From the White House to Your Home:
Insights on Enhancing the Security of Your Family
Arnette Heintze, Chief Executive Officer
Hillard Heintze is one of the foremost investigation, security risk management
and law enforcement consulting firms in the United States. We help clients
protect their people, performance, interests and reputations by providing
services that provide insight, deliver assurance and instill confidence.
ABOUT HILLARD HEINTZE
HILLARD HEINTZE © 2015 | Protecting What Matters2
April 14, 1865: Prevention steps
onto the national stage
President Lincoln takes action to prevent
the destruction of our nation’s financial
infrastructure – and creates the
U.S. Secret Service.
Lincoln and his wife head off to the
Ford Theater to see the production of
“Our American Cousin.”
A DAY OF CRISIS AND CHANGE
HILLARD HEINTZE © 2015 | Protecting What Matters3
Lessons are learned but at high costs to
three senior executives – and the nation.
HILLARD HEINTZE © 2015 | Protecting What Matters4
WHEN PREVENTION STUMBLES
LINCOLN
April 14, 1865
GARFIELD
July 2, 1881
MCKINLEY
September 6, 1901
Exceptional Case Study Project
The U.S. Secret Service and National Institute of Justice
FIVE-YEAR STUDY
Examined the thinking and behavior of
83 attackers from 1949 to 1996.
74 ATTACKS
• 6 attacks were carried out by 16 individuals who were
members of a group.
• 68 attacks were carried out by individuals acting alone.
• 24 of the 83 attackers were interviewed.
HILLARD HEINTZE © 2015 | Protecting What Matters5
EARLY RESEARCH BRINGS A CRUCIAL BODY OF KNOWLEDGE
MYTH 1:
They fit a distinct profile.
MYTH 2:
They are mentally ill
MYTH 3:
They make a direct threat
FACT 1: FACT 2: FACT 3:
Attackers do not fit
one descriptive or
demographic profile.
Mental illness rarely
plays a key role
in attacker behavior.
Persons who pose an
actual threat most often
do not make a threat.
6
EARLY RESEARCH REVEALS A CRUCIAL BODY OF KNOWLEDGE
HILLARD HEINTZE © 2015 | Protecting What Matters
Prior to the Study, we had these prevailing beliefs about attackers:
Targeted Violence is any incident of violence
where a known or knowable attacker selects a
particular target prior to their violent attack.
HILLARD HEINTZE © 2015 | Protecting What Matters7
UNDERSTANDING AND ADDRESSING THE RISK OF TARGETED VIOLENCE
HILLARD HEINTZE © 2015 | Protecting What Matters
Attackers have motives.
• Achieve fame and notoriety.
• Law enforcement-assisted suicide.
• Bring national attention to a
perceived problem.
8
UNDERSTANDING AND ADDRESSING THE RISK OF TARGETED VIOLENCE
Attackers select targets.
• Based on their motives and the
accessibility of the target.
• Often consider more than
one target.
Attackers have common backgrounds.
• Despair. Depression. Suicidal thoughts.
• History of harassing or stalking.
• Major loss or change in life.
• Few arrests for violent crimes.
What was learned about the pre-attack process
leading to Targeted Violence?
• Is the result of an understandable and often
discernible process of thinking and behavior.
• Stems from an interaction among the potential attacker,
past stressful events, a current situation and the target.
• A potential attacker’s behavior is vital to identifying his or her
intentions. The attacker’s thinking, planning and logistical
preparations have to be detected and interrupted.
HILLARD HEINTZE © 2015 | Protecting What Matters9
UNDERSTANDING AND ADDRESSING THE RISK OF TARGETED VIOLENCE
Behavioral threat assessment – three key processes
HILLARD HEINTZE © 2015 | Protecting What Matters10
UNDERSTANDING AND ADDRESSING THE RISK OF TARGETED VIOLENCE
Manage
The threat the
individual poses
Assess
If the individual poses a risk –
gather information from
multiple sources
Identify
Individuals who have
the idea or intent
of attacking
Would-be attackers report being
frustrated and foiled by security
measures.
Remain alert to those who roam
