CHAPTER 3

advertisement
Tab E Chapter 3
THREAT ASSESSMENT TEAM INVESTIGATION AND RESPONSE
By Susan Sciara
ABSTRACT
This chapter addresses threat investigation and response by
organizational Threat Assessment Teams (TATs) in
situations where onsite supervisors or personnel have
determined that more detailed assessments are necessary or
the situation meets the conditions for TAT involvement. It
helps the reader assess the level of risk involved, gather
data, and determine the most appropriate ways to intervene
to reduce the chances of violence occurring. It summarizes
the most important recent shifts in thinking about how to
assess and manage threats of violence. The reader is given
both the advantages and the disadvantages to each strategy,
which will allow for a well-formed intervention.
The chapter includes a checklist developed by TATs to
organize their data gathering and evaluation. In addition,
supplements provide three case studies that can be used by
Threat Assessment Teams as a basis for discussion and
learning (E-3 Supplement 1); and a listing of additional
resource materials (books, articles and Internet sites; E-3
Supplement 2).
WVP 10/02 STP
E-3 1
Tab E Chapter 3
A. Current Thinking Regarding Assessing the Risk of Violence
Threat assessment is an evolving practice – a blend of art and science. Different practitioners and
“experts” take a variety of approaches to conceptualizing what threat assessment should or
shouldn’t be, and to performing actual threat assessments. This section summarizes important
pieces of current thinking about the issue; some of this thinking is consistent with thinking a few
years ago, while some reflects changes in thinking gained from the maturation of the field and
quality research that has been done in recent years.
1. Profiles are not particularly helpful
The year 1986 put workplace violence on the map as far as most Americans were concerned.
That was the year that Patrick Sherrill killed 15, including himself, and injured 6 others at the
Edmond, Oklahoma Post Office. Prior to this event, the majority of Americans believed that
they were safe at work. The idea of a co-worker turning on them and killing them was a foreign
notion. In the years that followed, Americans were inundated by media stories recounting
violence at one workplace after another. We were told that workplace violence is the fasting
growing crime; that workplace violence is the number one killer of women in the workplace.
“Experts” were quick to rise to the occasion, developing profiles of the typical perpetrator of
workplace violence. He was described as a middle-aged, white male with a military background
who is a loner and chronically disgruntled. Thousand upon thousands of workers heard this
portrait in corporate trainings throughout the country. Unfortunately, while this profile may fit
some or many of the perpetrators of past violence, it is not helpful in the least in determining if
someone in your employ poses a threat to anyone in your organization.
As the research into mass homicides in the workplace got better, more information emerged that
identified the kinds of behavioral cues these individuals exhibited prior to the act. Gavin de
Becker, an expert on the prediction of violence calls them “pre-incident indicators” or PINs.1
Michael D. Kelleher took an in-depth look at 13 cases of workplace homicide by an employee
and identified the following warning signs2:
1
2

a pattern of obvious frustration accompanied by persistent blaming or unwarranted criticism
of the organization, supervisors, or co-workers;

unexplained, persistent, and abrupt changes in mood that persist over time;

evidence of depression, increased social withdrawal;

unprovoked outbursts of anger or aggression that clearly are inappropriate to the
circumstances;

a significant and persistent change in work habits;

evidence of substance or alcohol abuse;

a refusal to follow reasonable work directives;
See Tab A Chapter 2, which includes an excerpt from one of de Becker’s books on this subject.
M.D. Kelleher, Profiling the Lethal Employee, Praeger, Westport, Connecticut, 1997.
E-3 2
WVP 10/02 STP
TAT Investigation and Response

bizarre or outlandish behavior that has the effect of inducing discomfort or fear in coworkers;

argumentative or combative behavior;

physical aggression, workplace disruption, or sexual harassment;

persistent discussions that revolve around subjects of weaponry, paramilitary themes and
publicized incidents of workplace violence; and

threatening or intimidating behaviors directed at co-workers, supervisors, or the
organization.
These are all behaviors, not individual characteristics or demographics. These behaviors can be
easily detected in the workplace by observant supervisors and co-workers.
2. Violence is situational
Many articles and books discuss how employers can identify the “potentially violent“ employee
among their workforce. The problem with this thinking is that there will never be a group of
personal characteristics that one can use to determine if someone will become violent at some
future time. Violence is situational, and all of us have the capacity to become violent,
depending on the circumstances. There is a big difference between potential for violence and
intent on violence.
Violence is the product of the interaction among three factors:

an individual who sees violence as a means to an end;

a setting that permits, facilitates, or does nothing to stop the violence; and

a precipitating event, or “final straw.”
Without all three factors in place, there will be no violence. Focusing only on an individual
without looking at the setting and the stressors being brought to bear is incomplete and is unlikely
to be successful.
3. One-time assessments are not useful
An assessment of the risk of violence is not and cannot be a one-time event. Even in a crisis
where the assessment has to take place quickly, the assessment should continue once the crisis
has passed.
Since the risk is based on situational factors, those factors can change along with the risk. Each
situation must be continually monitored to determine what is changing in the individual’s life.
Are the factors that are likely to escalate the violence increasing or decreasing? What about the
factors that are likely to mitigate against violence such as steady employment, financial
resources, a marriage, and children? An employee can appear to be a low-level risk, but the risk
can quickly escalate when a spouse leaves or is suspected of having an affair, the job is
WVP 10/02 STP
E-3 3
Tab E Chapter 3
terminated, and/or heavy drinking clouds the judgment. The case studies provided at the end of
this chapter illustrate this ebb and flow.
4. Violence is a process
Most media portrayals of violence in the workplace would lead you to believe that people
suddenly snap and become violent. Nothing could be farther from the truth. Violence is a
process that starts in an individual’s head. First comes the idea that killing would solve current
problems, then begins the fantasizing about it, and eventually a plan for the event takes shape.
The thinking stage leads to active steps toward making it happen: buying the equipment,
practicing with it, and possibly following the target.
For example, consider the following sequence of events:
Joe believed that his supervisor was picking on him. He felt that no matter what he
did, it was never good enough. He began to believe that the supervisor was out to get
him. Others advised him to let it go, or to transfer to another area of the company.
But Joe wasn’t going to let “that SOB drive me off.” It wouldn’t be right, it wouldn’t
be fair. Joe was not going to let that supervisor win. Joe continued to think about all
the real and imagined slights that he had experienced from the supervisor over the
years and began to ruminate about it. He had difficulty sleeping at night and began
drinking to be able to sleep. He often ended up hung over the next morning or
overslept and was late for work. The final straw happened when the supervisor
handed him a notice that he was suspended for two weeks and told him that if he kept
it up, he would be fired. Joe thought, “I ought to kill him for that.” He later told a
buddy at work that he’d like to kill the supervisor. The buddy replied, “Wouldn’t we
all?”
The thoughts of killing the supervisor became more frequent and Joe was convinced
that he would be doing a good deed for the others in the work unit if he killed the
supervisor. He started to think about how he would do it and when the best time
would be. Sometimes at night, especially when he had been drinking, he could see
the whole scene unfold in his mind and his co-workers were cheering him and telling
him that someone should have killed the supervisor a long time ago.
Joe’s work began to exhibit more and more mistakes and he became belligerent when
it was pointed out to him. His temper outbursts increased and his co-workers
avoided him. Joe became more isolated and argued frequently with those around
him.
Joe purchased some automatic weapons at a gun show and started target practicing in
the woods near his house. He casually mentioned to a few of his co-workers that
he’d like to give the supervisor what he’s got coming. Another time, he told his
fellow worker that the supervisor wouldn’t have that smirk on his face when he gets
a look at his AK 47. The co-workers shrugged it off and thought that Joe was just
blowing off steam.
E-3 4
WVP 10/02 STP
TAT Investigation and Response
Joe obtained a copy of his supervisor’s schedule for the week and decided that
Tuesday morning, when everyone was there, would be the perfect day. The night
before, Joe practiced at home in front of the mirror, wearing his camouflage jacket.
He shaved his head and appeared as though he was preparing for war as he loaded his
pockets with rounds of ammunition, guns, and knives. He got in his car and headed
for work.
You can predict the end to this story and can clearly see that Joe did not suddenly snap. There
were numerous clues along the way that indicated that Joe was contemplating violence and was
moving closer and closer to it.
5. Action should not be predicated upon the presence of a threat
Many threat assessment professionals, including those in law enforcement, do not take action
until an individual makes a threat. Law enforcement professionals have traditionally been
trained to respond to an event, not prevent one.1 More recent research has indicated that the
majority of those who commit significant episodes of workplace violence do not directly
threaten their victim. For example, a study of 30 mass murders in the United States and Canada
over a 50-year period revealed that only 20% of the perpetrators ever threatened their victims
prior to the act.2
Another study of 246 incidents of workplace violence over a 30-year period found that only 27%
of the violent offenders had previously threatened violence in the workplace,3 Instead, they are
more likely to reveal their intentions in ways other than direct threats such as making cryptic
remarks, discussing their plans with co-workers, and so on.
6. Each situation is different
Despite some who will tell you to fire threatening employees or to advise targets of stalking to
seek a temporary restraining order, there is no cookie cutter approach that works with all cases.
One size does not fit all. Even situations involving similar circumstances will require far
different types of interventions. The best way to know the type of intervention that will work is
to thoroughly assess the case.
As Gavin de Becker stated in a presentation to the CIA, “There is no one answer. Anybody with
only one speed should get off of the racetrack, because they’re causing accidents.”
TAT members should review the case studies in E-3 Supplement 1, and the additional case
studies in Tab H.
1
2
3
See Tab C Chapter 8 for further discussion of this topic.
“Offender and Offense Characteristics of a Nonrandom Sample of Mass Murders,” A. G. Hempel. J.R. Meloy, and T. C. Richards,
Journal of the American Academy of Psychiatry and the Law , 27(2): 213-225, 1999.
Southerland, M, Collins, P. and Scarborough, K., Workplace Violence: A Continuum From Threat to Death, Anderson Publishing Co.,
1997.
WVP 5/03 STP
E-3 5
Tab E Chapter 3
B. Assessing the Risk of Violence
The types of situations with which Threat Assessment Teams (TATs)1 are most likely to get
involved are where the subject of concern is a current or former employee, and/or it is a domestic
violence or stalking situation. Domestic violence can spill into the workplace when an employee is
attempting to leave an abusive relationship.2 Stalking and unwanted pursuit can involve two coworkers, an employee and a customer, or an employee and an ex-spouse or lover. Often there has
been some sort of romantic relationship that has ended, but it can also be a situation where one
person wanted a relationship and the other was not interested.3
Whatever the situation, it is imperative that the TAT collects as much information as possible.4 It
is unlikely that the TAT will be able to collect all the data identified below, but the more data that
can be obtained, the better the chances of a successful resolution and the lower the likelihood of
being blind-sided.
The following is a general guide to the kinds of questions that are helpful to ask and the type of
data that can be useful in looking at the risks that a certain situation presents. It is by no means
exhaustive, as there may be certain cases that raise different questions.
See the end of this chapter for a checklist developed by TATs to guide their data gathering and
evaluation efforts.
1. Precipitating event
The TAT should be asking the following questions:
1
2
3
4

What has happened?

When did it happen?

Who reported the incident?

Is that person credible?

What are some possible motivations for the incident? For example, if a threat was made,
what is the most likely motivation for the threat? There is a big difference between a threat
that is made to reduce the threatener’s own anxiety and a threat made with an intention to
act (see Section D.1 below).
Tab B Chapter 4 describes the composition and duties of TATs in more detail.
For a more detailed discussion of domestic violence in the workplace, see Tab F Chapter 1.
The sparse research that is available on gay-couple domestic violence indicates that it is similar to that of heterosexual domestic
violence.
Tab C Chapter 6 and Tab E Chapter 1 address the topics of receiving and tracking reports of incidents. The Incident Report form (see
E-1 Supplement 1) and the Tracking Log (see E-1 Supplement 3) would be useful places for a TAT to begin their data gathering.
E-3 6
WVP 10/02 STP
TAT Investigation and Response
2. Identifying Information
It will be important to assemble as much information as possible about any violent situation.
Begin by finding out as much as you can about the subject.1

Assemble personal data.2 If the subject of your concern is an employee or a former
employee, you will probably have access to records that will provide you with useful
information, including the subject’s name, date of birth, social security number, home
address, and phone number. With this information, you would be able to check court
records if you decided to do that.

Assess the employment situation. Employment records will provide some information
about the work situation. If the subject is a current employee, how long has the subject
been employed? In what capacity? Who is the supervisor? More than likely, you will be
contacting the supervisor to get information. If the subject is a past employee, how long
was the subject employed? Who was the supervisor at the time? What were the
circumstances of the subject’s departure?

Identify an emergency contact. Employment records should also identify the subject’s
emergency contact, who may be able to tell you about the subject’s personal life. That
person is likely to be meaningful in the subject’s life and may even help you intervene in the
situation.

Obtain a description or photo. This can be useful if you need to tell or show security
officers, supervisors, or other personnel what this person looks like so they can be alert to
any attempts to enter the premises.
Of course, if the subject is a non-employee, none of this information may be readily available.
You will have to assemble it from scratch by questioning the person who has been threatened
and any co-workers who may have tidbits of information to contribute.
1
2
Through out this chapter I use the term “subject” to indicate the person who is the subject of concern or the subject of the TAT’s
investigation. This term has a more neutral connotation than the term “perpetrator.” If the TAT begins to think of this person as a
perpetrator, it may be more difficult for them to consider all of the available options when developing an intervention plan.
Your employer probably gathered basic information as part of pre-employment screening (see Tab C Chapter 1), and maintains current
data as part of the subject’s personnel file.
WVP 2/04 STP
E-3 7
Tab E Chapter 3
3. Background information
Review the subject’s education, military history, and employment history to gather information
about the subject’s intelligence, ability to get along with others, tenacity, types of skills,
knowledge, and abilities. Your employer may already have collected this information as part of
routine pre-employment screening efforts (see Tab C Chapter 1 of this Guide), and/or you may
wish to gather additional information that may be useful to your present assessment. This
investigation may also be subject to legal requirements intended to protect employee privacy and
ensure the quality and usefulness of information you are able to collect.1
1

Determine whether there is any history of violence or harassing behaviors. This kind of
background can give you information about the subject’s behavior under stress. Note,
however, that an absence of a history of violence doesn’t mean that the subject is less likely
to become violent.

You should also determine whether there is a history of criminal behavior, including arrests
for drunk driving. Is there any kind of pattern? For example, a number of battery arrests
where the charges were dropped could indicate domestic violence or a pattern of
intimidating witnesses.

What is the relationship history? Is this someone who has been socially inept and has had
difficulty connecting with others or is this someone who is socially skilled? If the subject is
a former employee, what does the past supervisor have to say? Does the subject make and
keep friends?
Until recently, the federal Fair Credit Reporting Act (FCRA; 15 U.S.C. §§ 1681 – 1681x; 16 C.F.R. §§ 1.71 – 1.73, parts 600 - 601)
had been applied broadly to cover investigations of present employees in the context of disciplinary matters, including defining
investigative reports prepared by third parties as “consumer reports” or “investigative consumer reports” subject to FCRA. See Federal
Trade Commission (FTC) Staff Opinion, letter to Judi Vail (April 5, 1999). FCRA requirements are discussed in Tab C Chapter 1 of
this Guide. However, effective December 4, 2003, the 2003 Amendments to FCRA (enacted as the Fair and Accurate Transactions
Act of 2003, Pub. L. No. 108-159, 117 Stat. 1952 [12/4/03]) create a new exclusion for reports prepared and provided:
“… in connection with and investigation of:
(i) suspected misconduct relating to employment; or
(ii) compliance with Federal, State, or local laws and regulations, the rules of a [stock exchange or other entity established to
make and enforce requirements affecting securities], or any preexisting written policies of the employer.”
E-3 8
WVP 2/04 STP
TAT Investigation and Response

Is there any evidence of present or past mental illness or substance abuse?

Does the subject have weapons expertise? Where was it obtained – through the military,
through private lessons, etc? Has the subject ever threatened the target with a weapon? 1
Has the subject ever threatened to kill the target?

If this is a domestic violence or stalking situation, have there been three or more of
instances of violence over the past year? Has the target ever needed medical attention
(whether received or not) as a result of injuries? Has the subject conducted surveillance on
the target? Has the target recently ended the relationship? Have there been inappropriate or
unwanted calls, visits, faxes, letters, gifts, or packages to the worksite? Has the target
recently moved to a secret location? Is there evidence of other kinds of violence? For
instance, has the subject ever killed or injured a pet? Is there a history of excessive or
repeated destruction of property? Has the subject ever assaulted non-family members?
According to Park Dietz, the noted forensic psychiatrist, any of these factors make the situation
a high-risk one2 and increase the chances of violent activity spilling into the workplace.
4. Current life situation
The TAT should work to find answers to the following questions:
1
2

How stable is the subject’s current living situation?

How stable is the employment situation?

Is there an appropriate support system? Is there anyone significant in the subject’s life that
may be able to have a positive influence?

If the subject is a former employee, what has happened since the person left your employ?
Has the subject continued to experience losses or failures? Has there been one-sided contact
with co-workers or other evidence that the subject is still focused on the former employer?

Are there financial problems?

Have there been any recent losses, physical or psychological?

