Loading...
HomeMy WebLinkAbouta. (Handout) Active Shooter Training Presentation (Handout) Training Presentation WORKPLACE VIOLENCE: Awareness, Prevention, Response y�:t Provided for the Central Contra Costa � r _ `--= July 2021 Sanitary District BOD ,:� r and Leadership Team �.� Dr. Steve Albrecht, SHRM PHR, ASIS CPP, ATAP CTM 866-261-5150 www.DrSteveAlbrecht.com THE ��NEW" WORK ENVIRONMENT? Economic ,� � Mental stress .A � illness The Age of Revenge and' Entitled Disgruntlement" ]ob Stress and Hostile Interactions Gun Access and the Culture of Acceptable Violence Personal Problems Come to Work THE ROBERT MACK INCIDENT � � 25-Year General Dynamics � r -- employee. 1 4r Fired for attendance violations. ` January 1992 - Shot and killed ' � � 4K the Labor Relations Mgr. ', assigned to his case; shot and ����� wounded hls manager, who later died. pE#ilSiHG1G0i.EifCE THEMES AND MOTIVES: MACK, HANSEL, DEKRAAI DESIRE FOR REVENGE ENTITLEMENT BLAME THE VICTIM / "THE SYSTEM" HAD A PLAN; NO APPARENT LEAKAGE 2 OF 3 "OVER-ARMED" THEMSELVES NO REMORSE; 2 LWOPS - SAD FOR WHERE THEY ARE, NOT WHAT THEY DID TYPES OF THREATS Direct i clear statements of harm ` Veiled indirect, vague, or subtle statements Conditional If-then threats Implausible unrealistic statements HUNTERS vs. HOWLERS Hunters work in stealth. They show evidence of planning and move along a path from"ideas to actions." Their goal is to attack with lethal violence. Howlers show visible anger. They use direct intimidation, verbal and written threats to create fear, stress, and anxiety in their targets. Their goal is control of the victims'emotional states. Hunters do not howl. Howlers do not hunt. When Howlers begin to hunt, they are no longer Howlers. (Source: Calhoun &Weston; Debra M. Jenkins"Intimacy Effect") PERPETRATORS OF WORKPLACE VIOLENCE PER OSHA Type 1 : Criminals or strangers. Type 2: Taxpayers, customers, students, patients, passengers, vendors, etc. Type 3: Current or former employees. Type 4: Current or former spouse/partner of an employee. (Type Cyber-related threats, attack.) ? DEFINING WORKPLACE VIOLENCE As defined by the media: - "a disgruntled ex-employee with an assault rifle..." For our purposes, it's any incident that could: - involve threats or assaults to or from an employee, ex- employee, vendor, stranger, or criminal; - make any employee feel afraid to come to work; - cause damage to facility or personal property; - involve domestic violence or stalking. THE SCOPE OF THE PROBLEM "4 of the biggest mass shootings in 5 aecaaes hannPned in 2018" — USA Today, November 9, 2018 Stoneman Douglas High, Parkland, FL — 17 Grim times: Borderline Bar and Grill — 12 307 mass Tree of Life Synagogue — 11 shootings in Santa Fe High, Santa Fe, TX — 10 311 days Baptist Church, Sutherland Springs, TX — 25 (2017) Las Vegas, NV — 58 (2017) 5 events in 1999; 1 event in 2000; 1 event in 2001; 0 events in 2002; 1 event in 2003; 1 event in 2004; 2 events in 2005. USSS 2017 REPORT: MASS ATTACKS IN PUBLIC SPACES: Mass attack: One or more attackers, using one or more firearms or other weapons, to injure three or more people, in a public setting. 28 incidents, 147 killed, 700 injured. 64% of attackers "experienced mental health symptoms" prior to the attack: psychoses, suicidal thoughts, depression. 46% had "personal grievances" as their main motivation: workplace, domestic, personal. All had one or more of"significant stressors": family problems, failed love relationship, personal issues, work or school problems, financial problems, substance abuse, LE contact. "TARGETED VIOLENCE" As defined by the US Secret Service, "the subject chooses a target in advance. The violence is not random or gang-related. There is evidence of planning. Threats are not made to the target directly, but to a third-party." The impact of these events is substantial, affecting: the community the first-responders the surviving employees or students (who may have guilt) the families of the injured or killed The District and its employees 2018 FBI REPORT: "A Study of the Pre-Attack Behaviors of Active Shooters in the US, Between 2000-2013" 1. The 63 active shooters examined in this study did not appear to be uniform in any way such that they could be readily identified prior to attacking based on demographics alone. 