SlideShare a Scribd company logo
Active Shooter
Identifying, Assessing, and Managing the Threat
Situational Awareness
“INCREASED SECURITY = INCREASED INCONVENIENCE”
• If you see something, say something.
• Assess surroundings for threats.
• What should be normal in your area/situation?
• Identify and gauge the danger of elements around you.
• All contractors should diligently adhere to all safety
protocols.
• Use your imagination to plan for different situations.
• Address those who aren’t following protocols.
• Try to identify threats.
• Fight against complacency.
2
Situational Awareness: Pathway toViolence
• Grievance
• Ideation
• Research / Planning
• Preparation
• Breach
• Attack
Source:U.S. Department of Justice, Federal Bureau of Investigation (2017); Calhoun
andWeston (2003)
3
Pathway toViolence: Grievance
• Significant personal loss, humiliation or setback;
whether perceived or real.
• Could be against person, institution or other entity.
• Lack of interest to non-violent resolutions to a
grievance.
• Deliberate or inadvertent disclosure of violent or
future plans.
Source:U.S. Department of Justice, Federal Bureau of Investigation (2017)
4
Pathway toViolence: Ideation
• Pervasive, persistent fantasies where offender victimizes
others.
• Problematic or concerning interpersonal interaction with
others (being bullied or bullying).
• Compromised ability to cope with stressors or setbacks.
• Increased isolation, depression and withdraw.
• Preoccupation with past attacks or attackers.
• Escalated interest in obtaining firearms and/or explosives.
• Escalated interest in tactical gear, clothing or
paraphernalia.
Source: U.S. Department ofJustice, Federal Bureau of Investigation (2017)
5
Pathway toViolence: Research and Planning
• Consideration of when, how and where to attack.
• Researching methods, the target, past incidents
and/or past offenders.
• May consider both practical and symbolic reasons
when selecting a target.
Source:U.S. Department of Justice, Federal Bureau of Investigation (2017)
6
Pathway toViolence: Preparation
• Procuring means for the attack.
• Obtaining skills for the attack.
• Pre-attack staging or cocooning (seeking isolation).
• Red-Zone Indicators (Imminence).
• Dramatic change in appearance or hygiene
• Cleansing/purifying: abrupt or inexplicable cessation of
drugs, alcohol or medication
• Legacy tokens: letters, videos, blogs, communications to
claim responsibility and indicate motivation. Live streaming
is a new trend.
Source:U.S. Department of Justice, Federal Bureau of Investigation (2017)
7
Pathway toViolence: Breach
• Circumvention or testing of security measures.
• Conducting dry runs.
• Cyber intrusion.
• May occur immediately prior to attack or earlier.
Source:U.S. Department of Justice, Federal Bureau of Investigation (2017)
8
Pathway toViolence: Attack
• Violence against preplanned and/or
opportunistically chosen targets.
• Culmination of highly personalized quest for justice
which, ultimately, may only be known to the
offender.
Source:U.S. Department of Justice, Federal Bureau of Investigation (2017)
9
Pathway toViolence: Opportunities for Identification
• Leakage (disclosure).
• Social media.
• Not letting go of an issue.
• Expressing violent solutions to problems.
• Direct or indirect threats of violence.
• Physical violence towards persons or property.
• Fixations on mass targeted violence.
• Suicidal behaviors or statements.
Source:U.S. Department of Justice, Federal Bureau of Investigation (2017)
10
RUN!
IF POSSIBLE AND SAFETO DO SO, FLEETHE AREATO SAFETY.
11
RUN:
If possible & safe, Flee!
