<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel xmlns:atom="http://www.w3.org/2005/Atom"><title>ACT Foundation</title><link>http://www.act-f.org/blog/rss/feeds</link><description>Our company has dedicated more than 30 years to the field of threat assessment and threat management and used the experience to create a simplified software.</description><atom:link href="http://www.act-f.org/blog/rss/feeds" rel="self" type="application/rss+xml" /><lastBuildDate>Sun, 03 May 2026 05:07:37 -0700</lastBuildDate><item><guid isPermaLink="true">http://www.act-f.org/blog/post/6-reasons-why-your-organization-needs-a-threat-management-solution</guid><link>http://www.act-f.org/blog/post/6-reasons-why-your-organization-needs-a-threat-management-solution</link><title>6 Reasons Why Your Organization Needs a Threat Management Solution</title><description>There is enough info on cyber threats, it is not too often you get an article on physical threat management. What are threats of physical violence? What does the management cycle look like? Why do you do it? These are all topics that we will discuss in today's article. 
First and foremost, we look at concerns in our physical realm, directly impacting your day-to-day safety and well-being. Understanding the importance of safety as well as the organization you are providing safety/security services for, will guide you in a well-balanced threat management program.
Safety and Security 
Most importantly &amp;ndash; no employees, no company. No students, no school. Your employees and your students are your assets, all your assets need to be protected. During the planning stage of this article, I found it very confusing that there is a significant amount of time and space spent on advising people on how to keep their computers safe from threats within their organization but not their people. The safety of the people entrusted in your care is paramount! 
We care &amp;ndash; show you care. Having a program in place assures your employees that you care enough to create a program to keep them safe. I cannot count how many times a threat has been reported, after investigation and interviews, we have safety and security discussions with those that are concerned. After these discussions, each employee we have spoken to feels a genuine connection and appreciation for taking time to educate them not only on how to keep themselves safe, but also how we do it as well. 
Security incidents are usually unpredictable, evolve quickly, and all too often turn tragic. The Department of Homeland Security (DHS), along with many other groups, has redoubled its efforts and is poised to continue enhancing school safety and security. Visit their School Safety and Security page for DHS documents, resources, and tools related to school safety and security. 
 
Culture and Comfort
The mental well-being of your those who in your care is extremely important. Human beings can be fragile and understanding those around you and their breaking points will be helpful when trying to mitigate threats. No matter the size of your organization, you will need a resource that has a soft touch and can mitigate mild concerns in mental health or one&amp;rsquo;s mental well-being.
 
People in your organization need the ability to perform tasks knowing that someone is focused on keeping them safe. I have had countless occasions where employees were thrilled to know that someone is thinking of how to keep them safe, while performing their duties. You will get to this point with casual conversations and conducting safety/security trainings.
 
