Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Severai well-established security principles provide o strong foundation tor mitigating and avoiding active shooter situations in schools.
Active Security
Going beyond "deter, detect and delay" strategies
may help prevent active shooter situations on campus.
BY LAWRENCE FITZGERALD, CPP, PSP
Security measures often are classified along the five steps of the
security continuum: deter, detect,
delay, respond and recover. With an
active shooter, if schools wait until
the response step (typically when
law enforcement responds to a 911
call), loss of life is likely. Often, a first
responder is a few minutes away when
seconds count.
Greater focus needs to be placed on
the first three steps: deter, detect and
SECURITY/LIFE SAFETY
Routine patrols by plainclothes and uniformed officers inside and outside a schooi may
heip deter a potentiai attack.
delay; the goal is preventing the inci- what those are. Nevertheless, schools
dent in the first place and eliminating should recognize that attackers will go
to great lengths to ensure their objecthe need for a response.
tives are achieved.
COMMON THREAT ELEMENTS
Attackers almost always conduct
To understand how a school can pre-attack planning, which may incarry out these steps, one should clude observing school operations
understand the nature of an active- and facilities, making inquiries about
shooter threat. The New York Pohce employees and events, and other
Department has chronicled 230 active- information-gathering techniques.
shooter cases over four decades. In a This planning frequently takes days
report on those cases (www.nyc.gov/ and weeks to complete. Attacks often
html/nypd/downloads/pdf/counter- follow a pattern of these steps:
terrorism/ActiveShooter2012EdiTarget selection.
tion.pdf), the department determined
Surveillance and information
that 97 percent of the attackers were gathering.
men or boys. The attackers' ages
Test and evaluate security.
range from 10 to 89, but with regard
Potential reconsideration and reto schools, the vast majority fall into confirmation of the target and goals
three age groups: 10 to 14; 15 to 19; and objectives.
and 20 to 24 years old.
Acquire supplies.
Frequently, these attackers have
Gain access and conduct attack.
mental or emotional issues, and they
Plan an escapein some cases this
often have a grievance (real or imag- occurs, but frequently not.
ined) toward the school or staff. Most
shootings are planned days and weeks APPLYING EFFECTIVE
in advance and are not reactionary or SECURITY STEPS
the result of a "mental snap." Attackers
Data and profiles can be used to
have objectives they want to achieve, help formulate effective "deter, detect
although it is not always known and delay" security steps at schools.
24 AMERiCAN SCHOOL & UNiVERSiTY ASUMAG.COM MAY 2013
unauthorized entry. In addition, expanding the secure space outside a school helps enhance the aura of
security and provides early detection of people acting
suspiciously. Closed-circuit television monitoring of
parking areas and public access points combined with
random walking patrols around building exteriors also
are effective.
In addition to those physical and operational
security measures, an efficient and effective security
program also will use information available within the
schoolreports, observations and similar data sources
about students (and staff) who are at risk of aggressive
behavior and violent acts. Young male students who
have been victims of physical, social or verbal bullying,
or other social ostracizing often become perpetrators.
BuUying-prevention programs may not succeed, and
bullying can be insidious and undetected, resulting in
deep and festering emotional damage.
A keenly aware and astute staff should recognize
that a victim of bullying may become an active shooter
in the future. This knowledge may help staff and administrators take steps to assist bullying victims.
Step 3: Delay involves the use of physical and virtual characteristics to harden the facility with a goal
of frustrating or impeding an attacker in the planning
and execution of an attack. Control of who enters and
exits a building, and where and how that occurs can
significantly affect the ability of an attacker to move
unimpeded through a building.
At Sandy Hook Elementary School, the attacker
reportedly could not open a locked door, so he shot the
lock to gain entry. To thwart similar action, physical
hardening is a useful technique. Substituting electromagnetic locks for common mechanical-type key locks
is one method to delay entry. "Mag locks" typically
require a force of 1,000 pounds or more to overcome
the lock. By adding some small sections of steel plate
around the mag locks, they frequently can be modified or installed to withstand ballistic impact from a
number of weapons.
Glass (glazing) at entry doors and emergency exits
and in accessible ground floor areas can be enhanced
with ballistic film or replaced with bulletproof glass.
Although it often is not practical to provide these exterior hardening measures for all potential entry points
and windows, a vulnerability assessment to determine
the most probable points of entry can help a school
prioritize where to add hardening measures as well as
access controls. Keeping a would-be attacker out of a
school, or delaying his attempt at entry, is important to
interrupt the attack cycle as well as to enable students
and staff to shelter in place (lockdown) or evacuate to
a safe location.
Another delay tactic is to deny access to information that would assist in planning and attack. Sharing
_ _
Daylighting
is the power of Kalwall.
High-performance Translucent Wall and
Skyroof Systems with unequaled thermal
and daylighting performance.
New construction, reconstruction and
replacement systems.
kalwall.com
dayiightmodeling.com
skylightinfo.com
tacebook.com/Kalwall
Kalwall
^
.w-
Since 1955
1955
CORPORATION
info@kalwall.com
APPHOVK
I TilE.tMERIC.AMNSTITCTE
r" OF .ARCHITECTS
SECURITY/UFE SAFETY
or
denied
full
access
to
the
school.
security measures.
Other security principles such
When this principle is used at a
school to protect the students and staff as crime prevention through envifrom an active shooter, an intruder ronmental design (CPTED), drills
would have to get past the following and exercises, and threat and vul"layers" of security to conduct an at- nerability assessments also can help
address and mitigate active-shooter
tack:
Avoid being noticed by teachers situations.
Bullying-prevention programs,
looking for visitors or odd behavior
(this level may be enhanced when behavior modification and crisis- FiTZGERALD, CPP, PSP, is a senior security
teachers have received training to look team interventions all play a role in professional with TRC Corporation, Lowell,
Moss.
for an estranged student with violent reducing potential threats. Having LFITZGERALD@TRCSOLUTIONS.COM
an armed-response capability within (207)620-3881
intent).
Avoid random patrols (either by
law enforcement, staff or security
ON THE WEB
personnel) through the parking lot
For more articles on all aspects of security, visit the extensive security
and grounds.
article archives at ASUmaq.com.
Defeat controlled-access entry
26