Submit Search
Upload
Hillard Heintze Radicalization in the Workplace
•
1 like
•
210 views
Hillard Heintze
Follow
Learn tips to prevent radicalization in the workplace.
Read less
Read more
Business
Report
Share
Report
Share
1 of 25
Download now
Download to read offline
Recommended
Terrorism | Types of Terrorism | Impacts of terrorism
Terrorism | Types of Terrorism | Impacts of terrorism
Mian Muhammad Zafar
Crj3400 Terrorism Understandingthe Threat1&2
Crj3400 Terrorism Understandingthe Threat1&2
Carter F. Smith, J.D., Ph.D.
Untitled 1
Untitled 1
Michael Sorrentino
Transnational crimes and terrorism
Transnational crimes and terrorism
Al Rajiv Carim
White7e ppt ch02
White7e ppt ch02
difordham
Powerandpolitics
Powerandpolitics
Pratiksha Kalmegh
The Moral Questions on the Religious Basis for Terrorism
The Moral Questions on the Religious Basis for Terrorism
inventionjournals
Psychology_of_Terrorism
Psychology_of_Terrorism
Dr. Robert L Silva II MA
Recommended
Terrorism | Types of Terrorism | Impacts of terrorism
Terrorism | Types of Terrorism | Impacts of terrorism
Mian Muhammad Zafar
Crj3400 Terrorism Understandingthe Threat1&2
Crj3400 Terrorism Understandingthe Threat1&2
Carter F. Smith, J.D., Ph.D.
Untitled 1
Untitled 1
Michael Sorrentino
Transnational crimes and terrorism
Transnational crimes and terrorism
Al Rajiv Carim
White7e ppt ch02
White7e ppt ch02
difordham
Powerandpolitics
Powerandpolitics
Pratiksha Kalmegh
The Moral Questions on the Religious Basis for Terrorism
The Moral Questions on the Religious Basis for Terrorism
inventionjournals
Psychology_of_Terrorism
Psychology_of_Terrorism
Dr. Robert L Silva II MA
Terrorism
Terrorism
guestff432a
Identity and terrorism
Identity and terrorism
Jaseme_Otoyo
Tactical Adoption of Terrorism by Islamic Insurgency
Tactical Adoption of Terrorism by Islamic Insurgency
Patrick Thomas Cannon
Changes on the terrorism scenario;old and new actors of terrorism
Changes on the terrorism scenario;old and new actors of terrorism
Chandana Wickramasinghe
Effective Counters to Terrorism & Violent Extremism
Effective Counters to Terrorism & Violent Extremism
ENODO Global, Inc.
Addressing extremism
Addressing extremism
Mark Levy
Chapter 9 Political crime & terrorism criminology presentation
Chapter 9 Political crime & terrorism criminology presentation
AsadAli775
Sociological Perspectives-2015-Stewart-0731121414557700
Sociological Perspectives-2015-Stewart-0731121414557700
Michele Bendall
Power in ir
Power in ir
rumahbianglala
To Elect Clinton
To Elect Clinton
Brian Coyle
Asymmetric warfare group report psychological and sociological concepts of r...
Asymmetric warfare group report psychological and sociological concepts of r...
PublicLeaker
Psychology of Peace
Psychology of Peace
Kannan Krishnamurthy
Cost of terrorism revised
Cost of terrorism revised
brianhayward
White7e ppt ch14
White7e ppt ch14
difordham
Educational Strategies for the Prevention of Violent Extremism
Educational Strategies for the Prevention of Violent Extremism
Renee Hobbs
The face of terrorism 2013
The face of terrorism 2013
Martin Brown
Violence ppt
Violence ppt
Eric Strayer
Counter Terrorism and the Protection of Human Rights in the Perspective of th...
