threat assessment and security measures for risk management 2

25
SECURITY MEASURES FOR THREAT/RISK MANAGEMENT (By Don Moe) 1. The potential attacker : Prior history of harassment, threats. How did the person handle unbearable stress in the past. 2. Event : Any past traumatic events: relationship, financial, living arrangement, rejection, humiliation, especially publicly perceived failure. 3. Situation : Individual’s specific situation at the time of peak stress. Are their significant people in the individuals life that would deter them from using violence to deal with stress, or would they condone violence as a means. 4. Target : How well know is the target to the individual? Is the individual acquainted with the targets lifestyle or work habits? Is information readily available about the target? How vulnerable is the target to an attack? What changes in lifestyle or living arrangements could mitigate and attack? How concerned about safety is the target? How concerned are those around the target? (Family or staff) FOUR PRIMARY ELEMENTS IN THREAT MANAGEMENT 1

Upload: mojo5

Post on 24-Dec-2014

538 views

Category:

Documents


0 download

DESCRIPTION

Investigative overview on the principles of how to respond to a threat to your client.

TRANSCRIPT

Page 1: Threat Assessment And Security Measures For Risk Management 2

SECURITY MEASURES FOR THREAT/RISK MANAGEMENT

(By Don Moe)

1. The potential attacker : Prior history of harassment, threats. How did the person handle unbearable stress in the past.

2. Event : Any past traumatic events: relationship, financial, living arrangement,

rejection, humiliation, especially publicly perceived failure.

3. Situation : Individual’s specific situation at the time of peak stress. Are their significant people in the individuals life that would deter them from

using violence to deal with stress, or would they condone violence as a means.

4. Target : How well know is the target to the individual? Is the individual acquainted with the targets lifestyle or work habits? Is information readily available about the target? How vulnerable is the target to an attack? What changes in lifestyle or living arrangements could mitigate and attack? How concerned about safety is the target? How concerned are those around the target? (Family or staff) How open is the target to advice from security or law enforcement?

FOUR PRIMARY ELEMENTS IN THREAT MANAGEMENT

WHO IS CONSIDERED DANGEROUS

1

Page 2: Threat Assessment And Security Measures For Risk Management 2

A person who thinks that attacking a public official or figure is a desirable,acceptable or potentially effective way to achieve a goal can be considered a potential assassin.

Need to ask yourself: Does this person have a motive to attempt an attack? If answer is yes. What is the person’s current and foreseeable ability to attack? Changes in thinking, and acceptability of attacking, or change in ability to

attack itself, may decrease the threat.

DESIGNING A PROTECTIVE INTELLIGENCE PROGRAM FOR THREAT MITIGATION

1. IDENTIFICATION : Identifying person or groups that might pose a threat.

Self Identify Two Types:Person will call, write, e-mail, or approach figure and indicate and unusual interest in that person.

“Threatened”: Communicates a direct, indirect, or conditional threat.

Purpose of making the threat To warn of possible attack. To ask to be stopped. To demand help or attention. Express frustration or anger. Communicate distress.

“Inappropriate interest”

A special relationship or unique assignment or role to play in their lives or organization.

Have extraordinary information or expertise that must be shared to the official.

Protective Intelligence three key elements

All threats should be investigated. Making a threat at minimum

is a violation of the law?

2

Page 3: Threat Assessment And Security Measures For Risk Management 2

2. ASSESSMENT : Building history and case file of behavior traits of subject to determine whether the individual poses a threat to protected person.

Sources of information

Interviews with the individual and those who have had contact with them. Employers, coworker, neighbors, relatives, associates, caregivers,

arresting officers. Records from agencies and institutions that have contact with person. Writings by or about the individual. Receipts of recent purchases and travel. Phone records, credit card receipts, weapons purchase background checks.

3. CASE MANAGEMENT : Monitoring persons and/or groups deemed a potential threat to target.

No threat determined: Case closed, and keep on file for future reference.

Determined to be a threat: Develop plan to manage risk.

Periodically confirm location of individual if incarcerated, hospital setting, and mental health setting for extended period of time.

Pattern of contacts with family members, police, coworkers, caregivers,Designed to prevent individual from approaching protected person and to Decrease the risk of violence.

Plan remains intact until deemed individual no longer poses threat.

