Advances in technology are constantly changing the dialogue about how we protect our children from potential predators. Over the last decade, parents have had to reform their strategy when it comes to protecting their child in the real world. Before, parents cautioned their kids on stranger danger, special code words, and remaining aware of their surroundings in public. In a new era of unfettered internet access through multiple smart devices, parents had to contend with the real world being brought into their homes, with predators targeting their children through social media. Now, it appears parents will yet again have to add some new pages to the playbook when it comes to protecting their children from predators on video game platforms with integrated social networking.
Parents with children between the ages of 12-25 will likely be familiar with the online first-person shooter video game known as Fortnite. In the game, 100 players at a time compete to be the last one standing in a battle-royale style of combat. The game features a chat feature allowing players to communicate in team efforts and other uses. It has great potential to foster team building and cooperation between young people, but also has a dark side recently illuminated by an arrest made in Florida in late January.
Authorities arrested 41-year-old, Anthony Thomas, a man who allegedly used Fortnite’s instant-messaging feature to groom over 20 minors, including a 17-year-old, with whom law enforcement allege he had a sexual relationship. The Florida Attorney General’s Office also stated Thomas has been charged with 22 counts of possession of child pornography, and other charges related to his unlawful sexual relationship with the minor. Investigators uncovered he groomed the minors by sending them gifts—including a cell phone so their communication could remain more private. Ashley Moody, Attorney General, remarked about the predation perpetrated, “This case is disturbing, not only because it involves child pornography, but also because a popular online game was used to communicate with the victim.”
Grooming is defined as “a process by which a child predator gains the trust of a victim by building a relationship with the child and then breaking down his or her defenses.” Once a predator has earned their trust, they begin exploitation. Minors who are groomed in the gaming community are particularly vulnerable because the predator may literally be on their team. Cooperative play between players fosters a healthy, “there’s no ‘I’ in TEAM,” mentality, but predators use this relationship to manipulate the minor.
One of a predator’s greatest weapons when grooming a minor online is pop culture. The predator—perhaps unlike the minor’s parents—shows their target they’re “hip and cool”, and are able to converse at their level about something they enjoy. This causes the minor to lower their guard, and the predator begins their manipulation game, culminating in the exploitation of said minor. Online gaming is becoming so ubiquitous predators have developed a way to sense when a minor’s gaming is suddenly being supervised. The moment a minor’s behavior changes—they stop responding to messages, or do so uncharacteristically—the predator can pick up on that and cease all communication before they’re caught.
Unfortunately, even if a parent is supervising the communication between their minor child and other players online, it doesn’t mean they cannot be groomed. In the grooming process, between the introduction and the beginning of the exploitation, predators often suggest moving their communications to a third-party app, like What’sApp or Snapchat. These are apps where communications disappear with ease, and a parent performing their due-diligence in supervising their child’s internet safety may not notice, or even know how to access. TeenSafe says it’s critical parents learn to recognize the signs of grooming in their minor child.
Signs of Grooming
Your child wants to spend more time online or playing games on a console, but won’t tell you why.
Your child does not want to discuss what he or she does online, or what websites he or she visits.
You notice your child is using inappropriate language he or she would not have heard within your home or at school.
When you walk in a room, your child quickly changes the computer screen, mutes the volume on their gaming console, or turns it off all together.
Fortnite and other games with similar messaging platforms have been on law enforcement’s radar for the last few years as the instances of these cases continues to grow. In August of 2018, Titania Jordan, a digital safety expert, appeared on The Doctors to provide parents with helpful tips—not just for supervising their children’s gaming—but also for establishing boundaries that can nip grooming in the bud.
Do not allow minors to have computers, game consoles, or tablets in their room without supervision. Keeping these devices in common areas will increase visibility and deter predators from targeting them.
Instruct your child to never reveal any personal information about themselves to people they’ve met online, especially very specific information, such as where they live or where they go to school.