outer perimeters seeking alternative
access points in order to avoid
security measures.
HILLARD HEINTZE © 2015 | Protecting What Matters11
OBSERVATIONS AND IMPLICATIONS OF ATTACK-RELATED BEHAVIORS
12
CASE STUDIES: THREE RECENT ENGAGEMENTS
HILLARD HEINTZE © 2015 | Protecting What Matters
Managing a Stalker Incident (#115)
Anonymous caller reported one of the
firm’s receptionists was slandering its
management team. The company
quickly learned the caller was known to
their employee, and had been stalking
her for over a year. Calls to local law
enforcement resulted in an initial flurry
of incident reports and administrative
filings. But progress in the case
quickly stalled.
A Former Employee’s
Potential for Violence (#116)
When a disgruntled former
employee began sending
inappropriate email
communications to current
employees, a healthcare
company asked Hillard Heintze to
assess the individual’s potential
for violence.
The Facebook Threat
(#131)
An employee in an East
Coast branch office
posted threatening
statements about
company personnel on
his Facebook wall along
with several pictures of
himself posing with
weapons.
Prevention for families
takes many forms
• Safeguarding the well-being of
adolescents and young adults.
• Defending the family in a technically
agile world.
• Protecting residences.
• Developing a family emergency plan.
HILLARD HEINTZE © 2015 | Protecting What Matters13
FOCUSING ON PREVENTION
HILLARD HEINTZE © 2015 | Protecting What Matters14
ENHANCING THE SECURITY OF YOUR FAMILY
Cyber Security
Think beyond ease of use and assumptions of data
protection and ask tough questions that will help
to identify the strengths and weaknesses of your
current information security strategies.
• Are we protected? Are we doing enough?
• What is the financial impact if we
incur a data breach?
• Do we have a data recovery plan in place?
Social Consciousness
Social networks are a great way to stay connected,
but you need to protect your personal information.
• Activate privacy and security settings on
your social networks.
• Once posted, always posted - protect your
reputation by posting with caution.
• Be cautious about how much personal information
you provide on social networking sites.
• Know and manage your friends.
15
ENHANCING THE SECURITY OF YOUR FAMILY
HILLARD HEINTZE © 2015 | Protecting What Matters
HILLARD HEINTZE © 2015 | Protecting What Matters
Protecting Residences
• Employ best-in-class systems to safeguard your home.
• Use landscaping and sightlines, lighting and physical
barriers to restrict access.
• Places duress alarms in strategic locations.
• Screen all personnel associated with the residence.
16
ENHANCING THE SECURITY OF YOUR FAMILY
Family Emergency Plan
• Plan out exactly how the family should
respond when a crisis unfolds.
• Establish a relocation point or “safe house.”
• Set a universal call-in number for emergencies.
• Secure shelter-in-place and emergency
medical capabilities.
• Addresses communication and transportation
capabilities and emergency egress routes.
• Conduct annual drills.
17
ENHANCING THE SECURITY OF YOUR FAMILY
HILLARD HEINTZE © 2015 | Protecting What Matters
HILLARD HEINTZE © 2015 | Protecting What Matters
Security Technology
A range of new smartphone apps to help you remotely
monitor your property.
• Most security systems will send alerts to your devices
and allow you to check on the status of your home
from any location.
• Some systems will call the police if there is a break-in.
• Do-it-yourself security system with motion sensors and
video cameras can be placed around the home and
watched remotely.
18
ENHANCING THE SECURITY OF YOUR FAMILY
Arnette Heintze, Chief Executive Officer
Arnette.Heintze@HillardHeintze.com
30 South Wacker Drive, Suite 1400
Chicago, Illinois 60606 312.869.8500
HILLARD HEINTZE © 2015 | Protecting What Matters19
QUESTIONS AND DISCUSSION