2. Active shooters take time to plan and prepare for the attack, with 77% of the subjects spending a week or longer planning their attack and 46% spending a week or longer actually preparing (procuring the means) for the attack. 3. A majority of active shooters obtained their firearms legally, with only very small percentages obtaining a firearm illegally. 4. The FBI could only verify that 25% of active shooters in the study had ever been diagnosed with a mental illness. Of those diagnosed, only three had been diagnosed with a psychotic disorder. 5. Active shooters were typically experiencing multiple stressors (an average of 3.6 separate stressors) in the year before they attacked. 2018 FBI REPORT: "A Study of the Pre-Attack Behaviors of Active Shooters in the US, Between 2000-2013" 6. On average, each active shooter displayed 4 to 5 concerning behaviors over time that were observable to others around the shooter. The most frequently occurring concerning behaviors were related to the active shooter's mental health, problematic interpersonal interactions, and leakage of violent intent. 7. For active shooters under age 18, school peers and teachers were more likely to observe concerning behaviors than family members. For active shooters 18 years old and over, spouses/domestic partners were the most likely to observe concerning behaviors. 8. When concerning behavior was observed by others, the most common response was to communicate directly to the active shooter(83%) or do nothing (54%). In 41% of the cases the concerning behavior was reported to law enforcement. Therefore,just because concerning behavior was recognized does not necessarily mean that it was reported to law enforcement. 2018 FBI REPORT: "A Study of the Pre-Attack Behaviors of Active Shooters in the US, Between 2000-2013" 9. In those cases where the active shooter's primary grievance could be identified, the most common grievances were related to an adverse interpersonal or employment action against the shooter (49%). 10. In the majority of cases (64%) at least one of the victims was specifically targeted by the active shooter. IS THERE A COPYCAT FACTOR? A study of workplace and school shootings from two psychology professors from Western New Mexico University: "If the mainstream media and social media make a pact to no longer share, reproduce, or retweet the names, faces, detailed histories, or long-winded statements from these killers, we could see a dramatic reduction in mass shootings. People who commit mass shootings in America tend to share three traits: depression, social isolation, and pathological narcissism. We call on the media to deny these shooters the fame they seek." "We know historically there is a strong copycat phenomenon with high-profile mass shootings. When there's one in the news it tends to spur a number of copycat events, so people feel a contagion effect. One leads to another, which leads to another." -- Dr. Jonathan M. Metzl, Vanderbilt University THE TARGETED VIOLENCE PROCESS A key to identification and resolution of threat cases is early identification of "'attack related" behaviors. Perpetrators of targeted acts of violence engage in covert and overt behaviors prior to their attacks: they consider they plan they prepare they share, usually with third-parties they move from ideas to actions Source: USSS Pathway to Workplace Targeted E ied Violence AMOCK 17 Disconnected, disaffected, depressed, driven to act, 18 desire for revenge, desperate, dangerous Early Psychopathy, Narcissistic Entitlement, Depression, No Empathy or Regard for Self or Others "I want to outdo my idols. I want international attention. I want to be infamous. You can only kill me once. My actions will live on." REALITY CHECK These events are both catastrophic and rare, still mostly committed by male Lone Wolf Actors. No shooter has ever impersonated a cop or breached a secured door. We know Run — Hide — Fight works. We can't "predict violence," but we can assess dangerous, threatening, or pre-attack behaviors. We can listen for third-party threats and "leakage." Our