25
Radicalization in the Workplace

Radicalization in the Workplace

Embed Size (px)

Citation preview

Radicalization in the Workplace

HILLARD HEINTZE © 2016 | Protecting What Matters 2

ORIGINS: WHY THE EXECUTIVE CONCERN?

"We are witnessing, in my view, a change in the nature of mass shootings in the U.S. No longer are they solely defined by a single, isolated aggrieved shooter but a shooter or shooters embedded in, justified by and potentially supported by an ongoing ideological framework.”

ALAN J. LIPMAN, FOUNDER AND EXECUTIVE DIRECTOR THE CENTER FOR THE STUDY OF VIOLENCE IN WASHINGTON D.C.

HILLARD HEINTZE © 2016 | Protecting What Matters 3

ORIGINS: WHY THE SPOTLIGHT NOW?

A marked rise in executive concerns

Increasing focus on workplace violence and active shooter prevention

Recent terror events in Europe and Turkey – and in the U.S., from San Bernardino to the Navy Yard

Mediaspin, opinion and frenzy

Politicsand the U.S. election process

Complexityof the issues –from privacy to religious expression

Overlapping executive responsibilities– Security, HR, Legal, IT, Law Enforcement

4

Radicalization cuts across many areas

So where exactly does threatening behavior related to radicalization fit in?

HILLARD HEINTZE © 2016 | Protecting What Matters

• Workplace violence• Substance abuse• Hostile work environment

• Criminal activity• Inappropriate behavior• Sexual harassment

HILLARD HEINTZE © 2016 | Protecting What Matters 5

DEFINITION

Radicalization“Radicalization is a personal process in which individuals adopt extreme political, social and/or religious ideals and aspirations, and where the attainment of particular goals justifies the use of indiscriminate violence. It is both a mental and emotional process that prepares and motivates an individual to pursue violent behavior.”

Source: A. S. Wilner and C. J. Dubouloz, "Homegrown terrorism and transformative learning:an interdisciplinary approach to understanding radicalization," GlobalChange, Peace & Security (formerly Pacifica Review: Peace, Security & Global Change) 22:1 (2010): 38.

HILLARD HEINTZE © 2016 | Protecting What Matters 6

What Security and HR leaders are saying• “Duty of care” obligates

companies to keep the employee population fully informed regarding ALL potentially threatening behaviors and, conversely, behaviors that may require tolerance in the workplace as well as reporting.

• Radicalization falls into a subset of workplace violence behaviors.

• Awareness training should be provided to employees regarding radicalization and orientations.

• Accommodations for particular non-threatening belief practices should be considered and established.

HILLARD HEINTZE © 2016 | Protecting What Matters 7

The spectrum of potential behaviorthat could be “radicalized” should be broadened to include:

• Gun rights• Abortion• Racism• Animal rights

• Religious extremism• Ultra right-wing activism• Ultra left-wing activism• Environmental activism

HILLARD HEINTZE © 2016 | Protecting What Matters 8

ACCOUNTABILITY: OVERLAPPING AREAS OF RESPONSIBILITY

CATEGORIES• Workplace Violence• Hostile Work Environment• Criminal Behavior• Cyber• Sexual Harassment• Substance Abuse• Inappropriate Behavior

STAKEHOLDERS• Security• HR• Legal• IT• Law Enforcement

ACTIONS• Document• Employee Assistance

Program• Confront• Report to Law Enforcement• Counsel• Personal Action

HILLARD HEINTZE © 2016 | Protecting What Matters 9

MANIFESTATION IN THE WORKPLACE

Radicalization can manifest itself as:• A violent, aggressive, selfless act conducted on a

random target, with encouragement, enabling and logistical support from an identifiable segment of an organization that has hijacked or bastardized a goal.

• The result of an openly stated goal or purpose of an organization or body.

HILLARD HEINTZE © 2016 | Protecting What Matters 10

PATHS TO RADICALIZATION

Disciples may be radicalized through exposure to:• A narrow indoctrination path.

• No outside contrary opinions.

• The inevitability of a catastrophic event as the likely outcome.

11

Violent ExtremistPerson who advocates, is engaged in or is preparing to engage in ideologically motivated terrorist activities (including providing support to terrorism) to further political or social objectives promoted by a foreign terrorist organization (FTO).

THREATS: THREE TYPES OF ATTACKERS

HILLARD HEINTZE © 2016 | Protecting What Matters

12

Homegrown Violent Extremist (HVE) THREATS: THREE TYPES OF ATTACKERS

HILLARD HEINTZE © 2016 | Protecting What Matters

A U.S. person who was once assimilated into, but who has rejected the cultural values, beliefs and environment of the U.S. in favor of a violent extremist ideology.

He or she is “U.S. radicalized” and intends to commit terrorism inside the U.S. without direct support or direction from a foreign terrorist organization.

HILLARD HEINTZE © 2016 | Protecting What Matters 13

THREATS: THREE TYPES OF ATTACKERS

Domestic Terrorist Person who engages in unlawful acts of violence to intimidate civilian populations or attempt to influence domestic policy (as opposed to furthering the aims of a foreign terrorist organization) without direction from or influence by a foreign actor.

Examples include acts by racist, supremacist, antigovernment, environmental, animal rights or other single-issue extremist groups or movements.

