SlideShare a Scribd company logo
1 of 43
Download to read offline
The Role of Protective Intelligence in
Managing Threats Associated with
Targeted Violence and the Active Shooter
March 22, 2017
AGENDA
HILLARD HEINTZE © 2017 | Protecting What Matters2
PART I
Why We're Here: Context and Mindset
PART II
Know Your Enemy: Threat Assessment
and Protective Intelligence
PART III
Practicing Prevention: Critical Issues and Insights
PART I
Why We're Here:
Context and Mindset
3 HILLARD HEINTZE © 2017 | Protecting What Matters
EMPLOYEE SAFETY IS A TOP PRIORITY
HILLARD HEINTZE © 2017 | Protecting What Matters4
Employers must maintain
“a place of employment which is
free from recognized hazards that
are causing or are likely to cause
death or serious physical harm ...”
OSHA/MOSHA
EMPLOYEE SAFETY IS A TOP PRIORITY
HILLARD HEINTZE © 2017 | Protecting What Matters5
Family of Navy Yard shooting victim
files $37.5 million wrongful-death claim
• Suit alleged the Navy and the Department of
Veterans Affairs overlooked or missed a series of
red flags that should have alerted them to the
troubled history of the shooter
• The action inspired other victims’ families to
seek legal advice or file lawsuits
EMPLOYEE SAFETY IS A TOP PRIORITY
Beware of the warning signs
Was the ABB Power Plant shooting preventable?
• Known to be disgruntled, unhappy at work and angry at the company
• Friends said he complained about pressure and conflict with supervisors
• Part of a class-action lawsuit against
the company over pension plan and
401(k) fees and expenses
• Subject purchased two of the four
weapons he used in the incident
only the day before – an AK-47
and a 12-gauge shotgun
HILLARD HEINTZE © 2017 | Protecting What Matters6
7 HILLARD HEINTZE © 2017 | Protecting What Matters
EMPLOYEE SAFETY IS A TOP PRIORITY
Employers must be aware of the legal
implications of workplace violence prevention
• The Health Insurance Portability and
Accountability Act (HIPAA)
• The Family Educational Rights and Privacy Act (FERPA)
• Duty to Warn – The Tarasoff Case
• State labor laws related to weapons and
mental health commitment
• Laws prohibiting discussion or discrimination
based on knowledge of domestic violence
8 HILLARD HEINTZE © 2017 | Protecting What Matters
EMPLOYEE SAFETY IS A TOP PRIORITY
The business benefits of a workplace violence prevention program
• Increased workplace and
employee security
• Higher employee morale leads
to improved levels of productivity
• Uninterrupted business operations
• Stronger enterprise risk management
• Greater cross-functional collaboration
and information sharing
• Early identification of red flags –
and opportunities to intervene
• Ability to perform basic threat
assessments in-house
• Lower risks of lawsuits and settlements
9 HILLARD HEINTZE © 2017 | Protecting What Matters
PROTECTING THE WORKPLACE
The FBI defines workplace violence as
“any action that could threaten the safety of
an employee, impact an employee’s physical
or psychological well-being, or cause damage
to company property.”
HILLARD HEINTZE © 2017 | Protecting What Matters
PROTECTING THE WORKPLACE
10
Common roadblocks to early intervention
in workplace violence prevention
- Lack of awareness about the knowable indicators
of behaviors that could point to a potential attack
- Poor understanding of risk and mitigation measures
- Absence of a formal workplace violence
prevention program
- Shortfalls in policies, training,
sustained executive sponsorship and
sufficient security-related funding
11 HILLARD HEINTZE © 2017 | Protecting What Matters
PROTECTING THE WORKPLACE
Targeted violence is any
incident of violence where a
known or knowable attacker
selects a particular target
prior to their violent attack.
12 HILLARD HEINTZE © 2017 | Protecting What Matters
PROTECTING THE WORKPLACE
A Proactive Approach: Prevention and Early Intervention
To manage threats associated with
targeted violence and the active
shooter, we must first gain an
understanding of the factors that
may indicate potential risk.
This includes:
Dispelling prevailing beliefs about attackers.
Understanding the pre-attack process.
Learning the processes involved in
behavioral threat assessment and
protective intelligence.
PART II
Know Your Enemy:
Threat Assessment and Protective Intelligence
13 HILLARD HEINTZE © 2017 | Protecting What Matters
14 HILLARD HEINTZE © 2017 | Protecting What Matters
WHAT WE LEARNED ABOUT ATTACKERS
The Exceptional Case Study Project
Five-year study
examined the thinking
and behavior of 83
subjects who carried
out 74 attacks from
1949 to 1996
1. Target Selection
2. Motive
3. Planning
4. Mental Illness
5. Communications
6. Security
HILLARD HEINTZE © 2017 | Protecting What Matters15
WHAT WE LEARNED ABOUT ATTACKERS
Myths versus Facts
MYTH 1:
They fit a
distinct profile
FACT 1:
Attackers do not fit
one descriptive or
demographic profile
MYTH 2:
Mentally ill attackers are
irrational in their planning
FACT 2:
Mentally ill attackers
have developed organized
and rational attack plans
MYTH 3:
They make a
direct threat
FACT 3:
Persons who pose an
actual threat most often
do not make a threat
TARGETED VIOLENCE: UNDERSTANDING AND ADDRESSING THE RISK
What was learned about the pre-attack process?
• An understandable and often discernible process of
thinking and behavior.
• Stems from an interaction among the potential attacker,
past stressful events, a current situation and the target.
• A potential attacker’s behavior is vital to identifying his
or her intentions. The attacker’s thinking, planning and
logistical preparations have to be detected and
interrupted.
HILLARD HEINTZE © 2017 | Protecting What Matters16
HILLARD HEINTZE © 2017 | Protecting What Matters17
WHAT WE LEARNED ABOUT ATTACKERS
Attackers
have motives
• Achieve fame
and notoriety
• Law-enforcement-
assisted suicide
• Bring national
attention to a
perceived
problem
Attackers
select targets
• Based on their
motives and
the accessibility
of the target
• Often consider
more than one
target
Attackers have
common
backgrounds
• Despair, depression,
suicidal thoughts
• History of harassing
or stalking
• Major loss or
change in life
• Few arrests for
violent crimes
18 HILLARD HEINTZE © 2017 | Protecting What Matters
WHAT WE LEARNED ABOUT ATTACKERS
Attack-related behaviors
• Interest or obsession with violence
• Develop attack plan
• Approach or visit site of attack
• Attempted assault or actual attack
• Attempt to penetrate security
• Approach or visit site with weapon
