SECURITY IN THE PRIMARY AND SECONDARY EDUCATION FIELDS Izzo Consulting & Training, LLC
LIFE WAS SIMPLER IN THE DAY  Izzo Consulting & Training, LLC
THERE ARE TWO ISSUES THAT MUST BE TAKEN INTO CONSIDERATION WHEN DISCUSSING SCHOOL SECURITY <ul><li>Internal </li></ul><ul>...
The Climate of Fear drives our need to address Security Concerns <ul><li>Protective Parents want to know: </li></ul><ul><l...
History of School Violence Recent history (last 20 years) we can cite specific examples of  school violence , specifically...
Trivia Question Who was Charles Whitman? Izzo Consulting & Training, LLC
TEXAS BELL TOWER INCIDENT  AUGUST 1 ST , 1966 <ul><li>Disaffected college student </li></ul><ul><li>Ex-marine Sharpshooter...
A security plan consists of the following steps <ul><li>Conduct a security survey of the site </li></ul><ul><ul><li>What i...
WHAT CAN WE DO? <ul><li>We start with the Basic Premises of Good Security </li></ul><ul><li>Deter </li></ul><ul><li>Detect...
Deter <ul><li>We must define our perimeter. How close do we want strangers to come onto our property? </li></ul><ul><li>Wh...
Deterrence Devices <ul><li>Fences </li></ul><ul><li>Access Control System </li></ul><ul><ul><li>Doors </li></ul></ul><ul><...
In  1130  <ul><li>King Henry of Huntington declared that brush be cut back 200 feet from the roadway so as to help give tr...
Define your Property Line Fence Door Izzo Consulting & Training, LLC
Izzo Consulting & Training, LLC Duart Castle on the Isle of Mull Scotland  A good view for detecting trespassers
Izzo Consulting & Training, LLC Another Castle that would be hard to sneak up on
Detect <ul><li>Burglar Alarm System </li></ul><ul><li>Closed Circuit Television Monitoring System </li></ul><ul><li>Securi...
THERE ARE MANY KINDS OF BURGLAR ALARM SYSTEMS <ul><li>Most systems pretty much do the same thing </li></ul><ul><li>They mo...
Closed Circuit Television Systems <ul><li>Analog (Coaxial Cable or UTP) </li></ul><ul><li>Digital (IP/Network Based) </li>...
When Designing a Camera System <ul><li>Start from the outside in </li></ul><ul><ul><li>Monitor outside areas for Trespasse...
Camera Recording Capability <ul><li>Digital Video Recorder (DVR) </li></ul><ul><li>Network Video Recorder (NVR) </li></ul>...
Security Guards <ul><li>A person in a uniform with a badge can act as a deterrence </li></ul><ul><li>In Connecticut must b...
Visitor Management Systems <ul><li>Visitor Badge </li></ul><ul><ul><li>Database System </li></ul></ul><ul><ul><li>Identify...
Duress Systems <ul><li>AKA  Panic Buttons </li></ul><ul><li>A push button used to alert others that someone is in need of ...
Delay <ul><li>Bolting or cabling down high value assets makes it difficult to grab and run </li></ul><ul><li>Locking class...
DEPLOY <ul><li>If the burglar alarm system goes off, then somebody must be monitoring the system so as to dispatch both a ...
Customer Considerations <ul><li>Cost of Ownership </li></ul><ul><li>Vendor Qualifications </li></ul><ul><li>Mean Time to F...
In Closing <ul><li>Do your Homework! </li></ul><ul><li>or </li></ul>Izzo Consulting & Training, LLC
Hire a Security Consultant <ul><li>Presentation by: </li></ul><ul><li>JohnPaul T. Izzo </li></ul><ul><li>Izzo Consulting &...
Upcoming SlideShare
Loading in …5
×

Security In The Primary And Secondary Education Fields

614 views

Published on

Things to think about for parents and school administrators when it comes to school security

