Upload
hillard-heintze
View
164
Download
0
Embed Size (px)
Citation preview
HILLARD HEINTZE © 2016 | Protecting What Matters 2
ORIGINS: WHY THE EXECUTIVE CONCERN?
"We are witnessing, in my view, a change in the nature of mass shootings in the U.S. No longer are they solely defined by a single, isolated aggrieved shooter but a shooter or shooters embedded in, justified by and potentially supported by an ongoing ideological framework.”
ALAN J. LIPMAN, FOUNDER AND EXECUTIVE DIRECTOR THE CENTER FOR THE STUDY OF VIOLENCE IN WASHINGTON D.C.
HILLARD HEINTZE © 2016 | Protecting What Matters 3
ORIGINS: WHY THE SPOTLIGHT NOW?
A marked rise in executive concerns
Increasing focus on workplace violence and active shooter prevention
Recent terror events in Europe and Turkey – and in the U.S., from San Bernardino to the Navy Yard
Mediaspin, opinion and frenzy
Politicsand the U.S. election process
Complexityof the issues –from privacy to religious expression
Overlapping executive responsibilities– Security, HR, Legal, IT, Law Enforcement
4
Radicalization cuts across many areas
So where exactly does threatening behavior related to radicalization fit in?
HILLARD HEINTZE © 2016 | Protecting What Matters
• Workplace violence• Substance abuse• Hostile work environment
• Criminal activity• Inappropriate behavior• Sexual harassment
HILLARD HEINTZE © 2016 | Protecting What Matters 5
DEFINITION
Radicalization“Radicalization is a personal process in which individuals adopt extreme political, social and/or religious ideals and aspirations, and where the attainment of particular goals justifies the use of indiscriminate violence. It is both a mental and emotional process that prepares and motivates an individual to pursue violent behavior.”
Source: A. S. Wilner and C. J. Dubouloz, "Homegrown terrorism and transformative learning:an interdisciplinary approach to understanding radicalization," GlobalChange, Peace & Security (formerly Pacifica Review: Peace, Security & Global Change) 22:1 (2010): 38.
HILLARD HEINTZE © 2016 | Protecting What Matters 6
What Security and HR leaders are saying• “Duty of care” obligates
companies to keep the employee population fully informed regarding ALL potentially threatening behaviors and, conversely, behaviors that may require tolerance in the workplace as well as reporting.
• Radicalization falls into a subset of workplace violence behaviors.
• Awareness training should be provided to employees regarding radicalization and orientations.
• Accommodations for particular non-threatening belief practices should be considered and established.
HILLARD HEINTZE © 2016 | Protecting What Matters 7
The spectrum of potential behaviorthat could be “radicalized” should be broadened to include:
• Gun rights• Abortion• Racism• Animal rights
• Religious extremism• Ultra right-wing activism• Ultra left-wing activism• Environmental activism
HILLARD HEINTZE © 2016 | Protecting What Matters 8
ACCOUNTABILITY: OVERLAPPING AREAS OF RESPONSIBILITY
CATEGORIES• Workplace Violence• Hostile Work Environment• Criminal Behavior• Cyber• Sexual Harassment• Substance Abuse• Inappropriate Behavior
STAKEHOLDERS• Security• HR• Legal• IT• Law Enforcement
ACTIONS• Document• Employee Assistance
Program• Confront• Report to Law Enforcement• Counsel• Personal Action
HILLARD HEINTZE © 2016 | Protecting What Matters 9
MANIFESTATION IN THE WORKPLACE
Radicalization can manifest itself as:• A violent, aggressive, selfless act conducted on a
random target, with encouragement, enabling and logistical support from an identifiable segment of an organization that has hijacked or bastardized a goal.
• The result of an openly stated goal or purpose of an organization or body.
HILLARD HEINTZE © 2016 | Protecting What Matters 10
PATHS TO RADICALIZATION
Disciples may be radicalized through exposure to:• A narrow indoctrination path.
• No outside contrary opinions.
• The inevitability of a catastrophic event as the likely outcome.
11
Violent ExtremistPerson who advocates, is engaged in or is preparing to engage in ideologically motivated terrorist activities (including providing support to terrorism) to further political or social objectives promoted by a foreign terrorist organization (FTO).
THREATS: THREE TYPES OF ATTACKERS
HILLARD HEINTZE © 2016 | Protecting What Matters
12
Homegrown Violent Extremist (HVE) THREATS: THREE TYPES OF ATTACKERS
HILLARD HEINTZE © 2016 | Protecting What Matters
A U.S. person who was once assimilated into, but who has rejected the cultural values, beliefs and environment of the U.S. in favor of a violent extremist ideology.
He or she is “U.S. radicalized” and intends to commit terrorism inside the U.S. without direct support or direction from a foreign terrorist organization.
HILLARD HEINTZE © 2016 | Protecting What Matters 13
THREATS: THREE TYPES OF ATTACKERS
Domestic Terrorist Person who engages in unlawful acts of violence to intimidate civilian populations or attempt to influence domestic policy (as opposed to furthering the aims of a foreign terrorist organization) without direction from or influence by a foreign actor.
Examples include acts by racist, supremacist, antigovernment, environmental, animal rights or other single-issue extremist groups or movements.
