Industries face a variety of threats - both internal and external - from hostile governments, terrorist groups, disgruntled employees, and malicious introducers. Alert employees can spot suspicious activity and report it. The power is in the employee, citizen, patron, or any person who can observe and report.
CISA offers a variety of tools and resources to empower and educate employees, citizens, patrons, or any person with the skills and support they need to identify and report suspicious behavior. CISA recognizes the power that a single individual can have in deterring threats and preventing harm. CISA’s non-confrontational techniques are tailored to harness the power of the individual in the securing the safety of our nation.
The OHNO approach – Observe, Initiate a Hello, Navigate the Risk, and Obtain Help – helps employees observe and evaluate suspicious behaviors, and empowers them to mitigate potential risk, and obtain help when necessary.
An insider is any person who has or had authorized access to or knowledge of an organization’s resources. Insider threat is the potential for an insider to use their authorized access or understanding of an organization to harm that organization.
The assessment process of the De-Escalation series determines whether an emergency response is needed, if de-escalation is possible, or if a more formal assessment is needed.
The "Pathway to Violence" provides information regarding the behavior indicators that assailants often demonstrate before a violent act.
CISA developed the Violence Prevention Through De-escalation video to help the critical infrastructure community and public gathering locations identify concerning behaviors and mitigate the risk from incidents of targeted violence.
Explore our Power of Hello and De-Escalation Series resources, both of which are available in a variety of translations.
The Power of Hello products provide stakeholders with information to assist in identifying and effectively responding to suspicious behavior.
The De-Escalation Series helps critical infrastructure owners, operators, and staff identify and navigate suspicious activity or potentially escalating situations as well as safely dis-engage and report these situations.