Education and Intelligence
With a system in place you will be able to see trends, track concerns and utilize available tools to mitigate future concerns before they happen. Understanding what location(s) have the most concerns, business groups, and types of threats made will give you an understanding if more training is needed such as de-escalation or security awareness. In some cases, it gives clear identification of concerns that allow changes in policies and procedures. 
The information you obtain will assist your leaders become better at leading, think of the benefits of business analyst and the information they provide. This will teach leaders how to keep employees safe based on job function, roles, and responsibilities. This will also assist in identifying those with irresponsible behaviors that could put other employees in harm&amp;rsquo;s way.
Streamlined Process and Consistent Response 
Unless you have a dedicated threat manager, you will need a guide to walkthrough process and ensure you do not skip a step. Even if you are a dedicated threat manager, never hurts to duplicate and aid investigations with technology. Having a process is needed for everything from preparing a spaceship for launch to the International Space Station to cleaning your barracks for military inspection, with everything in-between. Having a process to evaluate threats is critical to the safety and security of your organization. 
Central command and management of all stored documents regarding threats for use or validation later will be a life saver, especially when the same instigators continue to target your organization. Keeping a paper trail is not only good for law enforcement support / protection orders, but also determining the threat level and if the instigator is any closer on the pathway to targeted violence. 
Compliance and Legal
OSHA The federal Occupational Safety and Health Act, also called OSHA, requires employers to provide a safe working environment for employees. Many states also have their own workplace safety law. To comply with OSHA, employers must learn their obligations -- and find out whether they must follow federal or state law. You should always lean to the side of most compliant when analyzing safety and security measures. 
There is a reason we put this towards the bottom, the unfortunate truth is that it matters. You do not want to get sued. God forbid something does happen at your organization, targeted attack or something similar&amp;hellip; having a plan in place showing that steps were taken to identify and mitigate any threats, to include known policies within the organization, then the likelihood of additional financial burdens can be reduced. 
Save money 
Return on Investment (ROI) is a factor in every determination made. Creating a threat management program is a fraction of the price of paying out the alternative. In most cases you can pay for an expert to assist in setting up your program and remain on-call for threats that escalate. Utilizing this with a combination of technology such as our Threat Management software at www.incursus.co or as a standalone product for practitioners will simplify your process, reduce your risk exposure and provide a safer environment for your organization.</description><pubDate>Mon, 12 Sep 2022 14:48:00 -0700</pubDate></item><item><guid isPermaLink="true">http://www.act-f.org/blog/post/targeted-violence-is-not-random-active-assailants-just-dont-snap</guid><link>http://www.act-f.org/blog/post/targeted-violence-is-not-random-active-assailants-just-dont-snap</link><title>Targeted Violence is Not Random: Active assailants just don’t snap!</title><description>By Ken Carr, Ph.D., M.A.O.B. 
 
Time and time again, after almost every incident of targeted violence media reports describe the assailant as someone who &amp;ldquo;just snaped&amp;rdquo; and went off without warning. This is just not the case!
 
Research has shown that acts of targeted violence, like mass shootings, spree killings and homicides as the result of intimate partner violence in the workplace are the result of clearly identifiable behaviors, patterns of thinking (ideation) and actions that can vacillated within hours and escalate over days, weeks and months, or fester for years (Meloy R., &amp; Hoffman, J. 2014). 
 
In August of 2020, the U.S. Secret Service released its third study on Mass Attacks in Public Spaces -2019. This report examined 34 targeted acts of violence that occurred in 2019. The research continues to track common themes in behaviors and situational factors of the assailants that include access to firearms, prior criminal history, mental health symptoms, and threatening or concerning behavior. This year, the 2019 report included a focused on stressors in various areas of the assailant&amp;rsquo;s life, which has been lacking in the research. Of specific interest were disruptions in employment and/or significant stressors like family/romantic relationship, social interaction, work or school issues, contact with the legal system that did not result in arrest and other personal issues like evictions. Financial instability within five years of the attack accounted for more than half the assailants (n=20, 54%) and included an inability to sustain employment, loss of income, and being evicted. In fact, seven of the assailants experienced, or were about to experience termination prior to the attack and four had experienced a loss of employment within the last years. At the time of the attack fifteen of the assailants (41%) had an unstable home life. And, another 27%, more than a quarter, had experienced a triggering event (stressor) prior to the attack, which included a rent increase, being evicted, being removed from a business, and being terminated from employment (National Threat Assessment Center, 2020).
 
To date, there is no evidence in the research to indicate that assailants just &amp;ldquo;snap.&amp;rdquo; Violence is a goal directed behavior, at its basic core, is progressive in the development of a goal, the intent and behavior (Borum, R., Fien, R., Vosseskull, B., &amp; Berglund, J., 1999; Meloy R., &amp; Hoffman, J. 2014). What is important to note here is that the goal is based on a grievance that does not have to make since to the target or threat practitioner, the importance of the grievance lies in what value the grievance has for the assailant or Person of Concern in relation to its alleged physical or emotional harm.
 
