More Related Content Similar to Hillard Heintze Presentation to ATAP - Part 3 (20) More from Hillard Heintze (6) Hillard Heintze Presentation to ATAP - Part 31. Beyond Awareness
ACTIONS IN THREAT AND VIOLENCE RISK MANAGEMENT
February 2018
ATAP DALLAS/FORT WORTH AND HOUSTON FEBRUARY CHAPTER MEETINGS
PART 3
The Threat Investigation Process
2. 2 HILLARD HEINTZE © 2018 | Protecting What Matters®
AGENDA FOR PART 3
• Types of Threat Investigations
• Open Source Intelligence Tools and Process
• Case Intake
• Investigative Tools
• Common Roadblocks
3. 3 HILLARD HEINTZE © 2018 | Protecting What Matters®
TYPES OF THREAT INVESTIGATIONS
Proactive
• Listen
• Maintain a relationship with HR
• Review incident reports
• In anticipation of employment
actions or significant events
• Respond to reports
• Watch for policy violations
• Incidents
Reactive
4. 4 HILLARD HEINTZE © 2018 | Protecting What Matters®
OPEN SOURCE INTELLIGENCE TOOLS AND PROCESS
Have a systematic approach
5. OPEN SOURCE INTELLIGENCE TOOLS AND PROCESS
Incorporate tools in conjunction with manual searching
HILLARD HEINTZE © 2018 | Protecting What Matters®5
6. 6 HILLARD HEINTZE © 2018 | Protecting What Matters®
OPEN SOURCE INTELLIGENCE TOOLS AND PROCESS
Social media platforms we routinely monitor
• Twitter
• Instagram
• YouTube
• VK
• Tumblr
• Message Boards
• Blogs
• Facebook Pages
(manual search)
7. 7 HILLARD HEINTZE © 2018 | Protecting What Matters®
OPEN SOURCE INTELLIGENCE TOOLS AND PROCESS
What we look for and report
• Damaging reputational statements
• False information
• Client references of note
• Behaviors of concern (WAVR-21)
• Threats
• Pathway indicators
8. 8 HILLARD HEINTZE © 2018 | Protecting What Matters®
OPEN SOURCE INTELLIGENCE TOOLS AND PROCESS
Ongoing challenges
• Changing platforms, API
• Tool capabilities vary
• Languages, emoji, translation
• Time, resources, expertise
• Data storage and recall
• Proactive vs reactive posture
9. 9 HILLARD HEINTZE © 2018 | Protecting What Matters®
CASE INTAKE
Once a subject is identified or reported
• What do we know already?
• What would help us most with our assessment?
• What can we find out quickly?
10. CASE INTAKE
Complete Intake Form
• Caller or Source
• Individual of Concern
• Victim Information
• Incident Summary
• Notification
HILLARD HEINTZE © 2018 | Protecting What Matters®10
11. 11 HILLARD HEINTZE © 2018 | Protecting What Matters®
INVESTIGATIVE TOOLS
Where to look
• Social media and other
online sources
• Commercial databases
• Online court records research
• Criminal records – federal,
state, local levels
• Civil litigation records –
federal, state, local levels
• Bankruptcy filings or other
records (financial issues such
as tax liens or judgments)
• FOIA requests
• Industry forums
• Employer rating sites
(Indeed, Glassdoor)
• Press – local and national
media, trade and specialty
12. HILLARD HEINTZE © 2018 | Protecting What Matters®
COMMOM ROADBLOCKS
12
Why witnesses don’t report
• Lack of awareness about the warning signs.
• Hesitation to get involved.
• Assumption that it is someone else’s responsibility.
• Reluctance to be a tattletale or busybody.
• Apprehension about getting a co-worker in trouble.
• Fear of retaliation.
13. HILLARD HEINTZE © 2018 | Protecting What Matters®13
Matthew Doherty
Senior Vice President, Threat + Violence Risk Management
matthew.doherty@hillardheintze.com
JoAnn Ugolini
Director, Threat + Violence Risk Management
joann.ugolini@hillardheintze.com
Mark Brenzinger, Psy.D.
Vice President, Forensic and Clinical Psychologist,
Threat + Violence Risk Management
mark.brenzinger@hillardheintze.com