Counter Terrorism and the Protection of Human Rights in the Perspective of th...
paperpublications3
Radicalization in the Workplace
Radicalization in the Workplace
Hillard Heintze
Revolutions and Contention
Revolutions and Contention
atrantham
Revolutions and Contention
Revolutions and Contention
atrantham
Terrorism and-new-ideologies
Terrorism and-new-ideologies
Abel Enrique Sinning Castañeda
More Related Content
What's hot
Terrorism
Terrorism
guestff432a
Identity and terrorism
Identity and terrorism
Jaseme_Otoyo
Tactical Adoption of Terrorism by Islamic Insurgency
Tactical Adoption of Terrorism by Islamic Insurgency
Patrick Thomas Cannon
Changes on the terrorism scenario;old and new actors of terrorism
Changes on the terrorism scenario;old and new actors of terrorism
Chandana Wickramasinghe
Effective Counters to Terrorism & Violent Extremism
Effective Counters to Terrorism & Violent Extremism
ENODO Global, Inc.
Addressing extremism
Addressing extremism
Mark Levy
Chapter 9 Political crime & terrorism criminology presentation
Chapter 9 Political crime & terrorism criminology presentation
AsadAli775
Sociological Perspectives-2015-Stewart-0731121414557700
Sociological Perspectives-2015-Stewart-0731121414557700
Michele Bendall
Power in ir
Power in ir
rumahbianglala
To Elect Clinton
To Elect Clinton
Brian Coyle
Asymmetric warfare group report psychological and sociological concepts of r...
Asymmetric warfare group report psychological and sociological concepts of r...
PublicLeaker
Psychology of Peace
Psychology of Peace
Kannan Krishnamurthy
Cost of terrorism revised
Cost of terrorism revised
brianhayward
White7e ppt ch14
White7e ppt ch14
difordham
Educational Strategies for the Prevention of Violent Extremism
Educational Strategies for the Prevention of Violent Extremism
Renee Hobbs
The face of terrorism 2013
The face of terrorism 2013
Martin Brown
Violence ppt
Violence ppt
Eric Strayer
Counter Terrorism and the Protection of Human Rights in the Perspective of th...
Counter Terrorism and the Protection of Human Rights in the Perspective of th...
paperpublications3
What's hot
(18)
Terrorism
Terrorism
Identity and terrorism
Identity and terrorism
Tactical Adoption of Terrorism by Islamic Insurgency
Tactical Adoption of Terrorism by Islamic Insurgency
Changes on the terrorism scenario;old and new actors of terrorism
Changes on the terrorism scenario;old and new actors of terrorism
Effective Counters to Terrorism & Violent Extremism
Effective Counters to Terrorism & Violent Extremism
Addressing extremism
Addressing extremism
Chapter 9 Political crime & terrorism criminology presentation
Chapter 9 Political crime & terrorism criminology presentation
Sociological Perspectives-2015-Stewart-0731121414557700
Sociological Perspectives-2015-Stewart-0731121414557700
Power in ir
Power in ir
To Elect Clinton
To Elect Clinton
Asymmetric warfare group report psychological and sociological concepts of r...
Asymmetric warfare group report psychological and sociological concepts of r...
Psychology of Peace
Psychology of Peace
Cost of terrorism revised
Cost of terrorism revised
White7e ppt ch14
White7e ppt ch14
Educational Strategies for the Prevention of Violent Extremism
Educational Strategies for the Prevention of Violent Extremism
The face of terrorism 2013
The face of terrorism 2013
Violence ppt
Violence ppt
Counter Terrorism and the Protection of Human Rights in the Perspective of th...
Counter Terrorism and the Protection of Human Rights in the Perspective of th...
Similar to Hillard Heintze Radicalization in the Workplace
Radicalization in the Workplace
Radicalization in the Workplace
Hillard Heintze
Revolutions and Contention
Revolutions and Contention
atrantham
Revolutions and Contention
Revolutions and Contention
atrantham
Terrorism and-new-ideologies
Terrorism and-new-ideologies
Abel Enrique Sinning Castañeda
final
final
virujha
Revolutions and Contention
Revolutions and Contention
atrantham
Revolutions and Contention
Revolutions and Contention
atrantham
40 years of terror trend
40 years of terror trend
Giuliano Tavaroli
Question 1 What led to the drastic decline of the Klu Klux Kla.docx
Question 1 What led to the drastic decline of the Klu Klux Kla.docx
makdul
17 471 03_realist_model
17 471 03_realist_model
Andrei Bujaki
Is America Under Siege?
Is America Under Siege?
