Threat Assessment And Security Measures For Risk Management 2


Published on

  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Threat Assessment And Security Measures For Risk Management 2

  1. 1. SECURITY MEASURES FOR THREAT/RISK MANAGEMENT (By Don Moe) FOUR PRIMARY ELEMENTS IN THREAT MANAGEMENT 1. The potential attacker: • Prior history of harassment, threats. • How did the person handle unbearable stress in the past. 2. Event: • Any past traumatic events: relationship, financial, living arrangement, rejection, humiliation, especially publicly perceived failure. 3. Situation: • Individual’s specific situation at the time of peak stress. • Are their significant people in the individuals life that would deter them from using violence to deal with stress, or would they condone violence as a means. 4. Target: • How well know is the target to the individual? • Is the individual acquainted with the targets lifestyle or work habits? • Is information readily available about the target? • How vulnerable is the target to an attack? • What changes in lifestyle or living arrangements could mitigate and attack? • How concerned about safety is the target? • How concerned are those around the target? (Family or staff) • How open is the target to advice from security or law enforcement? 1
  2. 2. WHO IS CONSIDERED DANGEROUS • A person who thinks that attacking a public official or figure is a desirable, acceptable or potentially effective way to achieve a goal can be considered a potential assassin. Need to ask yourself: • Does this person have a motive to attempt an attack? • If answer is yes. What is the person’s current and foreseeable ability to attack? • Changes in thinking, and acceptability of attacking, or change in ability to attack itself, may decrease the threat. DESIGNING A PROTECTIVE INTELLIGENCE PROGRAM FOR THREAT MITIGATION Protective Intelligence three key elements 1. IDENTIFICATION: Identifying person or groups that might pose a threat. Self Identify Two Types: Person will call, write, e-mail, or approach figure and indicate and unusual interest in that person. “Threatened”: Communicates a direct, indirect, or conditional threat. Purpose of making the threat • To warn of possible attack. • To ask to be stopped. • To demand help or attention. • Express frustration or anger. • Communicate distress. “Inappropriate interest” • A special relationship or unique assignment or role to play in their lives or organization. • Have extraordinary information or expertise that must be shared to the official. All threats should be investigated. Making a threat at minimum is a violation of the law? 2
  3. 3. 2. ASSESSMENT: Building history and case file of behavior traits of subject to determine whether the individual poses a threat to protected person. Sources of information • Interviews with the individual and those who have had contact with them. • Employers, coworker, neighbors, relatives, associates, caregivers, arresting officers. • Records from agencies and institutions that have contact with person. • Writings by or about the individual. • Receipts of recent purchases and travel. • Phone records, credit card receipts, weapons purchase background checks. Some forms of information is considered private and may only be accessible by law enforcement assistance 3. CASE MANAGEMENT: Monitoring persons and/or groups deemed a potential threat to target. No threat determined: Case closed, and keep on file for future reference. Determined to be a threat: Develop plan to manage risk. • Periodically confirm location of individual if incarcerated, hospital setting, and mental health setting for extended period of time. • Pattern of contacts with family members, police, coworkers, caregivers, Designed to prevent individual from approaching protected person and to Decrease the risk of violence. • Plan remains intact until deemed individual no longer poses threat. 3
  4. 4. FUNCTIONS AND APPROACHES OF CASE INVESTIGATIONS Three Principles of Case Investigation 1. Investigation Skill • Does the individual have the motive and the means to act on opportunity to attack a protected person. • Gather information to support or repute threat concern. 2. Corroboration • Supportive objective facts that will support statements made by individual who may pose a threat. Example: Report individual traveled to location of protected person. • Attempt to secure travel and lodging receipts, or speak to credible witness who saw individual. 3. Common Sense • Key is to look at the interest, and the motive behind the potential threat and the means to carry it out. Example: Angry former bank customer threatening to bring the house down. Motive behind the threat is customer wanted late charges of past due account removed due to poor reflection on credit history. • Customer made threat to vent frustration and distress around fear of credit reprisal. Not intending to harm but to draw attention. 4
  5. 5. CONDUCTING A THREAT ASSESSMENT INVESTIGATION Inappropriate or Unusual Interest • It is reasonable to presume that the individual eventually will be deemed to not pose a threat. • Look for information the rebuts presumption that the individual does pose a real threat. • A brief investigation will confirm that the individual has neither the motive, means, nor interest in mounting an attack. • Any prior contact by individual or individual attempting to purchase a weapon as well as contact the protected person poses a real threat. Threats • Anonymous or Direct threats should always be taken seriously and investigated. • Many people who make threats against protected persons do not pose a real threat. • Some make threats to signal that they are in danger of losing control. • Some make threats to gain attention from authorities who they believe can prevent them from acting out. Note: Some make threats warning they are prepared to act. Any lack of investigation may be interpreted as permission, encouragement or deliberate indifference. This may increase the risk to follow through with an attack. 5