More Related Content

PDF
Hillard heintze Presentation for ATAP
PDF
Hillard Heintze Presentation The Strategic Value of Assurance
PPTX
How to Prevent An Active Shooter in Your Workplace
PDF
Hillard Heintze ASIS Presentation Active Shooter
PPT
Impact of Terrorism
PPT
Impact Of Terrorism
PPTX
The threat of terrorism
PPTX
terrorism ppt
Hillard heintze Presentation for ATAP
Hillard Heintze Presentation The Strategic Value of Assurance
How to Prevent An Active Shooter in Your Workplace
Hillard Heintze ASIS Presentation Active Shooter
Impact of Terrorism
Impact Of Terrorism
The threat of terrorism
terrorism ppt

What's hot (8)

PPT
Understanding hs ch 01
PPT
Understanding hs ch 03
PPTX
Terrorism In India.
PPT
What is terrorism
PPTX
Terrorism
PPT
AQA Short Course- RE- Lesson on Terrorism
PPTX
PPTX
Instruments counter terrorism
Understanding hs ch 01
Understanding hs ch 03
Terrorism In India.
What is terrorism
Terrorism
AQA Short Course- RE- Lesson on Terrorism
Instruments counter terrorism
Ad

Similar to Insights on Enhancing the Security of Your Family (20)

PDF
Hillard Heintze ASIS Presentation Active Shooter
PDF
Radicalization in the Workplace
PDF
Protecting the Family Office
PDF
Hillard Heintze Presentation to ATAP - Part 1
PDF
Hillard Heintze Presentation to ATAP - Part 3
PDF
Hillard Heintze Presentation to ATAP - Part 2
PPT
Organizational Security: When People are Involved
PPT
Data Breaches: The Cost of Being Unprepared
PDF
Concepts and Case Studies in Threat Management 1st Edition Calhoun
PDF
Journal of Physical Security 8(1)
PDF
InKnowVision November 2012 Special HNW Marketing Webinar - Tom Kasza
PDF
IQ4 Final Presentation (1)
PDF
2011 SC Magazine Insider Threat Keynote
DOC
Threat Assessment And Security Measures For Risk Management 2
DOC
Threat Assessment And Security Measures For Risk Management 2
PPTX
Active Shooter Slides_v3 - Jan's
PPTX
Active Shooter Slides_v3 - Jan's
PDF
Internal Threats: The New Sources of Attack
PPTX
Counterintelligence & The Insider Threat January 2019 (1).pptx
PDF
"Security on the Brain" Security & Risk Psychology Workshop Nov 2013
Hillard Heintze ASIS Presentation Active Shooter
Radicalization in the Workplace
Protecting the Family Office
Hillard Heintze Presentation to ATAP - Part 1
Hillard Heintze Presentation to ATAP - Part 3
Hillard Heintze Presentation to ATAP - Part 2
Organizational Security: When People are Involved
Data Breaches: The Cost of Being Unprepared
Concepts and Case Studies in Threat Management 1st Edition Calhoun
Journal of Physical Security 8(1)
InKnowVision November 2012 Special HNW Marketing Webinar - Tom Kasza
IQ4 Final Presentation (1)
2011 SC Magazine Insider Threat Keynote
Threat Assessment And Security Measures For Risk Management 2
Threat Assessment And Security Measures For Risk Management 2
Active Shooter Slides_v3 - Jan's
Active Shooter Slides_v3 - Jan's
Internal Threats: The New Sources of Attack
Counterintelligence & The Insider Threat January 2019 (1).pptx
"Security on the Brain" Security & Risk Psychology Workshop Nov 2013
Ad

Recently uploaded (20)

PPTX
Hassle-Free Tax Deducted at Source (TDS)
PPTX
Aekot – Premier Salesforce Consulting Services
PPTX
Understanding Time of Supply of Services Under GST A Key Concept for Tax Comp...
PDF
Top 2 Places to Buy Verified Cash App Accounts Online.pdf
PDF
Hushh.ai: Who we are and what exactly we do
PPTX
Financial_Document_Reconciliation_Full_Presentation.pptx
PDF
The Future of Transport and Logistics in Southeast Asia.pdf
PDF
D6E Volvo EC200B Excavator Service Repair Manual.pdf
PPTX
Courier-Delivery-App-Development-Unlocking-the-Future-of-Logistics.pptx
PDF
Dean, Jodi: Concept Paper, Park at Stable Acres.pdf
PDF
SAMPA Presenttaion 19 September 2018.pdf
PDF
Pure Tax Investigations presentation at Accountex.pdf
PPTX
Lowell_Stine_Presentation services .pptx
PDF
Top Benefits of Using Unified Communications for Your Company
DOCX
Apple_ social factors case study.docxfdgrtfh
PDF
Building a Cross-Platform Risk Profile with API Integration
PPT
Wireless communication is strictly prohibited to the topic of topic name is t...
PDF
The Essential Role of Gutter Guard Mesh in Safeguarding Your Property
PPTX
10 Essential Moving Supplies You Need for a Stress-Free Move .pptx
PPTX
The Rise of the Agentic Edge Salesforce’s Bold Move with Regrello GetOnCRM.pptx
Hassle-Free Tax Deducted at Source (TDS)
Aekot – Premier Salesforce Consulting Services
Understanding Time of Supply of Services Under GST A Key Concept for Tax Comp...
Top 2 Places to Buy Verified Cash App Accounts Online.pdf
Hushh.ai: Who we are and what exactly we do
Financial_Document_Reconciliation_Full_Presentation.pptx
The Future of Transport and Logistics in Southeast Asia.pdf
D6E Volvo EC200B Excavator Service Repair Manual.pdf
Courier-Delivery-App-Development-Unlocking-the-Future-of-Logistics.pptx
Dean, Jodi: Concept Paper, Park at Stable Acres.pdf
SAMPA Presenttaion 19 September 2018.pdf
Pure Tax Investigations presentation at Accountex.pdf
Lowell_Stine_Presentation services .pptx
Top Benefits of Using Unified Communications for Your Company
Apple_ social factors case study.docxfdgrtfh
Building a Cross-Platform Risk Profile with API Integration
Wireless communication is strictly prohibited to the topic of topic name is t...
The Essential Role of Gutter Guard Mesh in Safeguarding Your Property
10 Essential Moving Supplies You Need for a Stress-Free Move .pptx
The Rise of the Agentic Edge Salesforce’s Bold Move with Regrello GetOnCRM.pptx

