“Blowback” is a term that is not often used when discussing Workplace Violence and Active Shooter prevention and response. Preparation and awareness needs to start at the beginning of the hiring process and continue all the way through the termination of the employee. Blowback is the unforeseen and unwanted effect, result or set of repercussions.
Importance/relevance for employers and security professionals to understand this term –
- Blowback is not isolated
- It has a future
- We all need to plan for possible blowback
Planners must adopt:
- Threat policy that emphasizes documentation
- Firearms recognition policy
- Have a strong weapons storage policy
- Develop a strong signage policy
- Build strong law enforcement ties
Workplace Violence
The reasons a workplace violence event occurs:
- A disgruntled former or current employee
- Mentally disturbed individuals with a perceived wrong that needs to be made right
- A crime (robbery, theft, etc.) that goes bad
- An act of terrorism directed towards the organization
- A domestic dispute that spills over into the workplace
Workplace violence can happen for many reasons. Domestic violence is a common reason, with origins not directly related to the company involved. 1 in 4 working females are victims of domestic violence. Domestic violence can and has spilled over into the workplace. In most cases the employer and fellow employees were clueless of the potential for a domestic violence incident in their workplace.
Workplace violence prevention and awareness—the warning signs:
- Past history of violence
- History of threats
- Direct or implied threats made directly or to a third party
- Fascination with weapons
- Fascination with violent events
- Animal cruelty
- Extreme political extremism
- Extreme racism – hated of diversity
- Talk of hopelessness
- Isolation
- Begin to give things away
- Previous history of domestic violence
- Extreme dislike of management
- Pathological blamer
Social Media
Monitor Social Media – Some companies now designate a position or outsource someone to monitor social media platforms
- Why – Leakage (Communication with friends, relatives or others that indicate their intentions):
- People of concern will post things that may indicate direct and or veiled indicators
- Provides security with insight into a person of concern mental state of mind
- People have posted threats on social media in the past
Guns in America
Low tech terror –
- Now involves use of clubs, knives, cars, and trucks
- Ease of accessibility and no real need of operational knowledge (training), background check or licensing to purchase and/or operate.
In the U.S. the ease of access to guns, especially handguns is also a potential concern.
Potential signs of a concealed weapon:
- Security check – repeated touching of an area of the body where a weapon potentially may be concealed
- Unnatural gait
- Sagging jacket
- Bulges and/or outline of a weapon
- Visible weapon
- Palming of a weapon for purposes of concealment
- Overly concerned about a box or package
- Parking in an unnatural way e.g. no parking zone for ease of egress
Prevention and Risk Mitigation
Training of the staff needs to include:
- Run-Hide-Fight philosophy
- Domestic violence and it’s reality
- Trust your intuition
- Evacuation points and potential safe rooms
- Documentation – especially before an event occurs, not just after an event
- You may not have been the only one that’s seen something
- Fusion of information – documentation of what you and others may have noticed
If possible, “Harden the Target”:
- Install or improve cameras to be able to identify license plates
- Screening and access control procedures
- Metal detectors at key access points
- Installation of prox readers or electronic locks
- Maintain key control
- Designated safe rooms on each floor of the facility
- Identify all property provided to an employee and recover from terminated employee; especially a hostile termination
Risk mitigation of potential threats when hiring an employee:
- Conduct a background check
- Check with references – confirm the information provided
- Up to 10% of resumes contain false information
- Easier to not hire a potential problem employee than to terminate them once they’ve been hired
Risk mitigation of an identified party of concern:
- Conduct a background check
- Contact them if/when appropriate
- Learn as much about them as possible
- Work schedule
- Make/model of their vehicle
- License plate number
- Trespass the individual from the property
- Obtain and share pictures of the individual
- Alert all staff members of the concern
- Contact and share information with law enforcement
- Consider an Order of Protection
New building construction should insure CPTED principles
By doing your due diligence from the beginning of the hiring process, through a staff member’s employment, and upon termination you are better prepared to mitigate the threat of a potential active shooter or violent incident in the workplace.