greatest strengths: employee and management vigilance; rapid but measured responses; partnerships with our safety and security stakeholders; training, plans, and drills; and a Threat Assessment Team. DR. REID MELOY: ATTACKER CHARACTERISTICS On a path to violence: research, planning, preparation, focus, implementation, suicide or escape plan. Fixation on targets. Identification with a commando / warrior mentality. Energy burst, after social isolation. Testing, rehearsal, boundary probing. Leakage of third-party threats. Last resort thinking: justified, trapped, no other options. Post-incident feelings: anger, contempt, disgust, satisfaction. USSS SCHOOL SHOOTER RISK FACTORS Violent behavior toward others. History/perception of being bullied or victimized by others. History of discipline. Poor student achievement or academic progress. Peers and/or teachers are fearful of student. Sensitivity to feedback/criticism. Student tends to hold on to resentments or harbors a grudge. Reacts to discipline with agitation, violence, and unpredictability. PROTECTIVE FACTORS / DISINHIBITORS Stable family life. No history of child abuse. Appropriate peer support. No access to firearms. In a therapeutic relationship. Stabilized medication use. No street drug/alcohol use. No suicidality/homicidality. More Howler behavior (attention-seeking self-leakage) versus Hunter behavior (planning). Hope for the future, money. WHAT WE KNOW THAT WORKS Vigilance from CCCSD leadership, department heads, managers, supervisors, and staff. Listening for and responding to pre-attack leakage" comments, postings, threats, and behaviors. Using Threat Assessment Team processes. Early and coordinated responses from LE and clinicians. Facility security hardware and communications. Access control, visitor procedures, security improvements. Community notification systems, tip lines. Regular drills with staff and police. Crisis management plans and PTSD debriefing services. THREAT ASSESSMENT TEAMS H R GM's Office Security / Safety Department Heads Law Enforcement Labor Relations Counsel Union Reps Risk Management PIO / Communications Facilities Supervisors IT TM Consultants EAP or Behavioral Health Clinicians (* Keeps all case notes.) TAT MEETING CRITERIA Threats or violence toward leadership, meetings, facilities. Threats or violence to any employee, by a current or former employee; visitor; vendor, stranger. Employee-to-employee bullying, threats, or violence. High-risk employee discipline or terminations. Domestic violence crossovers with employees. Threats to the facilities, including bomb threats. Cyber threats. Vexatious litigants. TAT RESPONSES "proactively identify, assess, and manage threats against our employees and facilities." • Interviews with the subject. • Interviews with reportees, bosses, co-workers, witnesses. • Consulting with stakeholders, based on expertise. • Information collection review and assessment. • Assessing all communications and background data. • Create a Risk Priority. • Create a range of security, HR, or LE interventions. • Manage leave and/or re-entry plans. • Maintain and review case files. TAT DUE DILIGENCE Organizational safety. Employee safety / fear management. Facility safety / access control / law and policy enforcement. Information / gossip / rumor control. Return to work for victim-employees and suspect- employees. Appropriate, responsible, empowering follow-ups. HOW CAN WE SUCCEED AS A TAT? By better understanding the difference between "predicting violence" versus "assessing dangerousness." By understanding the differences between Hunters and Howlers. By being more aware of behaviors of concern. By focusing more on the subject's actions and less on verbal threats. By looking at each case from the POV of the victim(s), the subject, witnesses, the organization. By using Threat Assessment Team processes. By using humane and creative EAP, HR, and police procedures. By being proactive. ASSESSING OUR MISSION STATEMENT Is our goal "'Peace" or "'Justice?" Can we tolerate ambiguous solutions? ("Case Closed" or "'Case Inactive?") Can we see beyond our specialty areas? Can we accept that people do not always want our help or our solutions? Can