Published in: Education, Business
  • Be the first to comment

Security In The Primary And Secondary Education Fields

  1. 1. SECURITY IN THE PRIMARY AND SECONDARY EDUCATION FIELDS Izzo Consulting & Training, LLC
  2. 2. LIFE WAS SIMPLER IN THE DAY Izzo Consulting & Training, LLC
  3. 3. THERE ARE TWO ISSUES THAT MUST BE TAKEN INTO CONSIDERATION WHEN DISCUSSING SCHOOL SECURITY <ul><li>Internal </li></ul><ul><li>In most cases the enemy was from within. </li></ul><ul><li>This is true whether you are in an academic or business environment </li></ul><ul><li>External </li></ul><ul><li>Sex Offenders/Predators </li></ul><ul><li>Dysfunctional Families </li></ul>Izzo Consulting & Training, LLC
  4. 4. The Climate of Fear drives our need to address Security Concerns <ul><li>Protective Parents want to know: </li></ul><ul><li>What are you doing to protect my child? </li></ul><ul><li>Where are the metal detectors? </li></ul><ul><li>Security Cameras </li></ul><ul><li>We need police to patrol the halls to prevent the bad guys from getting into our school </li></ul>Izzo Consulting & Training, LLC
  5. 5. History of School Violence Recent history (last 20 years) we can cite specific examples of school violence , specifically the fairly dramatic school shootings that get tons of media attention and a encourage a climate of fear . Violence in urban schools related to gangs and violence involving other weapons or even without weapons is not mentioned at all even though they are far more common. . Actually despite the increase in dramatic cases of multiple victims, like the Columbine shootings, school violence in general, and homicide s in schools are going down, and have been since 1992 . There were 40 school shooting deaths during the 1997-98 school year, down from 55 in 1992-93. ( National School Safety Center at Pepperdine University ). The chances of a child being killed at school are less than one in a million , according to the Center on Juvenile and Criminal Justice . The most current data on school violence (not just homicides) in the United States also indicates that over all school violence (including rape , sexual assault , robbery , attacks with weapons, and suicide ) has been declining since 1993. Schools are actually the safest places for children to be; 99% of children die away from school, (Washington Post, Justice Policy Institute). Children are far more likely to be victim s of violent crime at home or in their neighborhoods and most crime in schools is non-violent theft . ( U.S. Department of Education , 1999).   Pasted from < http://everything2.com/index.pl?node_id=1005192 >   Izzo Consulting & Training, LLC
  6. 6. Trivia Question Who was Charles Whitman? Izzo Consulting & Training, LLC
  7. 7. TEXAS BELL TOWER INCIDENT AUGUST 1 ST , 1966 <ul><li>Disaffected college student </li></ul><ul><li>Ex-marine Sharpshooter </li></ul><ul><li>Killed 17 people </li></ul><ul><li>Wounded 26 </li></ul>Izzo Consulting & Training, LLC
  8. 8. A security plan consists of the following steps <ul><li>Conduct a security survey of the site </li></ul><ul><ul><li>What items of value must I protect? </li></ul></ul><ul><li>Conduct a risk and threat analysis of the site </li></ul><ul><ul><li>Where is my property located i.e. Inner City, Urban or Suburban area </li></ul></ul><ul><ul><li>What type of human factor am I involved with </li></ul></ul><ul><ul><li>Bus Stop/Parking Lots </li></ul></ul><ul><li>Identify the security levels for the different areas in the site </li></ul><ul><ul><li>Front door versus data room door </li></ul></ul><ul><ul><li>Sports objects versus paper products </li></ul></ul>Izzo Consulting & Training, LLC
  9. 9. WHAT CAN WE DO? <ul><li>We start with the Basic Premises of Good Security </li></ul><ul><li>Deter </li></ul><ul><li>Detect </li></ul><ul><li>Delay </li></ul><ul><li>Deploy </li></ul>Izzo Consulting & Training, LLC
  10. 10. Deter <ul><li>We must define our perimeter. How close do we want strangers to come onto our property? </li></ul><ul><li>While we choose to ignore it. History has always been there to show us how to do Security correctly </li></ul>Izzo Consulting & Training, LLC
