Insider threat: It’s Not Just About Spies

Historical Perspective There’s been increased attention in the government and the private sector about the insider threat since the disclosures of classified information by Edward Snowden in 2013. The insider threat has historically been viewed from an espionage perspective, especially by the Department of Justice and the FBI. This was true during the Cold War as intelligence agencies on both

Read More

Pre-Attack Behaviors of Active Shooters

The Federal Bureau of Investigation (FBI) published a study in June of 2018 on the “Pre-Attack Behaviors of Active Shooters” in the United States. The study was a follow-up to one done in 2014, also by the FBI, of active shooter incidents in the United States from 2000 to 2013. The earlier study was focused

Read More

Staying Silent on Problematic Behaviors

One of the challenges in working to reduce violence in the workplace is the failure by some inside the organization to report problematic behaviors that may lead to targeted violence. Former FBI Special Agent Mary Ellen O’Toole identified four primary reasons during her time with the FBI’s Behavioral Assessment Unit. Understanding and overcoming these behaviors

Read More

Security Alignment, Optimization, and Maturity

  Overview: If you’re like me you either played Whack-A-Mole as a child or with your children or grandchildren. As we know the challenge was to be ready to whack the mole when its’ head popped up in one of several holes in front of us. In a way some companies play a version of

Read More

Stalkers and the Workplace

Overview: In their 2002 study Risk Assessment of Stalkers: Some Problems and Possible Solutions, authors P. Randall Kropp, Stephen D. Hart, David R. Lyon described Stalking as a “cluster of behaviors, including unwanted communication, approach, or other contact, usually intended to threaten, harass, coerce, or intimidate the target into meeting the demands of the perpetrator”. Prior to

Read More

Threat Management Team: No Time for Silos

Confident or Cocky? Several years ago I met with an organization to discuss their workplace violence prevention program and threat management team. I asked a key stakeholder to identify who in the organization was responsible to assess and manage threats of violence. His response: “I assess all threats and decide what action we will take”

Read More

Are Protection Orders a Good Strategy?

Protection Orders It is too soon to say whether the protection order issued to the suspect in the shooting in Hesston, Kansas last week served as a trigger to this deadly event. And we do not know how much, if any, the suspect’s employer knew of the allegations of domestic abuse or whether the employer

Read More

Security Practices: Trust But Verify

Security Policies & Procedures Basic security policies and procedures are at the core of a sound security risk program. Former President Ronald Reagan popularized the phrase “trust but verify” when negotiating with the Soviet Union in the 1980s. Although certainly not on the same scale, that phrase can be applied everyday to ensure we provide for

Read More

Ethics: Don’t Reward Bad Behavior

Golden Parachute The CEO of United Airlines and two other senior executives stepped down in September of 2015 in the midst of a federal corruption probe and potential violations of the company’s code of ethics. Subsequently, CNBC reported that the United board of directors granted the CEO a $4.9 million termination settlement plus 60,000 shares of

Read More

Blind Spots: Know and Overcome Them

  What are Blind Spots Anyone who learned to drive as a teenager was warned to be aware of the blind spots between what you see in the rear view mirror and the side view mirror. As adults we hear about blind spots but in a much different context. Merriam-Webster defines one type of  blind spot as the tendency to ignore

Read More