Threat Management

 

Comprehensive threat management services for proactive risk and security solutions.

 

 

Threat management is primarily about preventing crimes by people with a high propensity to use violence against third parties.
The reappraisal of numerous serious acts of violence from the recent past has brought to light that such acts are often announced:
A conspicuous change in behaviour, allusions to known violent events or farewell acts can be harbingers of a planned act of violence, depending on the circumstances.

The aim of threat management is to follow up on such scattered clues and to decipher the partly hidden signs of a possible imminent act of violence
in order to take preventive countermeasures in good time.
The first task of threat management is therefore to recognize signals of an imminent serious act of violence.

In a second step, the available information must be compiled, in order to arrive at an assessment of the danger situation on this basis. If the risk of committing
a serious violent crime is assessed as sufficiently high, measures are examined and implemented that contribute to defusing the dangerous situation.

Forms of threats According to a commonly used definition, threats can be understood as the expression, implicit or explicit, of a desire or intention to harm a particular person or to violate their physical integrity.
A threat can be verbal, written, but also symbolic, for example through gestures.

Even if threats do not always precede a serious act of violence, it is advisable to take every threat seriously and, if necessary, to carry out a risk assessment with the support of specialists.
There are different types of threats: some have the character of clear and unambiguous announcements of an act of violence (direct threat).
They do not contain words such as "if", "or", "but", "until", "if not" or the like. If these words occur, the threatened act of violence is linked to special conditions.

This can be problematic, as the threatening person puts himself under pressure to act. This increases the risk that the threat will be implemented.
Employees who regularly deal with customers in person or by phone are repeatedly confronted with excessive demands.
They sometimes encounter extreme outbursts of emotion, in which anger or rage are also expressed.
This anger can be directed against the person at the counter or on the phone by insulting, yelling at or frightening them with threatening statements.
Sometimes the anger is also directed at the management or even the entire workforce of a company, sometimes making vague statements of a threatening nature,
which promise disaster, for example, "You'll see when I come next time!".

Threatening situations of this kind are more likely to be expected if employees work for companies or authorities that inevitably have to deal with many disappointed
or dissatisfied customers because of their range of services or their special tasks, e.g. complaints departments.

 

 

Why is someone threatening? The person WANTS something!

 

How does someone threaten?

 

-Verbal threat.

-Non-verbal.

-Threat per Telephone.

-Threat Written.

-Threat Direct (own concern).

-Indirect threat (third party affected).

 

Low execution risk threat:

 

• Vague and indirect wording.

• Inconclusive, implausible and not detailed.

• Unrealistic implementation.

 

Moderate risk threat:

 

• Concrete and direct formulation.

• Details of how to proceed in the case of the threatened act of violence.

• Indications of the place and time of the crime.

• Ambiguous allusions to preparatory measures (e.g. allusion to a film or the basic possibility of obtaining weapons).

• Emphatic emphasis on the seriousness of the threat.

• Allusions to serious violent events spread in the media (e.g. mass shootings).

 

High-risk threat:

 

• Direct, plausible and detailed description of the threatened act of violence.

• Indications of concrete preparatory actions (procuring and possibly also trying out weapons and the like).

• Indications of reconnaissance of potential crime scenes.

• Indications of observation (spying) of the potential.

 

 

Cyber spionage as a threat

 

In today's era of cybercrime, it is easy to forget about other threat resources, which are much closer than thought.
This familiarity, through daily encounters or returning situations, makes us canteens less cautious.
Not only within large international companies or organizations, but also smaller ones, information flows into the world without thinking.

 

Keep in mind:

 

- Outsourcing situations Temporary employees, contract employees for Maintenance, room maintenance, garden, etc.

- Cooperation with suppliers: “I know him and give him/her entry.” Even if it is is a different driver?

- Dismissal of Employee Emotional Behavior, Revenge, Personal Gained Knowledge. Independent projects: Who controls? where are results or notes? Is there a backup?

- Knowledge Transfer Information Flows, Mail or Postal Traffic, Secure PC systems and data carriers, what do I need to know / what am I allowed to know / say.

- System Vulnerabilities Access Areas, Doors, Windows, Bathrooms, Outside, Staff identification but also an open guest WiFi.

 

 

Security Policy Establish clear behavioral and Communication guidelines fixed for internal and external contact.

 

Control of People is the weak point within a system.

 

Regular meetings, project control, in personal conversations can improve the relationship to and understanding of the economic situation of a company and thus also his own position.

 

Practical advice.