Are there any pending crises or changes in circumstances?
I refer to the person who is, or appears to be, targeted for violence as the “target.” I prefer this term to “victim,” which has
connotations of helplessness and powerlessness.
Personal notes from training conducted by Dr. Park Dietz, Chicago, IL, 1998.
WVP 2/04 STP
E-3 8a
Tab E Chapter 3
This page intentionally blank
E-3 8b
WVP 2/04 STP
TAT Investigation and Response

Is there any evidence of a downward progression in social, occupational, or psychological
functioning?
5. Attack-related behaviors
Review behavior to see if you can identify patterns:

Does the subject show any unusual interest in violence – movies, games, books, magazines?

Is there any evidence of ideas or plans for violence such as a diary, notes, a recent
acquisition of a weapon?

Has the subject communicated any ideas, thoughts, or plans for violence through threats or
other verbalizations to family, friends, or co-workers?

Is there an identifiable target? Is there any evidence that the subject has followed or visited
the target? Has the subject approached or attempted to approach the target? Has the subject
been seen hanging around or performing surveillance activities?
If the situation is a domestic violence or stalking situation, it is very helpful to develop a
timeline of events. The target can be helpful in preparing this. The timeline helps you visualize
what has been happening and identify whether the situation is escalating. It could also be a
helpful tool in prosecution.1
6. The target
If a target has been identified, it is useful to know as much as possible about the situation of the
target

How vulnerable is the target?

How familiar is the subject with the target?

Does the subject know the target’s routines?

Does the target believe the subject is capable of violence?

Is the target willing to make lifestyle changes?
If this is a domestic violence or stalking situation, it is also important to determine answers to
the following questions:

1
Is the target willing to have no further contact with the subject?
For example, California law makes “stalking” a separate crime, punishable by a fine up to $1,000 and/or up to one year’s
imprisonment. Cal. Penal Code § 646.9. As amended effective January 2, 3003, this law defines stalking as action by a person who
“willfully, maliciously, and repeatedly follows, or willfully and maliciously harasses another person and who makes a credible threat
with the intent to place that person in reasonable fear for his or her safety, or the safety of his or her immediate family….” Id. At
§ 646.9(a). Harasses is further defined as “engages in a knowing and willful course of conduct directed at a specific person that
seriously alarms, annoys, torments, or terrorizes the person, and that serves no legitimate purpose.” Id. at § 646.9(e). Finally, a
course of conduct is defined to include “two or more acts occurring over a period of time….” Id. at § 646.9(f). Considering these
terms, it should be clear that careful keeping of a timeline and other records would assist a prosecution under this statute.
WVP 2/03 STP
E-3 9
Tab E Chapter 3

Is there anyone helping the target? (These individuals are often at higher risk because the
subject sees them as preventing access to the target.)

Has the target become involved with another romantic partner? If so, this will frequently
escalate the situation.
C. Additional Sources for Data
A TAT can be most effective when it utilizes its creativity and resources to develop as much
information about the situation, the subject, and any potential targets as possible. Individuals with
special expertise can be brought in as consultants on a case-by-case basis. The following illustrates
the type of information that a TAT would be looking for in most situations.
1. Records
The following sources of official records can provide the TAT with a wealth of information:

Courts (municipal, superior, federal district, small claims): Court records can be accessed to
determine civil suits and judgments, criminal convictions, property bought and sold,
marriages and divorces, and birth records.

The County Clerk’s Office: This office maintains birth, death and marriage records, as well
as records of fictitious business names.

Law Enforcement Agencies: The state Department of Corrections and the Federal Bureau
of Prisons maintain information on criminal convictions and parole information.
Municipal, county, state and federal law enforcement agencies have information on incident
reports, police contacts with the subject, outstanding warrants, and weapons registration
documents.

The Department of Motor Vehicles: This department has detailed records regarding driver’s
license status, accidents, substance abuse violations, and traffic tickets, in addition to
vehicle registration information.
Much of this information can be obtained through Internet searches, private security companies
that specialize in background checks, or through a visit to the courthouse. Many states and
counties have Internet sites where you can search for felony convictions and registered sex
offenders.1
If the subject is a current or former employee, employment records including application forms,
employee medical records, and worker’s compensation claims can yield a wealth of information.
Speaking with a current and/or former supervisor can also be an informational gold mine.
A call or visit to the local police to see if they have had any contact with the subject can be
helpful. Even though there may not have been formal charges filed, many local police
jurisdictions record “suspicious incidents” and you may find that they have visited the subject’s
house from time to time.
1
See Section B.3 above, and Tab C Chapter 1.
E-3 10
WVP 2/04 STP
TAT Investigation and Response
Sometimes a call to past employers can yield results, even though many are reluctant to discuss
problems they had with the subject for fear of legal action. Sometimes asking a question such as
“Would you re-hire this person?” will provide you with information. If the ex-employer says
that they would not consider re-hiring the subject but will not discuss it, you might be able to
infer that there were problems and those problems are likely to be similar to the ones that you
are experiencing with the subject.
Local newspapers are often archived and increasingly are available on the Internet. It can be
fruitful to enter the subject’s name in the search feature to see if there has been any mention.
2. Interviews
Interviews with the subject, the target(s), the subject’s friends, family, and co-workers are
invaluable sources of detailed information.
However, there are some important things to consider. For instance, what is the scope of your
authority? Can you compel an interview? Could the results be used for disciplinary or legal
action against the subject,1 and/or by the subject against the company?
Of the people to be interviewed, identify who is likely to be friendly, who is likely to be neutral
or disinterested, and who is likely to be adverse. Decide in advance what order to interview.
The general rule is that you start with the friendly witnesses, move to the neutral, and save the
adverse witnesses for last. Generally, you should only depart from this order when there is a
very good reason, since superior knowledge is a major advantage when interviewing the adverse
witness.
When interviewing the subject, there are two goals: gather information, and encourage change in
the subject’s behavior. The interviewer is most likely to be successful if he or she is friendly,
respectful, and professional. You will need to decide if it would be better to send an interviewer
that is known to the subject or more helpful to send someone who is not known. Obviously, if
someone has developed a rapport with the subject from previous contacts, this person would be
the ideal interviewer. On the other hand, if the interviewer knows the subject and has negative
feelings about the person, a more neutral interviewer would be desirable.
1
Employers must ensure that the subject employee’s rights are protected during the investigation. One source of such rights may be the
National Labor Relations Act (NLRA). For example, in 1975 the United States Supreme Court interpreted the NLRA to provide an
employee in a unionized workplace with the right to have a union representative present in any “examination” in connection with an
investigation that may result in disciplinary action against the employee. National Labor Relations Board (NLRB) v. Weingarten, Inc.,
420 US 251, 95 S.Ct 959, 43 L.Ed.2d 171 (1975). In 2002, the U.S. Supreme Court led stand a decision in which the NLRB extended
this so-called “Weingarten rule” to allow an employee in a non-unionized workplace to have a co-worker present during such an
examination. Epilepsy Fdn. Of NE Ohio v. NLRB, 268 F.3d 1095 (D.C.Cir. 2001), cert. denied 536 US 904, 122 S.Ct 2356, 153
L.Ed.2d 179 (2002). However, in June 2004, the NLRB changed its policy, deciding that the NLRA could reasonably be interpreted
either to permit or deny co-worker presence for non-unionized employees, and determining as a matter of policy to deny such
presence. In discussing this change in policy priorities, the NLRB noted the rise in concerns over workplace harassment and violence,
and heightened security concerns since the September 11, 2001 terrorist attacks. IBM Corp., 341 NLRB 148 (2004).
WVP 9/04 STP
E-3 11
TAT Investigation and Response
a. Risks and benefits of interviewing the subject
There are both advantages and disadvantages to interviewing the subject. The interview
provides a direct method of gathering information about the subject’s life, thought processes,
behaviors, and plans. It is also an opportunity for the subject to discuss frustrations with
whatever is happening in his or her life. An interview also communicates to the subject that
the behavior has been noticed and is unacceptable and must cease.
Once such an interview has been conducted, the subject knows that an investigation is
underway. Sometimes this knowledge can escalate the situation. The subject may fear losing
his or her job and become more desperate. An interview conducted by the police may even
embolden the subject, replacing fear of the police with the feeling that ”I met with them and
nothing bad happened.” In some cases, an interview may intensify the subject’s interest in a
target. A subject who has been angry at the organization in general now has a focus for
aggression, which could increase the risk of violence to the interviewers.
The U.S. Secret Service recommends that if there has been face-to-face contact between the
subject and the target, or the subject has communicated a threat to the target, then an
interview is a good idea. Gavin de Becker, on the other hand, recommends using direct or
detectable interventions only when non-detectable ones have failed.
b. Risks and benefits of interviewing the target(s)
Targets may be able to provide an abundance of useful information, both about the subject
and themselves. The information can be used to determine how vulnerable the target is to an
attack and how willing he or she is to make the necessary changes to become less vulnerable.
The information can also be used to supplement what you already know about the subject.
Potential targets, and those who work with or have been friends with the subject, are often
unwilling to consider that someone they know could want to kill them. They would prefer to
think that someone who is dangerous will be a stranger. Often they will tell you things like,
“Yeah, I heard Bob say that he wants to kill Joe, but I think he was just blowing off steam. I
don’t think he is serious.” Although it is important to identify whether potential targets are
apprehensive, just because they deny being frightened doesn’t mean you should discount the
subject’s potential for violence.
In stalking situations where there has been a relationship between the subject and the target,
the relationship may be continuing unbeknownst to you. The target may have ambivalent
feelings about ending the relationship for a variety of reasons and could be reporting to the
subject any information that you provide.
If the stalker believes that the interviewer is blocking access to the target, the interviewer may
become a target.
E-3 12
WVP 5/03 STP
TAT Investigation and Response
c. Risks and benefits of interviewing family, friends and co-workers
Family members, friends, and co-workers can be rich sources of information. They may also
have divided loyalties and may report back to the subject. The subject may become enraged
at being discussed with others and see this as an intrusion into personal privacy. It can easily
escalate any paranoia.
Interviewers have to be careful not to place themselves in a position to be sued for invasion
of privacy, libel, or defamation of character. The interviewers may be at risk of violence
from the subject as a result of their visible involvement in the situation.
D. Interpreting the Data and Assessing the Case
Once the TAT has gathered sufficient data, they will need to decide what those data mean and how
to interpret them. How much data to collect before moving on to this step varies by case and
becomes a decision for the TAT to make. Often data gathering is not a finite event, since
information generally comes to the TAT in a piecemeal fashion. Sometimes the TAT will learn
new information that changes the way they previously viewed the data. The following section lays
out ways to think about the meaning of the data that you have gathered.
1. Instrumental v. expressive threats
Threats, which are defined in this context as expressions of an intention to inflict something
harmful, are either instrumental or expressive. Dr. Reid Meloy provides the following
distinctions1:
An instrumental threat is primarily intended to control or influence the behavior of
the target through an aversive consequence. Expressive threats are primarily used
to regulate affect in the threatener.
After a review of the scientific literature on threats, Dr. Meloy concluded that threats are very
common – but most individuals do not act on their threats. Threats may increase, decrease, or
have no relationship to subsequent violence. In the stalking of public figures, those who pose a
threat do not generally make a threat beforehand.
Threats can serve many different purposes, so it is important to evaluate the purpose of the
threat. Was the threatener attempting to manipulate others, voicing intentions, or attempting to
regulate emotion in a highly charged situation? In other words, all threats are not equal.
1
Meloy, in Pinard and Pagani (Eds.) Clinical Assessment of Dangerousness, Cambridge Press, 2000.
WVP 5/03 STP
E-3 13
Tab E Chapter 3
2. Affective v. predatory violence
Dr. Meloy, a psychologist who is an expert in violent behavior, has developed a model that
differentiates between two different types of violence.
Affective violence is reactive and immediate and is based on the subject’s
experience of anger or fear. It is time-limited and primarily emotional. Bystanders
might see puffing up of the chest, along with fist and teeth clenching. The goal of
affective violence is to reduce any real or perceived threat. An example of this is the
typical bar fight. There is a provocation and an immediate response that is over
quickly. Affective violence is the most common form of violence.
Predatory violence is planned and purposeful where no threat exists. It tends to be
preceded by a private ritual such as practicing with weapons, cleaning the weapon,
and/or carrying certain symbols. The behavior is not time-limited and the goals are
power, control, recognition, or notoriety. About 25% of spousal abuse is predatory
and most sexual violence is predatory. Virtually all workplace homicides that are
committed by someone known to the victims are predatory.
If your subject has a history of violence, an important distinction to make is whether that
violence been affective or predatory. Obviously, you will be much more concerned if your
subject has a history of predatory violence. This does not mean that a subject with a history of
affective violence is not someone to be concerned about. Nor does it mean that absence of past
violence reduces the risk.
3. Stalking/obsessional following/unwanted pursuit
No matter what term you use to describe this behavior, it can be one of the most difficult kinds
of situations for the TAT to manage. Current research on stalking indicates that stalkers tend to
be male and their targets tend to be female. Stalkers tend to be more intelligent than other
criminals, and many are unemployed or underemployed. It has also been described as a
“courtship disorder” for some stalkers in that many years of relationship incompetence coupled
with poor social skills can increase the risk for this behavior.1 Many stalkers have personality
disorders, which are extremely difficult to treat.
So far, the studies on stalkers indicate that the three variables that predict lethality in stalking are
prior criminal convictions, substance abuse, and prior sexual intimacy. According to Reid
Meloy, who has studied both stalkers and the research on stalkers, the risk of violence is above
50% if there has been prior sexual intimacy. The weapons most commonly used, in the order of
frequency, are guns, knives, and cars.
Section E.2 of this chapter provides a longer discussion of stalking.
1
Stalking may also be an aspect of domestic violence in an established relationship. See Tab F Chapter 1.
E-3 14
WVP 11/04 STP
TAT Investigation and Response
4. False victimization syndrome
If you have an employee who is complaining of being stalked and, after gathering all available
information, the situation does not seem to make sense or there are pieces that do not appear to
be credible, you may have what has been referred to as “false victimization syndrome.”
Researchers estimate that about 2% of all stalking reports fall into this category. According to a
recent study,1 the majority of the “victims” are women who are motivated by their desire to
resurrect a failing relationship. These individuals often want to be the center of attention,
express shallow and rapidly shifting emotions, and provide information about the stalking events
that are impressionistic and lacking in detail. They may go so far as to harm themselves in order
to validate their claims and increase their credibility. These cases can be very difficult to
investigate and drain valuable resources.
5. Putting it all together
After the TAT has gathered information, it is helpful to ask and answer the following questions
about your case.

What was the precipitating event for our investigation? What evidence is there of current
stimuli that might cause the event to be repeated or to escalate?

What evidence is there to indicate that the subject is considering violence as an option?

Is the setting (work or home) permitting, facilitating, or not stopping violence?

How vulnerable is the target? Is the target willing to make lifestyle changes?

Is the subject moving toward or away from violence?