Some forms of information is considered private and may only be accessible by law enforcement assistance

3

Page 4: Threat Assessment And Security Measures For Risk Management 2

FUNCTIONS AND APPROACHES OF CASE INVESTIGATIONS

1. Investigation Skill

Does the individual have the motive and the means to act on opportunityto attack a protected person.

Gather information to support or repute threat concern.

2. Corroboration

Supportive objective facts that will support statements made by individualwho may pose a threat.

Example: Report individual traveled to location of protected person.

Attempt to secure travel and lodging receipts, or speak to credible witnesswho saw individual.

3. Common Sense

Key is to look at the interest, and the motive behind the potential threat and the means to carry it out.

Example: Angry former bank customer threatening to bring the house down. Motive behind the threat is customer wanted late charges of past due account removed due to poor reflection on credit history.

Customer made threat to vent frustration and distress around fear of credit reprisal. Not intending to harm but to draw attention.

Three Principles of Case Investigation

4

Page 5: Threat Assessment And Security Measures For Risk Management 2

CONDUCTING A THREAT ASSESSMENT INVESTIGATION

It is reasonable to presume that the individual eventually will be deemed to not pose a threat.

Look for information the rebuts presumption that the individual does pose a real threat.

A brief investigation will confirm that the individual has neither the motive, means, nor interest in mounting an attack.

Any prior contact by individual or individual attempting to purchase a weapon as well as contact the protected person poses a real threat.

Anonymous or Direct threats should always be taken seriously and investigated.

Many people who make threats against protected persons do not posea real threat.

Some make threats to signal that they are in danger of losing control.

Some make threats to gain attention from authorities who they believe can prevent them from acting out.

Note: Some make threats warning they are prepared to act. Any lack of investigation may be interpreted as permission, encouragementor deliberate indifference. This may increase the risk to follow through with an attack.

Inappropriate or Unusual Interest

Threats

5

Page 6: Threat Assessment And Security Measures For Risk Management 2

Studies of a few attackers and near lethal anonymous threats were trying to warn authorities they were considering attacking.

They are ambivalent about attacking and were communicating with the hope they mighty be stopped.

They do not want to identify themselves and make it more likely to be stopped.

Note: Anonymous threats though rarely acted upon, should be takenseriously and investigated to the fullest extent. Specific threatsor if threatener mentions being in proximity to protected person should be regarded as special consideration for protection for protective measures.

Primary focus of investigation is to determine the individuals: INTEREST, MOTIVE, and CAPACITY to carry out THREAT.

Primary goal of investigation is to PREVENT attack or violence.

Protective intelligence investigation does not attempt to predict a particular behavior based on cause and effect. It is the totality of the Information received in the context of interest, motive and capacity.

Anonymous threat by letter, phone, or e-mail.

Investigating a case

6

Page 7: Threat Assessment And Security Measures For Risk Management 2

Interviewing the individual is a key source of information. But not the primary source. If the individual is a member of a radical or militantgroup then any information gained must be within context of the overallstrategy for investigating the group.

Gather background and interests prior to interview. (Guide investigation to relevancy whether the person poses a threat)

Interview can provide insight to subjects: THINKING, MOTIVES and BEHVIOUR.

Interview may corroborate individual’s statements, and be the basis for judging their viability to the case.

Interviews give the individual an opportunity to tell their story.

Interviews allow us to reassess and redirect their behavior away from threatening activity.

In subjects home to observe non-verbal information. Example: (writings, pictures, and weapons that are in view).

In the home assists in learning the individual’s lifestyle and personality traits.

Interview with open ended questions and allow subject to speak freely.

Goal is to uncover behavior, and action that would support or detract the concern for an attack.

Interviewing the Subject

Where to conduct the interview

7

Page 8: Threat Assessment And Security Measures For Risk Management 2

Mentally ill subjects will behave with how he or she perceives reality.

Do not dismiss statements made such as: (“Aliens are telling me to do this”) as just crazy talk. Allow them speak, and listen for details leading towards attack preparation. (Purchased a weapon, traveled to location)

Treat subjects with respect. Studies show they will reveal their thoughtsand actions if they perceive you are generally interested in hearing whatthey have to say.