Denise Scelsi
CyberTerrorismACaseOfAliceInWonderland
CyberTerrorismACaseOfAliceInWonderland
Enrique J Cordero
Revolutions and contention
Revolutions and contention
atrantham
Attempts To Define Terrorism Terrorist Or Freedom Fighter
Attempts To Define Terrorism Terrorist Or Freedom Fighter
Dustin Pytko
Suicide Report 1
Suicide Report 1
adnanshaikh
Media's Discursive Influence on the Philippines' War on Drugs
Media's Discursive Influence on the Philippines' War on Drugs
Mark Raygan Garcia
Online Assignment
Online Assignment
Arun Murali
Terrorism
Terrorism
Col Mukteshwar Prasad
Statement of Erroll G. Southers before the US House of Representatives Commit...
Statement of Erroll G. Southers before the US House of Representatives Commit...
Elsevier
Comprehensive Active Shooter Incident Management
Comprehensive Active Shooter Incident Management
William Penfield
Similar to Hillard Heintze Radicalization in the Workplace
(20)
Radicalization in the Workplace
Radicalization in the Workplace
Revolutions and Contention
Revolutions and Contention
Revolutions and Contention
Revolutions and Contention
Terrorism and-new-ideologies
Terrorism and-new-ideologies
final
final
Revolutions and Contention
Revolutions and Contention
Revolutions and Contention
Revolutions and Contention
40 years of terror trend
40 years of terror trend
Question 1 What led to the drastic decline of the Klu Klux Kla.docx
Question 1 What led to the drastic decline of the Klu Klux Kla.docx
17 471 03_realist_model
17 471 03_realist_model
Is America Under Siege?
Is America Under Siege?
CyberTerrorismACaseOfAliceInWonderland
CyberTerrorismACaseOfAliceInWonderland
Revolutions and contention
Revolutions and contention
Attempts To Define Terrorism Terrorist Or Freedom Fighter
Attempts To Define Terrorism Terrorist Or Freedom Fighter
Suicide Report 1
Suicide Report 1
Media's Discursive Influence on the Philippines' War on Drugs
Media's Discursive Influence on the Philippines' War on Drugs
Online Assignment
Online Assignment
Terrorism
Terrorism
Statement of Erroll G. Southers before the US House of Representatives Commit...
Statement of Erroll G. Southers before the US House of Representatives Commit...
Comprehensive Active Shooter Incident Management
Comprehensive Active Shooter Incident Management
More from Hillard Heintze
Hillard Heintze Presentation to ATAP - Part 4
Hillard Heintze Presentation to ATAP - Part 4
Hillard Heintze
Hillard Heintze Presentation to ATAP - Part 3
Hillard Heintze Presentation to ATAP - Part 3
Hillard Heintze
Hillard Heintze Presentation to ATAP - Part 2
Hillard Heintze Presentation to ATAP - Part 2
Hillard Heintze
Hillard Heintze Presentation to ATAP - Part 1
Hillard Heintze Presentation to ATAP - Part 1
Hillard Heintze
Hillard Heintze Presentation The Strategic Value of Assurance
Hillard Heintze Presentation The Strategic Value of Assurance
Hillard Heintze
Insights on Enhancing the Security of Your Family
Insights on Enhancing the Security of Your Family
Hillard Heintze
Hillard heintze Presentation for ATAP
Hillard heintze Presentation for ATAP
Hillard Heintze
Security in Today's Global Threat Environment
Security in Today's Global Threat Environment
Hillard Heintze
Protecting the Family Office
Protecting the Family Office
Hillard Heintze
Hillard Heintze ASIS Presentation Active Shooter
Hillard Heintze ASIS Presentation Active Shooter
Hillard Heintze
How to Prevent An Active Shooter in Your Workplace
How to Prevent An Active Shooter in Your Workplace
Hillard Heintze
More from Hillard Heintze
(11)
Hillard Heintze Presentation to ATAP - Part 4
Hillard Heintze Presentation to ATAP - Part 4
Hillard Heintze Presentation to ATAP - Part 3
Hillard Heintze Presentation to ATAP - Part 3
Hillard Heintze Presentation to ATAP - Part 2
Hillard Heintze Presentation to ATAP - Part 2
Hillard Heintze Presentation to ATAP - Part 1
Hillard Heintze Presentation to ATAP - Part 1
Hillard Heintze Presentation The Strategic Value of Assurance
Hillard Heintze Presentation The Strategic Value of Assurance
Insights on Enhancing the Security of Your Family
Insights on Enhancing the Security of Your Family
Hillard heintze Presentation for ATAP
Hillard heintze Presentation for ATAP
Security in Today's Global Threat Environment
Security in Today's Global Threat Environment
Protecting the Family Office
Protecting the Family Office
Hillard Heintze ASIS Presentation Active Shooter
Hillard Heintze ASIS Presentation Active Shooter
How to Prevent An Active Shooter in Your Workplace
How to Prevent An Active Shooter in Your Workplace