What factors in the subject’s life and/or environment might increase/decrease the likelihood
for violence?
Once the TAT has answered these questions, you should have a clearer assessment of the
risk of violence and a sense of the level of intervention that is needed.
1
Zona, Palarea and Lane in The Psychology of Stalking, Meloy (Ed), Academic Press, 1998.
WVP 5/03 STP
E-3 15
Tab E Chapter 3
E. Determining How to Intervene
Intervention involves developing a plan that moves the subject away from considering violence as a
viable option and/or making the target inaccessible. Intervention strategies vary across cases, in
some generalized ways and in actual case-specific actions. Each case will be different. What has
worked in the past with one may not work with your current case. The following is a long list of
possibilities that have been used at various times. Some cases may require that you try several
different options until you are able to effect a successful intervention. It is not necessary or even
advisable to use all of the following possibilities. The TAT may want to discuss each strategy to
determine if it would be appropriate for a specific case. Keep in mind that just because an
intervention is not listed, that does not mean that it cannot be a viable tool for your TAT to use.
1. General intervention strategies
The following is a list of possible options. Not all are appropriate for each case. Depending
upon the circumstances of the case, strategies may either help or escalate the situation. Other
strategies may have no effect whatsoever on the behavior of the subject and the outcome of the
case. The TAT, in consultation with management, must give careful consideration to the
advantages, disadvantages, and any possible unintended consequences of each alternative before
implementing any strategy.
Watch and wait
The advantage to watching and waiting is that you are monitoring the situation in an unobtrusive
way. There are times when taking any action may only intensify the subject’s interest. For
example, a former employee has been calling the company president’s secretary and leaving
voice mail messages saying that the company has ruined his life and that they will be sorry. This
may be a situation where you want to wait and continue to capture the messages and analyze
them to determine whether they are becoming more angry and increasing in frequency and
intensity before you take any direct action against the subject.
There may be other times when the situation calls for immediate action and watching and
waiting may not be in your organization’s best interests.
Conduct a security audit
Assessing the security of the worksite and any targets’ homes, along with identifying ways to
protect the targets during periods of travel and when they are at other locations, can be helpful.1
Simple measures such as providing the targets with cell phones that have 911 programmed into
the speed dial feature can go a long way in decreasing their vulnerability. Adding security
cameras or other types of electronic security devices may be necessary. Making sure that the
existing security is being utilized (for instance, doors are not propped open, employees are
wearing identification badges, etc.) is critical. Adding escorts to and from parking areas for the
1
Tab A Chapter 3 presents a general discussion of workplace evaluation for workplace violence issues. Many of the same elements
appear in a case-specific assessment.
E-3 16
WVP 10/02 STP
TAT Investigation and Response
targets can provide protection to and from the car. There may be times when you will need to
consider personal protection personnel (bodyguards.) Providing your site security personnel
and/or receptionists with a photo of the subject can help determine if the subject is attempting to
enter the facility and serve as “an early warning” mechanism. Train those personnel how to
respond if there is an attempt at entry or if there are calls requesting information about the target.
In many communities, local police will provide home security audits upon request. If they do
not, this service can be contracted out, as there are many companies that specialize in home
security.
The disadvantage to this strategy is that many organizations simply apply extra security and wait
for an attack. As has been proven many times over, an armed assailant who doesn’t mind dying
for a cause will be able to penetrate perimeter security. Also, the additional security measures
can be costly, especially if it involves security guards or personal protection specialists, and
there is no way to determine how long this type of security should be in place.
Security efforts that are detectable to the subject may deter or may signal the organization’s fear
and increase the subject’s sense of empowerment and control.
Identify ways to reduce or eliminate the stimulus
In every situation where the risk of violence is high, there is always a precipitating event or a
stimulus where the subject feels at wit’s end and sees violence as a way to solve the problem.
Sometimes identifying ways to reduce or eliminate the stimulus may calm the situation down.
The disadvantage to this is that it may not be enough if the subject is already committed to
violence as a means of achieving the desired ends. Many companies also wrestle with the notion
that it is not desirable to reward inappropriate behavior by giving the subject some or all of what
they want and/or in bending the rules in ways that reduce or avoid punishment for the behavior.
Try direct confrontation
Sometimes sitting down and listening to the employee’s complaints and explaining how much
there is to lose by continuing on a course that is moving toward violent action can be helpful.
Depending on the situation, it can be useful to point out other people’s reactions to the
employee’s behavior. This can often work in situations where a socially inept employee falls in
love with a co-worker and pursues in spite of all discouragement. Often the employee has no
idea of the possible consequences of continuing the pursuit. Merely pointing out the fact that
the co-worker is frightened by the attention and that persisting may result in termination or even
arrest may be enough to stop the behavior.
At other times, direct confrontation will only make the subject more determined and could put
the confronter at risk. It can make the subject feel more desperate and precipitate action if it
appears as though loss of the job and of personal freedom is going to happen anyway. A
paranoid and delusional subject can easily incorporate the confronter into any delusions of
persecution.
WVP 2/03 STP
E-3 17
Tab E Chapter 3
Maintain contact with friends or relatives
Contact friends or relatives to get their agreement to notify you if things worsen in the subject’s
life. The advantage to this is that trustworthy and concerned friends and family can serve as an
early warning system, alerting you to significant changes in the subject’s life.
The disadvantage is that the friends and relatives may have conflicting loyalties. The
information could be incomplete or distorted. The subject may become angry at your efforts to
contact friends and family and it could heighten any sense of paranoia. It can feel like an
encroachment of personal space and may cause the subject to act out aggressively.
Keep in touch with the treating physician/mental health provider
Ask the treating physician/ mental health provider to provide notification if things change
in the subject’s situation. The advantage to this is that you have co-opted the treatment
provider into becoming a team member and working with you to head off any negative changes
that could escalate the potential for violence. The treatment provider is also in a position to use
medication and/or hospitalization if necessary.
However, the treatment provider’s first duty is to his or her sense of the subject’s best interests.
A provider is unlikely to share information with you without the patient’s consent so this is not
an unobtrusive method of gathering information or intervening. This could heighten any
feelings of paranoia or sense of conspiracy on the part of the subject.
The other risk is that the treatment provider may not be convinced that the patient is at risk for
violent behavior. Some treatment providers too willingly believe the false notion that a patient
who hasn’t directly threatened anyone is unlikely to be dangerous. The treatment provider can
see you as obtrusive and harassing and can inadvertently reinforce the subject’s behavior.
Monitor and/or maintain communication with the subject
Communication such as letters, e-mails, and voice mail messages can often be reviewed without
the subject’s knowledge. These communications can be reviewed to determine if they are
directed to a specific person, increasing in frequency, becoming angrier, or becoming
threatening.
Sometimes, someone in the organization will have contact with the subject in the course of the
investigation and will be able to develop rapport. This is often a member of the security staff or
a Human Resources professional. That person can have continued contact with the subject and
periodically check in “just to see how things are going.” This can work if the subject views that
person as a neutral party or someone who wants to help. However, if the subject begins to see
this person as someone who is no longer on his or her side, that person can become the target of
aggression.
E-3 18
WVP 2/03 STP
TAT Investigation and Response
Monitor the situation through pretext calls
Although using pretext to obtain information is often practiced by private investigators, it is a
controversial technique in the corporate world. Depending on how elaborate the pretext is, there
is a fear that lawsuits and negative publicity for the organization could emerge if it were
discovered that information was obtained through trickery.
The advantage is that this method may be the only way you have to obtain information about the
subject’s current state of mind. One example of using pretext to obtain information from a
problematic employee who recently left your company is to call and say that the Human
Resources department is doing a survey on former employees’ opinions of the company. If you
are able to get the subject talking, you may be able to determine the level of anger, at whom the
anger is directed, and perhaps even uncover any plans to “do something about it.”
Monitor activities through surveillance
Surveillance can give you information about the subject’s daily activities. It can give you
information about how the subject handles a situation that has the potential to escalate. For
example, conducting surveillance of a subject who has been given a termination notice can
provide you with information on where the subject goes and activities undertaken.
Collecting the subject’s trash can also be a useful tool for gathering information in an
unobtrusive way. You may be able to determine that the subject is drinking, using drugs, taking
medication, or whatever. You may be lucky enough to obtain notes that the subject has made
about the situation.
An internal security person, who may or may not be a member of the TAT, generally does these
activities or they may be contracted out to an external security vendor. You have to determine
when to conduct surveillance, and for how long. Surveillance tends to be very costly and timeconsuming, and it often yields no useful results. A surveillance team, no matter how good it is,
often loses subjects who are under surveillance.
Another risk is that the subject will spot the surveillance team. If the faces are familiar -perhaps the team includes security personnel who have interviewed the subject in the past -- it
will be clear that your organization is attempting to keep watch. This could increase the
subject’s rage at the company. On the other hand, discovering surveillance by strangers can
contribute to feelings of paranoia and desperation.
Offer leave with pay
One strategy to consider carefully is placing the employee on off-duty pay status while the team
investigates. The advantage to getting the employee out of the facility while you collect data is
that you may have reduced the stressors that were fueling the inappropriate behavior. It can
provide both management and the employee with a cooling off period. Continuing the
employee’s pay reinforces the notion that the organization wants to work with the employee to
resolve the situation and it does not contribute to an adversarial atmosphere or increase the
WVP 2/03 STP
E-3 19
Tab E Chapter 3
employee’s desperation by cutting off the paycheck. It also shows that the organization takes the
behavior seriously and takes decisive action. It can also be reassuring to other employees who
may be frightened of or intimidated by the subject.
The disadvantage to removing the employee from the workplace is that you have disrupted the
routine. For some people, especially those who are mentally ill, having a routine and a place to
go every day helps them function at a higher level. Now the employee has a great deal of time
available to ruminate about problems and maybe take action. In addition, you don’t know where
the employee is or doing what. Other employees can become fearful that the subject will return
and seek retribution, especially if they are not sure that adequate security measures are being
taken.
Obtain a fitness for duty evaluation
It is often very helpful to obtain a psychiatric fitness for duty evaluation for the subject. A
mental health evaluation can provide you with information that you would not have been able to
obtain any other way. It can give you the opportunity to “get inside the employee’s head.” It
can identify treatable mental illnesses and recommend a course of treatment. The evaluation can
determine whether or not the employee is able to return to work afterwards or at some point in
the future.
The disadvantage to a mental health evaluation is that it is intrusive for the employee and can be
costly for the employer. There are few evaluators with the specific skills to provide you with
truly useful information. There is also the danger of over-reliance on the information that the
mental health provider gives you to the extent that you minimize the rest of the investigation. In
addition, the employee may believe that the organization perceives him or her as mentally ill and
Americans with Disabilities Act (ADA) issues may come into play. Depending upon the results
of the evaluation, the organization may have to offer the employee reasonable accommodation
for a handicapping condition.
Develop a Return to Work Agreement or a Last Chance Agreement
A Return to Work (RTW) Agreement is a formal written agreement that identifies the
conditions under which the employee may return to work and continue to work and is based on
accommodation for a medical condition. It may include provisions for mental health or
substance abuse treatment, taking medication, no contact with the target, etc. It also specifies
how these provisions are measured and monitored and who does the monitoring. If the
employee does not comply with the provisions of the agreement, that employee is considered
unfit to work. The employee can be removed at this point with the argument that the
accommodation did not work. The advantage is that an RTW Agreement can provide a win-win
