Incorporating Behavioral Threat Assessment into Emergency Planning. Internal and External Threats to Safety

Similar documents
Establishing a Best-in-Class Workplace Violence Prevention Program. Matthew Doherty, Senior Vice President, Hillard Heintze

Understanding and Preventing Workplace Violence. Alameda County Health Care Services Agency

TARGETED VIOLENCE, THREAT ASSESSMENTS & THREAT MANAGEMENT

Preventing and Managing Workplace Violence and other High-Risk Behaviors)

The Handbook for Campus Threat Assessment and Management Teams. By Gene Deisinger, Ph.D. Marisa Randazzo, Ph.D. Daniel O Neil Jenna Savage SUMMARY

Five Mistakes and Omissions That Increase Your Risk of Workplace Violence

PREVENTING WORKPLACE VIOLENCE PRESENTED BY THE SOLUTIONS GROUP

Active Shooter: Recommendations and Analysis for Risk Mitigation

OREGON STATE POLICE CAPITOL MALL AREA COMMAND

Tab 25 ACTIVE SHOOTER

Managing the Drug-Free Workplace Quiz

Threat Assessment: Behavioral Indicators for Risk of Future Violence

OREGON STATE POLICE CAPITOL MALL AREA COMMAND. Oregon State Police 900 Court St Rm 60C Salem, Or (503) Ver

WORKPLACE AND ON CAMPUS VIOLENCE GUIDE

Case Management Approach for Posttraumatic Stress Disorder (PTSD): Overview

PREVENTING WORKPLACE VIOLENCE

DRUG AND ALCOHOL POLICY

Threat Assessment in Schools (2002). Washington, D.C.: U.S. Secret Service & U.S. Dept. of Education.

The Workplace Violence. Perspective

21 st CENTURY THREAT MANAGEMENT IACP 2014 POLICE PSYCHOLOGICAL SERVICES SECTION TRACK. KRIS MOHANDIE, Ph.D., ABPP

COLUMBUS STATE COMMUNITY COLLEGE POLICY AND PROCEDURES MANUAL. SEXUAL MISCONDUCT Effective September 25, 2014 Policy 3-44 Page 1 of 8

Employee Drug-Free Workplace Education

Workplace Violence. David Blaine, Esq. (661)

PRIVELEGED, NON-CLASSIFIED CARVER + SHOCK PRIMER

Biennial Review of the Trinity Valley Community College s Drug and Alcohol Abuse Prevention Program

Mounds View Public Schools Ends and Goals Regulation

Nebraska Campus Threat Assessment Program (CTAP)Webinar. Call and enter passcode for audio

QASP: 500 hours of Supervised Fieldwork Supervisors are required to verify that the candidate meets the following:

Medium Sized Solano Logo WORKPLACE VIOLENCE. Statement, Prevention, and Response In compliance with California Code of Regulations, Title 8

Sexual Assault. Attachment 1. Approval Date: Policy No.: The University of British Columbia Board of Governors

2017 Healthcare Crime Survey

IT and Information Acceptable Use Policy

Employee Education Working Partners

Flashpoint: Recognizing and Preventing Workplace Violence Shots Fired: When Lightning Strikes - Active Shooter Training From the Center for Personal

Just use the link above to register. Then start with the next slide.

Debutantes School of Cosmetology and Nail Technology

James, D. V., Mullen, P. E., Meloy, J. R., Pathe, M. T., Preston, L., Darnley, B., Scalora, M.

Building Unity in the Community through Professionalism, Passion, Vision and Commitment. Sheriff Leon Lott

Policy A worker is entitled to benefits for traumatic or chronic mental stress arising out of and in the course of the worker s employment.

Related Entries: COF-EA, COF-RA, COH-EA, EEB-RA, GBB-RA, IGO-RA, IGP-RA, JFA, JFA-RA, JGA, JGB-RA, JPC-RA, KGA-RA Responsible Offices:

Indirect Threat Assessments and Direct Violence Risk Evaluations

Preventing Workplace Violence

NORTH COUNTY FIRE AUTHORITY POLICY & PROCEDURE MANUAL OPERATIONS

What if we had a. Women s Advocate. in all Unifor workplaces?

SUSPICIOUS CIRCUMSTANCES & INDIVIDUALS: Engagement Procedures and Strategies Original publication: June 2012 Latest review & revision: July 2018

Crime Prevention Programs: Programs designed to inform students and employees about the prevention of crime.