Recently uploaded
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
Call Girls in Nagpur High Profile Call Girls
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Dave Litwiller
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
rajveerescorts2022
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
IlamathiKannappan
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Seo
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperity
hemanthkumar470700
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
lizamodels9
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
Exhibitors Data
Eluru Call Girls Service ☎ ️93326-06886 ❤️🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️🔥 Enjoy 24/7 Escort Service
Damini Dixit
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
amitlee9823
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
P&CO
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
amitlee9823
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Dipal Arora
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
rwgiffor
Phases of Negotiation .pptx
Phases of Negotiation .pptx
nandhinijagan9867
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
dlhescort
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Admir Softic
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
Aggregage
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
Abortion pills in Kuwait Cytotec pills in Kuwait
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
priyanshujha201
Recently uploaded
(20)
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperity
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
Eluru Call Girls Service ☎ ️93326-06886 ❤️🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️🔥 Enjoy 24/7 Escort Service
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
Phases of Negotiation .pptx
Phases of Negotiation .pptx
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
Hillard Heintze Radicalization in the Workplace
1.
Radicalization in the Workplace
2.
HILLARD HEINTZE © 2018 | Protecting What Matters 2 ORIGINS: WHY THE EXECUTIVE CONCERN? "We are witnessing, in my view, a change in the nature of mass shootings in the U.S. No longer are they solely defined by a single, isolated aggrieved shooter but a shooter or shooters embedded in, justified by and potentially supported by an ongoing ideological framework.” ALAN J. LIPMAN, FOUNDER AND EXECUTIVE DIRECTOR THE CENTER FOR THE STUDY OF VIOLENCE IN WASHINGTON D.C.
3.
HILLARD HEINTZE © 2018 | Protecting What Matters 3 ORIGINS: WHY THE SPOTLIGHT NOW? A marked rise in executive concerns Increasing focus on workplace violence and active shooter prevention Recent terror events in Europe and Turkey – and in the U.S., from San Bernardino to the Navy Yard Media spin, opinion and frenzy Politics and the U.S. election process Complexity of the issues – from privacy to religious expression Overlapping executive responsibilities –
Security, HR, Legal, IT, Law Enforcement
4.
4 Radicalization cuts across many areas So where exactly does threatening behavior related to radicalization fit in? HILLARD HEINTZE © 2018 | Protecting What Matters • Workplace violence • Substance abuse •
Hostile work environment • Criminal activity • Inappropriate behavior • Sexual harassment
5.
HILLARD HEINTZE © 2018 | Protecting What Matters 5 DEFINITION Radicalization “Radicalization is a personal process in which individuals adopt extreme political, social and/or religious ideals and aspirations, and where the attainment of particular goals justifies the use of indiscriminate violence. It is both a mental and emotional process that prepares and motivates an individual to pursue violent behavior.” Source: A. S. Wilner and C. J. Dubouloz, "Homegrown terrorism and transformative learning: an interdisciplinary approach to understanding radicalization," GlobalChange, Peace & Security (formerly Pacifica Review: Peace, Security & Global Change) 22:1 (2010): 38.
6.
HILLARD HEINTZE © 2018 | Protecting What Matters 6 What Security and HR leaders are saying • “Duty of care” obligates companies to keep the employee population fully informed regarding ALL potentially threatening behaviors and, conversely, behaviors that may require tolerance in the workplace as well as reporting. • Radicalization falls into a subset of workplace violence behaviors. •
Awareness training should be provided to employees regarding radicalization and orientations. • Accommodations for particular non- threatening belief practices should be considered and established.