we accept the fact we may fail? Are we really willing to think outside the box? WHAT IS A THREAT ASSESSMENT? "Threat assessment is an investigative process leading to an opinion about the seriousness of a situation (David Batza, 1990)." Threat Assessment is both a science and an 'intuitive art." Beware of statistics or profiles; we are not "predicting violence." Threat Assessment is just a ""Window in Time." More than just warning signs or threats alone, it's a unique and overall view of changing, relevant, and related behaviors in context. HISTORY OF THREAT ASSESSMENT RESEARCH f Gavin de Becker ( The Gift of Fear) Dr. Fred Calhoun, U.S. Marshals / TSA ("Hunters and Howlers") -*�* Steve Weston, J.D., retired CHP (with Calhoun, ThreatAssessmentandw Management Strategies and Contemporary Threat Management) SSA Bryan Vossekuil, Dr. Robert Fein, Dr. Marisa Reddy, USSS (Exceptional Case Study Project and Safe School Initiative reports) HISTORY OF THREAT r" ASSESSMENT RESEARCH Dr. John Monahan, University of VA School of Law, d (called "the leading thinker on the issue of violence risk assessment") Dr. Park Dietz, Newport Beach, CA ! (stalking behaviors, threat assessments, expert witness testimony) Dr. Reid Meloy, Diego,San CA (predatory versus affective violence, stalking research) 6 p The WAVR-21 (White & Meloy) Absent — Present - Prominent 1. Motives for Violence 2. Homicidal Ideas, Violent Fantasies or Preoccupation 3. Violent Intentions and Expressed Threats 4. Weapons Skill and Access 5. Pre-attack Planning and Preparation 6. Stalking or Menacing Behavior 7. Current Job Problems 8. Extreme Job Attachment 9. Loss, Personal Stressors and Negative Coping 10. Entitlement and Other Negative Traits 33 WAVR-21 continued (White & Meloy) Absent — Present - Prominent 11. Lack of Conscience and Irresponsibility 12. Anger Problems 13. Depression and Suicidality 14. Paranoia and Other Psychotic Symptoms 15. Substance Abuse 16. Isolation 17. History of Violence, Criminality, and Conflict 18. Domestic/Intimate Partner Violence 19. Situational and Organizational Contributors to Violence 20. Stabilizers and Buffers Against Violence 21. Organizational Impact of Real or Perceived Threats NOT PROFILES OR LABELS: Behaviors Troubled or troubling? Angry? Depressed? Suicidal ideations? 'Injustice Collector"? Brittle" personality? Hypersensitive? Substance abuser? Bully or bullied? Significant life problems with no sense of support? (No father, mentor, relative who cares.) Acquired or practiced with a firearm? Makes veiled or provocative comments about workplace/school violence cases? Other people are concerned? Third-party threats, leakage? 'Hunter" or ' Howler"? Moving from ideas to actions? CRITICAL TA QUESTIONS Do we know who it is? (Manage the victim or the suspect?) Is it a cause, demand, or a threat? Can we provide a viable solution? Likes / hates / wants? Troubled or troubling? Hunter or Howler? Movement from ideas to actions? Homicidal or suicidal? Repetition, escalation, or boundary probing? Fitness for Duty evaluation? (� Give up your gun?") CRITICAL TA QUESTIONS Cyber threats or in-person contacts? HR issue, LE issue, EAP, security, or mental health issue? Prescription medication compliance? Civil order compliance? What is our response when the subject passes our last and final "Do Not Cross" line? How can we create consequences? Who is the best person to explain the "rules" to the subject? How can we help the victim(s) cope with the stress? TA INFORMATION SOURCES Personnel file review. Co-worker, friend, family, parent contact. Workers' comp-related medical or mental health records. E-mails, texts, letters, journals. Facebook, Twitter, blog posts. Auditing office computer or agency cell phone data. Information from co-workers, family, neighbors. Tarasoff warnings from clinicians. Information from law enforcement. INHIBITORS VS. IGNITORS Money Economic stress Job security Job loss Family presence Family crises Love relationships) Broken heart Friends / social Loner behavior connections Irrational religious beliefs Religious beliefs One-dimensional life Interests / hobbies Pain Rules and norms `Interference" INDICATORS OF HIGHER RISK