic. Purchased a 12-gauge shotgun and two boxes of shells, after  
  2. TRANSITION TO NEXT SECTION: We know WPV is one of your top priorities – and a growing one. There are many things we can do prevent and mitigate targeted violence in your organization. This includes: Dispelling prevailing beliefs about attackers. Understanding the pre-attack process. Learning the processes involved in behavioral threat assessment and protective intelligence. Understanding the difference between an active shooter and terrorism. To understand the legal risks and issues and ultimately create change and develop solutions to problems, one must first gain an understanding of targeted violence and the factors that may indicate potential threats. Companies must understand the value of conducting behavioral threat assessments and how this can help identify a potential attacker’s intentions before an incident occurs.
  3. What we have learned about attackers
  4. An attacker may target an individual, group, or symbol, over a perceived injury, injustice, or loss. An attacker may “shift” targets. Events and circumstances in others’ lives that can increase the likelihood of their acting out violently or can strengthen their commitment to their plans to commit violence.
  5. An attacker may target an individual, group, or symbol, over a perceived injury, injustice, or loss. An attacker may “shift” targets. Events and circumstances in others’ lives that can increase the likelihood of their acting out violently or can strengthen their commitment to their plans to commit violence.
  6. An attacker may target an individual, group, or symbol, over a perceived injury, injustice, or loss. An attacker may “shift” targets. Events and circumstances in others’ lives that can increase the likelihood of their acting out violently or can strengthen their commitment to their plans to commit violence.
  7. Applying Experience and Best Practices in Managing a Stalker Incident Industry: Real Estate Client: Diversified Real Estate Investment Trust Service: Threat Assessment and Workplace Violence Prevention Client’s Challenge: When an anonymous caller reported that one of the company’s receptionists was slandering its management team, the company prepared to take action. But it quickly learned that the caller was an individual known to their employee who had been stalking her for over a year. While calls to local law enforcement resulted in an initial flurry of incident reports and administrative filings, progress in the case quickly stalled. The Hillard Heintze Solution: In these circumstances, Hillard Heintze’s protective intelligence experts, behavioral threat assessment specialists and retired law enforcement executives collaborate very closely with the company, its security and legal departments, mental health professionals if necessary and the employee – as well as appropriate local, state and federal authorities – to undertake a relatively wide range of potential responses. Every case is different – and the most appropriate courses of action depend on factors such as the urgency of the threat-related circumstances, case history, information known and available about the alleged stalker, and to what extent the parties involved seek protection, intervention and prosecution, among many other tactics, strategies and outcomes. In this particular case, Hillard Heintze’s first order of business was obtaining a photo of the subject for dissemination to employees and facility staff. Next, the firm conducted an investigation of the alleged stalker, analyzed his “dangerousness” and potential to inflict harm, and advised the company and employee on key findings, options, recommendations and next steps. Hillard Heintze’s experts also contacted former colleagues at a major federal agency, determined their primary points of contact with local law enforcement and mounted a multi-jurisdictional team of both internal and external experts that began responding quickly, professionally and effectively. Impact on the Client’s Business: This case is ongoing. But the actions already taken – and the steps currently underway – have brought the company, the victim, and her family a strong level of assurance and confidence that (1) the employee’s personal safety has markedly improved and (2) that the matter will be resolved shortly – to their satisfaction.
  8. Case Study: #116 Assessing a Former Employee’s Potential for Violence Industry: Software & IT Services Client: A Market Leader with more than 3,000 Employees Service: Threat Assessment and Workplace Violence Prevention Client’s Challenge: Stalking is one issue. Inappropriate behavior or mental illness – while sometimes though not always related – are others. Understanding the difference – and being prepared to change tactics quickly if rapidly changing circumstances threaten the safety of an individual – can be a delicate task. When a disgruntled former employee began sending inappropriate email communications to current employees, a healthcare company asked Hillard Heintze to assess the individual’s potential for violence. The Hillard Heintze Solution: Hillard Heintze began its assessment by gathering relevant information on the individual, including his mental history, current life situation, behavioral history, motivation, attack-related behavior, criminal history, organizational interests and affiliations and ownership of weapons or ability to acquire them, among many other factors. The firm also undertook detailed interviews of the individual’s known associates, neighbors, family members and others with a direct perspective on the events occurring in his life. With this information at hand, Hillard Heintze then evaluated the subject’s organizational ability, fixation, focus, communications, actions and time imperative in order to establish an expert perspective on his potential for targeted violence. Impact on the Client’s Business: Based on this evidence, Hillard Heintze concluded that, although challenged by mental health factors, the subject did not represent an imminent danger to the company or its employees. The company accepted this finding and began implementing Hillard Heintze’s recommendations for action – including distributing the subject’s photo to appropriate personnel, preparing to document any future correspondence with him, making provisions to obtain a court restraining order against him and developing a company-wide behavioral threat capability that informs and raises awareness among managers and employees about how they can prevent possible acts of violence in the future. It also authorized Hillard Heintze to conduct continuous monitoring of the situation for 6 to 12 months, including periodic checks with family members and others with timely information on the subject’s location and behavior.