Attacks are often preceded by warning signs such as attempting to obtain a firearm, having a &amp;ldquo;hit list&amp;rdquo; and emulation of other assailants (Dietz, 1989). Evidence supported research has advanced the concept of ideation to action into the conceptualization of a &amp;ldquo;pathway&amp;rdquo; to violence that involved six markers: grievance, ideation, research and planning, preparation, breach and attack (Calhoun &amp; Watson, 2003). The pathway begins with a perceived grievance which is the cause of the distress or reason for the complaint. The grievance is highly personal, self-reinforcing, fuels the feeling of being wronged and translates into behaviors related to a sense of mission, destiny, loss or desire for revenge. Ideation is basically the act of forming or entertaining ideas (often in fantasy) specific to the utility and acceptability of violence as a means to resolve the grievance. The next step in the pathway leads from ideation to deliberate action the involves Research and Planning. Research and Planning involve the seeking of information to execute an attack and can involve surveillance, internet research, testing security, and researching methods of attack. Research and Planning then leads into Preparation where the Person of Concern takes more deliberate action in acquiring skills, weapons, assembling equipment and resources, arranging transportation, may observe significant dates, obtain a disguise, may rehearse, conduct final act behaviors or engage in novel aggression. The Person of Concern may then progress into the Breach and Attack phase. While these two stages are separate they can overlap. Breach behavior may involve an attempt to circumvent security measures and maybe an extension of the rehearsal but can advance into the start of the Attack, which is the attempt to carry out the intended act of violence against the target (Calhoun &amp; Watson, 2003).
 
Behavioral threat assessment and management is a two-part process that involves investigative and operational techniques that can be used by a threat practitioner who endeavors to identify, assess and manage a person of concern for risk of targeted violence (Fein, Vossekuil, &amp; Holden, 1995). One of the keys in the assessment phase, is the ability to accurately obtain and effectively evaluate warning behaviors that precede final act behaviors. On the management side it is less about prediction, in the since of a violence risk assessment, and more about mitigating potential risk factors so they do not progress down the pathway of violence (As cited in Meloy R., &amp; Hoffman, J. 2014). This necessitates the need to have appropriate resources in place to monitor the Person of Concern&amp;rsquo;s activity, which may include direct surveillance, monitoring their social media accounts and developing relationships with their friends and family to adequately obtain accurate real time indications of changes in behavior that could be of concern and require intervention. Intervention strategies range for simply resetting boundaries with behavioral contract or cease and desist letters, to encouraging the target to improving their physical security as well as their situational awareness and incapacitation of the Person of Concern by civil or criminal incarceration if warranted.
 
Behavioral threat assessment and management is a multifaceted approach to risk management that crosses many disciplines, including: the criminal justice system (law enforcement, probation, the courts and custody), mental health professionals, workplace management, security professionals, risk management, school personnel, faith based organizations, and many others all play a part in a multidisciplinary team approach, which is the foundation of behavioral threat assessment.
 
References: 
Borum, R., Fein, R., Vossekuil, B., &amp; Berglund, J. (1999). Threat Assessment: Defining an Approach for Evaluating Risk of Targeted Violence. Behavioral Science &amp; the Law. 17, 323-337.
Calhoun, F., &amp; Weston, S. (2003). Contemporary threat management. San Diego, CA: Special Training Services.
Dietz, P., &amp; Martell, D. (1989). Mentally disordered offenders in pursuit of celebrities and politicians. National Institute of Justice. Washington DC. Grant# 83-NI-AX-0005.
Fein, R., Vossekuil, B., &amp; Holden, G. (1995). Threat assessment: An approach to prevent targeted violence. National Institute of Justice. Washington DC.
Meloy, R. &amp; Hoffman, J. (2014). International Handbook of Threat Assessment. Oxford University Press. New York, NY.
National Threat Assessment Center. (2020). Mass attacks in public spaces - 2019. U.S. Secret Service, Department of Homeland Security. Washington, D.C.
 