HRS Group UK Drug and Alcohol Policy

Section Claims - In the Course of and Arising Out of. Subject Traumatic Mental Stress

Targeted Violence: Pre-Attack Behaviors and Indicators. Community College Risk Management Consortium David L. Young

ETH-154: SEXUAL HARASSMENT AND SEXUAL MISCONDUCT

M.E.E.T. on Common Ground

CCI Drug-Free Workplace Written Training Modules

SOFIT: Sociotechnical and Organizational Factors for Insider Threat

BRESCIA UNIVERSITY COLLEGE SEXUAL VIOLENCE POLICY. Vice Principal, Students Director, Human Resources

8/4/2016. Attacks are not impulsive acts Action is Opportunistic Acts are part of a campaign waged in asymmetrical conflict

Assessing the Credibility of Threats Toward Schools

The Greater Manchester Police training experiment. Paul Quinton Chicago Forum on Procedural Justice & Policing 21 March 2014

Drug and Alcohol Workplace and Testing Policy

Florida School of Massage Campus Security Policy

MS Society Safeguarding Adults Policy and Procedure (Scotland)

Wellness on the Run Webinar The stress factor: How to manage stress and depression in the workplace

Workplace Violence and Crime Through Environmental Design (CPTED) Sergeant Robert J. Greenlee III DEFINITIONS

Unit 2: Inmates Rights to be Free from Sexual Abuse and Sexual Harassment and Staff and Inmates Rights to be Free from Retaliation for Reporting

Workplace Violence. Introductions and Disclaimers

Workplace Substance Abuse

POLICY of 5. Students SEXUAL HARASSMENT OF STUDENTS

CODE OF CONDUCT PROTECTION AGAINST SEXUALIZED DISCRIMINATION, HARASSMENT AND VIOLENCE CODE OF CONDUCT FOR THE MAX PLANCK SOCIETY

Suicide Prevention and Intervention. North Kitsap School District

Through the use of the stress management programs offered, the department projects the following benefits:

Does challenging measures that criminalize homelessness work?

(4) Coercion unreasonable, intimidating or forcible pressure for sexual activity.

Overview. Behavior. Chapter 24. Behavioral Emergencies 9/11/2012. Copyright 2013 by Jones & Bartlett Learning, LLC, an Ascend Learning Company

DOWNLOAD OR READ : THE VIOLENT WORKPLACE PDF EBOOK EPUB MOBI

Northwest Territories and Nunavut 03.09

Stalking Informational Packet

ALCOHOL & DRUGS: DOT COMPLIANCE MANUAL. Table of Contents

BIENNIAL REVIEW Compliance with the Drug-Free Schools and Communities Act. St. Johns River State College

Sexual Harassment in the Workplace. Karen Maynard 2013

POLICY ON DRUGS & ABUSE

CYBER-THREATS AGAINST WOMEN Capacity Building Workshop on Promoting a Safer Cyberspace in the Arab region

3 on 3 Solutions for Negative Behavior Modification

Human Resources SHELL IN CANADA ALCOHOL AND DRUG POLICY

Workplace Violence Prevention. Presented by: Glenn Eiserloh, CHSP Sr. Risk Consultant LHA Trust Funds

FAQ s - Drugs and Alcohol

Safecity Policy Project: Railway Stations Audit Report. Safecity is an initiative of Red Dot Foundation which aims to make cities safer by

Targeted Violence Attacks Exercise Safety Briefing and Training

Alcohol and Substance Abuse Policy

Entry Level Assessment Blueprint Criminal Justice

Underage Drinking. Underage Drinking Statistics

TRENDS IN LEGAL ADVOCACY: INTERVIEWS WITH LEADING PROSECUTORS AND DEFENCE LAWYERS ACROSS THE GLOBE

John Richardson, CMAA

Pandemic Influenza Continuity of Operations Plan (COOP) For. Bradford Management Group & Talent Bridge

"Preparedness and Personal Awareness" - Albert Timen

Drug-free Workplace Staff Rights and Responsibilities

Model Smoke & Vape Free Workplace Policy (Alberta Version)

Effective Date: 9/14/06 NOTICE PRIVACY RULES FOR VALUEOPTIONS

Corporate Services. Road To Recovery. Behavioral Health & Substance Abuse Services

Smoke-Free Campus Guidelines

Transcription:

Incorporating Behavioral Threat Assessment into Emergency Planning Internal and External Threats to Safety

Threat Assessment Compliments Risk Assessment Need to know what specific or general threats are likely against facilities and personnel; physical, operational and behavior Not all possible threat scenarios can be planned for; however, organizations should identify and mitigate the most likely threats Attention to local, regional, national and international incidents; cause, methods, and motivations

Workplace Standards & Threat Assessment The ASIS-SHRM standard goes deep into recommendations for developing and implementing a comprehensive, multi-disciplinary WVPI program; a threat management protocol, and practices that can help in effectively managing post-incident issues. It recommends the WVPI group include top-management, legal, HR, security, EHS, EAP, risk management, unions, EAPs, PR, and even outside experts such as a threat assessment professional. ASIS/SHRM WVPI.1-2011 Workplace Violence Prevention and Intervention

Threat Assessment Professional Uses perspective of organizational safety, not individual based Knowledgeable of multi-disciplinary functions; mental health Be objective and use all available information when making an assessment Assessments aimed at incorporating safe procedures for implementing organizational decisions

Threat Assessment Program Scope (Sample) Objective Assess the likelihood of escalated violence or disruption to operations, as well as identifying measures that can be taken to mitigate the risks When Situations which have caused harm or have the potential to cause harm affecting life safety, and/or serious damage to organization s property or operations Where Organization s owned or controlled property or which involve organization s employees.