TARGETED VIOLENCE: UNDERSTANDING AND ADDRESSING THE RISK
Assess potential threats from the outside, looking in
• Always remember that the question at the core of a
threat assessment is not “Has the subject made a
threat?” but “Does the subject pose a threat?”
• Investigations are behavior-based rather than
statement-based
• Information sharing is key to prevention
19 HILLARD HEINTZE © 2017 | Protecting What Matters
BEHAVIORAL THREAT ASSESSMENT
HILLARD HEINTZE © 2017 | Protecting What Matters20
Behavioral threat assessment is the process of
gathering and assessing information about persons
who may have the interest, motive, intention and
capability of committing an act of targeted violence.
BEHAVIORAL THREAT ASSESSMENT
HILLARD HEINTZE © 2017 | Protecting What Matters21
The threat assessment process is a continuum from inquiry to investigation.
Manage
The threat the
individual poses
Assess
If the individual poses
a risk – gather
information from
multiple sources
Identify
Individuals who have
the idea or intent
of violence
BEHAVIORAL THREAT ASSESSMENT
HILLARD HEINTZE © 2017 | Protecting What Matters22
Threat assessment is the
approach supported by the
Exceptional Case Study Project
• Various approaches to assessing the
likelihood of violence exist. Most are
effective in one or more respects –
but ineffective in others.
Profiling
Automated
Decision-
Making
Structured
Clinical
Assessment/
Guided
Professional
Judgment
PREVENTION: PROTECTIVE INTELLIGENCE - TEN KEY QUESTIONS
What motivated the subject
to make the statement or
take the action which caused
him or her to come to our
attention?
HILLARD HEINTZE © 2017 | Protecting What Matters23
PREVENTION: PROTECTIVE INTELLIGENCE - TEN KEY QUESTIONS
What has the subject
communicated to
anyone concerning his
or her intentions?
HILLARD HEINTZE © 2017 | Protecting What Matters24
PREVENTION: PROTECTIVE INTELLIGENCE - TEN KEY QUESTIONS
Has the subject shown
inappropriate interest in
assassins, weapons, militant
ideas or mass murders?
HILLARD HEINTZE © 2017 | Protecting What Matters25
PREVENTION: PROTECTIVE INTELLIGENCE - TEN KEY QUESTIONS
Is there evidence that the
subject has engaged in
attack-related behavior
targeting our protectee(s)?
HILLARD HEINTZE © 2017 | Protecting What Matters26
27 HILLARD HEINTZE © 2017 | Protecting What Matters
PREVENTION: PROTECTIVE INTELLIGENCE - TEN KEY QUESTIONS
Does the subject have a history
of mental illness involving
command hallucinations,
delusional ideas, feelings of
persecution, etc.?
PREVENTION: PROTECTIVE INTELLIGENCE - TEN KEY QUESTIONS
Does the subject have the
ability to plan and execute
a violent action against one
of our protectees?
HILLARD HEINTZE © 2017 | Protecting What Matters28
PREVENTION: PROTECTIVE INTELLIGENCE - TEN KEY QUESTIONS
Is there evidence that the
subject is experiencing
desperation and/or despair?
HILLARD HEINTZE © 2017 | Protecting What Matters29
PREVENTION: PROTECTIVE INTELLIGENCE - TEN KEY QUESTIONS
Is what the subject says consistent
with his or her actions?
HILLARD HEINTZE © 2017 | Protecting What Matters30
PREVENTION: PROTECTIVE INTELLIGENCE - TEN KEY QUESTIONS
Is there concern among
those who know the
subject that he or she
might take action based
on inappropriate ideas?
HILLARD HEINTZE © 2017 | Protecting What Matters31
PREVENTION: PROTECTIVE INTELLIGENCE - TEN KEY QUESTIONS
Are there factors in the
subject’s life or environment
which might increase or
decrease the likelihood of the
subject attempting to attack a
protectee?
HILLARD HEINTZE © 2017 | Protecting What Matters32
REAL-LIFE CONTEXT: CASE STUDIES
Managing a Stalker Incident
An anonymous caller reported one of the firm’s
receptionists was slandering its management
team. The company quickly learned the caller
was known to their employee and had been
stalking her for over a year. Calls to local law
enforcement resulted in an initial flurry of
incident reports and administrative filings, but
progress in the case quickly stalled.
HILLARD HEINTZE © 2017 | Protecting What Matters33
REAL-LIFE CONTEXT: CASE STUDIES
A Former Employee’s Potential
for Violence
A disgruntled former employee began
sending inappropriate emails to current
employees. The client needed to assess
the individual’s potential for violence.
HILLARD HEINTZE © 2017 | Protecting What Matters34
REAL-LIFE CONTEXT: CASE STUDIES
The Facebook Threat
An employee in an East Coast
branch office posted threatening
statements about company
personnel on his Facebook wall
along with several pictures of
himself posing with weapons.
HILLARD HEINTZE © 2017 | Protecting What Matters35
PART III
Practicing Prevention:
Critical Issues and Insights
36 HILLARD HEINTZE © 2017 | Protecting What Matters
BEST PRACTICES: CRITICAL ISSUES TO KEEP IN MIND
Targeted workplace violence
in the United States
On average, 1.7 million people
annually are victims of violent crime
while working – including an average
of 700 homicides per year.
HILLARD HEINTZE © 2017 | Protecting What Matters37
BEST PRACTICES: CRITICAL ISSUES TO KEEP IN MIND
U.S. Workplace Homicides
by Type, 2011-2012
38 HILLARD HEINTZE © 2017 | Protecting What Matters
BEST PRACTICES: CRITICAL ISSUES TO KEEP IN MIND
HILLARD HEINTZE © 2017 | Protecting What Matters39
Workplace violence prevention is not best
left to traditional law enforcement
Without specific training on violence prevention,
law enforcement may fail to act on reported
information or respond in a meaningful way.
BEST PRACTICES: CRITICAL ISSUES TO KEEP IN MIND
• Internal investigations are controlled
by the organization
• External investigations are controlled
by law enforcement agencies
40 HILLARD HEINTZE © 2017 | Protecting What Matters
41 HILLARD HEINTZE © 2017 | Protecting What Matters
We must do everything possible to prevent
and prepare for active shooter events
• 37% of attacks ended in less than 5 minutes
• Average attack lasted 12 minutes
• 74% of attackers entered through a main entrance
• 51% of attacks occurred in the workplace
ACTIVE SHOOTER PLANNING
• Developed in line with the
Four Phases of Emergency
Management
• An Active Shooter Plan
should be an essential
component of an overall
Emergency Management
Plan
42
ACTIVE SHOOTER PLANNING
HILLARD HEINTZE © 2017 | Protecting What Matters
43 HILLARD HEINTZE © 2017 | Protecting What Matters
Matthew Doherty
Senior Vice President, Threat and Violence Risk Management
matthew.doherty@hillardheintze.com
202.306.6530
30 South Wacker Drive, Suite 1400, Chicago, Illinois 60606
QUESTIONS AND DISCUSSION