Disclaimer: 
Any information provided on this site, or any other site managed by Dr Ken PhD MAOB, Inc. (Dr Kenneth Carr), is not intended to be considered legal, personal, professional, mental/behavioral health or medical advice or a substitute for professional intervention and consultation, diagnosis or treatment. Always seek the advice of a trained and qualified professional with the appropriate education, training and experience with any question(s) you may have regarding your situation. Never disregard professional advice or delay seeking it because of something you have read on this site or any other site held by Dr Ken PhD MAOB, Inc. (Dr. Kenneth Carr).
 </description><pubDate>Mon, 12 Sep 2022 14:38:00 -0700</pubDate></item><item><guid isPermaLink="true">http://www.act-f.org/blog/post/domestic-violence-in-the-age-of-covid19</guid><link>http://www.act-f.org/blog/post/domestic-violence-in-the-age-of-covid19</link><title>Domestic Violence in the age of COVID-19</title><description>Since March 2020 in many parts of the world, governments have ordered people to shelter in place (SIP) because of COVID-19. The global impact on the economy and employment is unprecedented. Businesses both large and small have been shuttered, sending employees back to live and work at home or close completely. 
For most still employed this is good, people enjoy working in the safety and comfort of their own home. For those in troubling relationships, this could mean a death sentence. Emphasis is on the worst-case scenario, as the United States has seen a staggering increase of violent crime and domestic violence in the first six months of SIP.
The impacts on educational institutions are no different, children and teachers are also forced to stay in homes that may have less than desirable conditions. For some kids, going to school was an escape away from an abusive family member or a way to get the resources and nutrition necessary to study for school.
As a leader of an organization or department; whether you are a security leader, human resources professional, school administrator, business unit leader, or co-founder of a start-up you will need to understand the impact these policies have on your vulnerable population. We have outlined a simple process to identify a threat report a threat and respond to a threat. 
Identifying a Threat
The first step to mitigating a potential domestic violence incident, is to identify signs of concern before an act of violence occurs. Often, domestic violence will go unreported unless there is a third party who intervenes, or the threat escalates to severe form of physical assault and law enforcement is called. With everyone sheltered in place, the normal report chain of teachers and supervisors may be difficult and go unnoticed.
 
Behavior
Focus is on noticeable changes in behavior. For employers, you should have a good understanding of your employees&amp;rsquo; work ethic and ability. Any noticeable performance or attendance issues should raise great concern. For teachers, this may be the first year you have these students, which puts you at a disadvantage when trying to connect and understand their deficiencies. 
Absenteeism, virtual bullying, talk of suicide, vulgar language or any aggressive behavior should be documented and reported if severity deems necessary. Use your best judgment on escalating a concern over behavior, as threat managers would prefer to review any threat and rule out as negligible over not knowing a potential threat occurred. 
 
Personal care
Many people attend Zoom (Teams, Skype, etc.) meetings in attire they would not normally wear to work or school, we all understand this. The importance of this trigger is noticing the changes that would lead someone in a direction not taking as good of care of themselves, perhaps as they once have. 
Cameras on policy! Some employers and schools require cameras on to be on in meetings so that leaders can verify a few things; you are physically present, awake, engaged and well taken care of. If your policies restrict this from happening, try to set time aside with each person who is unwilling to turn on the camera, you will learn more to understand why. 
Attitude
Even though you are at a distance from the others on Zoom, you should hopefully have substantive communication that would allow a fair assessment on their attitude and demeanor. There are many types of personality and attitudes that would elevate concern, please be cognizant of such, document as needed or report when necessary. 
Extremely negative conversations happen from time to time, depending on the scenario or that day&amp;rsquo;s current events. During COVID, it is quite common for those to air their grievances about how bad things are being handled, and how this personally impacts them.
A few triggers that should raise concerns are any discussion of suicide, mass shootings, taking out vengeance, to right a wrong against politicians or police, or anything that may seem uncharacteristic of the person making the statement.
Reporting a Threat
Reporting a concern of threat of abuse can be exceedingly difficult, depending on your current living situation. Understanding the options out there is your first step to seeking help, mitigating the threat, and moving on with your life. This section is important not only for those being abused, but also for those witnessing the abuse.
 