• What is a safe location?
• Meet location; reunification.
• Have multiple escape routes and plans in mind
• Evacuate regardless of whether others agree to follow.
• Leave your belongings behind.
• Help others escape, if possible.
• Auditory distortion – identifying location of the threat?
• Prevent individuals from entering the area of the active shooter.
• Keep your hands visible.
• Follow the instructions of law enforcement.
• Do not attempt to move wounded people.
• Call 911 when you are safe.
12
HIDE!
IF FLEEING IS NOT POSSIBLE, QUICKLY MOVE (USHER OTHERS
FROM IMMEDIATE AREA) TO NEAREST LOCKABLE ROOM, LOCK
DOORS, BARRICADE (IF POSSIBLE), AND COMPARTMENTALIZE.
13
HIDE:
Move to lockable room, barricade &
compartmentalize.
• Everything is in play / an option.
• Explore technology / tools to barricade.
• Usher others to safety as long as it’s safe to do so.
• Your hiding place should:
• Be out of the aggressor’s view
• Provide protection if shots are fired in your direction (i.e., an
area with a closed and locked door)
• Not trap you or restrict your options for movement
14
Turn off lights and stay quiet.
• Cell phones need to be off or silent; remember cell
phone backlight.
• Cover windows, including door window.
• DON’T DRAW ATTENTION!
15
Once locked down, no one else will be
allowed in.
• You do not know who the aggressor is.
• You do not know where the aggressor is.
• You MUST provide for the safety of those in your
immediate care.
• Pre-plan: those locked out must RUN!
16
Stay away from doors and windows.
• Stay out of sight.
• In the event the aggressor(s) attempt to gain access
into your locked and/or barricaded area:
• Prepare to fight!
• Arm yourself
• Stack for door breach
17
Remain calm, think clearly, identify
improvised weapons and arm yourself.
• Defend yourself if confronted.
• Be the leader.
• Start planning.
• Ask yourself, “Can I escape?”
18
Can I flee to a safer location?
• Be mindful of all possible escape routes.
• Would it be safer to move or remain in current location?
19
FIGHT!
IF ABOVE ACTIONS ARE NOT POSSIBLE, ANDYOU
ARE CONFRONTED, DEFENDYOURSELF.
20
FIGHT:
IF ABOVE ACTIONS ARE NOT POSSIBLE,
ANDYOU ARE CONFRONTED, DEFEND
YOURSELF.
• Legal justification for self-defense.
• Legal justification in defending others.
• Improvised weapons:
• What are they
• Locate and identify
21
Follow instructions from
administrators and/or law
enforcement
• Real incidents are dynamic and plans have to be
modified according to the incident.
• Don’t argue with Law Enforcement or
Administration.
• There is a good reason behind the decisions
made and the directions given.
22
Fire Alarm
If you hear a fire alarm during an
active shooter crisis:
• Remain in your location.
• Use your senses to determine if
there is a fire.
• If there is a fire at or near your
location, run to another safe
location.
23
Lockdown / Hide / Barricade
• Barricading:
• Lockable / not lockable
• Improvised tools – cords, belts, etc.
• Compartmentalize:
• Multiple barriers
• Door between aggressor(s) and public
• Don’t draw attention:
• Stay out of sight
• Be quiet
• Prepare to fight!
24
Fight
• Identify improvised weapons.
• Formulate strategy:
• Who has what?
• Stack at door
• Stack below muzzle of weapon
• First person grabs weapon
• Everyone else fights aggressor
• Use improvised weapons
• Secure weapon.
• Interacting with Law Enforcement.
25
Other Considerations
• CPRTraining
• First Aid Kit andTraining
• Tourniquet andTraining
26
Questions
27
Safety Alliance – PO BOX 526101, Miami, FL 33152
800-713-3510 | www.safetyalliance.org
All Rights Reserved – 2019 SafeTalk®