Insights on Enhancing the Security of Your Family

  • 1. From the White House to Your Home: Insights on Enhancing the Security of Your Family Arnette Heintze, Chief Executive Officer
  • 2. Hillard Heintze is one of the foremost investigation, security risk management and law enforcement consulting firms in the United States. We help clients protect their people, performance, interests and reputations by providing services that provide insight, deliver assurance and instill confidence. ABOUT HILLARD HEINTZE HILLARD HEINTZE © 2015 | Protecting What Matters2
  • 3. April 14, 1865: Prevention steps onto the national stage President Lincoln takes action to prevent the destruction of our nation’s financial infrastructure – and creates the U.S. Secret Service. Lincoln and his wife head off to the Ford Theater to see the production of “Our American Cousin.” A DAY OF CRISIS AND CHANGE HILLARD HEINTZE © 2015 | Protecting What Matters3
  • 4. Lessons are learned but at high costs to three senior executives – and the nation. HILLARD HEINTZE © 2015 | Protecting What Matters4 WHEN PREVENTION STUMBLES LINCOLN April 14, 1865 GARFIELD July 2, 1881 MCKINLEY September 6, 1901
  • 5. Exceptional Case Study Project The U.S. Secret Service and National Institute of Justice FIVE-YEAR STUDY Examined the thinking and behavior of 83 attackers from 1949 to 1996. 74 ATTACKS • 6 attacks were carried out by 16 individuals who were members of a group. • 68 attacks were carried out by individuals acting alone. • 24 of the 83 attackers were interviewed. HILLARD HEINTZE © 2015 | Protecting What Matters5 EARLY RESEARCH BRINGS A CRUCIAL BODY OF KNOWLEDGE
  • 6. MYTH 1: They fit a distinct profile. MYTH 2: They are mentally ill MYTH 3: They make a direct threat FACT 1: FACT 2: FACT 3: Attackers do not fit one descriptive or demographic profile. Mental illness rarely plays a key role in attacker behavior. Persons who pose an actual threat most often do not make a threat. 6 EARLY RESEARCH REVEALS A CRUCIAL BODY OF KNOWLEDGE HILLARD HEINTZE © 2015 | Protecting What Matters Prior to the Study, we had these prevailing beliefs about attackers:
  • 7. Targeted Violence is any incident of violence where a known or knowable attacker selects a particular target prior to their violent attack. HILLARD HEINTZE © 2015 | Protecting What Matters7 UNDERSTANDING AND ADDRESSING THE RISK OF TARGETED VIOLENCE
  • 8. HILLARD HEINTZE © 2015 | Protecting What Matters Attackers have motives. • Achieve fame and notoriety. • Law enforcement-assisted suicide. • Bring national attention to a perceived problem. 8 UNDERSTANDING AND ADDRESSING THE RISK OF TARGETED VIOLENCE Attackers select targets. • Based on their motives and the accessibility of the target. • Often consider more than one target. Attackers have common backgrounds. • Despair. Depression. Suicidal thoughts. • History of harassing or stalking. • Major loss or change in life. • Few arrests for violent crimes.
  • 9. What was learned about the pre-attack process leading to Targeted Violence? • Is the result of an understandable and often discernible process of thinking and behavior. • Stems from an interaction among the potential attacker, past stressful events, a current situation and the target. • A potential attacker’s behavior is vital to identifying his or her intentions. The attacker’s thinking, planning and logistical preparations have to be detected and interrupted. HILLARD HEINTZE © 2015 | Protecting What Matters9 UNDERSTANDING AND ADDRESSING THE RISK OF TARGETED VIOLENCE
  • 10. Behavioral threat assessment – three key processes HILLARD HEINTZE © 2015 | Protecting What Matters10 UNDERSTANDING AND ADDRESSING THE RISK OF TARGETED VIOLENCE Manage The threat the individual poses Assess If the individual poses a risk – gather information from multiple sources Identify Individuals who have the idea or intent of attacking