Interviewing the subject with clear, direct, and nonjudgmental attitude will solicit useful information rather than pretending to agree with their delusion thinking

Be and active listener, communicate genuine interest in hearing and understanding the subjects story. No matter how delusional or out of touch the story may seem.

Listening and understanding does not infer you agree with the subjects thinking. Respectful skepticism will elicit more useful information.

Example: “I have not had that experience, but I’m interested in what

you believe”

Information provided by the subject may be: incomplete, misleading, or inaccurate.

Subject may provide different information at different points of time, depending on current circumstances, degree of desperation, mental healthtreatment and other factors.

Note: Do not rely to heavily on interviews alone. It is the totality of the information gathered and objective facts discovered that will support or detract from the overall threat.

Interviewing the mentally ill

8

Page 9: Threat Assessment And Security Measures For Risk Management 2

Primary task is to SEEK and COLLECT information and evidence to corroborate the statements of the subject.

Corroborated information about the subjects thinking and behaviorwill assist assessment of the subjects: INTERESTS, MOTIVES and CAPACITY to attempt an attack on protected person.

Corroborated evidence is more useful than subjective information oropinion.

Ask questions that will initiate a factual response not an opinion.

Example direct: “What is the name of the city he traveled to and when?”Example opinion: “Do you think he is the type of person to do this?”

Corroborated information and evidence

9

Page 10: Threat Assessment And Security Measures For Risk Management 2

FIVE AREAS OF INQUIRY FOR PROTECTIVE INVESTIGATION

1. The facts of the situation that brought the subject to your attention.

Providers of information may have multiple motives such as:extortion, disgruntled employee setting up another, angry wife, husband, neighbor hoping to embarrass individual by law enforcement action.

Eyewitness accounts of subject’s action or behavior have a high degree of inaccuracies. Need to establish and corroborate.

Establish facts of a case to determine if the subject being reported is a victim and if the informant is the true threat.

2. Three kinds of general information about the subject.

Name and alias. Date of birth SSN/Military ID. Current address. Name of close relatives. Physical description and photograph. Handwriting samples.

Education and training. Criminal history. Violent behavior history. Military history. History and experience with weapons. Marital and relationship history. Employment history. Mental health history. (depression, despair, suicidal, violence) Extremist ideas or interest in radical groups. History of grievances and/or harassment of others.

Areas of inquiry

Identifiers

Background information

10

Page 11: Threat Assessment And Security Measures For Risk Management 2

Travel history in previous year.

Four purposes for gathering background:

1. Subjects past behavior.2. Subjects interests.3. Subjects lifestyle. (Can influence interest, motive or capacity to attack)4. Subjects capacity to attempt an attack.

Individuals in unstable or transitional living arrangements may participatein extreme behavior or reach out to authorities by acting out.

Is individual in stable environment with food, shelter, clothing and supportive human contact.

Subject employed. How stable is employment. Is subject facing crisis or transition (Loss of marriage, job, housing) Subject being discharged from jail, mental health facility. How does current living situation compare with past situations? Does subject appear to be on downward course?

3. Information about attack related behaviors .

Many attacks or near lethal approaches are preceded by attack relatedbehavior. (Often observed by people in subjects life)

Such behavior should be considered a warning sign and taken seriously.

Subjects must: - Select target. - Locate target. - Secure weapon. - Travel to target.- Try and overcome security measures protecting target.

Current life situation and circumstances

11

Page 12: Threat Assessment And Security Measures For Risk Management 2

4. Behaviors of concern in a threat assessment

Visiting sites related to assassins. Writing to or about assassins. Gathering news and information related to topics of assassination.

Comments made to others. Notes in a diary or journal. Recent attention to travel and activities of protected person. Inquires to police or security about security measures. Attempts to breach security. Recent efforts to purchase or procure a weapon.

Attackers rarely directly threaten a person. Attackers rarely communicate threat to law enforcement or security. Attackers will usually communicate intent to: Family, friend, co-worker,

neighbor or others.

Visiting an event or site where protectee is, or believed to be.

An interest in assassination

Ideas and plans about attacking public figure or official

Communicating inappropriate interest in protected person or comments that express or imply interest in attacking the person.

Visiting a site linked to a protectee

12

Page 13: Threat Assessment And Security Measures For Risk Management 2

Information that subject has acquired a weapon around the same time the subject has developed an inappropriate or unusual interest in protectee.

