Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Physical Security

12 Methods to De-Escalate Violent Situations

Preventing workplace violence
FatCamera / E+ via Getty Images

FatCamera / E+ via Getty Images

July 28, 2015

Every day, says Jim Sawyer, CHS-III, CPP, CHPA, Director of Security Services for Seattle Children’s Hospital, there are 16,000 threats of workplace violence. Sawyer is a crime prevention and personal safety presenter, a nonviolent crisis intervention certified instructor, a member and presenter with Homeland Security, and a president and past president with the Washington State Crime Prevention Association.

Read more about workplace violence

Read more about security officer training

Key to mitigating workplace violence, Sawyer says, are recognizing verbal and non-verbal signs of violence, in addition to paying attention to your “gut instinct.” Sawyer suggests that intuition can be an element that can help contribute to zero incidents. “It’s of sentinel importance for security staff to hone, honor and listen to their intuition,” Sawyer relates. There are five ways a person’s intuition will speak to them: heart rate, perspiration, nausea, feeling indecisive and hair rising on the back of your neck.

 

According to Sawyer, some of the verbal warning signs of violence are:

  1. Threats – Direct
  2. Threats – Veiled
  3. Threats – Conditional
  4. Boasts of prior violence
  5. Confused thinking
  6. Bragging about losing control
  7. An increase in pitch when speaking – indicates throat is tightening
  8. Repetitive word use, parroting and or echoing
  9. Forced or strained speech
  10. A nervous laugh or laughing at inappropriate times (Laughing is a way for a body to shed emotions.)
  11. When a person speaks to others about someone as if they are not present
  12. Yelling or screaming
  13. Non-stop profanity
  14. Slurred speech
  15. Talk of hurting animals

 

The non-verbal signs of impending violence include:

  1. Personal space violation
  2. Standing toe to toe
  3. Finger pointing
  4. Making fists
  5. Staring through you
  6. Face flushing
  7. Heavy breathing
  8. Flaring nostrils
  9. Person refuses any eye contact
  10. Someone blocks egress

 

Sawyer also offers verbal and non-verbal dos and don’ts that security teams can use to de-escalate a situation.

The verbal do’s include:

  1. Use the person’s name.
  2. Ask “May I help you?”
  3. Speak slowly.
  4. Use restatement for clarification.
  5. Ask to take notes.
  6. Paraphrase.
  7. Use “what” and “we.”
  8. Allow time for reflection.
  9. Give options.
  10. Ask for their idea or solution.
  11. Use simple words.
  12. Maintain 65-percent eye contact.

 

The verbal don’ts include:

  1. Don’t allow long waits.
  2. Don’t fake attention.
  3. Don’t roll your eyes.
  4. Don’t make false promises.
  5. Don’t use jargon.
  6. Don’t agree with someone – take their side.
  7. Don’t cut people off.
  8. Don’t get in a power struggle.
  9. Don’t raise your voice.
  10. Don’t fail to document.
  11. Don’t lose temper.
  12. Don’t ever meet an angry person one on one.
  13. Don’t allow more than one person to talk.
  14. Don’t argue.
  15. Don’t say “calm down.”
KEYWORDS: de-escalation training security officer training threat awareness workplace violence

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 13, 2025

Inside the 2025 Security Benchmark Report

The 2025 Security Benchmark Report unveils the top trends CSOs and enterprise security executives are facing in today’s current climate and how each of these trends could potentially impact the enterprise’s global reputation with the public, governments, and business partners. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • SEC0821-Cover-Feat-slide1_900px

    Top de-escalation strategies and training for security leaders

    See More
  • de-escalation-freepik.jpg

    CISA releases de-escalation training series for critical infrastructure operators

    See More
  • NIST crowdsourcing

    NIST crowdsourcing challenge to de-identify public safety data sets

    See More

Related Products

See More Products
  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

  • facility manager.jpg

    The Facility Manager's Guide to Safety and Security

  • The Complete Guide to Physical Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing