4/19/2015© Nicoletti-Flater Associates Detection, Disruption & Risk Assessments of Insider / Outsider Perpetrated Violence COLORADO HEALTH CARE ASSOCIATED.

Slides:



Advertisements
Similar presentations
Building A Safe Workplace: Preventing Workplace Violence.
Advertisements

Indianapolis, Indiana Offender Notification Meetings.
© PRIMA-EF Consortium Work Package 5: Interventions and best practice on bullying and third party violence at work Interventions and best practice workshop.
Policy 8207 – Harassment, Intimidation, or Bullying The district is committed to establishing a safe and civil educational environment for all students.
INCIDENT REPORTING for Resource Parents 1 September 2012.
Page 1 PREA Orientation. Page 2 Basic Rules We Respect Each others Safety – No verbal or physically assaultive behavior We Appreciate Each Others Individuality.
UCLA 1 Intake is the administrative and initial assessment procedures for admission to a program. 2.
Criminal Violence: Patterns, Causes, and Prevention Riedel and Welsh, Ch. 9 “Workplace Violence”
USC Health and Safety Training Workplace Violence.
Chapter Fourteen: Violent Behavior in Institutions
Violence Prevention. Preventing school violence is a top priority for school and public safety officials today. Efforts include creating more positive.
HARASSMENT, INTIMIDATION AND BULLYING POLICY AND PR0CEDURES Irvington Public Schools Staff Training School Year.
Session 8: Modeling the Vulnerability of Targets to Threats of Terrorism 1 Session 8 Modeling the Vulnerability of Targets to Threats of Terrorism John.
Alternatives to Restraints/Restraints Workshop. Definitions What is a restraint? –A restraint can either be physical or chemical and is used to limit.
Campus Safety and Duty to Warn Tim Keefe, M. Ed Dean of Students Plymouth State University Jean M. Joyce-Brady, Ph.D. Dean of Students Massachusetts College.
WORKPLACE VIOLENCE A SUPERVISOR GUIDE PLANNING PRE-EMPLOYMENT SCREENING –application as a guide to check past acts of violence –personal interviews with.
Implementing Human Service Worker Safety Regulations
Laboratory Management - 1
CHAPTER 2 – ROLES OF CONSTRUCTION PERSONNEL IN SAFETY AND HEALTH
PREVENTING VIOLENCE IN THE WORKPLACE
Workplace Violence Research has identified factors that may increase the risk of violence at worksites. Such factors include working with the public or.
Learning Objectives ALL will understand the history of community care MOST will be able to explain the key features of community care SOME will evaluate.
Detective Barry Smith Oakdale Police Department.
Internet Safety Part II CyberBullying. Judson Independent School District … strives to provide a safe, positive learning environment for students in our.
Presented by FARA on the behalf of The Office of Risk Management.
Mentally Ill Offenders and Sex Offenders. The Problem Mental illness and the lack of sufficient mental health care have driven offenders into the CJ system.
12 NYCRR PART PUBLIC EMPLOYER WORKPLACE VIOLENCE PREVENTION PROGRAMS.
Work Place Violence Pam Cant IH MS, Industrial Hygienist.
9/11/2015© Nicoletti-Flater Associates Violence Goes to College: Detecting and Preventing Avenger Violence WEBINAR John Nicoletti, Ph.D. Nicoletti-Flater.
Overview of the Hernando County School District Anti-Bullying and Harassment Policy January 2009.
WORKPLACE VIOLENCE SEMINAR SEATTLE FEDERAL EXECUTIVE BOARD ASSOCIATES PROGRAM Update 3/9/1999.