7.
HILLARD HEINTZE © 2018 | Protecting What Matters 7 The spectrum of potential behavior that could be “radicalized” should be broadened to include: • Gun rights • Abortion •
Racism • Animal rights • Religious extremism • Ultra right-wing activism • Ultra left-wing activism • Environmental activism
8.
HILLARD HEINTZE © 2018 | Protecting What Matters 8 ACCOUNTABILITY: OVERLAPPING AREAS OF RESPONSIBILITY CATEGORIES • Workplace Violence • Hostile Work Environment •
Criminal Behavior • Cyber • Sexual Harassment • Substance Abuse • Inappropriate Behavior STAKEHOLDERS • Security • HR • Legal • IT • Law Enforcement ACTIONS • Document • Employee Assistance Program • Confront • Report to Law Enforcement • Counsel • Personal Action
9.
HILLARD HEINTZE © 2018 | Protecting What Matters 9 MANIFESTATION IN THE WORKPLACE Radicalization can manifest itself as: • A violent, aggressive, selfless act conducted on a random target, with encouragement, enabling and logistical support from an identifiable segment of an organization that has hijacked or bastardized a goal. • The result of an openly stated goal or purpose of an organization or body.
10.
HILLARD HEINTZE © 2018 | Protecting What Matters 10 PATHS TO RADICALIZATION Disciples may be radicalized through exposure to: • A narrow indoctrination path. • No outside contrary opinions. •
The inevitability of a catastrophic event as the likely outcome.
11.
11 Violent Extremist Person who advocates, is engaged in or is preparing to engage in ideologically motivated terrorist activities (including providing support to terrorism) to further political or social objectives promoted by a foreign terrorist organization (FTO). THREATS: THREE TYPES OF ATTACKERS HILLARD HEINTZE © 2018 | Protecting What Matters
12.
12 Homegrown Violent Extremist (HVE) THREATS: THREE TYPES OF ATTACKERS HILLARD HEINTZE © 2018 | Protecting What Matters A U.S. person who was once assimilated into, but who has rejected the cultural values, beliefs and environment of the U.S. in favor of a violent extremist ideology. He or she is “U.S. radicalized” and intends to commit terrorism inside the U.S. without direct support or direction from a foreign terrorist organization.
13.
HILLARD HEINTZE © 2018 | Protecting What Matters 13 THREATS: THREE TYPES OF ATTACKERS Domestic Terrorist Person who engages in unlawful acts of violence to intimidate civilian populations or attempt to influence domestic policy (as opposed to furthering the aims of a foreign terrorist organization) without direction from or influence by a foreign actor. Examples include acts by racist, supremacist, antigovernment, environmental, animal rights or other single-issue extremist groups or movements.
14.
14 A sampling of lessons the U.S. intelligence community is gleaning from recent events • Radicalization increases the likelihood of violence. • Individuals and groups follow different paths to violence. •
Multiple factors indicate why some choose terrorist violence. • A one-factor approach to intervention will fail. • Factor importance varies across cases and circumstances. • Some factors serve as catalysts for others and can trigger a chain of events. INSIGHTS: FUNDAMENTAL PRINCIPLES OF RADICALIZATION HILLARD HEINTZE © 2018 | Protecting What Matters
15.
HILLARD HEINTZE © 2018 | Protecting What Matters 15 DRIVERS: FACTORS THAT INCREASE AN INDIVIDUAL’S VULNERABILITY Personal Factors Group Factors Community Factors Sociopolitical Factors Ideological Factors • Psychological • Demographic backgrounds •
Personal history • Social networks • Family and peer groups • Group dynamics • Alienation • Marginalization • Diaspora relationships with home country • Collective grievances • Foreign policy • External events • Appeal of justifying narrative • Charismatic ideologues
16.