More Related Content

Similar to Active Shooter

SecurAlert July 2014 - Active Shooter
SecurAlert   July 2014 - Active ShooterSecurAlert   July 2014 - Active Shooter
SecurAlert July 2014 - Active Shooter
Chris Carney
 
Emergency Action Plan HRPA
Emergency Action Plan HRPAEmergency Action Plan HRPA
Emergency Action Plan HRPA
Laura Lanoue Hrpa
 
Active Shooter / Workplace Violence by CMRRC
Active Shooter / Workplace Violence by CMRRCActive Shooter / Workplace Violence by CMRRC
Active Shooter / Workplace Violence by CMRRC
Atlantic Training, LLC.
 
Surviving an active shooter 2
Surviving an active shooter 2Surviving an active shooter 2
Surviving an active shooter 2
Donielle Haynes
 
Threat Assessment And Security Measures For Risk Management 2
Threat Assessment And Security Measures For Risk Management 2Threat Assessment And Security Measures For Risk Management 2
Threat Assessment And Security Measures For Risk Management 2
mojo_5
 
Threat Assessment And Security Measures For Risk Management 2
Threat Assessment And Security Measures For Risk Management 2Threat Assessment And Security Measures For Risk Management 2
Threat Assessment And Security Measures For Risk Management 2
mojo_5
 
Policies Presentation 2014
Policies Presentation 2014Policies Presentation 2014
Policies Presentation 2014
SHUResLife
 
TITLE IX CONFLICTS & ROLES: MHA NASPA Law Conference 2011
TITLE IX CONFLICTS & ROLES: MHA NASPA Law Conference 2011TITLE IX CONFLICTS & ROLES: MHA NASPA Law Conference 2011
TITLE IX CONFLICTS & ROLES: MHA NASPA Law Conference 2011
Margolis Healy
 