  • 11. Would-be attackers report being frustrated and foiled by security measures. Remain alert to those who roam outer perimeters seeking alternative access points in order to avoid security measures. HILLARD HEINTZE © 2015 | Protecting What Matters11 OBSERVATIONS AND IMPLICATIONS OF ATTACK-RELATED BEHAVIORS
  • 12. 12 CASE STUDIES: THREE RECENT ENGAGEMENTS HILLARD HEINTZE © 2015 | Protecting What Matters Managing a Stalker Incident (#115) Anonymous caller reported one of the firm’s receptionists was slandering its management team. The company quickly learned the caller was known to their employee, and had been stalking her for over a year. Calls to local law enforcement resulted in an initial flurry of incident reports and administrative filings. But progress in the case quickly stalled. A Former Employee’s Potential for Violence (#116) When a disgruntled former employee began sending inappropriate email communications to current employees, a healthcare company asked Hillard Heintze to assess the individual’s potential for violence. The Facebook Threat (#131) An employee in an East Coast branch office posted threatening statements about company personnel on his Facebook wall along with several pictures of himself posing with weapons.
  • 13. Prevention for families takes many forms • Safeguarding the well-being of adolescents and young adults. • Defending the family in a technically agile world. • Protecting residences. • Developing a family emergency plan. HILLARD HEINTZE © 2015 | Protecting What Matters13 FOCUSING ON PREVENTION
  • 14. HILLARD HEINTZE © 2015 | Protecting What Matters14 ENHANCING THE SECURITY OF YOUR FAMILY Cyber Security Think beyond ease of use and assumptions of data protection and ask tough questions that will help to identify the strengths and weaknesses of your current information security strategies. • Are we protected? Are we doing enough? • What is the financial impact if we incur a data breach? • Do we have a data recovery plan in place?
  • 15. Social Consciousness Social networks are a great way to stay connected, but you need to protect your personal information. • Activate privacy and security settings on your social networks. • Once posted, always posted - protect your reputation by posting with caution. • Be cautious about how much personal information you provide on social networking sites. • Know and manage your friends. 15 ENHANCING THE SECURITY OF YOUR FAMILY HILLARD HEINTZE © 2015 | Protecting What Matters
  • 16. HILLARD HEINTZE © 2015 | Protecting What Matters Protecting Residences • Employ best-in-class systems to safeguard your home. • Use landscaping and sightlines, lighting and physical barriers to restrict access. • Places duress alarms in strategic locations. • Screen all personnel associated with the residence. 16 ENHANCING THE SECURITY OF YOUR FAMILY
  • 17. Family Emergency Plan • Plan out exactly how the family should respond when a crisis unfolds. • Establish a relocation point or “safe house.” • Set a universal call-in number for emergencies. • Secure shelter-in-place and emergency medical capabilities. • Addresses communication and transportation capabilities and emergency egress routes. • Conduct annual drills. 17 ENHANCING THE SECURITY OF YOUR FAMILY HILLARD HEINTZE © 2015 | Protecting What Matters
  • 18. HILLARD HEINTZE © 2015 | Protecting What Matters Security Technology A range of new smartphone apps to help you remotely monitor your property. • Most security systems will send alerts to your devices and allow you to check on the status of your home from any location. • Some systems will call the police if there is a break-in. • Do-it-yourself security system with motion sensors and video cameras can be placed around the home and watched remotely. 18 ENHANCING THE SECURITY OF YOUR FAMILY
  • 19. Arnette Heintze, Chief Executive Officer Arnette.Heintze@HillardHeintze.com 30 South Wacker Drive, Suite 1400 Chicago, Illinois 60606 312.869.8500 HILLARD HEINTZE © 2015 | Protecting What Matters19 QUESTIONS AND DISCUSSION