Create a culture of openness in your home where children feel comfortable coming to you if they feel uncomfortable about an interaction they’ve had online.
People of all ages play video games, but the vast majority of players are either minors or young adults, and parents often find themselves overwhelmed with the strange new world of online gaming. Titania Jordan reminded parents knowledge is power, recommending they verse themselves in the games their children play. This can only heighten your ability to detect when something is off. This means doing research online, and actively listening when your children describe normal gameplay behavior.
Having an internet connection in your home may feel like you’re inviting predators into your home. And true, there’s no time to supervise every single activity your child does online. This is why it’s so important to nurture an open line of communication between parent and child. Not only will parents be able to sense when something is amiss in their child’s online interactions, but a strong bond between parent and child makes it less likely that an online predator will be able to isolate the child emotionally and manipulate them for the purposes of exploitation.
As the Western idealization of a family unit continues to grow and change, more and more parents are either opting to place their child for adoption or adopt themselves rather than have a biological child. As such, adoptions are on the rise. The Adoption Network estimates the number of children in foster care at any given time in the United States is around 428,000. Of that staggering number, about 135,000 are adopted every year. Children are put up for adoption under a wide umbrella of circumstances in varying degrees of frequency, but what is not uncommon is a child’s adolescent or adult curiosity about the exact nature of where they came from. Because adoption agencies have their own privacy restrictions regarding birth parents, adopted children are often left with only a few meager details and options. Private investigators, however, are well-equipped to find a child’s birth parents; with a comprehensive tool chest and a wealth of experience in searching for persons who may or may not want to be found.
The rate at which information technology is developing has been denoted by some as Orwellian, but the ubiquity of public databases and fact-finding software available to the public is higher than ever. Hiring a private investigator may be costlier to the individual than conducting the search oneself, but without the proper tools and expertise, individuals can follow false leads and dead ends for years at the cost of their time and personal finances. Private investigators, especially ones who specialize in locating biological relatives, can cut down the time and expense individuals would ultimately incur during their search. The complexity of adoption laws and procedures (often varying state-to-state) is a knot of cable wires that is difficult for any private citizen to untangle.
Private investigators with a variety of specialties are suited for this work because there is no chain of command in their business. Most notably, private investigators are often their own bosses, with the freedom to pick and choose the cases they want to focus on. Unlike the underpaid, overworked civil servants who work in child services, or the overwhelmed agents at an adoption agency, private investigators only handle less than a half-dozen cases at one time, so an adoption case will not just become another folder in a tall, precariously leaning pile on someone’s desk. There are no jurisdictional boundaries preventing a private investigator from going across state lines, as long as they are licensed in the state or being contracted by a private investigator who is licensed in the state. While there are limitations to what information can be gathered from the state based on the birth-parents wishes, the autonomy of a private investigator is ideal for tracking down either birth parents, or children who have been placed for adoption.
The Child Welfare Information Gateway estimates, of all parents placing their biological children for adoption, nearly half of those parents will then seek out those children after they have reached adulthood. Parents in search of a biological child always have a search advantage as the legal adult at the time of the adoption. They play a pivotal role in establishing the boundaries that might preclude this child from ever contacting them again in the future. Depending on the terms of the adoption agreement, the adoption agency may not be able to release information about anonymous birth parents to their biological children.
The privacy laws surrounding adoption in the United States date back to the beginning of the 20th century, and were put in place to protect the privacy and identity of all parties involved in an adoption. It’s only in recent years that the Adoption Information Act has made it possible for both parents and children to request information about the other in situations where all of the aforementioned parties have waived their right to privacy. Adoption laws have also gone through a metamorphosis in recent decades where parents are required to fill out detailed medical histories for the benefit of the child’s physical and mental health growing up. In addition to information about their own birth (date, location, hospital), a birth parent’s medical background might be the only information an adopted child possesses.