The Health System Response to Gender-Based Violence in EECA: A programmatic package Risk Assessment & Safety Concerns.
HR Legislation Update: AODA Integrated Accessibility Standards and Bill Facilitated by: Melissa Magder – Director.
© Business & Legal Reports, Inc Alabama Retail is committed to partnering with our members to create and keep safe workplaces. Be sure to check out.
Welcome to the Quarterly FTM Facilitator Advanced Training  Please make sure you have signed in.  In order to receive PE training hours you must be registered.
Carol Wilkinson, MD. MSPH Medical Director, IBM Medical Director, IBM November 15, 2004 Baltimore, Md November 15, 2004 Baltimore, Md VIOLENCE PREVENTION:
Chapter Fourteen Safety and Health: A Proactive Approach.
OVERVIEW Definitions and Air Force Policy Possible Domestic Violence Indicators Rules of Engagement Referral Agencies.
Violence in the Workplace Types, Warning Signs & Prevention Ohio Division of Safety & Hygiene.
Forensic Victimology 2nd Edition Chapter Twelve: Workplace Violence.
WORKPLACE VIOLENCE CARROLL WARD EASTERN REGIONAL SECURITY OFFICER FAX:
Violence in the Work Place Awareness Training 1 Avaya Violence in the Work Place Awareness Training Presented By Avaya Global Security Health, Environment,
Practice Area 1: Arrest, Identification, & Detention Practice Area 2: Decision Making Regarding Charges Practice Area 3: Case Assignment, Assessment &
Intimate Partner Violence A pattern of coercive behavior intended to establish and maintain power and control Abuser may be a current or former spouse,
Presented by Sedgwick CMS on the behalf of The Office of Risk Management.
Managing Difficult Patrons with A Course Tips and Highlights from.
Viol_oh5/02/00 1 Building A Safe Workplace: Preventing Workplace Violence Employee Training Cooperatively Developed By and The Commonwealth of Pennsylvania.
The Risk Management Process
WORKPLACE BULLYING Prevention and Skills to Recognise Key Factors in Your Workplace.
Workplace violence is violence or the threat of violence against workers. It includes harassment, verbal abuse, threatening behavior, fighting and physical.
Developing Skills and Competencies Among Behavior Intervention Teams and Team Members Charles Kenyon, Ed.D. Associate VP and Dean of Students Karen O’Quin,
Physician Assistant : Violence in the Workplace Group 5.
Risk Assessment. Windlestone Hall School Risk Assessment Name of Student…………….…DOB……..AGE…….. Completed by…………………………………………… Type Prior to admission Pre.
VIOLENCE AT WORK Samuel Nii Tettey (Ergonomist) 1.
Introduction Chardon Police Department Executive Lieutenant
Safety and Health: A Proactive Approach
Chapter Fourteen: Violent Behavior in Institutions
Criminal Violence Riedel and Welsh, Ch. 9 “Workplace Violence”
Workplace Violence.
VIOLENCE IN THE WORKPLACE PREVENTION PROGRAM
Detection & Disruption of Insider/Outsider Perpetrated Violence
Introduction Costly Workplace violence costs American taxpayers $4 billion to $6 billion annually. Psychological Violence In addition to physical violence,
Rampage Higgins O’Brien Spring 2012.
Policy 8207 – Harassment, Intimidation, or Bullying
WORKPLACE VIOLENCE Updated 09/28/11 1
Organizational Change and Stress Management
(COLOR SYSTEMS FLOWCHART HANDOUT, fancier than book): LETS LOOK AT OUR RECOMMENDATIONS FOR A SYSTEM (LEVEL 1 AND LEVEL 2… THEN WE’LL DISCUSS YOUR SYSTEM.
Workplace Violence Rich Lobdell 4/8/2019.
Violence in the Workplace
Incident Reporting for Foster Parents
Presentation transcript:

4/19/2015© Nicoletti-Flater Associates Detection, Disruption & Risk Assessments of Insider / Outsider Perpetrated Violence COLORADO HEALTH CARE ASSOCIATED RISK MANAGERS 2013 ANNUAL CONFERENCE John Nicoletti, Ph.D., ABPP Nicoletti-Flater Associates Facebook: Nicoletti-Flater Associates

WHY COLORADO?

4/19/2015© Nicoletti-Flater Associates BASIC SAFETY CONSIDERATIONS IN PREVENTING & DISRUPTING A VOLATILE ATTACK Development of a Centralized Data Collection Point (VORTEX) Target Hardening Activation of Dynamic Countermeasures

4/19/2015© Nicoletti-Flater Associates WHAT ARE THE CATEGORIES OF RISKS? A risk for Proactive Attack Behaviors against people or property A risk for Reactive Attack Behaviors against people or property A risk for behaviors that create Social and Psychological Disruption

4/19/2015© Nicoletti-Flater Associates WHO ARE THE ATTACKERS? Insider – Individuals who are on your radar before they attack. Outsider – Individuals who are not on your radar before they attack.

4/19/2015© Nicoletti-Flater Associates SPECIFICALLY, WHO ARE THE INSIDERS AND OUTSIDERS?  Employees  Ex-Employees  Family Members  Ex-Family Members  Patients / Customers / Clients  Contractors  Others

WHAT DOES NOT WORK IN CONDUCTING A RISK ASSESSMENT? 4/19/2015© Nicoletti-Flater Associates

FOCUSING ON WHO INSTEAD OF WHAT What is a ‘who’? Mental Health Diagnosis (i.e., psychotic, bipolar, etc.). Ethnicity Gender Religious Affiliation Political Affiliation Other Affiliations (i.e., Greenpeace, Code Pink, PEAT) 4/19/2015© Nicoletti-Flater Associates

4/19/2015© Nicoletti-Flater Associates Individuals with Mental Illness Attackers

4/19/2015© Nicoletti-Flater Associates DENIAL

4/19/2015© Nicoletti-Flater Associates RATIONALIZATION -- Inserting ‘JUST’ in the behavioral description

4/19/2015© Nicoletti-Flater Associates BELIEVING IN AN URBAN LEGEND

4/19/2015© Nicoletti-Flater Associates WHAT ARE THE TIME & RESPONSIBILITY CONSIDERATIONS?  Pre-Event Threshold Actions – what you do before the person gets on your radar.  Event Threshold – what you do when the person gets on your radar.  Event Horizon – what you do when the person attacks you.  Post-Event Horizon – what you do to try to recover and live with what happened.

4/19/2015© Nicoletti-Flater Associates Pre-Event Threshold Actions

4/19/2015© Nicoletti-Flater Associates IN DEALING WITH CURRENT EMPLOYEES: Document all behavioral actions Provide employee ongoing feedback No surprises

4/19/2015© Nicoletti-Flater Associates If They Broadcast It – Believe It!

4/19/2015© Nicoletti-Flater Associates Skip the “Tea Leaf” Reading If a coded behavior occurs, go to a countermeasure.

4/19/2015© Nicoletti-Flater Associates AREAS OF RESPONSIBILITIES  Employees – Detectors  Supervisors/Managers – Detectors & Disruptors  Agency Response Team – Disruptors

4/19/2015© Nicoletti-Flater Associates There are two timelines in violence.

4/19/2015© Nicoletti-Flater Associates TWO KEY TIME CONSIDERATIONS Event Threshold Event Horizon

4/19/2015© Nicoletti-Flater Associates The probability of a violent incident from an insider should be low.

4/19/2015© Nicoletti-Flater Associates ALGORITHM ANALYSIS 35 Incidents Between 1/13/12 & 12/27/12 57% of the attackers were insiders 63% of the attackers broadcast a perceived injustice 71% of the victims initially targeted were the focus of the perceived injustice 74% of the attackers entered through the main entrance

4/19/2015© Nicoletti-Flater Associates ALGORITHM ANALYSIS (con’t) 71% of the attackers just walked in 49% of the attackers committed suicide 17% of the attackers were killed 34% of the attackers were arrested 37% of the attacks were over in under 5 minutes 63% of the attacks were over in under 15 minutes

4/19/2015© Nicoletti-Flater Associates ALGORITHM ANALYSIS (con’t) Location of the Attacks 51% of the attacks occurred in the workplace 17% of the attacks occurred in a school 17% of the attacks occurred in a public place 6% of the attacks occurred in a religious establishment 9% of the attacks occurred either in the victim’s or the offender’s residence

4/19/2015© Nicoletti-Flater Associates EVENT THRESHOLD ACTIONS Identification of The Event Threshold Behaviors

4/19/2015© Nicoletti-Flater Associates Avengers always have a progression.

HOW DO YOU GO FROM POINT A TO POINT Z? 4/19/2015© Nicoletti-Flater Associates

4/19/2015© Nicoletti-Flater Associates HOW DO YOU GO FROM POINT A TO POINT Z?

4/19/2015© Nicoletti-Flater Associates

HOW DO YOU GO FROM POINT A TO POINT Z? 4/19/2015© Nicoletti-Flater Associates

4/19/2015© Nicoletti-Flater Associates DEVELOPMENT OF AN AVENGER Perceived Injustice Feeling Victimized Externalization of Responsibility Development of a Grudge Obsessed with Avenging Avenging Action

4/19/2015© Nicoletti-Flater Associates Avengers always broadcast ahead of time.

HOW DO THEY BROADCAST IT? 4/19/2015© Nicoletti-Flater Associates

HOW DO THEY BROADCAST IT? Insiders broadcast directly to their targets. Outsiders triangulate their broadcasts. 4/19/2015© Nicoletti-Flater Associates

4/19/2015© Nicoletti-Flater Associates

4/19/2015© Nicoletti-Flater Associates

4/19/2015© Nicoletti-Flater Associates

4/19/2015© Nicoletti-Flater Associates BEHAVIORAL CODING OPTIONS: Normal Behaviors Boundary Probing Behaviors Attack Related Behaviors Attack Behaviors

4/19/2015© Nicoletti-Flater Associates NORMAL BEHAVIORS Must be defined according to: The specific environment The individual The event In reality, “normal behaviors” refer to behaviors that are accepted and tolerated. There cannot be any universal definition of “normal behaviors.”

4/19/2015© Nicoletti-Flater Associates BOUNDARY PROBING Involves pushing rules, regulations and tolerance levels. The purpose is to determine how much he/she can get away with.

4/19/2015© Nicoletti-Flater Associates IMPORTANT ISSUE If you allow a boundary probe to occur without a disrupter, then by default that behavior becomes normal.

4/19/2015© Nicoletti-Flater Associates ATTACK RELATED BEHAVIORS Desensitization Behaviors (threat making – direct, veiled, conditional) In Vivo Virtual Dehumanization Behaviors In Vivo Virtual

4/19/2015© Nicoletti-Flater Associates ATTACK RELATED BEHAVIORS Skill Set Building Development of an Armament Inventory Development of an Attack Plan

4/19/2015© Nicoletti-Flater Associates ATTACK RELATED BEHAVIORS Threatening Verbalizations Threatening Behaviors Personal Space Violations

4/19/2015© Nicoletti-Flater Associates ATTACK BEHAVIORS People Property

4/19/2015© Nicoletti-Flater Associates ACTIVATION OF COUNTERMEASURES Always Interrupt / Disrupt the Behavior

4/19/2015© Nicoletti-Flater Associates BOUNDARY PROBING AND ATTACK RELATED BEHAVIORS INCREASE WHEN THERE ARE NO TREES (DETERRENTS)

4/19/2015© Nicoletti-Flater Associates TREES CATEGORIES (Disrupters) CATEGORY I QUESTIONING CATEGORY II CONFRONTING CATEGORY III CONSEQUENCES

4/19/2015© Nicoletti-Flater Associates WHEN A TREE IS PLACED AFTER A PRACTICE SESSION THE INDIVIDUAL HAS A CHOICE TO EITHER BACK OFF OR CLIMB OVER IT INDIVIDUAL REACTIONS TO TREES

4/19/2015© Nicoletti-Flater Associates PREDICTING FUTURE VIOLENCE The best predictor of future behavior is not past behavior but post-intervention behavior.

4/19/2015© Nicoletti-Flater Associates INTERPRETING LACK OF COMPLIANCE If the concerning behaviors continue after an intervention, then two possible hypotheses have been generated: 1. The individual is choosing to disregard rules when it suits him/her. 2. The individual does not have the capacity to control his/her actions.

4/19/2015© Nicoletti-Flater Associates IMPORTANT CONSIDERATION Once an individual has engaged in an attack-related behavior, he/she should always remain on the radar detector, even if the behavior appears to have stabilized.

4/19/2015© Nicoletti-Flater Associates EVENT HORIZON CONSIDERATIONS

4/19/2015© Nicoletti-Flater Associates Always Proactively Train for an Event Horizon

4/19/2015© Nicoletti-Flater Associates RESPONSE STRATEGIES (Initiate At The Event Horizon) Activation of Delay Systems/Target Hardening Internal Notification Hi-Tech Hi-Touch External Notification Activation of Survival Strategies

4/19/2015© Nicoletti-Flater Associates STRATEGIC RESPONSES: PERSONAL SURVIVAL STRATEGIES WHEN VIOLENCE IS OCCURRING: GET OUT HIDE OUT – Saferoom/Concealment FAKE OUT – Play Dead TAKE OUT – Active Resistance

4/19/2015© Nicoletti-Flater Associates AFTERMATH

4/19/2015© Nicoletti-Flater Associates THERE WILL BE AN AFTERMATH AND YOU MUST DEAL WITH IT.

© Nicoletti-Flater Associates THE SIZE OF THE PSYCHOLOGICAL FOOTPRINT WILL EXCEED THE SIZE OF THE MEDICAL FOOTPRINT

AFTERMATH ISSUES Physical Clean Up Psychological Clean Up Business Reactivation 4/19/2015© Nicoletti-Flater Associates