Webinar: Navigating the Criminal Justice System for People with I/DD
Webinar: Navigating the Criminal Justice System for People with I/DD Webinar: Navigating the Criminal Justice System for People with I/DD
Webinar: Navigating the Criminal Justice System for People with I/DD
USC UCEDD at Children's Hospital Los Angeles
 
The Five W's of Policy
The Five W's of PolicyThe Five W's of Policy
The Five W's of Policy
George Buahin
 
The Five W's of Policy*
The Five W's of Policy*The Five W's of Policy*
The Five W's of Policy*
George Buahin
 
P19 active threat response steps toward mitigation_king_mc_evoy_6.12.19
P19 active threat response steps toward mitigation_king_mc_evoy_6.12.19P19 active threat response steps toward mitigation_king_mc_evoy_6.12.19
P19 active threat response steps toward mitigation_king_mc_evoy_6.12.19
National Retail Federation
 
ALICE 300 presentation.pptx
ALICE 300 presentation.pptxALICE 300 presentation.pptx
ALICE 300 presentation.pptx
JaredSuits
 
Situational awareness
Situational awarenessSituational awareness
Situational awareness
Casey Roy
 
Active shooter booklet
Active shooter bookletActive shooter booklet
Active shooter booklet
Honolulu Civil Beat
 
Responding to An Active Shooter: Ready or Not?
Responding to An Active Shooter: Ready or Not?Responding to An Active Shooter: Ready or Not?
Responding to An Active Shooter: Ready or Not?
Joe Rosner
 
Small Team Operations-Knowing Your Client
Small Team Operations-Knowing Your ClientSmall Team Operations-Knowing Your Client
Small Team Operations-Knowing Your Client
Don Moe
 
Guidance for Handling an Active Shooter Event
Guidance for Handling an Active Shooter EventGuidance for Handling an Active Shooter Event
Guidance for Handling an Active Shooter Event
Debbi L. Shaffer, The Audacious Admin
 
Ppt crime prevention talks ppt
Ppt crime prevention talks pptPpt crime prevention talks ppt
Ppt crime prevention talks ppt
JanMichaelFernandez1
 
Active Shooter Training for Library Employees (February 2020)
Active Shooter Training for Library Employees (February 2020)Active Shooter Training for Library Employees (February 2020)
Active Shooter Training for Library Employees (February 2020)
ALAeLearningSolutions
 

Similar to Active Shooter (20)

SecurAlert July 2014 - Active Shooter
SecurAlert   July 2014 - Active ShooterSecurAlert   July 2014 - Active Shooter
SecurAlert July 2014 - Active Shooter
 
Emergency Action Plan HRPA
Emergency Action Plan HRPAEmergency Action Plan HRPA
Emergency Action Plan HRPA
 
Active Shooter / Workplace Violence by CMRRC
Active Shooter / Workplace Violence by CMRRCActive Shooter / Workplace Violence by CMRRC
Active Shooter / Workplace Violence by CMRRC
 
Surviving an active shooter 2
Surviving an active shooter 2Surviving an active shooter 2
Surviving an active shooter 2
 
Threat Assessment And Security Measures For Risk Management 2
Threat Assessment And Security Measures For Risk Management 2Threat Assessment And Security Measures For Risk Management 2
Threat Assessment And Security Measures For Risk Management 2
 
Threat Assessment And Security Measures For Risk Management 2
Threat Assessment And Security Measures For Risk Management 2Threat Assessment And Security Measures For Risk Management 2
Threat Assessment And Security Measures For Risk Management 2
 
Policies Presentation 2014
Policies Presentation 2014Policies Presentation 2014
Policies Presentation 2014
 
TITLE IX CONFLICTS & ROLES: MHA NASPA Law Conference 2011
TITLE IX CONFLICTS & ROLES: MHA NASPA Law Conference 2011TITLE IX CONFLICTS & ROLES: MHA NASPA Law Conference 2011
TITLE IX CONFLICTS & ROLES: MHA NASPA Law Conference 2011
 
Webinar: Navigating the Criminal Justice System for People with I/DD
Webinar: Navigating the Criminal Justice System for People with I/DD Webinar: Navigating the Criminal Justice System for People with I/DD
Webinar: Navigating the Criminal Justice System for People with I/DD
 
The Five W's of Policy
The Five W's of PolicyThe Five W's of Policy
The Five W's of Policy
 
The Five W's of Policy*
The Five W's of Policy*The Five W's of Policy*
The Five W's of Policy*
 