14

A sampling of lessons the U.S. intelligence community is gleaning from recent events• Radicalization increases the likelihood of violence.• Individuals and groups follow different paths to violence.• Multiple factors indicate why some choose terrorist violence.• A one-factor approach to intervention will fail.• Factor importance varies across cases and circumstances.• Some factors serve as catalysts for others and can

trigger a chain of events.

INSIGHTS: FUNDAMENTAL PRINCIPLES OF RADICALIZATION

HILLARD HEINTZE © 2016 | Protecting What Matters

HILLARD HEINTZE © 2016 | Protecting What Matters 15

DRIVERS: FACTORS THAT INCREASE AN INDIVIDUAL’S VULNERABILITY

Personal Factors

Group Factors

Community Factors

SociopoliticalFactors

Ideological Factors

• Psychological

• Demographic backgrounds

• Personal history

• Social networks

• Family and peer groups

• Group dynamics

• Alienation

• Marginalization

• Diaspora relationships with home country

• Collective grievances

• Foreign policy

• External events

• Appeal of justifying narrative

• Charismatic ideologues

HILLARD HEINTZE © 2016 | Protecting What Matters 16

MOBILIZATION

A Portfolio of Indicators

Other Indicators (Sampling)• Preparing and disseminating a last will, martyrdom video or statement.

• Seeking help from family and friends to enable travel to join terrorist groups overseas.

• Planning or attempting to travel to a conflict zone to fight with or support an FTO.

• Seeking religious or political justification for violent acts.

• Employing counter-surveillance techniques.

• Establishing suspicious travel patterns.

• Deleting social media and other online accounts to avoid tracking by law enforcement.

• Suspicious acquisition of maps or blueprints.

HILLARD HEINTZE © 2016 | Protecting What Matters 17

DEFINITION

Workplace Insider Threats“A current or former employee, contractor or other business partner who has or had access to an organization’s network, system or data and intentionally exceeded or misused that access in a manner negatively affected the confidentiality, integrity, or availability of the organization’s information or information systems.”

DHS NATIONAL CYBERSECURITY AND COMMUNICATIONS INTEGRATION CENTER

HILLARD HEINTZE © 2016 | Protecting What Matters 18

DEFINITION

Insider Threat“The insider threat to critical infrastructure is one or more individuals with the access and/or insider knowledge of a company, organization or enterprise that would allow them to exploit the vulnerabilities of that entity’s security, systems, services, products, or facilities with intent to cause harm.”National Infrastructure Advisory Council in their publication, “The Insider Treat to U.S. Critical Infrastructures”

19

INSIDER THREAT MITIGATION

HILLARD HEINTZE © 2016 | Protecting What Matters

Detect anomalies as early as possible and investigate before assets, data or personnel are compromisedLook beyond cyber security to include potential insider threats related to:• Fraud• Workplace violence• Information technology (IT) sabotage• Intellectual property and research and

development theft

HILLARD HEINTZE © 2016 | Protecting What Matters 20

INSIDER THREATS ARE SELDOM IMPULSIVE ACTS

Look for the warning signs as insiders move along a threat continuum from idea to action

• Demonstrating a change in behavior or attitude

• Violating company policy• Arriving early or staying late• Showing undue interest in

information not relevant to job• Attempting access into physical

areas not related to job

21

LEARN THE WARNING SIGNS OF INSIDER THREAT

HILLARD HEINTZE © 2016 | Protecting What Matters

Companies must establish guidelines on recognizing threat indicators based on behavioral-based techniques 1. Train employees to recognize and report

behavioral indicators exhibited by fellow employees or business partners.

2. Ensure training includes how to identify the characteristics of insiders at risk of becominga threat.

HILLARD HEINTZE © 2016 | Protecting What Matters 22

CHARACTERISTICS OF INSIDERS AT RISK OF BECOMING A THREAT

• Introversion• Greed/financial need• Vulnerability to blackmail• Compulsive and destructive

behavior• Rebellious, passive-

aggressive• Ethical “flexibility”• Reduced loyalty• Entitlement – narcissism

(ego/self-image)• Minimize their mistakes

and faults

• Inability to assume responsibility

• Intolerance to criticism• Self-perceived value exceeds

performance• Lack of empathy• Predisposition towards law

enforcement• Pattern of frustration and

disappointment• History of managing crisis

ineffectively

HILLARD HEINTZE © 2016 | Protecting What Matters 23

FREE ONLINE COURSES

DHS/FEMA independent study course, “Protecting Critical Infrastructure Against Insider Threats” (IS-915)http://training.fema.gov/

Department of Defense (DoD), “Insider Threat Awareness Course” http://cdsetrain.dtic.mil/itawareness/

HILLARD HEINTZE © 2016 | Protecting What Matters 24

KEY ISSUES

Starting the Conversation4. Determine the scope of monitoring, recording

and reporting on employee online behavior.

5. Establish the parameters of access.

6. Communicate the consequences of abuse to employees.

1. Engage external partners – law enforcement, media, community services and religious experts.

2. Understand the role of technology, social media and internet usage.

3. Identify technology vendors that provide monitoring services.

HILLARD HEINTZE © 2016 | Protecting What Matters 25

FOR FURTHER INFORMATION

Howard Fisher, Esq. Vice President, Strategic [email protected]

30 South Wacker Drive, Suite 1400Chicago, Illinois 60606 312.869.8500