  6. 6. Anonymous threat by letter, phone, or e-mail. • Studies of a few attackers and near lethal anonymous threats were trying to warn authorities they were considering attacking. • They are ambivalent about attacking and were communicating with the hope they mighty be stopped. • They do not want to identify themselves and make it more likely to be stopped. Note: Anonymous threats though rarely acted upon, should be taken seriously and investigated to the fullest extent. Specific threats or if threatener mentions being in proximity to protected person should be regarded as special consideration for protection for protective measures. Investigating a case • Primary focus of investigation is to determine the individuals: INTEREST, MOTIVE, and CAPACITY to carry out THREAT. • Primary goal of investigation is to PREVENT attack or violence. • Protective intelligence investigation does not attempt to predict a particular behavior based on cause and effect. It is the totality of the Information received in the context of interest, motive and capacity. 6
  7. 7. Interviewing the Subject • Interviewing the individual is a key source of information. But not the primary source. If the individual is a member of a radical or militant group then any information gained must be within context of the overall strategy for investigating the group. • Gather background and interests prior to interview. (Guide investigation to relevancy whether the person poses a threat) • Interview can provide insight to subjects: THINKING, MOTIVES and BEHVIOUR. • Interview may corroborate individual’s statements, and be the basis for judging their viability to the case. • Interviews give the individual an opportunity to tell their story. • Interviews allow us to reassess and redirect their behavior away from threatening activity. Where to conduct the interview • In subjects home to observe non-verbal information. Example: (writings, pictures, and weapons that are in view). • In the home assists in learning the individual’s lifestyle and personality traits. • Interview with open ended questions and allow subject to speak freely. • Goal is to uncover behavior, and action that would support or detract the concern for an attack. 7
  8. 8. Interviewing the mentally ill • Mentally ill subjects will behave with how he or she perceives reality. • Do not dismiss statements made such as: (“Aliens are telling me to do this”) as just crazy talk. Allow them speak, and listen for details leading towards attack preparation. (Purchased a weapon, traveled to location) • Treat subjects with respect. Studies show they will reveal their thoughts and actions if they perceive you are generally interested in hearing what they have to say. • Interviewing the subject with clear, direct, and nonjudgmental attitude will solicit useful information rather than pretending to agree with their delusion thinking • Be and active listener, communicate genuine interest in hearing and understanding the subjects story. No matter how delusional or out of touch the story may seem. • Listening and understanding does not infer you agree with the subjects thinking. Respectful skepticism will elicit more useful information. Example: “I have not had that experience, but I’m interested in what you believe” • Information provided by the subject may be: incomplete, misleading, or inaccurate. • Subject may provide different information at different points of time, depending on current circumstances, degree of desperation, mental health treatment and other factors. Note: Do not rely to heavily on interviews alone. It is the totality of the information gathered and objective facts discovered that will support or detract from the overall threat. 8
  9. 9. Corroborated information and evidence • Primary task is to SEEK and COLLECT information and evidence to corroborate the statements of the subject. • Corroborated information about the subjects thinking and behavior will assist assessment of the subjects: INTERESTS, MOTIVES and CAPACITY to attempt an attack on protected person. • Corroborated evidence is more useful than subjective information or opinion. • Ask questions that will initiate a factual response not an opinion. Example direct: “What is the name of the city he traveled to and when?” Example opinion: “Do you think he is the type of person to do this?” 9
  10. 10. FIVE AREAS OF INQUIRY FOR PROTECTIVE INVESTIGATION Areas of inquiry 1. The facts of the situation that brought the subject to your attention. • Providers of information may have multiple motives such as: extortion, disgruntled employee setting up another, angry wife, husband, neighbor hoping to embarrass individual by law enforcement action. • Eyewitness accounts of subject’s action or behavior have a high degree of inaccuracies. Need to establish and corroborate. • Establish facts of a case to determine if the subject being reported is a victim and if the informant is the true threat. 2. Three kinds of general information about the subject. Identifiers • Name and alias. • Date of birth • SSN/Military ID. • Current address. • Name of close relatives. • Physical description and photograph. • Handwriting samples. Background information • Education and training. • Criminal history. • Violent behavior history. • Military history. • History and experience with weapons. • Marital and relationship history. 10
  11. 11. • Employment history. • Mental health history. (depression, despair, suicidal, violence) • Extremist ideas or interest in radical groups. • History of grievances and/or harassment of others. • Travel history in previous year. Four purposes for gathering background: 1. Subjects past behavior. 2. Subjects interests. 3. Subjects lifestyle. (Can influence interest, motive or capacity to attack) 4. Subjects capacity to attempt an attack. Current life situation and circumstances • Individuals in unstable or transitional living arrangements may participate in extreme behavior or reach out to authorities by acting out. • Is individual in stable environment with food, shelter, clothing and supportive human contact. • Subject employed. • How stable is employment. • Is subject facing crisis or transition (Loss of marriage, job, housing) • Subject being discharged from jail, mental health facility. • How does current living situation compare with past situations? • Does subject appear to be on downward course? 3. Information about attack related behaviors. • Many attacks or near lethal approaches are preceded by attack related behavior. (Often observed by people in subjects life) • Such behavior should be considered a warning sign and taken seriously. • Subjects must: - Select target. - Locate target. - Secure weapon. - Travel to target. - Try and overcome security measures protecting target. 11