More Related Content

Similar to Hillard heintze Presentation for ATAP

Breach Response Matters: Effectively Handling Health Care Cyber Security Inci...
Breach Response Matters: Effectively Handling Health Care Cyber Security Inci...Breach Response Matters: Effectively Handling Health Care Cyber Security Inci...
Breach Response Matters: Effectively Handling Health Care Cyber Security Inci...
Polsinelli PC
 
Chapter 13Security Threats and ControlsFundamentals of Law
Chapter 13Security Threats and ControlsFundamentals of Law Chapter 13Security Threats and ControlsFundamentals of Law
Chapter 13Security Threats and ControlsFundamentals of Law
EstelaJeffery653
 

Similar to Hillard heintze Presentation for ATAP (20)

Hillard Heintze ASIS Presentation Active Shooter
Hillard Heintze ASIS Presentation Active ShooterHillard Heintze ASIS Presentation Active Shooter
Hillard Heintze ASIS Presentation Active Shooter
 
Hillard Heintze Presentation to ATAP - Part 1
Hillard Heintze Presentation to ATAP - Part 1Hillard Heintze Presentation to ATAP - Part 1
Hillard Heintze Presentation to ATAP - Part 1
 
Hillard Heintze Presentation to ATAP - Part 2
Hillard Heintze Presentation to ATAP - Part 2Hillard Heintze Presentation to ATAP - Part 2
Hillard Heintze Presentation to ATAP - Part 2
 
Radicalization in the Workplace
Radicalization in the WorkplaceRadicalization in the Workplace
Radicalization in the Workplace
 
Comprehensive Active Shooter Incident Management
Comprehensive Active Shooter Incident ManagementComprehensive Active Shooter Incident Management
Comprehensive Active Shooter Incident Management
 
Hillard Heintze Presentation to ATAP - Part 3
Hillard Heintze Presentation to ATAP - Part 3Hillard Heintze Presentation to ATAP - Part 3
Hillard Heintze Presentation to ATAP - Part 3
 
Hillard Heintze Presentation to ATAP - Part 4
Hillard Heintze Presentation to ATAP - Part 4Hillard Heintze Presentation to ATAP - Part 4
Hillard Heintze Presentation to ATAP - Part 4
 
Hi103 week 5 chpt 13
Hi103 week 5 chpt 13Hi103 week 5 chpt 13
Hi103 week 5 chpt 13
 
Breach Response Matters: Effectively Handling Health Care Cyber Security Inci...
Breach Response Matters: Effectively Handling Health Care Cyber Security Inci...Breach Response Matters: Effectively Handling Health Care Cyber Security Inci...
Breach Response Matters: Effectively Handling Health Care Cyber Security Inci...
 