  9. Investigating an Anonymous Tip that an Employee Had Just Posted a Threat of Violence to the Company on Facebook Industry: Professional Business Services Client: Major Provider of Outsourced Business Solutions Service: Behavioral Threat Assessment and Investigation Client’s Challenge: Predicting an individual's dangerousness is one thing. Doing so in time to prevent harm to others requires real-time – or near real-time – access to information and an informed ability to interpret this information, ideally in the context of an extensive understanding of the subject's background, history and life circumstances. For one company, the trigger that set off alarms in the company's Security Department – common now among an increasing number of employers – occurred when an employee in an East Coast branch office posted threatening statements about company personnel on his Facebook wall along with several pictures of himself posing with weapons. The Hillard Heintze Solution: Within hours, Hillard Heintze threat assessment experts were on site, reviewing internal HR files and reports and conducting a battery of discreet interviews with the subject's known associates and others with a direct perspective on the events occurring in his life. Hillard Heintze leveraged its nationwide network of contacts to facilitate a meeting with the chief of the local police department who assigned one of their top investigators as liaison to the team. Other analysts began an immediate background investigation of the subject and started assessing emerging information – in real-time – using a highly structured, multi-perspective threat assessment methodology based on the one used to protect the U.S. President and visiting foreign dignitaries. Impact on the Client's Business: In short, Hillard Heintze helped the company identify, understand and think through a range of countermeasures, select one with a high probability of success, and implement it – with care. One employee, who had been a target of the subject's anger, was temporarily reassigned to offices in another state. No violence occurred. The individual no longer works for the company. And through a carefully orchestrated series of recommendations outlined by Hillard Heintze, the company is managing the threat on an ongoing basis – in part, by supporting the individual's access to mental health treatment and the opportunity to move his life forward in a healthier and more positive way.
  10. The United States has a long history of violence against colleagues, family and prominent individuals Presidential assassinations School violence Violence against judges and public officials Celebrities Domestic violence Bias-motivated crimes DATA SOURCES “Between 1992 and 2010, there were over 13,800 workplace homicide victims,” Centers for Disease Control and Prevention. http://www.cdc.gov/niosh/topics/violence/ “In 2010 alone, there were 4,690 workplace fatalities.” U.S. Bureau of Labor Statistics, U.S. Department of Labor, Current Population Survey, Census of Fatal Occupational Injuries, and U.S. Census Bureau, 2012. “1.7 million people annually, on average, are victims of violent crime in the U.S. while working, including an average of 700 homicides per year.” Centers for Disease Control and Prevention, Bureau of Labor Statistics’ Census of Fatal Occupational Injuries (CFOI). http://www.cdc.gov/niosh/topics/violence/
  11. An Active Shooter is an individual actively engaged in killing or attempting to kill people in a confined and populated area.
  12. Prevent & Mitigate Workplace Violence Prevention Pre-Employment Screening and EAP Emergency Action Plan Threat Assessment Active Shooter Training Emergency Management Committee Prepare Take a leadership role in the pre-planning and training process with: First Responders: including police, fire and medical All departments Key stakeholders: including management, human resources and leadership Respond Follow DHS Guidelines RUN > HIDE > FIGHT Implementation of internal and external emergency management plans Recover Restoration of normal operations – internal and external Debriefings Post-incident press conferences Multi-disciplinary debriefings On-site counseling After-action report
  13. And in a worst-case scenario, they may entirely fail to respond in any meaningful way.