Presume that a subject that has engaged in these behaviors involving a weapon, or breached security is interested in attacking if given the opportunity.

Investigative efforts should focus on ruling out the possibility of an attack.

Example: Subject had valid reason to purchase a firearm. (Hunting season, sport shooting)

Note: A subjects MOTIVES may determine whether a protectee is being targeted for an attack.

Approaching a protectee

13

Page 14: Threat Assessment And Security Measures For Risk Management 2

1. Bringing themselves to the attention of persons they PERCIEVED to be authorities.

2. Actions causing them to be involuntarily committed to a mental health or correctional facility.

3. Change in current living situation viewed as intolerable by the subject.

4. Obtaining help, being stopped from acting violently.

5. Getting someone else in trouble.

6. Obtaining attention or notoriety or bringing a concern to public attention.

7. Achieving a special relationship with a public official or figure.

8. Correcting a perceived wrong.

Note:

Our OPINION of the rationality of the subjects MOTIVES has no bearing on whether the subject will take action.

Subjects ACTS are based on their PERCEPTION OF REALITY.

It does not matter if the subjects MOTIVES are: LOGICAL, ILLOGICAL, RATIONAL, FOOLISH, REALISTIC or SELF-DESTRUCTIVE.

Example: Subject believes they are a relative of the protectee and has been invited to move into their home.

Important: The task is to UNDERSTAND how the subject VIEWSthe situation, not to REINFORCE any DELUSIONALIDEAS, and to attempt to GAUGE the ACTION the subject might take based on their PERCEPTION AND

BELIEFS.

Eight common motives found in inappropriate and/or attack related subjects.

14

Page 15: Threat Assessment And Security Measures For Risk Management 2

5. Target Selection

Many attackers and near lethal approaches may consider severalpotential targets and change their primary target several times.

Factors in target selection: Ability to travel, Finances. Approach opportunities with protectee, Perceived importance given by the media, Security around protectee.

Be alert to the possibility that a subject has considered, is simultaneously considering, or might consider in the future a number of officials or figures as possible targets.

15

Page 16: Threat Assessment And Security Measures For Risk Management 2

QUESTIONS TO ASK IN THREAT ASSESSMENT

1. What motivated the subject to make the statement or take the action?

2. What has the subject communicated to someone else or written in a diary or journal concerning their intentions?

3. Has the subject shown interest in:

Assassins or assassination. Weapons (Recent purchase or procurement of weapon) Militant or radical ideas/group. Murders, murderers, mass murders, workplace violence, stalking

incidents.

4. Has subject been involved in incidents of: menacing, harassing and or stalking behaviors? These behaviors combine an inappropriate interestwith any of the following:

Developing an attack idea or plan. Approaching, visiting, and/or following the protectee with a weapon. Attempting to overcome security measures. Assaulting or attempting to assault a protectee.

16

Page 17: Threat Assessment And Security Measures For Risk Management 2

1. Violence prediction is conditional : Not a yes or no

Definition: A prediction of violence is a statement that, given certain circumstances or conditions, a specified risk exists that a particular subject will act violently toward a particular target.

2. Targeted violence is different than any other kinds of violence .

Example: Armed robbery, rape or attack on a roommate, is different than an attack on a public figure, or business leader.

A murder of a celebrity or business leader is different than a murderof a parent or neighbor.

Prior history of violence may not predict violence toward a public figure. It is the totality of the information attained.

1. Information should be examined for evidence of behavior and conditionsthat would be consistent with the likelihood of attack on a public person.

2. Determine whether the subject appears to be moving toward and attack and if so, how rapidly.

Note: ATTACK is the result of UNDERSTANDABLE and DISCERNIBLE PROCESS of THINKING and BEHAVIOR!

Two points about violence prediction

Two stage process in evaluation of violence prediction

17

Page 18: Threat Assessment And Security Measures For Risk Management 2

References Intelligence Threat Assessment Investigations US Dept of Justice: A guide for State and Local Enforcement Officials. (Robert Fein/Bryan Vossekuil) Behavioral Science and the Law Volume 17 (1999) John Wiley and Sons Ltd. Threat Assessment: An approach to Prevent Targeted Violence (National Institute of Justice)

18