P19 active threat response steps toward mitigation_king_mc_evoy_6.12.19
P19 active threat response steps toward mitigation_king_mc_evoy_6.12.19P19 active threat response steps toward mitigation_king_mc_evoy_6.12.19
P19 active threat response steps toward mitigation_king_mc_evoy_6.12.19
 
ALICE 300 presentation.pptx
ALICE 300 presentation.pptxALICE 300 presentation.pptx
ALICE 300 presentation.pptx
 
Situational awareness
Situational awarenessSituational awareness
Situational awareness
 
Active shooter booklet
Active shooter bookletActive shooter booklet
Active shooter booklet
 
Responding to An Active Shooter: Ready or Not?
Responding to An Active Shooter: Ready or Not?Responding to An Active Shooter: Ready or Not?
Responding to An Active Shooter: Ready or Not?
 
Small Team Operations-Knowing Your Client
Small Team Operations-Knowing Your ClientSmall Team Operations-Knowing Your Client
Small Team Operations-Knowing Your Client
 
Guidance for Handling an Active Shooter Event
Guidance for Handling an Active Shooter EventGuidance for Handling an Active Shooter Event
Guidance for Handling an Active Shooter Event
 
Ppt crime prevention talks ppt
Ppt crime prevention talks pptPpt crime prevention talks ppt
Ppt crime prevention talks ppt
 
Active Shooter Training for Library Employees (February 2020)
Active Shooter Training for Library Employees (February 2020)Active Shooter Training for Library Employees (February 2020)
Active Shooter Training for Library Employees (February 2020)
 

Recently uploaded

Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
MJDuyan
 
Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"
National Information Standards Organization (NISO)
 
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
National Information Standards Organization (NISO)
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
GeorgeMilliken2
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
siemaillard
 
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
Nguyen Thanh Tu Collection
 
A Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two HeartsA Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two Hearts
Steve Thomason
 
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptxRESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
zuzanka
 
Skimbleshanks-The-Railway-Cat by T S Eliot
Skimbleshanks-The-Railway-Cat by T S EliotSkimbleshanks-The-Railway-Cat by T S Eliot
Skimbleshanks-The-Railway-Cat by T S Eliot
nitinpv4ai
 
CIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdfCIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdf
blueshagoo1
 
The basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptxThe basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptx
heathfieldcps1
 
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
EduSkills OECD
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
TechSoup
 
Bonku-Babus-Friend by Sathyajith Ray (9)
Bonku-Babus-Friend by Sathyajith Ray  (9)Bonku-Babus-Friend by Sathyajith Ray  (9)
Bonku-Babus-Friend by Sathyajith Ray (9)
nitinpv4ai
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
HajraNaeem15
 
Stack Memory Organization of 8086 Microprocessor
Stack Memory Organization of 8086 MicroprocessorStack Memory Organization of 8086 Microprocessor
Stack Memory Organization of 8086 Microprocessor
JomonJoseph58
 
Data Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsxData Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsx
Prof. Dr. K. Adisesha
 
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
haiqairshad
 
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptxBIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
RidwanHassanYusuf
 
How Barcodes Can Be Leveraged Within Odoo 17
How Barcodes Can Be Leveraged Within Odoo 17How Barcodes Can Be Leveraged Within Odoo 17
How Barcodes Can Be Leveraged Within Odoo 17
Celine George
 

Recently uploaded (20)

Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
 
Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"
 
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
 
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
 
A Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two HeartsA Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two Hearts
 
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptxRESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
 
Skimbleshanks-The-Railway-Cat by T S Eliot
Skimbleshanks-The-Railway-Cat by T S EliotSkimbleshanks-The-Railway-Cat by T S Eliot
Skimbleshanks-The-Railway-Cat by T S Eliot
 
CIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdfCIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdf
 
The basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptxThe basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptx
 
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
 
Bonku-Babus-Friend by Sathyajith Ray (9)
Bonku-Babus-Friend by Sathyajith Ray  (9)Bonku-Babus-Friend by Sathyajith Ray  (9)
Bonku-Babus-Friend by Sathyajith Ray (9)
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
 
Stack Memory Organization of 8086 Microprocessor
Stack Memory Organization of 8086 MicroprocessorStack Memory Organization of 8086 Microprocessor
Stack Memory Organization of 8086 Microprocessor
 
Data Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsxData Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsx
 
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
 
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptxBIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
 
How Barcodes Can Be Leveraged Within Odoo 17
How Barcodes Can Be Leveraged Within Odoo 17How Barcodes Can Be Leveraged Within Odoo 17
How Barcodes Can Be Leveraged Within Odoo 17
 