  12. 12. 4. Behaviors of concern in a threat assessment An interest in assassination • Visiting sites related to assassins. • Writing to or about assassins. • Gathering news and information related to topics of assassination. Ideas and plans about attacking public figure or official • Comments made to others. • Notes in a diary or journal. • Recent attention to travel and activities of protected person. • Inquires to police or security about security measures. • Attempts to breach security. • Recent efforts to purchase or procure a weapon. Communicating inappropriate interest in protected person or comments that express or imply interest in attacking the person. • Attackers rarely directly threaten a person. • Attackers rarely communicate threat to law enforcement or security. • Attackers will usually communicate intent to: Family, friend, co-worker, neighbor or others. Visiting a site linked to a protectee • Visiting an event or site where protectee is, or believed to be. 12
  13. 13. Approaching a protectee • Information that subject has acquired a weapon around the same time the subject has developed an inappropriate or unusual interest in protectee. • Presume that a subject that has engaged in these behaviors involving a weapon, or breached security is interested in attacking if given the opportunity. • Investigative efforts should focus on ruling out the possibility of an attack. • Example: Subject had valid reason to purchase a firearm. (Hunting season, sport shooting) Note: A subjects MOTIVES may determine whether a protectee is being targeted for an attack. 13
  14. 14. Eight common motives found in inappropriate and/or attack related subjects. 1. Bringing themselves to the attention of persons they PERCIEVED to be authorities. 2. Actions causing them to be involuntarily committed to a mental health or correctional facility. 3. Change in current living situation viewed as intolerable by the subject. 4. Obtaining help, being stopped from acting violently. 5. Getting someone else in trouble. 6. Obtaining attention or notoriety or bringing a concern to public attention. 7. Achieving a special relationship with a public official or figure. 8. Correcting a perceived wrong. Note: • Our OPINION of the rationality of the subjects MOTIVES has no bearing on whether the subject will take action. • Subjects ACTS are based on their PERCEPTION OF REALITY. • It does not matter if the subjects MOTIVES are: LOGICAL, ILLOGICAL, RATIONAL, FOOLISH, REALISTIC or SELF- DESTRUCTIVE. Example: Subject believes they are a relative of the protectee and has been invited to move into their home. Important: The task is to UNDERSTAND how the subject VIEWS 14
  15. 15. the situation, not to REINFORCE any DELUSIONAL IDEAS, and to attempt to GAUGE the ACTION the subject might take based on their PERCEPTION AND BELIEFS. 5. Target Selection • Many attackers and near lethal approaches may consider several potential targets and change their primary target several times. • Factors in target selection: Ability to travel, Finances. Approach opportunities with protectee, Perceived importance given by the media, Security around protectee. • Be alert to the possibility that a subject has considered, is simultaneously considering, or might consider in the future a number of officials or figures as possible targets. 15
  16. 16. QUESTIONS TO ASK IN THREAT ASSESSMENT 1. What motivated the subject to make the statement or take the action? 2. What has the subject communicated to someone else or written in a diary or journal concerning their intentions? 3. Has the subject shown interest in: • Assassins or assassination. • Weapons (Recent purchase or procurement of weapon) • Militant or radical ideas/group. • Murders, murderers, mass murders, workplace violence, stalking incidents. 4. Has subject been involved in incidents of: menacing, harassing and or stalking behaviors? These behaviors combine an inappropriate interest with any of the following: • Developing an attack idea or plan. • Approaching, visiting, and/or following the protectee with a weapon. • Attempting to overcome security measures. • Assaulting or attempting to assault a protectee. 16
  17. 17. Two points about violence prediction 1. Violence prediction is conditional: Not a yes or no Definition: A prediction of violence is a statement that, given certain circumstances or conditions, a specified risk exists that a particular subject will act violently toward a particular target. 2. Targeted violence is different than any other kinds of violence. Example: Armed robbery, rape or attack on a roommate, is different than an attack on a public figure, or business leader. • A murder of a celebrity or business leader is different than a murder of a parent or neighbor. • Prior history of violence may not predict violence toward a public figure. It is the totality of the information attained. Two stage process in evaluation of violence prediction 1. Information should be examined for evidence of behavior and conditions that would be consistent with the likelihood of attack on a public person. 2. Determine whether the subject appears to be moving toward and attack and if so, how rapidly. Note: ATTACK is the result of UNDERSTANDABLE and DISCERNIBLE PROCESS of THINKING and BEHAVIOR! 17
  18. 18. References Intelligence Threat Assessment Investigations US Dept of Justice: A guide for State and Local Enforcement Officials. (Robert Fein/Bryan Vossekuil) Behavioral Science and the Law Volume 17 (1999) John Wiley and Sons Ltd. Threat Assessment: An approach to Prevent Targeted Violence (National Institute of Justice) 18