solution. The organization gets to keep an employee in whom it has invested time and money
and the employee gets to keep the job. The Equal Employment Opportunity Commission
(EEOC) has implicitly endorsed this approach.
The disadvantage is that the monitoring systems could fail and the employee could act out
violently. This creates legal liability for the organization since it can’t say it didn’t know.
E-3 20
WVP 2/03 STP
TAT Investigation and Response
A Last Chance Agreement (LCA) is similar to an RTW Agreement except the employee has
been terminated for cause. The agreement holds the discipline (the termination) in abeyance as
long as the employee complies with the terms of the agreement. The terms can include a mental
health evaluation and any recommended treatment, along with medication, toxicology screens,
and so on. If the employee violates any part of the agreement, the original discipline is
instituted.
LCAs have their origins in accommodating alcoholic employees and often include Employee
Assistance Program (EAP) participation as a condition of employment so that the employee is
able to receive treatment for the alcoholic condition. Courts and arbitrators have consistently
held that it is important for an employee to have a date on which the LCA terminates since it is
tied to discipline. In the federal system, LCAs generally last two years.
The advantages and disadvantages of an LCA are similar to those of an RTW Agreement. The
major difference is that LCAs are time-limited, and tied to discipline, while RTW Agreements
are ongoing and are based on a medical condition
Offer treatment
There may be times where offering and paying for mental health and/or chemical dependency
treatment is prudent for the organization, even if the subject is no longer working for your
organization.1 If the subject is high risk for violence, managing the mental illness or substance
abuse will dramatically decrease that risk. If you select and pay for the treatment, it also gives
you a measure of control since you will be sending the subject to a provider whom you know
and trust. It is an additional way to obtain information and monitor whether the risk appears to
be increasing or decreasing.
The disadvantage to this is that it further strengthens the link between the organization and the
subject and can help intensify the subject’s preoccupation with the company. Offering posttermination services continues a link that might otherwise be severed. Some organizations
choose to pay for the treatment but set it up in such a way that the subject does not know that the
money comes from the organization.
Use a mediator
Hire a neutral third party to act as a liaison or mediator. Sometimes an employee or former
employee who feels unfairly treated and is contemplating violence really wants to feel heard and
understood. His or her anger at the organization may be so longstanding and intense that no one
in the organization can act as a facilitator or mediator of the situation. Companies that
specialize in acting as a go-between in situations such as this can broker a solution that is
agreeable to all parties in an effort to reduce the chances of violence occurring.
The advantage is that the third party can help develop solutions that had not been considered by
either party and may be in a position to monitor the outcome and provide continuing data on the
subject to the organization.
1
These services exceed those typically included within a routine EAP. See Tab C Chapter 5.
WVP 2/03 STP
E-3 21
Tab E Chapter 3
The disadvantage is that this type of service can be costly and may not yield results. The other
disadvantage is that the subject, knowing that the third party is in the employ of the
organization, may not perceive the third party as truly neutral. This method requires quite a bit
of skill on the part of the third party to win and keep the subject’s trust.
Request a law enforcement interview
Sometimes a visit by security, the police, or other law enforcement personnel, known as a
“knock and talk,” can discourage continued behavior. It may also provide information,
particularly if the interview is conducted in the subject’s home. It can be helpful for the TAT to
know what condition the house is in, who lives there, and if there are signs of mental illness
such as pervasive signs of neglect, or even extreme indicators such as foil on the windows or
wrapped around the television set, which could indicate paranoid delusions.
A police visit may impress upon the subject the seriousness of the behavior; it may convince the
subject to cease.
On the other hand, it may also remove the deterrence factor if the police came and nothing
negative seemed to result. If other possibilities are increasing the subject’s sense of desperation
and anxiety, the chances of acting out might be increased if the subject figures there is nothing
to lose since arrest is pending anyway.
Offer a separation package
Another option to consider is offering a separation package in return for the employee’s
resignation. This can be another way to get an employee who poses a threat out of the
organization, and do it in a non-adversarial way that will not escalate the conflict. The employee
can leave the organization with no damage to dignity and the company can be rid of a bad apple.
The separation package might include salary continuation, agreement not to contest
unemployment benefits, continuing medical benefits, paying for or contributing to the costs of
mental health/chemical dependency treatment, and/or career counseling. It can present a winwin where the employee is encouraged to get on with life and find employment that may be
more suitable and the company is not constantly looking over its shoulder. The risk of anger
continuing to fester should be reduced if the employee feels in control of successfully
negotiating advantageous terms. In time, the anger could subside to become nothing more than
a bad memory, and the employee will no longer present a safety risk.
If the company has engaged a service provider such as a career counselor or outplacement
agency to help the employee transition out of the workplace, these providers are in a position to
help the company continue to monitor the employee’s behavior. The TAT can get a sense of
whether the transition strategy is working or not.
The disadvantage is that this option can cost the company time and money. Many companies
are unwilling to reward bad behavior. The thinking is that the employee should not be paid to
go away as it sets a bad precedent and may encourage others to act out and collect benefits for
doing so. It also continues to link the organization and the subject.
E-3 22
WVP 2/03 STP
TAT Investigation and Response
Companies also struggle with the ethical and moral aspects of helping an employee who is high
risk for violence find employment at another organization. Some argue that this is only passing
a bad employee to another company where the same behaviors may be repeated.
Assist the subject in obtaining SSI benefits
If the decision has been made that the employee can no longer work at your organization and is
mentally ill, he or she may qualify for supplemental security benefits from the government.
Helping an employee obtain these may ease the financial burden of being unemployed.
The downside to this is that in order to be successful at obtaining these benefits, one generally
needs an attorney who is skilled at disability law. This can be an added expense for the
employer, and it is often a lengthy process, sometimes taking years with a series of denials and
appeals before the benefits are awarded.
Assist the subject in obtaining disability retirement benefits
If the subject of your concern is a current employee who you have determined can no longer
work for you, it is useful to explore the possibility of retirement, especially if your company
offers disability retirement. This may allow the employee to leave with some dignity and retain
some benefits.
The disadvantage to this is that it requires the employee to admit that there is something wrong,
either mentally or physically. Most employees who are in the position of being considered a
threat to the organization are so caught up in their rage at the company that they are unwilling to
acknowledge that they have had any role in creating the conflict. They are often unwilling to
cooperate with the process even if a physician has declared them disabled and unable to work.
Write to mental health providers regarding their duty to warn
If the subject is in treatment with a mental health provider, there may be times where it is helpful
to ask your company’s legal counsel to write a letter to the provider documenting the
organization’s concerns about the potential for violence and reminding the provider of his or her
duty to warn or protect victims from imminent danger. This duty was first established by a court
case in California in 19761 and has become part of the mental health code in many states.
Mental health providers are familiar with this doctrine.
The advantage is that it clearly puts the provider on notice and identifies your organization’s
concerns in writing.
The disadvantage is that the mental health provider may see it as an adversarial move. This
strategy is generally used when efforts to gain the provider’s assistance have not worked.
1
Tarasoff v Regents of the U. of Cal., 551 P2d 334 (Cal 1976).
WVP 2/03 STP
E-3 23
Tab E Chapter 3
Terminate the employee
There are times when an organization decides that it is in its best interests and that of other
employees to terminate the subject’s employment.
The advantage to this approach is that the company has taken decisive action and may reduce the
risk of continued acting out. It may limit its liability for future tort claims for violence that the
subject engages in while employed. It can also provide a powerful disincentive for other
employees and may cause them to think twice before engaging in inappropriate behavior.
The downside is that it doesn’t always take care of the problem. There have been numerous
examples of employees who were fired only to come back to their former workplace to kill those
they held responsible. Some organizations increase security measures when they fire an
employee who appears to present a threat. Unfortunately, no one can tell you how long you will
need to leave the extra security in place and often, as costs mount, the decision is made to
discontinue it without any knowledge of whether the former employee continues to present a
threat.
Initiate a corporate restraining order
This is where an organization, not an individual, goes to court to get an order to keep someone
away from a particular person.
Currently California is the only state to offer the option of allowing a company to obtain a
Temporary Restraining Order against an individual.1 However, several other states are looking
at enacting similar laws.
This can be helpful in stalking cases where the stalker is not an employee and the company
wishes to take legal action to keep the stalker away from the work site. If the company is the
petitioner, the focus is not on the target and any anger that is felt may not be as likely to be
directed against the individual target.
As with any kind of legal action, this can escalate the adversarial nature of the relationship and
fuel the hostility and anger that the subject feels. The company needs to weigh its responsibility
to the target along with its responsibility to the rest of the workforce. By putting its name on the
petition as the complainant in a restraining order, the company risks the subject’s anger turning
on its representatives.
Send a “stay away” letter
If you do not want the subject to come on your property, either permanently or while you are
conducting your investigation, it is advisable to notify the subject formally in a letter that is sent
1
Cal. Code of Civil Procedure § 527.8.
E-3 24
WVP 2/03 STP
TAT Investigation and Response
by express mail with a carrier receipt. This provides you with documentation that the subject
has received the instructions.1
By notifying the subject by mail, you avoid putting any of your employees at risk by having to
confront the subject with the request to leave and not come back. Once you have delivered
written notification, the local police can be called as soon as the subject is seen on the premises
and the subject can be arrested for trespassing.
If the subject is a current employee who has had an adversarial relationship with a supervisor, it
is best not to have that supervisor sign the letter. A higher-level manager should sign it to avoid
aggravating what may already be a tense situation.
The advantage is that you have taken steps to keep the subject off the company property and can
increase the safety of those at work. The disadvantage is that this can be construed as an
adversarial action on the part of the organization and as such, has the potential to escalate the
situation.
Obtain a court order
Sometimes it might be practical to obtain a court order for an outpatient commitment or an order
for involuntary admission to a psychiatric facility.
Some states allow outpatient mental health commitments where the court orders an individual to
engage in outpatient mental health treatment, and often medication. Indiana is one example of
this. If the subject does not comply with the court order, the court orders hospitalization. This is
often done with individuals who are chronically mentally ill, who function fairly well as long as
they are medicated, and have a history of non-compliance with medication. There are some
medications that have a sustained action and can be given monthly in the mental health clinic.
All states allow an individual who is deemed to be imminently dangerous to self or others to be
held in a psychiatric facility involuntarily. Most states allow for a 72-hour observation and
assessment period with the institution having the option of petitioning the court for additional
time.
The advantage of a court order for inpatient treatment is that it can buy some time if violence
appears imminent. There have been times when it is fairly certain that hospitalizing a subject
saved others’ lives. It can get a mentally ill person into the mental health system who would not
go any other way. In some states, psychiatric hospitalization would preclude the subject from
ever obtaining a firearms permit, which is another advantage.
What you gain in short-term benefits, you may lose in other ways since this is intrusive and
adversarial and is unlikely to produce long-term benefits. The subject is likely to consider this a
hostile act and any notion that the organization is out to get him or her has now been confirmed.
Hospitals generally do not keep someone for very long unless the person is acutely psychotic.
Otherwise, hospital personnel tend to base their assessments of violence potential on the
1
If you use certified mail with a return receipt, the subject may avoid signing the receipt and the letter will be returned to you. If this
happens you will have to determine how to proceed.
WVP 2/03 STP
E-3 25
Tab E Chapter 3
subject’s self report. In other words, they ask the subject about suicidal or homicidal feelings,
and if the subject denies any such feelings, they determine that they can no longer hold the