Protecting the Family Office
Protecting the Family OfficeProtecting the Family Office
Protecting the Family Office
 
Hillard Heintze Radicalization in the Workplace
Hillard Heintze Radicalization in the WorkplaceHillard Heintze Radicalization in the Workplace
Hillard Heintze Radicalization in the Workplace
 
Chapter 13Security Threats and ControlsFundamentals of Law
Chapter 13Security Threats and ControlsFundamentals of Law Chapter 13Security Threats and ControlsFundamentals of Law
Chapter 13Security Threats and ControlsFundamentals of Law
 
P19 active threat response steps toward mitigation_king_mc_evoy_6.12.19
P19 active threat response steps toward mitigation_king_mc_evoy_6.12.19P19 active threat response steps toward mitigation_king_mc_evoy_6.12.19
P19 active threat response steps toward mitigation_king_mc_evoy_6.12.19
 
Hm300 week 3 part 1 of 2
Hm300 week 3 part 1 of 2Hm300 week 3 part 1 of 2
Hm300 week 3 part 1 of 2
 
Hi103 week 3 chpt 6
Hi103 week 3 chpt 6Hi103 week 3 chpt 6
Hi103 week 3 chpt 6
 
Hm300 week 3 part 1 of 2
Hm300 week 3 part 1 of 2Hm300 week 3 part 1 of 2
Hm300 week 3 part 1 of 2
 
6 Keys to Preventing and Responding to Workplace Violence
6 Keys to Preventing and Responding to Workplace Violence6 Keys to Preventing and Responding to Workplace Violence
6 Keys to Preventing and Responding to Workplace Violence
 
CH 4 CRIMINAL ACTS AND INTENTIONAL TORTS
CH 4 CRIMINAL ACTS AND INTENTIONAL TORTSCH 4 CRIMINAL ACTS AND INTENTIONAL TORTS
CH 4 CRIMINAL ACTS AND INTENTIONAL TORTS
 
Active Shooter - The New Cyber
Active Shooter - The New CyberActive Shooter - The New Cyber
Active Shooter - The New Cyber
 
Crisis Communications: Manage (and Avoid) Crises with Media Monitoring
Crisis Communications: Manage (and Avoid) Crises with Media MonitoringCrisis Communications: Manage (and Avoid) Crises with Media Monitoring
Crisis Communications: Manage (and Avoid) Crises with Media Monitoring
 

Recently uploaded

Chandigarh Call Girls ☎ 9878799926✅ Just Genuine Call Call Girls Mohali 🧿Elit...
Chandigarh Call Girls ☎ 9878799926✅ Just Genuine Call Call Girls Mohali 🧿Elit...Chandigarh Call Girls ☎ 9878799926✅ Just Genuine Call Call Girls Mohali 🧿Elit...
Chandigarh Call Girls ☎ 9878799926✅ Just Genuine Call Call Girls Mohali 🧿Elit...
rajveerescorts2022
 
Chandigarh Call Girls ☎ 08868886958✅ Just Genuine Call Call Girls Chandigarh ...
Chandigarh Call Girls ☎ 08868886958✅ Just Genuine Call Call Girls Chandigarh ...Chandigarh Call Girls ☎ 08868886958✅ Just Genuine Call Call Girls Chandigarh ...
Chandigarh Call Girls ☎ 08868886958✅ Just Genuine Call Call Girls Chandigarh ...
Sheetaleventcompany
 
Udaipur Call Girls ☎ 9602870969✅ Better Genuine Call Girl in Udaipur Escort S...
Udaipur Call Girls ☎ 9602870969✅ Better Genuine Call Girl in Udaipur Escort S...Udaipur Call Girls ☎ 9602870969✅ Better Genuine Call Girl in Udaipur Escort S...
Udaipur Call Girls ☎ 9602870969✅ Better Genuine Call Girl in Udaipur Escort S...
Apsara Of India
 
👉 Amritsar Call Girls 👉📞 8725944379 👉📞 Just📲 Call Ruhi Call Girl Near Me Amri...
👉 Amritsar Call Girls 👉📞 8725944379 👉📞 Just📲 Call Ruhi Call Girl Near Me Amri...👉 Amritsar Call Girls 👉📞 8725944379 👉📞 Just📲 Call Ruhi Call Girl Near Me Amri...
👉 Amritsar Call Girls 👉📞 8725944379 👉📞 Just📲 Call Ruhi Call Girl Near Me Amri...
Sheetaleventcompany
 
Call Girls In Lahore-->>03274100048<<--Independent Call Girls & Escorts In La...
Call Girls In Lahore-->>03274100048<<--Independent Call Girls & Escorts In La...Call Girls In Lahore-->>03274100048<<--Independent Call Girls & Escorts In La...
Call Girls In Lahore-->>03274100048<<--Independent Call Girls & Escorts In La...
Ifra Zohaib
 
💚Call Girls Chandigarh 💯Riya 📲🔝8868886958🔝Call Girls In Chandigarh No💰Advance...
💚Call Girls Chandigarh 💯Riya 📲🔝8868886958🔝Call Girls In Chandigarh No💰Advance...💚Call Girls Chandigarh 💯Riya 📲🔝8868886958🔝Call Girls In Chandigarh No💰Advance...
💚Call Girls Chandigarh 💯Riya 📲🔝8868886958🔝Call Girls In Chandigarh No💰Advance...
Sheetaleventcompany
 

Recently uploaded (20)

Chandigarh Call Girls ☎ 9878799926✅ Just Genuine Call Call Girls Mohali 🧿Elit...
Chandigarh Call Girls ☎ 9878799926✅ Just Genuine Call Call Girls Mohali 🧿Elit...Chandigarh Call Girls ☎ 9878799926✅ Just Genuine Call Call Girls Mohali 🧿Elit...
Chandigarh Call Girls ☎ 9878799926✅ Just Genuine Call Call Girls Mohali 🧿Elit...
 