Active Shooter

  • 1. Active Shooter Identifying, Assessing, and Managing the Threat
  • 2. Situational Awareness “INCREASED SECURITY = INCREASED INCONVENIENCE” • If you see something, say something. • Assess surroundings for threats. • What should be normal in your area/situation? • Identify and gauge the danger of elements around you. • All contractors should diligently adhere to all safety protocols. • Use your imagination to plan for different situations. • Address those who aren’t following protocols. • Try to identify threats. • Fight against complacency. 2
  • 3. Situational Awareness: Pathway toViolence • Grievance • Ideation • Research / Planning • Preparation • Breach • Attack Source:U.S. Department of Justice, Federal Bureau of Investigation (2017); Calhoun andWeston (2003) 3
  • 4. Pathway toViolence: Grievance • Significant personal loss, humiliation or setback; whether perceived or real. • Could be against person, institution or other entity. • Lack of interest to non-violent resolutions to a grievance. • Deliberate or inadvertent disclosure of violent or future plans. Source:U.S. Department of Justice, Federal Bureau of Investigation (2017) 4
  • 5. Pathway toViolence: Ideation • Pervasive, persistent fantasies where offender victimizes others. • Problematic or concerning interpersonal interaction with others (being bullied or bullying). • Compromised ability to cope with stressors or setbacks. • Increased isolation, depression and withdraw. • Preoccupation with past attacks or attackers. • Escalated interest in obtaining firearms and/or explosives. • Escalated interest in tactical gear, clothing or paraphernalia. Source: U.S. Department ofJustice, Federal Bureau of Investigation (2017) 5
  • 6. Pathway toViolence: Research and Planning • Consideration of when, how and where to attack. • Researching methods, the target, past incidents and/or past offenders. • May consider both practical and symbolic reasons when selecting a target. Source:U.S. Department of Justice, Federal Bureau of Investigation (2017) 6
  • 7. Pathway toViolence: Preparation • Procuring means for the attack. • Obtaining skills for the attack. • Pre-attack staging or cocooning (seeking isolation). • Red-Zone Indicators (Imminence). • Dramatic change in appearance or hygiene • Cleansing/purifying: abrupt or inexplicable cessation of drugs, alcohol or medication • Legacy tokens: letters, videos, blogs, communications to claim responsibility and indicate motivation. Live streaming is a new trend. Source:U.S. Department of Justice, Federal Bureau of Investigation (2017) 7
  • 8. Pathway toViolence: Breach • Circumvention or testing of security measures. • Conducting dry runs. • Cyber intrusion. • May occur immediately prior to attack or earlier. Source:U.S. Department of Justice, Federal Bureau of Investigation (2017) 8
  • 9. Pathway toViolence: Attack • Violence against preplanned and/or opportunistically chosen targets. • Culmination of highly personalized quest for justice which, ultimately, may only be known to the offender. Source:U.S. Department of Justice, Federal Bureau of Investigation (2017) 9
  • 10. Pathway toViolence: Opportunities for Identification • Leakage (disclosure). • Social media. • Not letting go of an issue. • Expressing violent solutions to problems. • Direct or indirect threats of violence. • Physical violence towards persons or property. • Fixations on mass targeted violence. • Suicidal behaviors or statements. Source:U.S. Department of Justice, Federal Bureau of Investigation (2017) 10
  • 11. RUN! IF POSSIBLE AND SAFETO DO SO, FLEETHE AREATO SAFETY. 11
  • 12. RUN: If possible & safe, Flee! • What is a safe location? • Meet location; reunification. • Have multiple escape routes and plans in mind • Evacuate regardless of whether others agree to follow. • Leave your belongings behind. • Help others escape, if possible. • Auditory distortion – identifying location of the threat? • Prevent individuals from entering the area of the active shooter. • Keep your hands visible. • Follow the instructions of law enforcement. • Do not attempt to move wounded people. • Call 911 when you are safe. 12
  • 13. HIDE! IF FLEEING IS NOT POSSIBLE, QUICKLY MOVE (USHER OTHERS FROM IMMEDIATE AREA) TO NEAREST LOCKABLE ROOM, LOCK DOORS, BARRICADE (IF POSSIBLE), AND COMPARTMENTALIZE. 13
  • 14. HIDE: Move to lockable room, barricade & compartmentalize. • Everything is in play / an option. • Explore technology / tools to barricade. • Usher others to safety as long as it’s safe to do so. • Your hiding place should: • Be out of the aggressor’s view • Provide protection if shots are fired in your direction (i.e., an area with a closed and locked door) • Not trap you or restrict your options for movement 14
  • 15. Turn off lights and stay quiet. • Cell phones need to be off or silent; remember cell phone backlight. • Cover windows, including door window. • DON’T DRAW ATTENTION! 15
  • 16. Once locked down, no one else will be allowed in. • You do not know who the aggressor is. • You do not know where the aggressor is. • You MUST provide for the safety of those in your immediate care. • Pre-plan: those locked out must RUN! 16
  • 17. Stay away from doors and windows. • Stay out of sight. • In the event the aggressor(s) attempt to gain access into your locked and/or barricaded area: • Prepare to fight! • Arm yourself • Stack for door breach 17
  • 18. Remain calm, think clearly, identify improvised weapons and arm yourself. • Defend yourself if confronted. • Be the leader. • Start planning. • Ask yourself, “Can I escape?” 18
  • 19. Can I flee to a safer location? • Be mindful of all possible escape routes. • Would it be safer to move or remain in current location? 19
  • 20. FIGHT! IF ABOVE ACTIONS ARE NOT POSSIBLE, ANDYOU ARE CONFRONTED, DEFENDYOURSELF. 20
  • 21. FIGHT: IF ABOVE ACTIONS ARE NOT POSSIBLE, ANDYOU ARE CONFRONTED, DEFEND YOURSELF. • Legal justification for self-defense. • Legal justification in defending others. • Improvised weapons: • What are they • Locate and identify 21
  • 22. Follow instructions from administrators and/or law enforcement • Real incidents are dynamic and plans have to be modified according to the incident. • Don’t argue with Law Enforcement or Administration. • There is a good reason behind the decisions made and the directions given. 22
  • 23. Fire Alarm If you hear a fire alarm during an active shooter crisis: • Remain in your location. • Use your senses to determine if there is a fire. • If there is a fire at or near your location, run to another safe location. 23
  • 24. Lockdown / Hide / Barricade • Barricading: • Lockable / not lockable • Improvised tools – cords, belts, etc. • Compartmentalize: • Multiple barriers • Door between aggressor(s) and public • Don’t draw attention: • Stay out of sight • Be quiet • Prepare to fight! 24
  • 25. Fight • Identify improvised weapons. • Formulate strategy: • Who has what? • Stack at door • Stack below muzzle of weapon • First person grabs weapon • Everyone else fights aggressor • Use improvised weapons • Secure weapon. • Interacting with Law Enforcement. 25
  • 26. Other Considerations • CPRTraining • First Aid Kit andTraining • Tourniquet andTraining 26
  • 27. Questions 27 Safety Alliance – PO BOX 526101, Miami, FL 33152 800-713-3510 | www.safetyalliance.org All Rights Reserved – 2019 SafeTalk®