Everyone knows these, but they are forgotten precisely in difficult situations:

 

- Greet and remain friendly.

- Pay attention to your body language.
- Stay interactive during contact.

- Speak clearly. You should be able to understand the other person outside your personal intimate area.

- Listen actively, show interest. In the case of irrelevant topics, let them know this and do not annoy the other person by losing time.

- Argue objectively. Remain emotionless, impersonal, clear.

- Demonstrate empathy, but not solitadarization effects. But I never understand the sentence: "I know that" or "I had that too"

- Offer alternatives. If the desired solution is not available, there may be a different perspective.

- Allow time for reflection. Don't let the emotions escalate and create time for yourself by checking in with colleagues, recording Contact details for re-registration.
- Offering an e-mail or postal address for written opinion.

 

Difficult and threatening situations with customers or in private.

 

Measures for your own safety:

 

- Within companies, observe the obligation to carry an identity card, remember identification points in private.

 

Here rather refer to physical identity then to clothing.

 

- Think of eyes, ears, nose, tall, small, physique, movements, speech, hands, hair.

 

This knowledge can be practiced in everyday life by observing people inconspicuously. Inform about conspicuous people.

If you do not feel well, you pay attention to something that is out of the ordinary, bring these experiences further through the exchange of information.

 

- Make sure that there is sufficient lighting.

- Not only enough light, but if possible, also true-to-life light is important to better recognize features.

- If you are going to an appointment or assignment where you feel unsafe, organize an escort or direct contact by phone as a backup.

 

Playing through situations.

 

Every new day is a challenge. Life never runs according to plan and the same.

 

- Try to start the day with a good physical and mental condition.

- Getting enough sleep and eating healthy food will help you cope with each day.

- What could happen to me as a person on a new day?

- Prepare external appointments conscientiously.

- Travel plan and time, car/traffic jam/fuel, public transport/connections/delays, stopover, contact persons, files & facts, possibly take materials with you.

- Meeting strangers on the road, keeping personal distance.

- Reason for contact always question internally.

 

In business, ask visitor reason, offer help, maybe wrong address.

However, never immediately provide information about employees or your internal activities. Think about Espionage.

Prepare for dangerous situations, think about your own safety.

 

Preparation for situations on the road should be made rather impulsive. However, by practicing regular situational training with work colleagues, your reaction can be quite controlled and effective.
You can also analyse and question several everyday situations for yourself in your private life.
Items are often underestimated in terms of security.

 

Telephone, iPad, bags, suitcases, scissors, letter openers, folders, writing utensils, hole punches or staplers are weapons, objects that can be thrown.
Note that these can be used in Emotional Encounters. If possible, keep them safely stored. Keep a sufficient distance, stay out of reach, keep a counter,
office desk or bag between you and the other person. This barrier also immediately shows your desire for sufficient distance.
Personal interpersonal contact does not have to be.

 

Doors and windows are entry points to private or business areas. In summer, a window or terrace door is often forgotten in the evening.
Unfortunately, criminals are not only out and about in the evening today.
Make sure that open entry options are at a visual distance and are closed even when leaving the room for a short time.
Expect difficult situations, inform colleagues, perhaps trusted neighbours.
Arrange a time span or a spontaneous contact to ensure your own safety.
In the event of an aggressive conversation, de-escalate directly and request help.
Try to keep your distance.

 

The trigger points; The aggressor....

 

- Provokes.

- Puts pressure.

- Causes confusion.

- Arouses pity.

- Intimidates.

- Threatens, frightens.

- Wraps around the finger.

- Dominates.

- Flirts.

- Is charming.

 

The recipient....

 

- Positive start into the conversation.

- Is dialogue possible/useful?

- Documentation.

- Process complaints positively.

- Verification of statements.

- Pay attention to body language.

- Ensure self-protection and maintain physical distance.

- Keep calm, active listening.

- Stay friendly.

- Allow Abreaction.

- Explain / argue objectively.

- Change contact person if possible / necessary.

- Person should calm down or have to leave the building.

- Show options Possibly call the Police.

 

Follow-up:

 

Never stay behind after a confrontation and try to process it on your own.
Try to talk to a trusted person, family member or good acquaintance to give a place.
Often you are a victim of impulsive violence or threats because you were in the wrong place at the wrong time.
Often you are also the only barrier between a person and their goal.
Always try to complete an event.
Unfortunately, physical activities are no longer an exception and the processing of such an attack is not easy and often noticeable in the long term, upto 2 years !

 

 

I hope that I can make your everyday life a little safer through my contribution.