person against his or her will. A subject who has been locked up in a psychiatric hospital for 72
hours and then released may come out with even more intense anger at the organization.
An individual who poses a threat is not necessarily mentally ill. Additionally, there are
individuals who may have formal diagnoses of mental illness who are not amenable to treatment
because they do not want it and don’t believe that there is anything wrong with them.
If the subject does not have health insurance coverage for this hospitalization, the organization
may decide to foot the bill. You need to decide quickly how many hospital days the company
will pay for, as the cost can mount rapidly. Another other option may be hospitalization at a
community or state facility for indigents, if the subject qualifies.
The process for a mental health commitment varies from state to state but it is generally not an
easy process and takes the involvement of medical or mental health professionals. In some
jurisdictions, if police witness certain behaviors, they have the authority to take an individual to
a psychiatric facility for observation. Their willingness to do this varies depending upon the
particular law enforcement agency and the particular jurisdiction.
Arrest and probation
If the behavior warrants an arrest and the charge is likely to result in probation, it may be helpful
to enter discussions with the local prosecutor for certain conditions that may reduce the chances
of violence. For example, if the subject is a substance abuser, asking for substance abuse
treatment along with toxicology screens can be appropriate.
The disadvantage is that the subject may see this as more evidence of the organization’s
determination to “get me.” Some corporate attorneys argue that this could create a fiduciary
responsibility by the organization. Note, too, that the prosecutor may not welcome advice from
the TAT.
Felony arrest and incarceration
Some individuals will continue to pose a threat as long as they are not incarcerated. The
advantage of incarceration is that the organization can breathe a sigh of relief and employees can
feel safe knowing that the subject is behind bars.
The disadvantage is that for most subjects who pose a substantial threat, unless the prison time
is lengthy, it may have little deterrence on their behavior. If the subject is arrested and allowed
to bond out, this may increase the chances for violence since it may result in feelings of “there’s
little to lose.”
E-3 26
WVP 2/03 STP
TAT Investigation and Response
2. Stalking
Stalking is the most common reason for a TAT to get involved in dealing with violence by a
non-employee, but it can also happen between employees, or between employees and clients.1
The strategies outlined below offer some options for dealing with such a situation.
Note: In situations where the stalker is an employee you will likely want to use a combination of
the strategies outlined below, along with strategies in the previous sections.
a. Strategies for the target
Take personal responsibility for safety
This is often one of the most difficult hurdles. A target wants to believe that the police can
offer adequate protection, that mental health professionals can accurately predict violence,
and that the criminal justice system will operate efficiently. It is common to feel victimized
and believe that it is not fair that the situation demands significant changes in lifestyle. After
all, why should the victim have to move, get a different car, or change job location?
The truth of the matter is that it isn’t fair; not at all. But at this point, the critical piece is not
about fairness; it is about safety and the only way that the target is going to be safe is to take
responsibility for personal safety.
Since this involves a major shift in thinking and feelings, it is helpful for the target to work
with an Employee Assistance Program (EAP) or other counselor who is skilled and
experienced in stalking situations.2
The target can be referred to the security department or a personal protection specialist to
learn ways in which to increase personal safety and reduce vulnerability.
Cease all contact with the stalker
Often, the target has inadvertently encouraged the stalking. It is all too easy to be convinced
that a pursuer will go away if persuaded. One more conversation will do it.
In reality, according to Gavin de Becker, one of the United State’s foremost experts on
security, any further communication will be perceived as negotiation.3 Negotiations are
about possibilities. If the relationship is over, then there is nothing to talk about. In a
stalking situation, almost any contact from the target is seen as progress. If the stalker calls
30 times, then the target finally calls back with a request to stop calling, the stalker has just
learned that the price of a callback is 30 phone calls. If the target tells the pursuer eight times
that there will be no further contact, the target has just entered into seven negotiations.
1
2
3
See Tab F Chapter 1 for a discussion of domestic violence, which is involved in many stalking cases.
EAPs are discussed in Tab C Chapter 5.
See Tab A Chapter 2.
WVP 5/04 STP
E-3 27
Tab E Chapter 3
In addition, targets who continually restate the rejection are only facilitating the pursuer’s
continued emotional investment. They are perpetuating the fantasy that the stalker has in
which the two of them are linked together.
Many stalkers easily misinterpret information. The target may believe that if the stalker
witnesses a new relationship, the stalker will know the old relationship is over: The stalker’s
interpretation is that as soon as that new partner is out of the way, the target will be available
again. A determined stalker could make plans to get the new partner out of the way so that
the target is again available.
In order to stop contact, the target must do exactly that: stop contact. There is no clearer way
to communicate that no further contact is wanted than to stop communicating.
Reduce access possibilities
The target must do whatever it takes to make access difficult for the pursuer. Referring
female targets to seek services at a domestic violence shelter cannot be emphasized strongly
enough, since these facilities offer the expertise and supportive services that are essential in
such situations.1 They will also provide advocacy, which is sometimes difficult for the TAT
to provide since it has to be concerned with the safety of the organization as well as the
target. Sometimes the needs of the target and the needs of the organization do not intersect.
Some other examples of ways to reduce accessibility include: moving, using a private
mailbox service as the address of residence, and changing all records (work, bank, property,
driver’s license, voting registration, and so on) to reflect the new address. Someone other
than the target should answer the phone, and respond to inquiries about the target’s schedule
without giving out any information. The target can use a fictitious name for home deliveries
to screen for presents that the subject may send.
Other strategies include getting a dog, varying routines and routes so that movements are
unpredictable, not walking to the car alone, and carrying a cell phone to call for help.
There are dozens of other possible strategies, but the basic idea is that the harder the pursuer
has to work to find the target, the less likely it is that the behavior will persist and the more
likely the target will be alerted if it does. Some stalkers who find the victim to be very
difficult to access give up and end up stalking another target.
In extreme cases, there are domestic violence advocates who specialize in legally relocating a
target. It is now legal to change one’s social security number in situations where domestic
violence has occurred. Some advocates will help the target create a fictitious death, complete
with obituary and funeral, so that the stalker believes that the target is dead and will no longer
pursue. Obviously, this is a drastic measure that is used in only the most extreme cases since
it involves giving up contact with family and friends and relocating.
1
F-1 Supplement 3 provides contact information for domestic violence resource and referral agencies throughout the United States and
Canada. Employers should make it a point to identify such organizations near their workplace(s) and inform workers of those
resources.
E-3 28
WVP 5/04 STP
TAT Investigation and Response
Consider a restraining order
Research shows that the effectiveness of restraining orders (also called orders of protection or
protective orders in some states) has been mixed. Some studies indicate that they have been
helpful under certain circumstances, while other studies indicate that they have not. Most of
the studies on restraining orders have been non-random studies of short duration in domestic
violence situations. Overall, the research indicates that when taken as a whole, restraining
orders tend to work. When limited to stalking cases, the research shows that protective
orders tend not to be effective.
As with any intervention, restraining orders have the potential to escalate the situation. Think
about it for a minute. You have a person who is so sensitive to rejection that relinquishing
the relationship is too difficult, and now that rejection has just been made public. The
restraining order may be served at work in front of co-workers or at home in front of friends
or neighbors. This sort of psychological loss-of-face can intensify the situation and increase
the risk of violence.
Some things to consider when trying to determine whether or not to pursue a restraining order
are:
 Have there been restraining orders in the past? If so, how effective were they?
 Has there been a history of physical violence toward the target?
 How preoccupied or obsessed is the subject?
 How good is the enforcement in the jurisdiction where it will be served?
If the restraining order did not work in the past, it is unlikely to work in the future. Relying
on a restraining order when the subject is obsessed with the target and has already used
violence will rarely prove effective. As the judge noted in a famous stalking case that ended
with death, “Paper does not stop bullets.”
If the police are not particularly good about enforcement of restraining orders or if it involves
multiple jurisdictions, this will diminish the effectiveness of the order.
One of the major advantages of restraining orders is that even if they don’t work they can be
used to facilitate arrest and other interventions.
WVP 5/04 STP
E-3 29
Tab E Chapter 3
b. Strategies for the Organization
Relocate the target
The target can be relocated, permanently or temporarily, to another part of the organization.
In order for this strategy to work so that it protects the target without endangering the new coworkers, as few as possible within the organization can be allowed to know where the target
has gone. The stalker must be able to find out only that the target is no longer in the old
location.
Communicate with other employees
If there is the possibility that there may be an approach at the worksite, it is important to
identify employees, such as security personnel and receptionists, who would most likely
come in contact with the pursuer, and to train them how to respond to and who to notify of an
approach.
As other employees become aware of the situation, their feelings of apprehension will
naturally increase as they worry about their own personal safety. One strategy is to hold
periodic meetings with the affected employees to assure them that the organization takes the
situation seriously and is concerned about their safety as well. Management, along with
security and EAP personnel, can conduct this meeting. Management can reiterate their
commitment to a safe workplace; Security can talk about general ways to increase their
personal safety and the results of any safety audit that was done at the worksite. EAP
personnel can talk about anxiety and give some tips on ways to manage it. A general
question-and-answer session can usually be kept sufficiently vague so as to not violate
anyone’s privacy or expose strategies, yet still provide reassurance to the other employees.
Any employees who are having prolonged difficulties can be referred to the EAP for an
individual assessment.
Restraining orders
The same concerns about restraining orders apply for organizations as for individuals (see
above): there are pros and cons that need to be weighed carefully.
If a restraining order is issued, the time immediately following the issuance is highly
emotionally charged. You may want to consider surveillance and ensure the target is
completely unavailable to the subject.
E-3 30
WVP 5/04 STP
TAT Investigation and Response
Separate the target
There may be situations when, despite your best efforts, the situation just remains too
dangerous to risk putting the other employees in harm’s way. Efforts to make the target less
accessible may not have worked, or the target may have refused to take responsibility for
personal safety by being unwilling to make necessary lifestyle changes. Whatever the
reasons, the organization has an obligation to provide a safe workplace for its employees. If
one employee is keeping the organization from that goal, it may be time to separate that
employee from the organization.1
The times to consider separation are when:
 violence is probable,
 felony arrest and incarceration is unlikely to happen,
 civil commitment is unlikely to be helpful,
 a restraining order is unlikely to be obeyed,
 the worksite cannot be completely secured,
 others at work would be in danger if an attack occurs,
 the steps the target is taking outside of work increase the risk at work, and/or
 the target refuses to make the necessary lifestyle changes.
F. Closing the Case
Although some threat management experts will say that a case is never closed, the reality is that
organizations have finite resources and it makes sense to allocate those resources in the most
efficient manner. The following are questions to for the TAT to ask and answer when considering
closing a case:
1.
What has changed in the subject’s life that appears to lessen the likelihood of violence?
How do these changes affect the individual, situation, and/or setting?
2.
What components of the case management plan seemed to have had an impact? In what
way?
3.
What circumstances might occur that would once again put the subject at greater risk for
contemplating, planning, or attempting violence toward the original target or another target?
4.
Are there ways to detect that the subject is once again moving toward violence?
5.
Are there supports in place (or that can be developed) that will be known and available to
the subject when the subject is at risk of moving toward violent behavior?
Once a case is closed, the organization should retain relevant files to access if the problem recurs.
There are likely to be privacy and other issues involved in doing so.2
1
2
Please see Tab C Chapter 4 for additional information on terminations. You will need to consider carefully the potential liabilities for
such a termination, and the inducements necessary to avoid such liabilities.
See Tab B Chapter 4.
WVP 5/04 STP
E-3 31
Tab E Chapter 3
IMPLEMENTATION CHECKLIST
1.
Determine the details of the precipitating event.
Yes
Have we determined:





2.

No

What happened?
When it happened?
Who reported the incident?
Is that person credible?
Possible motivations for the incident?
Assemble detailed information about the subject.
Have we assembled identifying information?







Have we assembled background information?















How stable is the person’s current living situation?
How stable is the employment situation?
Is there an appropriate support situation?
Is there anyone who could be a positive influence?
Has the subject experienced recent losses/failures?
What is the financial situation?
 Any pending crises?
 Any evidence of downward progression?
 If the subject is a former employee, do we know:
E-3 32

Education
Military history
Employment history
History of violence or harassing behavior
Criminal history
Substance abuse history
Psychiatric history
Weapons expertise
Relationship history
Have we assembled information about the subject’s current life
situation?






Name of the subject
Address and phone number
Date of birth and Social Security Number
Place of employment, name and phone number of the supervisor
Emergency contact and phone number
Physical description or photo
Make, model, and license plate of vehicle
WVP 10/02 STP
TAT Investigation and Response
what has happened since the subject left our employ?
whether the subject has continued one-sided communication?
WVP 5/04 STP
E-3 33
Tab E Chapter 3
Yes
Have we assembled information about attack-related behaviors?





 Have we determined the accessibility of the target?
 Have we determined how familiar the subject is with the target’s
routines?
 Does the target believe the subject capable of violence?
 Is the target willing to make lifestyle changes?



If this is a case of domestic battery or stalking, assemble additional information.
Have there been three or more instances of violence in past year?
Has the target ever needed medical attention because of violence by the
subject?
Has the subject conducted surveillance on the target?
Has the relationship between subject and target recently ended?
Have there been calls, visits, letters, or packages to the worksite?
Is the target living in a secret location?
Has the subject ever killed or injured a pet?
Has the subject ever assaulted non-family members?
4.

Is there an unusual interest in violence?
Any evidence of ideas or plans for violence?
Any communication of ideas of violence to others?
Is there an identifiable target?
Has there been any contact or attempts to contact target by subject?
Have we determined the vulnerability of the target?
3.
No








































Determine a course of action.
Should we:
conduct a security audit?
identify ways to reduce or eliminate the stimulus?
try direct confrontation?
maintain contact with friends or relatives?
keep in touch with the treating physician/mental health provider?
monitor the situation by:
 maintaining communication with the subject?
 using pretext calls?
 using surveillance?
offer leave with pay?
obtain a fitness for duty evaluation?
develop a Return to Work Agreement?
develop a Last Chance Agreement?
offer treatment?
use a mediator?
E-3 34
WVP 5/04 STP
TAT Investigation and Response
request a law enforcement interview?
WVP 5/04 STP


E-3 35
Tab E Chapter 3
offer a separation package?
offer to assist the subject in:
 obtaining SSI benefits?
 obtaining disability retirement benefits?
write to mental health providers regarding their duty to warn?
terminate the employee?
initiate a corporate restraining order?
send a “stay away” letter?
obtain a court order?
request that the subject be arrested?
5.
Yes
No




























Determine the long-term impact on the company.
Have we checked to see how much security and/or treatment the
company is prepared to pay for?
Does the employee have coverage for the course of treatment
suggested?
Does the company have a fiduciary responsibility?
Do we need to provide intervention for the target or for other
employees?
Do we need to change our physical security arrangements?
If the subject has been incarcerated, do we need to make contingency
plans to cover the time of his or her release from custody?
E-3 36
WVP 5/04 STP
Download