HILLARD HEINTZE © 2018 | Protecting What Matters 16 MOBILIZATION A Portfolio of Indicators Other Indicators (Sampling) • Preparing and disseminating a last will, martyrdom video or statement. • Seeking help from family and friends to enable travel to join terrorist groups overseas. •
Planning or attempting to travel to a conflict zone to fight with or support an FTO. • Seeking religious or political justification for violent acts. • Employing counter- surveillance techniques. • Establishing suspicious travel patterns. • Deleting social media and other online accounts to avoid tracking by law enforcement. • Suspicious acquisition of maps or blueprints.
17.
HILLARD HEINTZE © 2018 | Protecting What Matters 17 DEFINITION Workplace Insider Threats “A current or former employee, contractor or other business partner who has or had access to an organization’s network, system or data and intentionally exceeded or misused that access in a manner negatively affected the confidentiality, integrity, or availability of the organization’s information or information systems.” DHS NATIONAL CYBERSECURITY AND COMMUNICATIONS INTEGRATION CENTER
18.
HILLARD HEINTZE © 2018 | Protecting What Matters 18 DEFINITION Insider Threat “The insider threat to critical infrastructure is one or more individuals with the access and/or insider knowledge of a company, organization or enterprise that would allow them to exploit the vulnerabilities of that entity’s security, systems, services, products, or facilities with intent to cause harm.” National Infrastructure Advisory Council in their publication, “The Insider Treat to U.S. Critical Infrastructures”
19.
19 INSIDER THREAT MITIGATION HILLARD HEINTZE © 2018 | Protecting What Matters Detect anomalies as early as possible and investigate before assets, data or personnel are compromised Look beyond cyber security to include potential insider threats related to: • Fraud • Workplace violence •
Information technology (IT) sabotage • Intellectual property and research and development theft
20.
HILLARD HEINTZE © 2018 | Protecting What Matters 20 INSIDER THREATS ARE SELDOM IMPULSIVE ACTS Look for the warning signs as insiders move along a threat continuum from idea to action • Demonstrating a change in behavior or attitude • Violating company policy •
Arriving early or staying late • Showing undue interest in information not relevant to job • Attempting access into physical areas not related to job
21.
21 LEARN THE WARNING SIGNS OF INSIDER THREAT HILLARD HEINTZE © 2018 | Protecting What Matters Companies must establish guidelines on recognizing threat indicators based on behavioral-based techniques 1. Train employees to recognize and report behavioral indicators exhibited by fellow employees or business partners. 2. Ensure training includes how to identify the characteristics of insiders at risk of becoming a threat.
22.
HILLARD HEINTZE © 2018 | Protecting What Matters 22 CHARACTERISTICS OF INSIDERS AT RISK OF BECOMING A THREAT • Introversion • Greed/financial need •
Vulnerability to blackmail • Compulsive and destructive behavior • Rebellious, passive- aggressive • Ethical “flexibility” • Reduced loyalty • Entitlement – narcissism (ego/self-image) • Minimize their mistakes and faults • Inability to assume responsibility • Intolerance to criticism • Self-perceived value exceeds performance • Lack of empathy • Predisposition towards law enforcement • Pattern of frustration and disappointment • History of managing crisis ineffectively
23.
HILLARD HEINTZE © 2018 | Protecting What Matters 23 FREE ONLINE COURSES DHS/FEMA independent study course, “Protecting Critical Infrastructure Against Insider Threats” (IS-915) http://training.fema.gov/ Department of Defense (DoD), “Insider Threat Awareness Course” http://cdsetrain.dtic.mil/itawareness/
24.
HILLARD HEINTZE © 2018 | Protecting What Matters 24 KEY ISSUES Starting the Conversation 4. Determine the scope of monitoring, recording and reporting on employee online behavior. 5. Establish the parameters of access. 6.
Communicate the consequences of abuse to employees. 1. Engage external partners – law enforcement, media, community services and religious experts. 2. Understand the role of technology, social media and internet usage. 3. Identify technology vendors that provide monitoring services.
25.
HILLARD HEINTZE © 2018 | Protecting What Matters 25 FOR FURTHER INFORMATION Howard Fisher, Esq. Vice President, Strategic Relationships howard.fisher@hillardheintze.com 312.229.9882 30 South Wacker Drive, Suite 1400 Chicago, Illinois 60606 312.869.8500
Download now