Locating a birth parent or child is a form of investigation known as a skip trace. “Skip” refers to the action of searching for a person, derived from an old colloquialism, “to skip town,” or leave with very little notice or instruction. Trace refers to the process and resources involved in finding the person, such as international online databases, surveillance, and location technology and services. Skip traces in adoption cases can go both ways: A child in search of their birth parents, or a birth parent in search of the child they placed. Private investigators who take adoption skip traces have a mountain of data to sift through, including adoption registries, religion-related services (such as options offered through the Catholic church) and a mountain of databases, including—but not limited to—welfare, child protective services, private adoption agency, foster care, police, court, hospital, and international records.
Depending on the level of information available to either a birth parent or biological child (and subsequently the investigator) adoption cases can have a mixed bag of possible results. In scenarios where a private investigator is unable to find a birth parent, it’s typically because there is not enough information on the record to begin with. Because of varying degrees of regulation across all adoption agencies (both state and private), the level of information and quality of record keeping is a crap-shoot, and investigators often hit dead ends in those types of investigations. In other circumstances, after many long hours of research and investigation, the private investigator is able to locate the birth child or parent, only to report back to the client the subject in question has no desire to reunite with them in any fashion. These are solutions often unsatisfactory to the client, but it is a difficult reality, and the client will have some semblance of closure regarding their questions about the subject. However, in the event private investigators locate the birth child or parent, and the subject is willing to re-initiate contact, private investigators can be ideal liaisons to bringing biological parents and children together in adulthood. They can alleviate some of the most common anxieties surrounding meeting strangers, and have experience with reconnecting displaced parties that will inform a gradual process of reestablishing contact.
Life has an infinite potential to get messy very quickly, and a child being placed for adoption is one of the consequences of the indeterminate. Fortunately, private investigators not only have the sleuth skills to find persons under all circumstances, but an acute ability to read people that benefits the precarious nature of the cases they take on. When a birth parent and child are open to meeting again under more pleasant circumstances, private investigators can build strong bridges across decades of separation, confusion, and curiosity.
The United States government has been shut down for almost four weeks, sending shockwaves throughout a nation already gripped by tumultuous politics and controversial issues. In addition to institutions like the National Parks System, and the National Institute of Health, all federal employees have currently been laid off from duty, and a majority of their services suspended. The ripple effect is dizzying, with many of the governments services being on hold for the duration of the shutdown. Many consumers across the country are not aware of the shutdown’s impact on some of our nation’s best departments, so you can imagine their shock when they phoned to report a consumer complaint, and were told the government couldn’t help them.
When running normally, the government requires a wealth of quality communication to run smoothly. As many federal employees remain on furlough, therefore not being compensated, everyone’s level of communication with one another is atypical and—as many federal employees are called in without pay—constantly breaking down. The Consumer Financial Protection Bureau (CFPB) is the federal agency that fields the influx of consumer complaints. A consumer submits their complaint about a business or financial entity to the CFPB, which is reviewed. According to the CFPB, after the complaint is reviewed, “We’ll forward your complaint and any documents you provide to the company and work to get a response from them. If we find that another government agency would be better able to assist, we will forward your complaint to them and let you know.” The CFPB remains in operation and was not effected by the shutdown, but if the agency is ill-equipped to deal with the complaint, they may never get off the ground, as the appropriate department might be effected by the shutdown. This leaves many consumers displaced when it comes to voicing their concerns about products and services.
This suspension of protection services has allowed the beast of robo-calls to fester and become feral, as consumers cannot block or report harassing robo-calls. They’re left screaming into the void. Alex Quilici, the chief executive of YouMail—a smartphone application that helps consumers block robo-calls—describes it, “It’s a neighborhood with no police on the beat.” YouMail estimated, just last month, there were 5 billion robo-calls made, and 50% of calls made in early 2019 could be coming from scammers and robots attempting to fraudulently obtain your information. These horrifying statistics are the codas for a chorus of federal employees who are aware of the scope of the problem, like Jessica Rosenworcel, the Federal Communications Commission Commissioner, “The number of robo-calls consumers are receiving is insane. The problem just keeps growing. Shutting down the government is not going to help.” As of this moment, there is no one to administrate the “Do Not Call” list, the national registry in which consumers can ask specific companies not to contact them.