AMBALA CALL GIRL 9661985112 LOW PRICE ESCORT SERVICE AMBALA
AMBALA CALL GIRL 9661985112 LOW PRICE ESCORT SERVICE AMBALAAMBALA CALL GIRL 9661985112 LOW PRICE ESCORT SERVICE AMBALA
AMBALA CALL GIRL 9661985112 LOW PRICE ESCORT SERVICE AMBALA
 
Call Girls Siliguri Just Call 7870993772 Top Class Call Girl Service Availabl...
Call Girls Siliguri Just Call 7870993772 Top Class Call Girl Service Availabl...Call Girls Siliguri Just Call 7870993772 Top Class Call Girl Service Availabl...
Call Girls Siliguri Just Call 7870993772 Top Class Call Girl Service Availabl...
 
Call Girls Nagpur 💋Just Call WhatsApp 7870993772 Top Class Call Girl Service ...
Call Girls Nagpur 💋Just Call WhatsApp 7870993772 Top Class Call Girl Service ...Call Girls Nagpur 💋Just Call WhatsApp 7870993772 Top Class Call Girl Service ...
Call Girls Nagpur 💋Just Call WhatsApp 7870993772 Top Class Call Girl Service ...
 
Chandigarh Call Girls ☎ 08868886958✅ Just Genuine Call Call Girls Chandigarh ...
Chandigarh Call Girls ☎ 08868886958✅ Just Genuine Call Call Girls Chandigarh ...Chandigarh Call Girls ☎ 08868886958✅ Just Genuine Call Call Girls Chandigarh ...
Chandigarh Call Girls ☎ 08868886958✅ Just Genuine Call Call Girls Chandigarh ...
 
Satara call girl 8797040791♥️ call girls in satara escort service
Satara call girl 8797040791♥️ call girls in satara escort serviceSatara call girl 8797040791♥️ call girls in satara escort service
Satara call girl 8797040791♥️ call girls in satara escort service
 
Rehabilitation centres in zimbabwe | 📲 +263788080001
Rehabilitation centres in zimbabwe |  📲 +263788080001Rehabilitation centres in zimbabwe |  📲 +263788080001
Rehabilitation centres in zimbabwe | 📲 +263788080001
 
Mainpuri Escorts 📞 8617370543 | Mainpuri Call Girls
Mainpuri Escorts 📞 8617370543 | Mainpuri Call GirlsMainpuri Escorts 📞 8617370543 | Mainpuri Call Girls
Mainpuri Escorts 📞 8617370543 | Mainpuri Call Girls
 
Call Now ☎8264348440|| Call Girls in Mehrauli Escort Service Delhi N.C.R..pdf
Call Now ☎8264348440|| Call Girls in Mehrauli Escort Service Delhi N.C.R..pdfCall Now ☎8264348440|| Call Girls in Mehrauli Escort Service Delhi N.C.R..pdf
Call Now ☎8264348440|| Call Girls in Mehrauli Escort Service Delhi N.C.R..pdf
 
Vadodara 💋 Call Girl 9748763073 Call Girls in Vadodara Escort service book now
Vadodara 💋 Call Girl 9748763073 Call Girls in Vadodara Escort service book nowVadodara 💋 Call Girl 9748763073 Call Girls in Vadodara Escort service book now
Vadodara 💋 Call Girl 9748763073 Call Girls in Vadodara Escort service book now
 
Udaipur Call Girls ☎ 9602870969✅ Better Genuine Call Girl in Udaipur Escort S...
Udaipur Call Girls ☎ 9602870969✅ Better Genuine Call Girl in Udaipur Escort S...Udaipur Call Girls ☎ 9602870969✅ Better Genuine Call Girl in Udaipur Escort S...
Udaipur Call Girls ☎ 9602870969✅ Better Genuine Call Girl in Udaipur Escort S...
 
ULHASNAGAR CALL GIRL 7857803690 LOW PRICE ESCORT SERVICE
ULHASNAGAR CALL GIRL 7857803690 LOW PRICE ESCORT SERVICEULHASNAGAR CALL GIRL 7857803690 LOW PRICE ESCORT SERVICE
ULHASNAGAR CALL GIRL 7857803690 LOW PRICE ESCORT SERVICE
 
darjiling ❤CALL GIRL 7870993772 ❤CALL GIRLS ESCORT SERVICE in darjiling Book...
darjiling ❤CALL GIRL 7870993772 ❤CALL GIRLS  ESCORT SERVICE in darjiling Book...darjiling ❤CALL GIRL 7870993772 ❤CALL GIRLS  ESCORT SERVICE in darjiling Book...
darjiling ❤CALL GIRL 7870993772 ❤CALL GIRLS ESCORT SERVICE in darjiling Book...
 