Values of a Threat Assessment Program Process: Safety Oriented Behavior, not Profile Based Risk Prevention and Management Focused Objectives: Promote open and safe environment Activities that promote and emphasize dignity and respect Avoid heavy-handed approaches Focus upon prevention as well as a calculated response to threatening situations Expedite the reporting of troubling situations

Threat Assessment program attributes Coordination Preventive versus reactive Bring together disconnected pieces of information or concerns Coordinated plan to effectively address problem Collaboration Working with departments and units to mitigate risk Provide needed services/resources to subject Confidentiality Information to be protected to the degree legally possible Protection of case-specific information

Threat Assessments Analysis Many people causing threats or risks are not members of the organization Persons with troubled behavior who leave or are removed from the workplace may not stop being a threat or risk Community approach is beneficial, if not necessary Employees live off away from work Employment may take people away from work site Relevant activity occurred or may occur or in other jurisdictions

Types of Threats Malicious outsider organized crime, hacker, terrorist group, stalker Special interest group/extremist group Direct or indirect focus on organization Disgruntled insider/recently released employee Negligent insider Accidental or unintentional action

Low Tech Warning Signs Sudden changes of behavior Expressions of frustration(s) Pending or recent disciplinary action Expressions of ethical flexibility Expression of reduced loyalty Threats, malicious boasting ( You wouldn t believe how easily I could trash this net! ) and other negative sentiments

Considerations to Implementation of Threat Assessment Have internal process and resources available Keep message short, concise, easy to remember Use existing communications pathways to promote message Continual affirmation of message

Threat Assessment Principles Threat, approach, and attack behavior are the products of discernible processes of thinking and behavior Most people who attack others perceive the attack as a means to a goal An individual s motives and target selection are directly connected Targeted acts often precipitated by a personal or significant stressor

Targeted Violence Process (Weston, 2001) Ideation Planning Preparation Implementation

Critical Issues Making a threat vs. posing a threat Risk must be viewed as a probability estimate over time that changes with context Critical Information may come from a variety of sources (e.g., family, coworkers, other targets of interest) Threat assessment management must be viewed as a shared responsibility

Assessing the Level of Threat Posed: Initial Considerations Initial assessment of immediacy of threat/ accessibility of target Subject identifiable? prior history with the organization (or past employers) & law enforcement? Nature and intensity of threat posed? pattern of contact behaviors? escalation or de-escalation of behavior? method or methods of contact changed? motivations expressed/implied? intensity of motive across contacts? Presence of precipitating stressors? Mental illness Loss of status/pride Significant loss? (e.g., relationship, family, job, benefits)

Considerations to Facilitate Reporting Reporter should be given feedback Sometimes people need to know how concerned they should be about a situation. If the reporter is also the victim of threatening or concerning activity, important to provide following: Feedback regarding level of concern Safety planning tips Information concerning future activities by organization s authorities/tat to monitor/address/manage situation Always, the reporter should be reinforced for reporting a concern

Incidents That Should be Reported Anything that raises suspicion or concern Subject displays signs of serious mental illness who either engages in problematic contact behavior or makes reference to a member while engaging in unusual behavior Harassing, following, or stalking behavior Contacts that reference the person s safety or security Contacts (e.g., letters, email, phone, voice mail, face to face visit) that make negative/hostile reference to a person or group Threatening contacts regardless of method used Subject displays agitated & disruptive behavior toward a person or group (regardless whether threat is made)

Incidents That Should be Reported Behaviors Suggestive of Surveillance/Stalking: Individuals observed within unauthorized areas Use of multiple identifications Person(s) placing unusual items in trash containers adjacent to facility (or placing items in garbage on multiple occasions) Unknown persons trying to gain access to facilities Unknown persons or occupied vehicles loitering in the vicinity of facility for an extended period of time

Incidents That Should be Reported Behaviors Suggestive of Surveillance/Stalking: Photography or filming of high profile structures/procedures i.e. critical infrastructure, research facility, security, etc. Interest in security measures or personnel, entry points, access controls, or perimeter barriers Observation of emergency reaction drills or procedures Discrete use of still cameras, video recorders or note taking at unusual locations

Owen Yardley oyardley2@unl.edu University of Nebraska-Lincoln Police 402-472-2222