The Federal Communications Commission is just one of many threads woven into the Federal Trade Commission. Another voiceless victim of the shutdown is the victim of identity fraud. Louette Duvall is one of these victims. Not long after the holidays were over, Duvall’s car was pilfered by thieves while she was at her job. They made off with her purse, her briefcase, and a wealth of identifying information that amounted to a scammer’s treasure trove. Fraudulent charges started rolling in as she scrambled to alert all of her creditors and financial institutions that she had been robbed. She began calculating the full scope of the theft’s ramifications: New checkbooks ordered, extravagant items ordered in her name, new credit cards, the list goes on and on. When she called the Federal Trade Commission to let them know her identity had been stolen, she was told they could not help her due to the government shutdown. FTC data prior to the shutdown stated that the agency received thousands of calls a day regarding identity theft alone. That’s thousands of crimes going uninvestigated every day, a Washington Post reporter pointed out when they became a victim as well. Not only are new crimes going unreported, but investigative resources are also frozen. The Consumer Sentinel Network helps investigators track the movement of identity theft and related frauds to build cases against the perpetrators, and it remains down as of day 26 of the longest government shutdown in history. At a minimum, the FTC is still allowing individuals to file complaints so that they be issued an affidavit for their creditors’ purposes.
News coverage of the shutdown has attempted to sharpen the big picture for Americans when it comes to the ripple effect of the government shutdown. While many federal agencies might be unable to assist consumers with complaints, there is recourse for consumers experiencing the myriad of issues helmed by the Federal Trade Commission. There are online, step-by-step resources for obtaining documentation to dispute fraudulent charges and claims. Consumers can also retain the services of a private investigator. One of the most beneficial aspects of hiring a private investigator is that they are the top of the chain of command in their firm. They are the ones calling the shots in any investigation, not a supervisor nor a superior. They will represent your interests and your interests alone. As is the case with many frauds and thefts, perpetrators tend to either operate remotely, or move quickly to evade law enforcement. Acting independently, private investigators will be able to move as fluidly as a scammer, crossing jurisdictional boundaries with little to no red tape. Statistics surrounding fraud indicate that many federal investigators in charge of tracking down scammers and thieves are inundated with a never-ending stream of complaints. This means their attention can be divided over and over again across a heavy caseload. A typical private investigator only handles between 3-4 cases at a time, meaning your case can be a priority for them and not just another file in a drawer.
Political pundits and talking heads don’t project a sunny forecast when it comes to the shutdown—no end in sight. As the shutdown enters its 27th day, many Americans who have been the victims of consumer fraud and identity theft who do not yet know the full scope of the shutdown’s impact will receive an ugly surprise when they turn to the federal government for help. While the government gets its house in order, know that there are options for victims of consumer and identity fraud. Consult a private investigator today to learn how their specific skill set, experience, and independence can help you get right the ship when it comes to fraud.
How easy would it be to kidnap a child in a crowded place? Maybe the park, walking home from school or even sleeping in their own bedroom. Over again, we see parents of missing children making pleas for the safe return of their children on the news. We see the Amber Alerts and Facebook posts and immediately picture our own children’s faces, thinking “What if it happened to me?” A common reaction to something so traumatic.
A young child becoming the victim of a predator is every parent’s worst nightmare, but the fact is, it is happening every day to parents throughout the country and our own fears do not wane just because our children are getting older.
I am a parent of four grown children and a mother who has worked in the field of missing persons for over 25 years. Every day I interacted with parents who were desperately searching for their missing child. Their pain unimaginable. Very quickly I realized the crime of abduction does not discriminate based upon a child’s age.
Commonly, we think of small children when we hear the word kidnapping and we think as our children age, they are safer, but the fact is, they can become even more vulnerable as they approach adulthood.