👉 Amritsar Call Girls 👉📞 8725944379 👉📞 Just📲 Call Ruhi Call Girl Near Me Amri...
👉 Amritsar Call Girls 👉📞 8725944379 👉📞 Just📲 Call Ruhi Call Girl Near Me Amri...👉 Amritsar Call Girls 👉📞 8725944379 👉📞 Just📲 Call Ruhi Call Girl Near Me Amri...
👉 Amritsar Call Girls 👉📞 8725944379 👉📞 Just📲 Call Ruhi Call Girl Near Me Amri...
 
Call Girls Pune Call WhatsApp 7870993772 Top Class Call Girl Service Availab...
Call Girls Pune Call  WhatsApp 7870993772 Top Class Call Girl Service Availab...Call Girls Pune Call  WhatsApp 7870993772 Top Class Call Girl Service Availab...
Call Girls Pune Call WhatsApp 7870993772 Top Class Call Girl Service Availab...
 
Budaun Call Girl WhatsApp Chat: 📞 8617370543 | Girls Number for Friendship
Budaun Call Girl WhatsApp Chat: 📞 8617370543 | Girls Number for FriendshipBudaun Call Girl WhatsApp Chat: 📞 8617370543 | Girls Number for Friendship
Budaun Call Girl WhatsApp Chat: 📞 8617370543 | Girls Number for Friendship
 
❤️Zirakpur Escort Service☎️7837612180☎️ Call Girl service in Zirakpur☎️ Zirak...
❤️Zirakpur Escort Service☎️7837612180☎️ Call Girl service in Zirakpur☎️ Zirak...❤️Zirakpur Escort Service☎️7837612180☎️ Call Girl service in Zirakpur☎️ Zirak...
❤️Zirakpur Escort Service☎️7837612180☎️ Call Girl service in Zirakpur☎️ Zirak...
 
Call Girls In Lahore-->>03274100048<<--Independent Call Girls & Escorts In La...
Call Girls In Lahore-->>03274100048<<--Independent Call Girls & Escorts In La...Call Girls In Lahore-->>03274100048<<--Independent Call Girls & Escorts In La...
Call Girls In Lahore-->>03274100048<<--Independent Call Girls & Escorts In La...
 
💚Call Girls Chandigarh 💯Riya 📲🔝8868886958🔝Call Girls In Chandigarh No💰Advance...
💚Call Girls Chandigarh 💯Riya 📲🔝8868886958🔝Call Girls In Chandigarh No💰Advance...💚Call Girls Chandigarh 💯Riya 📲🔝8868886958🔝Call Girls In Chandigarh No💰Advance...
💚Call Girls Chandigarh 💯Riya 📲🔝8868886958🔝Call Girls In Chandigarh No💰Advance...
 
❤️Amritsar Call Girl☎️9815674956☎️ Call Girl service in Amritsar☎️ Amritsar C...
❤️Amritsar Call Girl☎️9815674956☎️ Call Girl service in Amritsar☎️ Amritsar C...❤️Amritsar Call Girl☎️9815674956☎️ Call Girl service in Amritsar☎️ Amritsar C...
❤️Amritsar Call Girl☎️9815674956☎️ Call Girl service in Amritsar☎️ Amritsar C...
 