Editor's Notes

  1. Each student and staff member’s security depends on you. Security comes at a cost; usually the cost of convenience. The foundation of security rests upon information gathering. Authorities cannot act if they are unaware of potential incidents. No matter how minor the information may seem, it is imperative that the information be shared with authorities (school administration and law enforcement). Always assess your area for threats and what appears to be out of the ordinary throughout the campus. Avoid distractions. Each person knows and recognizes what is normal in their specific work location. The safety of each person depends on everyone following all safety protocols. Think through different situations and plan accordingly. This is key to personal preparedness. Finally, don’t allow complacency to take place. Situations occur when people least expect them. Always be prepared. Safety and security requires continued vigilance.
  2. There is no demographic profile of a targeted violence offender. Objective assessment of threat enhancing and mitigating circumstances is the key to evaluating concern for violence. Any individual, no matter what age, sex, race, religion, education or income level, marital status, or occupation, has the potential to engage in targeted violence. The first step in preventing future violence is identifying and evaluating a person’s behaviors. No single behavior is predictive of targeted violence; rather, a “perfect storm” sometimes develops based on a multitude of factors and conditions. When conducting an assessment, the facts and circumstances identified in this chapter must each be examined while focusing on the person of concern, the potential target(s), the situation, and the setting. Threat assessment is a multifaceted process, stemming from a holistic analysis of the pattern of behaviors displayed by a person of concern. Elementary risk factors differ from middle and high school and are typically external in nature. Source: Making Prevention a Reality: Identifying, Assessing, and Managing the Threat of Targeted Attacks. U.S. Department of Justice, Federal Bureau of Investigation (2017)
  3. The traditionally known pathway to violence model is an excellent place to begin the discussion because it addresses the question of “why?” It describes a first step on the journey toward intended violence as the formation of a deeply held personal grievance or humiliation based upon real or imagined injustices inflicted upon the grievant. This grievance could be against an individual, an institution, or other entity the person of concern feels slighted or wronged him. It may be nurtured and cultivated over time, even years. Depending upon the particular individual, it may be plainly evident to all around him or kept hidden and private. Although there are cases of targeted violence in which a grievance or motivation was never identified, this appears to be rare with regard to the kind of mass targeted violence attacks this guide addresses. Regardless of whether a specific grievance exists or can be pinpointed, only a few general motives for mass targeted violence offending appear to be prevalent in the experience of the BAU. They include: Revenge for a perceived injury or grievance Quest for justice (as defined by the offender) Desire for notoriety or recognition Desire to solve a problem perceived to be unbearable Desire to kill or be killed Source: Making Prevention a Reality: Identifying, Assessing, and Managing the Threat of Targeted Attacks. U.S. Department of Justice, Federal Bureau of Investigation (2017)
  4. When a person of concern for targeted violence is unable to resolve the negative emotional burden of unachieved justice, he could then progress to a violent ideation: the idea that violence is an acceptable, or even the only, means of achieving redress. Unable to shake off a grievance and its accompanying anger, despair, humiliation, or other negative emotional responses, the person of concern may eventually conclude that violence is justified, necessary, and his only choice. The adoption of this idea can be profoundly relieving, almost like a salve on a wound. It is for this reason that a sudden turnaround by a formerly angry, depressed, or menacing person of concern should not be presumed as good news. More assessment is often prudent. Expressed violent ideations can also offer hints about targeting, means of potential attack, or other vital clues to the thoughts and plans of a person of concern. Source: Making Prevention a Reality: Identifying, Assessing, and Managing the Threat of Targeted Attacks. U.S. Department of Justice, Federal Bureau of Investigation (2017)
  5. Once a person of concern decides that violence should or must be used to seek justice for real or perceived wrongs, under most circumstances he must then begin to think and plan. The person of concern then considers when, how, and where to offend. He can craft and refine his plan by researching methods, the planned target, past offenders, and previous targeted violence incidents. The person of concern may consider both practical and symbolic reasons when selecting potential targets. As with other steps along the pathway, research and planning need not cease when the next step begins; it can and may comingle with other steps. Source: Making Prevention a Reality: Identifying, Assessing, and Managing the Threat of Targeted Attacks. U.S. Department of Justice, Federal Bureau of Investigation (2017)
  6. The person of concern may acquire the equipment, skills, and/or any other resources necessary to conduct the attack. This can include obtaining weapons and gear as well as familiarization of and practice with the weapons. The person may conduct an actual or virtual rehearsal of any aspect of the attack (e.g., driving the intended route to the site). It can also include farewell writings or other end of life planning, or creation of artifacts meant to be left behind to claim credit and explain motive. Source: Making Prevention a Reality: Identifying, Assessing, and Managing the Threat of Targeted Attacks. U.S. Department of Justice, Federal Bureau of Investigation (2017)
  7. This step involves circumvention of security measures or boundaries at the target location. Breach activities can include conducting dry runs, engaging in approach behaviors to include stalking, and testing security at the target location. In practice, the BAU has expanded this definition to include cyber intrusion behaviors where these breaches may be intended to identify security plans and weaknesses, gain protected information about a target, or otherwise further an attack plan via unauthorized access to systems. Breach behavior may occur immediately prior to an attack, or earlier. Source: Making Prevention a Reality: Identifying, Assessing, and Managing the Threat of Targeted Attacks. U.S. Department of Justice, Federal Bureau of Investigation (2017)