While teenagers are venturing out, without the protective eye of a parent, there is even more chance they can cross paths with a potential kidnapper. It is our responsibility as parents to guide our children throughout their lives and hopefully provide them with some tools that will keep them safe.
According to the National Center for Missing & Exploited Children (NCMEC), approximately 800,000 children are reported missing each year in the United States. That number accounts for nearly 2,000 per day.
The Federal Bureau of Investigation (FBI) estimates a relatively small number, approximately 115 of those missing children are abducted by strangers and listed as an “involuntary” abduction in the national database of missing children. However, this number does not account for children (to include teens), who are listed in the FBI National Crime Information Center (NCIC) in various categories such as “Endangered Missing,” “Runaways” or “Other.” Many of these disappearances are considered “long-term” with more than a year having passed with no resolution or explanation as to how or why the child disappeared. The fact is, we just don’t know, therefor accurate statistics impossible.
One thing we all can do as parents is prepare our children. Much of the following information and tools have proven to save lives.
Communicate with your children
Predators do not look like the “Boogieman.” Strangers look like everyone else. Children need to understand that everyone is a stranger, even women and seniors. It is not about being unsociable, explaining this is about being cautious.
Agree to a code word
Strangers have no business asking a child for directions or a lost pet. Many times, a predator will try to coerce a child into coming with them voluntarily without causing a scene by telling them they were sent by their parents to pick the child up. Agree to a simple “code word” like “Giraffe” or “Cheetos” that your child can remember and tell them to only trust an adult who knows the code word.
Walking Away
Children should be taught to trust their instincts and walk away if a stranger approaches them. Though not all people are dangerous, it is always more important to be safe than being polite.
Don’t put your child’s name on personal items
Children will tend to trust others who know their name. Never put your child’s name on personal items such as clothing or backpacks.
Just scream
If approached, children should be taught to scream and run. Reassure your child the likelihood of being approached by a stranger is minimal but should it happen, to scream “This is not my dad” or “Fire” while running away.
The stakes are high when a child becomes the target of a predator. It really is a matter of life or death. According to the FBI, statistically when a child is abducted by a stranger, the likelihood of recovering them alive diminishes with each hour that passes.
When a predator has targeted its prey, survival depends upon fighting back. For example, if approached with a knife or gun and told to get in a car, statistically the child or teen have more of a chance surviving if they fight back at the initial crime scene. Survival rates drop when a child is transported to a second crime scene.
Communication
As children get older and spend more time away from parents, it is important to communicate openly with them. They need to know the dangers and reality of abduction without feeling fear which can be paralyzing.
Not alone
Children should never answer the door when home alone or answer the phone and tell the caller their parent is not home.
No compromises
Use the “Buddy System” and teens should always inform their parents where they are going and with who. No compromises.
No shortcuts
Children should avoid shortcuts through empty parks, fields, and alleys. It is better to always remain in a well populated area to be safe.
Life-saving technology
Use a GPS on their phone. There are free Apps such as Life 360. The App can be loaded on both the child’s phone and the parent’s phone and track location. Personally, my children are all grown with their own families now but my daughter and I both use Life 360 to keep tabs on each other. Though teens may demand their space, their safety trumps the right to privacy.
Remember, promote a home atmosphere that is open so kids can let you know what is going on in their lives. It is important to help them to have an understanding and confidence you want the best for them. Thomas Lauth has been in the private investigation industry for over 30 years, and in the cases of missing children, he stresses the importance of communication between parent and child, “We often get calls for missing children and teens. Once located and reunited with their families, we often educate parents or caregivers on tenets that would prevent this from occurring again. Regardless of circumstances, the most important thing is communication. Not only open and honest communication between parent and child, but communication safety concerning things like social media. In a world where young people are glued to their devices, it’s paramount that they remember to have awareness of their surroundings. Communicate, Educate, Communicate.”