  11. 11. Deterrence Devices <ul><li>Fences </li></ul><ul><li>Access Control System </li></ul><ul><ul><li>Doors </li></ul></ul><ul><ul><li>Locks (Keys & Cards) </li></ul></ul><ul><ul><li>Hinges </li></ul></ul><ul><ul><li>Frames </li></ul></ul><ul><li>Video Intercom Systems </li></ul><ul><li>Metal Detectors </li></ul>Izzo Consulting & Training, LLC
  12. 12. In 1130 <ul><li>King Henry of Huntington declared that brush be cut back 200 feet from the roadway so as to help give travelers along the Kings Highway the ability to observe highway robbers who were hiding close to the road. </li></ul>Izzo Consulting & Training, LLC
  13. 13. Define your Property Line Fence Door Izzo Consulting & Training, LLC
  14. 14. Izzo Consulting & Training, LLC Duart Castle on the Isle of Mull Scotland A good view for detecting trespassers
  15. 15. Izzo Consulting & Training, LLC Another Castle that would be hard to sneak up on
  16. 16. Detect <ul><li>Burglar Alarm System </li></ul><ul><li>Closed Circuit Television Monitoring System </li></ul><ul><li>Security Guards/Aides </li></ul><ul><li>VMS </li></ul><ul><li>Duress Systems </li></ul>Izzo Consulting & Training, LLC
  17. 17. THERE ARE MANY KINDS OF BURGLAR ALARM SYSTEMS <ul><li>Most systems pretty much do the same thing </li></ul><ul><li>They monitor a change in a condition </li></ul><ul><ul><li>Normally open or normally closed </li></ul></ul>Izzo Consulting & Training, LLC
  18. 18. Closed Circuit Television Systems <ul><li>Analog (Coaxial Cable or UTP) </li></ul><ul><li>Digital (IP/Network Based) </li></ul>Izzo Consulting & Training, LLC
  19. 19. When Designing a Camera System <ul><li>Start from the outside in </li></ul><ul><ul><li>Monitor outside areas for Trespassers/Loiterers </li></ul></ul><ul><ul><li>Monitor all perimeter doors into the facility </li></ul></ul><ul><ul><li>Monitor key areas within the building </li></ul></ul>Izzo Consulting & Training, LLC
  20. 20. Camera Recording Capability <ul><li>Digital Video Recorder (DVR) </li></ul><ul><li>Network Video Recorder (NVR) </li></ul><ul><li>Edge Recording Systems </li></ul><ul><li>The Question: How Long and at What Quality? </li></ul>Izzo Consulting & Training, LLC
  21. 21. Security Guards <ul><li>A person in a uniform with a badge can act as a deterrence </li></ul><ul><li>In Connecticut must be licensed </li></ul><ul><li>Can either be in a fixed or patrol position </li></ul>Izzo Consulting & Training, LLC
  22. 22. Visitor Management Systems <ul><li>Visitor Badge </li></ul><ul><ul><li>Database System </li></ul></ul><ul><ul><li>Identifying who comes onto the property </li></ul></ul>Izzo Consulting & Training, LLC
  23. 23. Duress Systems <ul><li>AKA Panic Buttons </li></ul><ul><li>A push button used to alert others that someone is in need of assistance </li></ul>Izzo Consulting & Training, LLC
  24. 24. Delay <ul><li>Bolting or cabling down high value assets makes it difficult to grab and run </li></ul><ul><li>Locking classrooms from the inside and outside </li></ul>Izzo Consulting & Training, LLC
  25. 25. DEPLOY <ul><li>If the burglar alarm system goes off, then somebody must be monitoring the system so as to dispatch both a key holder and the police. </li></ul><ul><li>If a duress button is pressed someone must be alerted and a response plan must be implemented </li></ul>Izzo Consulting & Training, LLC
  26. 26. Customer Considerations <ul><li>Cost of Ownership </li></ul><ul><li>Vendor Qualifications </li></ul><ul><li>Mean Time to Failure </li></ul><ul><li>Service Response Time </li></ul>Izzo Consulting & Training, LLC
  27. 27. In Closing <ul><li>Do your Homework! </li></ul><ul><li>or </li></ul>Izzo Consulting & Training, LLC
  28. 28. Hire a Security Consultant <ul><li>Presentation by: </li></ul><ul><li>JohnPaul T. Izzo </li></ul><ul><li>Izzo Consulting & Training, LLC </li></ul><ul><li>Tel 203-734-5726 </li></ul><ul><li>E-mail: jptizzo@izct.com </li></ul>Izzo Consulting & Training, LLC

×