Hillard heintze Presentation for ATAP

  • 1. The Role of Protective Intelligence in Managing Threats Associated with Targeted Violence and the Active Shooter March 22, 2017
  • 2. AGENDA HILLARD HEINTZE © 2017 | Protecting What Matters2 PART I Why We're Here: Context and Mindset PART II Know Your Enemy: Threat Assessment and Protective Intelligence PART III Practicing Prevention: Critical Issues and Insights
  • 3. PART I Why We're Here: Context and Mindset 3 HILLARD HEINTZE © 2017 | Protecting What Matters
  • 4. EMPLOYEE SAFETY IS A TOP PRIORITY HILLARD HEINTZE © 2017 | Protecting What Matters4 Employers must maintain “a place of employment which is free from recognized hazards that are causing or are likely to cause death or serious physical harm ...” OSHA/MOSHA
  • 5. EMPLOYEE SAFETY IS A TOP PRIORITY HILLARD HEINTZE © 2017 | Protecting What Matters5 Family of Navy Yard shooting victim files $37.5 million wrongful-death claim • Suit alleged the Navy and the Department of Veterans Affairs overlooked or missed a series of red flags that should have alerted them to the troubled history of the shooter • The action inspired other victims’ families to seek legal advice or file lawsuits
  • 6. EMPLOYEE SAFETY IS A TOP PRIORITY Beware of the warning signs Was the ABB Power Plant shooting preventable? • Known to be disgruntled, unhappy at work and angry at the company • Friends said he complained about pressure and conflict with supervisors • Part of a class-action lawsuit against the company over pension plan and 401(k) fees and expenses • Subject purchased two of the four weapons he used in the incident only the day before – an AK-47 and a 12-gauge shotgun HILLARD HEINTZE © 2017 | Protecting What Matters6
  • 7. 7 HILLARD HEINTZE © 2017 | Protecting What Matters EMPLOYEE SAFETY IS A TOP PRIORITY Employers must be aware of the legal implications of workplace violence prevention • The Health Insurance Portability and Accountability Act (HIPAA) • The Family Educational Rights and Privacy Act (FERPA) • Duty to Warn – The Tarasoff Case • State labor laws related to weapons and mental health commitment • Laws prohibiting discussion or discrimination based on knowledge of domestic violence
  • 8. 8 HILLARD HEINTZE © 2017 | Protecting What Matters EMPLOYEE SAFETY IS A TOP PRIORITY The business benefits of a workplace violence prevention program • Increased workplace and employee security • Higher employee morale leads to improved levels of productivity • Uninterrupted business operations • Stronger enterprise risk management • Greater cross-functional collaboration and information sharing • Early identification of red flags – and opportunities to intervene • Ability to perform basic threat assessments in-house • Lower risks of lawsuits and settlements
  • 9. 9 HILLARD HEINTZE © 2017 | Protecting What Matters PROTECTING THE WORKPLACE The FBI defines workplace violence as “any action that could threaten the safety of an employee, impact an employee’s physical or psychological well-being, or cause damage to company property.”
  • 10. HILLARD HEINTZE © 2017 | Protecting What Matters PROTECTING THE WORKPLACE 10 Common roadblocks to early intervention in workplace violence prevention - Lack of awareness about the knowable indicators of behaviors that could point to a potential attack - Poor understanding of risk and mitigation measures - Absence of a formal workplace violence prevention program - Shortfalls in policies, training, sustained executive sponsorship and sufficient security-related funding
  • 11. 11 HILLARD HEINTZE © 2017 | Protecting What Matters PROTECTING THE WORKPLACE Targeted violence is any incident of violence where a known or knowable attacker selects a particular target prior to their violent attack.
  • 12. 12 HILLARD HEINTZE © 2017 | Protecting What Matters PROTECTING THE WORKPLACE A Proactive Approach: Prevention and Early Intervention To manage threats associated with targeted violence and the active shooter, we must first gain an understanding of the factors that may indicate potential risk. This includes: Dispelling prevailing beliefs about attackers. Understanding the pre-attack process. Learning the processes involved in behavioral threat assessment and protective intelligence.
  • 13. PART II Know Your Enemy: Threat Assessment and Protective Intelligence 13 HILLARD HEINTZE © 2017 | Protecting What Matters
  • 14. 14 HILLARD HEINTZE © 2017 | Protecting What Matters WHAT WE LEARNED ABOUT ATTACKERS The Exceptional Case Study Project Five-year study examined the thinking and behavior of 83 subjects who carried out 74 attacks from 1949 to 1996 1. Target Selection 2. Motive 3. Planning 4. Mental Illness 5. Communications 6. Security
  • 15. HILLARD HEINTZE © 2017 | Protecting What Matters15 WHAT WE LEARNED ABOUT ATTACKERS Myths versus Facts MYTH 1: They fit a distinct profile FACT 1: Attackers do not fit one descriptive or demographic profile MYTH 2: Mentally ill attackers are irrational in their planning FACT 2: Mentally ill attackers have developed organized and rational attack plans MYTH 3: They make a direct threat FACT 3: Persons who pose an actual threat most often do not make a threat
  • 16. TARGETED VIOLENCE: UNDERSTANDING AND ADDRESSING THE RISK What was learned about the pre-attack process? • An understandable and often discernible process of thinking and behavior. • Stems from an interaction among the potential attacker, past stressful events, a current situation and the target. • A potential attacker’s behavior is vital to identifying his or her intentions. The attacker’s thinking, planning and logistical preparations have to be detected and interrupted. HILLARD HEINTZE © 2017 | Protecting What Matters16
  • 17. HILLARD HEINTZE © 2017 | Protecting What Matters17 WHAT WE LEARNED ABOUT ATTACKERS Attackers have motives • Achieve fame and notoriety • Law-enforcement- assisted suicide • Bring national attention to a perceived problem Attackers select targets • Based on their motives and the accessibility of the target • Often consider more than one target Attackers have common backgrounds • Despair, depression, suicidal thoughts • History of harassing or stalking • Major loss or change in life • Few arrests for violent crimes
  • 18. 18 HILLARD HEINTZE © 2017 | Protecting What Matters WHAT WE LEARNED ABOUT ATTACKERS Attack-related behaviors • Interest or obsession with violence • Develop attack plan • Approach or visit site of attack • Attempted assault or actual attack • Attempt to penetrate security • Approach or visit site with weapon
  • 19. TARGETED VIOLENCE: UNDERSTANDING AND ADDRESSING THE RISK Assess potential threats from the outside, looking in • Always remember that the question at the core of a threat assessment is not “Has the subject made a threat?” but “Does the subject pose a threat?” • Investigations are behavior-based rather than statement-based • Information sharing is key to prevention 19 HILLARD HEINTZE © 2017 | Protecting What Matters
  • 20. BEHAVIORAL THREAT ASSESSMENT HILLARD HEINTZE © 2017 | Protecting What Matters20 Behavioral threat assessment is the process of gathering and assessing information about persons who may have the interest, motive, intention and capability of committing an act of targeted violence.
  • 21. BEHAVIORAL THREAT ASSESSMENT HILLARD HEINTZE © 2017 | Protecting What Matters21 The threat assessment process is a continuum from inquiry to investigation. Manage The threat the individual poses Assess If the individual poses a risk – gather information from multiple sources Identify Individuals who have the idea or intent of violence
  • 22. BEHAVIORAL THREAT ASSESSMENT HILLARD HEINTZE © 2017 | Protecting What Matters22 Threat assessment is the approach supported by the Exceptional Case Study Project • Various approaches to assessing the likelihood of violence exist. Most are effective in one or more respects – but ineffective in others. Profiling Automated Decision- Making Structured Clinical Assessment/ Guided Professional Judgment
  • 23. PREVENTION: PROTECTIVE INTELLIGENCE - TEN KEY QUESTIONS What motivated the subject to make the statement or take the action which caused him or her to come to our attention? HILLARD HEINTZE © 2017 | Protecting What Matters23
  • 24. PREVENTION: PROTECTIVE INTELLIGENCE - TEN KEY QUESTIONS What has the subject communicated to anyone concerning his or her intentions? HILLARD HEINTZE © 2017 | Protecting What Matters24
  • 25. PREVENTION: PROTECTIVE INTELLIGENCE - TEN KEY QUESTIONS Has the subject shown inappropriate interest in assassins, weapons, militant ideas or mass murders? HILLARD HEINTZE © 2017 | Protecting What Matters25
  • 26. PREVENTION: PROTECTIVE INTELLIGENCE - TEN KEY QUESTIONS Is there evidence that the subject has engaged in attack-related behavior targeting our protectee(s)? HILLARD HEINTZE © 2017 | Protecting What Matters26
  • 27. 27 HILLARD HEINTZE © 2017 | Protecting What Matters PREVENTION: PROTECTIVE INTELLIGENCE - TEN KEY QUESTIONS Does the subject have a history of mental illness involving command hallucinations, delusional ideas, feelings of persecution, etc.?
  • 28. PREVENTION: PROTECTIVE INTELLIGENCE - TEN KEY QUESTIONS Does the subject have the ability to plan and execute a violent action against one of our protectees? HILLARD HEINTZE © 2017 | Protecting What Matters28
  • 29. PREVENTION: PROTECTIVE INTELLIGENCE - TEN KEY QUESTIONS Is there evidence that the subject is experiencing desperation and/or despair? HILLARD HEINTZE © 2017 | Protecting What Matters29
  • 30. PREVENTION: PROTECTIVE INTELLIGENCE - TEN KEY QUESTIONS Is what the subject says consistent with his or her actions? HILLARD HEINTZE © 2017 | Protecting What Matters30
  • 31. PREVENTION: PROTECTIVE INTELLIGENCE - TEN KEY QUESTIONS Is there concern among those who know the subject that he or she might take action based on inappropriate ideas? HILLARD HEINTZE © 2017 | Protecting What Matters31
  • 32. PREVENTION: PROTECTIVE INTELLIGENCE - TEN KEY QUESTIONS Are there factors in the subject’s life or environment which might increase or decrease the likelihood of the subject attempting to attack a protectee? HILLARD HEINTZE © 2017 | Protecting What Matters32
  • 33. REAL-LIFE CONTEXT: CASE STUDIES Managing a Stalker Incident An anonymous caller reported one of the firm’s receptionists was slandering its management team. The company quickly learned the caller was known to their employee and had been stalking her for over a year. Calls to local law enforcement resulted in an initial flurry of incident reports and administrative filings, but progress in the case quickly stalled. HILLARD HEINTZE © 2017 | Protecting What Matters33
  • 34. REAL-LIFE CONTEXT: CASE STUDIES A Former Employee’s Potential for Violence A disgruntled former employee began sending inappropriate emails to current employees. The client needed to assess the individual’s potential for violence. HILLARD HEINTZE © 2017 | Protecting What Matters34
  • 35. REAL-LIFE CONTEXT: CASE STUDIES The Facebook Threat An employee in an East Coast branch office posted threatening statements about company personnel on his Facebook wall along with several pictures of himself posing with weapons. HILLARD HEINTZE © 2017 | Protecting What Matters35
  • 36. PART III Practicing Prevention: Critical Issues and Insights 36 HILLARD HEINTZE © 2017 | Protecting What Matters
  • 37. BEST PRACTICES: CRITICAL ISSUES TO KEEP IN MIND Targeted workplace violence in the United States On average, 1.7 million people annually are victims of violent crime while working – including an average of 700 homicides per year. HILLARD HEINTZE © 2017 | Protecting What Matters37
  • 38. BEST PRACTICES: CRITICAL ISSUES TO KEEP IN MIND U.S. Workplace Homicides by Type, 2011-2012 38 HILLARD HEINTZE © 2017 | Protecting What Matters
  • 39. BEST PRACTICES: CRITICAL ISSUES TO KEEP IN MIND HILLARD HEINTZE © 2017 | Protecting What Matters39 Workplace violence prevention is not best left to traditional law enforcement Without specific training on violence prevention, law enforcement may fail to act on reported information or respond in a meaningful way.
  • 40. BEST PRACTICES: CRITICAL ISSUES TO KEEP IN MIND • Internal investigations are controlled by the organization • External investigations are controlled by law enforcement agencies 40 HILLARD HEINTZE © 2017 | Protecting What Matters
  • 41. 41 HILLARD HEINTZE © 2017 | Protecting What Matters We must do everything possible to prevent and prepare for active shooter events • 37% of attacks ended in less than 5 minutes • Average attack lasted 12 minutes • 74% of attackers entered through a main entrance • 51% of attacks occurred in the workplace ACTIVE SHOOTER PLANNING
  • 42. • Developed in line with the Four Phases of Emergency Management • An Active Shooter Plan should be an essential component of an overall Emergency Management Plan 42 ACTIVE SHOOTER PLANNING HILLARD HEINTZE © 2017 | Protecting What Matters
  • 43. 43 HILLARD HEINTZE © 2017 | Protecting What Matters Matthew Doherty Senior Vice President, Threat and Violence Risk Management matthew.doherty@hillardheintze.com 202.306.6530 30 South Wacker Drive, Suite 1400, Chicago, Illinois 60606 QUESTIONS AND DISCUSSION