14
A sampling of lessons the U.S. intelligence community is gleaning from recent events• Radicalization increases the likelihood of violence.• Individuals and groups follow different paths to violence.• Multiple factors indicate why some choose terrorist violence.• A one-factor approach to intervention will fail.• Factor importance varies across cases and circumstances.• Some factors serve as catalysts for others and can
trigger a chain of events.
INSIGHTS: FUNDAMENTAL PRINCIPLES OF RADICALIZATION
HILLARD HEINTZE © 2016 | Protecting What Matters
HILLARD HEINTZE © 2016 | Protecting What Matters 15
DRIVERS: FACTORS THAT INCREASE AN INDIVIDUAL’S VULNERABILITY
Personal Factors
Group Factors
Community Factors
SociopoliticalFactors
Ideological Factors
• Psychological
• Demographic backgrounds
• Personal history
• Social networks
• Family and peer groups
• Group dynamics
• Alienation
• Marginalization
• Diaspora relationships with home country
• Collective grievances
• Foreign policy
• External events
• Appeal of justifying narrative
• Charismatic ideologues
HILLARD HEINTZE © 2016 | Protecting What Matters 16
MOBILIZATION
A Portfolio of Indicators
Other Indicators (Sampling)• Preparing and disseminating a last will, martyrdom video or statement.
• Seeking help from family and friends to enable travel to join terrorist groups overseas.
• Planning or attempting to travel to a conflict zone to fight with or support an FTO.
• Seeking religious or political justification for violent acts.
• Employing counter-surveillance techniques.
• Establishing suspicious travel patterns.
• Deleting social media and other online accounts to avoid tracking by law enforcement.
• Suspicious acquisition of maps or blueprints.
HILLARD HEINTZE © 2016 | Protecting What Matters 17
DEFINITION
Workplace Insider Threats“A current or former employee, contractor or other business partner who has or had access to an organization’s network, system or data and intentionally exceeded or misused that access in a manner negatively affected the confidentiality, integrity, or availability of the organization’s information or information systems.”
DHS NATIONAL CYBERSECURITY AND COMMUNICATIONS INTEGRATION CENTER
HILLARD HEINTZE © 2016 | Protecting What Matters 18
DEFINITION
Insider Threat“The insider threat to critical infrastructure is one or more individuals with the access and/or insider knowledge of a company, organization or enterprise that would allow them to exploit the vulnerabilities of that entity’s security, systems, services, products, or facilities with intent to cause harm.”National Infrastructure Advisory Council in their publication, “The Insider Treat to U.S. Critical Infrastructures”
19
INSIDER THREAT MITIGATION
HILLARD HEINTZE © 2016 | Protecting What Matters
Detect anomalies as early as possible and investigate before assets, data or personnel are compromisedLook beyond cyber security to include potential insider threats related to:• Fraud• Workplace violence• Information technology (IT) sabotage• Intellectual property and research and
development theft
HILLARD HEINTZE © 2016 | Protecting What Matters 20
INSIDER THREATS ARE SELDOM IMPULSIVE ACTS
Look for the warning signs as insiders move along a threat continuum from idea to action
• Demonstrating a change in behavior or attitude
• Violating company policy• Arriving early or staying late• Showing undue interest in
information not relevant to job• Attempting access into physical
areas not related to job
21
LEARN THE WARNING SIGNS OF INSIDER THREAT
HILLARD HEINTZE © 2016 | Protecting What Matters
Companies must establish guidelines on recognizing threat indicators based on behavioral-based techniques 1. Train employees to recognize and report
behavioral indicators exhibited by fellow employees or business partners.
2. Ensure training includes how to identify the characteristics of insiders at risk of becominga threat.
HILLARD HEINTZE © 2016 | Protecting What Matters 22
CHARACTERISTICS OF INSIDERS AT RISK OF BECOMING A THREAT
• Introversion• Greed/financial need• Vulnerability to blackmail• Compulsive and destructive
behavior• Rebellious, passive-
aggressive• Ethical “flexibility”• Reduced loyalty• Entitlement – narcissism
(ego/self-image)• Minimize their mistakes
and faults
• Inability to assume responsibility
• Intolerance to criticism• Self-perceived value exceeds
performance• Lack of empathy• Predisposition towards law
enforcement• Pattern of frustration and
disappointment• History of managing crisis
ineffectively
HILLARD HEINTZE © 2016 | Protecting What Matters 23
FREE ONLINE COURSES
DHS/FEMA independent study course, “Protecting Critical Infrastructure Against Insider Threats” (IS-915)http://training.fema.gov/
Department of Defense (DoD), “Insider Threat Awareness Course” http://cdsetrain.dtic.mil/itawareness/
HILLARD HEINTZE © 2016 | Protecting What Matters 24
KEY ISSUES
Starting the Conversation4. Determine the scope of monitoring, recording
and reporting on employee online behavior.
5. Establish the parameters of access.
6. Communicate the consequences of abuse to employees.
1. Engage external partners – law enforcement, media, community services and religious experts.
2. Understand the role of technology, social media and internet usage.
3. Identify technology vendors that provide monitoring services.
HILLARD HEINTZE © 2016 | Protecting What Matters 25
FOR FURTHER INFORMATION
Howard Fisher, Esq. Vice President, Strategic [email protected]
30 South Wacker Drive, Suite 1400Chicago, Illinois 60606 312.869.8500