Teaching children techniques to avoid an abduction
The window of opportunity to save oneself from danger might be seconds and children need to feel confident enough to make a split-second decision. In addition to coercion, abductors use intimidation. There are some techniques you can practice at home to build their self-confidence should they ever be face to face with a kidnapper.
Practice yelling “Stop, Stranger” or “Fire” to draw attention and yell as loud as they can.
Practice the Windmill technique which means rotating arms in a big circle so a potential attacker can’t get a good grip.
Practice the Velcro technique by having your child grab and hold onto something, not letting go. They should also learn to scream while doing this.
If a child is abducted and somehow placed in a vehicle, they should know they need to take any opportunity they can to escape while trying to keep a cool head.
Children should be taught not to be passive but proactive.
Try to open the passenger side door quickly or jump in the back seat and try to escape through the rear doors.
If placed in a trunk, they should be taught not to panic but to look for the “release” that opens the trunk upon pulling on it. Tear all the wires to the tail lights and brakes if possible.
I know this is a very serious and scary topic and just the thought of having to explain to an innocent child that some people are out to hurt them is incredibly uncomfortable, but when teaching others about fire safety, Benjamin Franklin said, “An ounce of prevention is worth a pound of cure.” It applies throughout life.
Kym Pasqualini is the founder of the Nation’s Missing Children Organization and the National Center for Missing Adults and worked with law enforcement and families of missing persons for over 25 years. Kym continues to work with media nationwide to raise awareness of missing children and adults.
So far this year, there have been 297 mass shootings in the United States. Seeing as how November 1st is the 305th day in the calendar year, it would appear that the spike in active shooter events in recent years will not slow down any time soon. While schools redefine their safety protocols and implement programs that prepare students for these events, employers throughout the United States are also beginning to understand the importance of preparing their workforce for an active shooter event.
The year of 2017 broke the record for the most mass-shooting deaths every recorded—112 deaths, well exceeding the amount in any other year in recorded history. In 2018, the Bureau of Labor Statistics published a report that showed another spike in workplace homicides. According to them, there were 83 workplace homicides in 2015, a number that skyrocketed to 500 for the year of 2018 alone. A terrifying 79% of those cases were the result of an active shooter. As a result, the desire for employee active shooter training has never been higher, with NPR reporting that as of 2016, 75-80% of employers are seeking qualified active shooter training to protect their workforce.
The Department of Homeland Security has a myriad of resources on their website for dealing with active shooters. One of them is a pocket-card that outlines the characteristics of an active shooter event, “Victims are selected at random. The event is unpredictable and evolves quickly. Law enforcement is usually required to end an active shooter situation.” Active shooters may fire at random, using no discernible criteria for their victims, but that arbitration should not be misunderstood. Perpetrators are deliberate, focused, and simultaneously detached from their task, creating a fatal perfect storm.
The Department of Homeland Security also have their own guidelines to how private citizens should react during an active shooter event: Run—hide—fight.
Run
At the onset of an active shooter event, individuals should immediately identify an escape route, most likely a fire exit. While keeping their hands visible, they should leave their belongings behind and run to safety as quick as possible, assisting others if needed.
Hide
Once they’ve reached safety (or if escape is impossible) the Department of Homeland Security recommends hiding immediately in a location out of the shooter’s line of sight. Individuals should block the door or manner of entry into their hiding spot and silence their cell phones and pagers. Sit very quietly and wait for first-responders to find you.
Fight
The Department of Homeland Security lists this option as an absolute last resort in the event of an active shooter in the workplace. Your life should be in immediate danger, and you should be well-positioned to act with physical aggression and incapacitate the shooter.
Many third-party security companies also endorse the methods of Homeland Security, but there are others that take a different approach. Laurence Barton, a workplace violence expert, recommends employers seek training programs that promote a culture of safety and preparedness—not fear. In lieu of careful research regarding active shooter training, many employers opt for the simple, cost-effective route by showing employees the prolific training video produced by the city of Houston, which features graphic depictions of employees being shot. “When some companies have created these videos that show blood and guts—that’s not in any way the kind of learning that stays with people. In fact, it repulses them…employees get scared,” Barton says, “I just don’t believe scaring people is the way to teach them. It just promotes anxiety.” Aric Mutchnick, the president of a risk management firm called the Experior Group, agrees with Barton, “Cops or military guys like to have it very realistic because they think the more real it is, the more they can find out. That is true if you’re a tactical team, but you can’t apply tactical training to a civilian population.” Mutchnick points out that the equal distribution of choice laid down by the Department of Homeland Security—run, hide, or fight—is not only dangerous, but unrealistic, “It should be 90 percent run, 8 percent hide until you can run, and then as for fight, really? Are you kidding? I don’t know how you would even train on that.” Companies like Experior Group also recommend that a base knowledge of firearms should also be part of the training, not so employees can operate firearms, but so their knowledge can inform their escape. Civilians who are ignorant of basic firearm operations can easily be paralyzed by fear because they are uncertain of a weapons range or magazine size. This gives an active shooter ample opportunity to change their position and reload without fear of retaliation.
Frozen with fear—it’s something we can all relate to. After all, many working people today are not acclimated to the viable, potential threat of an active shooter in the workplace. Aggressive, hyper-realistic training can compound the anxiety triggered by the increased probability of being involved in an active shooter event. That’s why Barton and other like-minded professionals epitomize on a feeling of safety, with straightforward and honest training that will leave any employee feeling prepared. “The chief learning officer has a huge opportunity to lead a discussion about workplace safety. [Employees] are yearning to be informed about how the world is changing and how threats get processed at work…You want to have a subject matter expert who works with law enforcement and can speak the language of all employees.”
One thing that employers often overlook when considering active shooter training programs is a company that curtails the training to their individual brick and mortar location. As part of what they call “red ball drills,” Experior Group will evaluate the property to identify the specific issues that might present during an active shooter event. “The problems of a commercial building are not the problems of a hospital or a school,” Mutchnick says. “Run, hide, fight is s giant blanket they throw over the problem as a response, but it doesn’t deal with any site-specific issues.” All training dispensed by Experior Group is tailor-made for the culture and physical context of any business. When these issues have been identified, the instructor can direct employees the best manner of exit, should they have that option.
The last thing to consider when choosing an active shooter training program is the credibility behind the operations. Some of the most prolific risk management and security companies are headed by former members of law enforcement or the military. This experience with weapons and chaos not only validates the content for many employers, but also leaves employees empowered with credible knowledge. However, former navy seals and swat team leaders are not the only option when it comes to the instructor. Lauren Perry, the vice president of operations for Trident Shield, often addresses training groups. Her specific style and feminine touch opens the dialogue in any room, allowing individuals who might not respond to an aggressive, alpha males to remain engaged in the training, retaining the information that might one day save their lives.
Many employers often grapple with the cost of active shooter training for their employees. With many training programs averaging in the realm of thousands of dollars, employers often question whether or not active shooter training is even necessary. The Occupational Safety and Health Act of 1970 says, “Employers have the responsibility to provide a safe and healthful workplace that is free from serious recognized hazards.” The rise of active shooter events in the United States is most certainly recognized, with every event further inflaming the political world and conversations surrounding gun control. Given the statistics we’ve seen here, it appears as though it’s not a matter of if an active shooter even will occur, but when.
Carie McMichael is the Communication and Media Specialist for Lauth Investigations International. She regularly writes on private investigation and missing persons topics. For more information, please visit our website.
Employee misconduct in the workplace can have a toxic effect on morale and productivity, which often incentivizes employers to resolve the situation quickly. These days, there are clear benefits to getting out in front of any misconduct complaint as movements like #MeToo have employers scrambling to vet their workforce so they can identify predators before scandal or evidence of misconduct can become public. In a surveillance culture where both bad behavior and good behavior are fodder for a good viral news story, employers everywhere are starting to understand the value in properly handling a corporate crisis. But in their haste to resolve the situation, are employers handling internal investigations properly?
Regardless of the type of business and type of misconduct, (sexual harassment, drug-trafficking, theft, etc.) the first instinct where there is a whiff of employee misconduct is often to keep the information very close to executives. As with any investigation, the controlled release of information has an investigative advantage in identifying the true culprits of any misconduct. This is the beginning of employers remaining too close to the situation. It’s not unusual for a well-meaning employer to appoint themselves as the head of the investigation—but this presents a huge conflict of interest. As a person with a great deal to lose, the employer is, by their very nature, biased and an unbiased investigation is the foundation for anything built on an employee complaint. Without the use of an external investigator, the case loses integrity.
Hiring an external investigator, like a licensed private investigator, will bring a flattering layer of transparency to any workplace investigation. First and foremost, a private investigator is an independent third-party. Having no personal knowledge of the employees involved—and therefore having no preconceived notions about them—means they can truly approach the case from an indisputable place of objectivity. The employer’s personal knowledge of their employees disqualifies them from such objectivity. Whatever the misconduct du jour, they might never suspect their trusted personal assistant, their senior manager, or their business partner—all individuals with extensive access to company information and property. However, a private investigator will vet this list of possible suspects in search of the truth.
When an employer is unsure of how to proceed when investigating workplace misconduct, it seems like a no-nonsense solution to let the lawyers handle it. And it can often make sense, as they will be fielding any litigation that surfaces. In-house counsel might feel it’s under their purview for the same reasons, but this is very misguided. The lines of their capacities as both in-house counsel and investigator cross one another, thus creating another conflict of interest. While there are states like New York that allow attorneys to act as private investigators without a license to do so, this is still not recommended. Witnesses within the company will likely have anxiety about speaking to the company’s lawyer, and might not be as forthcoming with pertinent details. Leads suddenly begin pancaking into dead ends as nervous employees become less cooperative. Private investigators have the advantage in this situation, as they are not representatives of the individual’s employers in any capacity, and have no power to fire them. It’s the same advantage private investigators have over law enforcement because they have no powers of arrest.
The documentation provided by a private investigator is invaluable to workplace investigations. After all, many reports not handled to the satisfaction of the complainant often lead to legal action, the most common example being the more familiar story of sexual harassment in the workplace: An employee alleges sexual misconduct against another employee. Both parties are interviewed. The interviewer does not tape the interview nor take notes. After a shoddy investigation, the complainant decides to sue the company for negligence. Another common example is the case of an employee who is hastily terminated for FMLA abuse or malingering before the company conducts a thorough investigation.
Not only are paper and ink expensive, but filling out and preparing reports is time-consuming—time that would be better spent trying to improve your business. Private investigators keep meticulous records, just like law enforcement, of all witness statements, evidence, surveillance, and relevant information to the case. This will go a long way towards addressing the complaint after the PI has issued their solution. It’s a perfect package: The investigation is chronicled from beginning to end, all of the relevant information is accessible, and best of all, it was conducted, prepared, and presented by a completely objective, independent third-party. The same third-party can also offer testimony in any court case that might result from the investigation.
Whether you’re investigating sexual harassment allegations, drug-trafficking, theft, or any complaint of employee misconduct, make the proactive choice of hiring a private investigator. It’s the strongest first step you can take in any internal workplace investigation. From the beginning, the investigator will be an impartial, unbiased eye whose only loyalty is to the truth. This kind of due-diligence will go a long way towards demonstrating you, as an employer, have heard the complaint, taken it seriously, and are only interested in what actually occurred. The solution will not be based on pre-conceived notions of colleagues, or biased assumptions, but independent deduction and well-documented evidence. And even if the investigation comes to a less than amiable termination, the foundation laid by the private investigator will protect your business from litigation.