Law Enforcement
Law Enforcement across the country report calls for domestic violence are up dramatically. If a situation is about to get violent or has already become violent, law enforcement will need to be involved. Once law enforcement becomes involved in an incident, the individual being threatened now has the availability of court resources to help mitigate further concern. 
Only the person being threatened can make the determination if a protection order is needed and to go through with filling and appearing in court. It is not easy, both emotionally and mentally draining for someone in this position. If this advice is given, please understand all the pros and cons involved. 
 
Tools
The United States is filled with expert threat managers and psychologist who can help in these situations. There are also many tools out there (such as ours at www.incursus.co) that can help in making an assessment and understanding next steps and potential future concerns. 
Getting expert advice and utilizing threat assessment tools will be the best first step for those that may not warrant a call to law enforcement, looking for a long-term solution for a threat that has already been escalated and those unsure about what they should be doing to keep themselves safe. 
 
Non-profits
Non-profits can be a great resource for someone who is both scared and embarrassed by their current position. No one likes appearing helpless or in need of help to people close to them. Non-profits provide an outlet, education, and resources for those impacted by threats of violence. 
Non-profits across the US are reporting a decrease in number of calls. With Law Enforcement reports up, this means more people are waiting until it is unbearable, or serious injury occurs before asking for help. They are waiting until it is too late, and consequences are more severe. Victims can call the domestic violence hotline at 1-800-799-7233 if they feel safe to do so. https://www.thehotline.org/
 
Friends and Family Support
Not being present daily with co-workers can mean that an abused person may go months without someone noticing. The typical reporting process would take place when someone is forced to go to school or work and another person notice bruises or the changes in behavior. 
Having a strong support system such as family and friends is key to moving away from a threatening situation, especially if it is one&amp;rsquo;s home. The knowledge that you can have a safe place and people that care will mean the difference in someone getting help, or not. Understanding this dynamic will be extremely helpful in mitigating these threats. 
Responding to the Threat
This is the most sensitive part of the process and the reason you get the others involved from reporting the threat. It is imperative that the previous steps occur, prior to responding. Unless trained to do so, please seek advice from law enforcement, threat managers, psychologist, knowledgeable friends or family member, or a non-profit in your area on how to keep yourself safe with a long-term solution. 
 
Security/law enforcement
For most people, we do not have the financial means to pay for security to constantly be present at our home and work. Unfortunately, law enforcement can not stand post near your work or home unless there is an active threat either. Understanding what long-term solutions are available will be especially important.
With advancements in technology, most people have the availability to purchase a good camera and alarm systems at a very reasonable price. The ability to monitor your home or vehicles surrounding will help a threatened person identify if there is someone snooping around, stalking, or potentially targeting them. 
 
Recovery
There are a few things that can help the transition back to a normal, non-abusive life. The subject needs to redirect to someone else, go to jail, or be deceased before the threat becomes negligible. 
Unfortunately for most, this will be something that will haunt them for the rest of their life. We have a saying in threat management, the threat does not die until the person threatening dies. Even if energy is redirected, precautions and changes in behavior will be necessary.
 
Ongoing Support and Behavior
The victim&amp;rsquo;s behavior will need to change. They will need to alter which routes you drive to work, what times you go the gym or where you grab your morning coffee. Depending on the severity, it may be worth looking at a transfer out of the area or looking for new employment elsewhere. This is the hardest part for people to understand, if the threat is out there, precautions will need to be taken. 
Long term solution to recovery is counselling, there are many providers out there for employers and schools to help with this process, if you don&amp;rsquo;t already have a program, you should start now, check out associations that specialize in this such as EASNA https://easna.org/, or ATAP Worldwide https://www.atapworldwide.org/. </description><pubDate>Mon, 12 Sep 2022 14:37:00 -0700</pubDate></item></channel></rss>