Antisocial, Borderline, Paranoid, Narcissistic Psychotic, Schizophrenic, Bipolar Substance Abuse History Violent History, Suicide attempts 'Injustice Collector"/ Blaming Behavior Severe Depression Mullen's Big 3: drugs, violence history, depression Albrecht's Big 4: minimize, rationalize, deny, blame 40 GOALS OF TA INTERVIEWING It can send a signal to the subject that his / her behavior has been noticed. It can allow the subject to tell his / her story. It helps us gather information that can be verified, analyzed, or discounted. It can provide an opportunity to communicate to the subject that his or her behavior is unwelcome, unacceptable, and must stop. INTERVIEW WARNINGS An interview may intensify the subject's interest in the target or the risk of lethal behavior. Examples: Increased depression and suicidal ideations. Self-perceptions of abandonment, loss of hope. More security barriers in place to the target. Sense that time is running out. Perception of no other options except violence. BENEVOLENT SEVERANCE? - 's (a/k/a ��Lovely Parting Gifts") Post-employment letter. �� Uncontested unemployment insurance claim. Resigning in lieu of termination. Continuation of EAP and health benefits (beyond COBRA). Severance package. Outplacement services. Quick access to final paycheck, vacation pay, retirement accounts. Agreement on reference check calls. Single point of contact. DV IN THE WORKPLACE RESPONSES Victim's right to privacy, Suspect's behaviors, right to self-manage, boundary probing, right to a safe workplace security concerns, law violations When do we have the right to get involved in an employee's personal life? BUSINESS IMPACT DV CASE ISSUES Pros: Cons: The suspect is usually known. Except in stalking cases. We can bring many resources. We don't always talk collectively. There are more consequences Some suspects don't fear any for suspects. consequences. We can be more visible to Some victims don't want our help. victims. These cases can drag on for We can respond quickly. years. We can help rescue the victim We are perceived as the from a potential tragedy. "harassers." 45 STALKER TYPOLOGIES 46 23 Common or Simple Obsessional Love Obsessional Erotomaniac Source: Drs. Zona, Meloy, Lt. J. Lane THE �SAFE ROOM" RESPONSE: Knowing �the Outs" Figure Out Whe ghtning Strikes - Get Out - Spread Out Take Out Post-incident counseling THE ��ACTIVE SHOOTER OR ARMED ATTACKER" RESPONSE Knowing the Outs: Where? 47 UIQ H��E � FIG�I� Burt (Get out, Evacuate) SUFtYiVJNG AN ACME SHOOTER O - Hide (Lock Out, Barricade) _ - Keep Out 48 24 �'_�_ Spread Out - '• Fight (Take Out, Protect) � ,� � Cover vs. Concealment? `� _ A 15-minute Drill IMPORTANT QUESTIONS . . . How do we manage staff concerns and fears about these issues? What is our mass notification plan? How will we evacuate or shelter the disabled employees or taxpayers? Have we discussed the intensity of the police response and its likely variations? Will we have the ability or desire to schedule a yearly Run-Hide drill with our staff? What mental health resources can we provide immediately after an event and going forward? PHYSICAL SECURITY IMPROVEMENTS Access control solutions. Door hardware and panic alarms. Lockdown procedures that can be initiated by all staff. Cameras, especially for blind spots. Better fencing and gates. Better building and rooftop signage. Improved PA systems and notification software. ' Red I _.... - building plans, maps, rosters. Knox Boxes - facility instructions, utility shutoffs. FUTURE CHALLENGES Copycat factor? Dangerous Aprils? The balance between dollars and security? The violence-obsessed media culture? Employee entitlements about behavior? Cross-over problems come from home to work? THE LAST VIOLENCE EQUATION Motive + Opportunity = threat Potentia. We won't always know the motive nor be able to change it. 51 Attacks are usually preceded by survei/lance and p/arming. Bad people are deterred by courageous people, good security, constant awareness, sharing information, and 52 26 reporting and acting on behaviors of concern, third-party leakage, and suspicious indicators Awareness / Vigilance / Access Control / Policies / Consistency / Notification / Partnerships