  8. An offense may involve violence against both preplanned and opportunistically chosen targets. Both practical and symbolic acts may occur. The violent offense is the culmination of a highly personalized quest for justice which may, ultimately, only be fully understandable to the offender. Source: Making Prevention a Reality: Identifying, Assessing, and Managing the Threat of Targeted Attacks. U.S. Department of Justice, Federal Bureau of Investigation (2017)
  9. Leakage has been defined as a communication to a third party of intent to do harm to a target through an attack. Homicide and suicide are more closely linked than many think. In many cases multiple homicides are linked with prior suicide attempts, gestures, or suicidal ideation on the part of the perpetrator. This is especially true with targeted violence. A “Safe Schools Initiative” research project revealed that 78% (32 of 41 studied) of targeted mass attackers exhibited a history of suicide attempts or suicidal thoughts at some point prior to their attack. Moreover, many offenders attempt or succeed at suicide or “suicide by cop” at the conclusion of a targeted violence event. If you become aware of these indicators, notify your administration. Most of these factors will not violate the law or justify a Baker Act. The focus is to get help where help is needed. Source: Making Prevention a Reality: Identifying, Assessing, and Managing the Threat of Targeted Attacks. U.S. Department of Justice, Federal Bureau of Investigation (2017)
  10. Fleeing danger is the best option if it is safe to do so. If the environment outside your location is more dangerous than your location, then locking down may be your best option. This is a judgment call on each faculty/staff member’s part. Decisions will always be questioned. With this in mind, be decisive.
  11. A safe location could be a ‘safer’ location than your present location, or it could be away from your location altogether. Again, one must determine if safety is enhanced or compromised by fleeing. If you are in doubt, remain in your safe location until you determine it is safer to flee. During transition times, assemblies, arrival and/or dismissal, fleeing may be the only option. Having multiple escape routes and escape plans in mind will assist you in determining what is best in your current situation. Active shooters have chained exterior doors shut to trap victims. Under stress and due to the environment, it is difficult to determine where the danger is. Gunshots inside a school campus will sound very different than gunshots in an open environment. Consider a car back-firing in a parking lot. When fleeing, keep your hands visible as that is what law enforcement is trained to look at. Strictly follow their instructions and allow then to do their job. You cannot safely move wounded people when there is an armed individual moving around the facility. Call 9-1-1 when you and your group are in a safe location.
  12. If safe to do so, usher people into your safe location. Armed aggressors, like water, follow the path of least resistance. Remove their opportunity to hurt you/others.
  13. Staff members should develop plans of action for their specific locations. Each location is unique and requires thought to use your environment to your advantage. All desks, chairs, tables, computers, ANYTHING can be used to protect yourself. Identify items to be used to barricade and items that could be used as a weapon. Give yourself permission to use anything to protect yourself and others when life is in danger.
  14. One potential problem with active shooter incidents is that students use their phones to notify parents and social media. We will not be able to effectively control this; however, we should discourage it to the extent that using phones draws the attention of the aggressor(s). The goal of being locked down is to not be seen, heard or draw attention.
  15. Why? The question is one of reasonableness: would a reasonable person lock out students/persons when there is no immediate threat present or would a reasonable person allow proximal students/people into their location before locking down? Once you lock the door and barricade, do not allow anyone else to come in. This prioritizes the need to train students who are locked out to flee to safety. Once locked down, barricade yourself if possible and compartmentalize (lock down in other rooms) if possible.
  16. Do not draw attention. If all of your efforts to hide are being circumvented by the aggressor, prepare to fight. Defending yourself and identifying improvised weapons will be covered later in the presentation.
  17. If you are confronted by the aggressor(s), FIGHT! As faculty/staff members, take control of your specific situation. Organize those in your immediate area and plan. What if the aggressor comes here? Always be mindful of escape routes and opportunities. Pay close attention to your surroundings. Defending yourself and identifying improvised weapons will be covered later in the presentation.
  18. Always be mindful of primary and alternate escape routes. If it becomes safer to flee than remain in your current location, flee! As part of training, identify escape routes in training location.
  19. Be prepared for lots of questions. 776.012 Use or threatened use of force in defense of person.—(1) A person is justified in using or threatening to use force, except deadly force, against another when and to the extent that the person reasonably believes that such conduct is necessary to defend himself or herself or another against the other’s imminent use of unlawful force. A person who uses or threatens to use force in accordance with this subsection does not have a duty to retreat before using or threatening to use such force. (2) A person is justified in using or threatening to use deadly force if he or she reasonably believes that using or threatening to use such force is necessary to prevent imminent death or great bodily harm to himself or herself or another or to prevent the imminent commission of a forcible felony. A person who uses or threatens to use deadly force in accordance with this subsection does not have a duty to retreat and has the right to stand his or her ground if the person using or threatening to use the deadly force is not engaged in a criminal activity and is in a place where he or she has a right to be. Locate and identify improvised weapons that would be present in a classroom, work area or in the actual training location.
  20. Emergency management plans are developed on paper with significant thought; however, real incidents unfold in ways we cannot expect. Due to the dynamics of each incident, decisions are made on evacuation locations, routes, safety zones, etc. to protect the citizenry as well as preserve the crime scene. When advised by law enforcement or administrators, do what they tell you. There are reasons behind the decisions; the most important being safety.
  21. Active shooters have utilized fire alarms to draw innocent people out to them. Under these circumstances, faculty/staff should use their senses to determine if the fire alarm represents a fire threat or is being used to draw people out.
  22. Demonstrate and explain these elements Securing in-swing vs out-swing doors Tie-downs Do this only when safe to do so