Guard Force Management Camera ComplicationsGP0|#cd529cb2-129a-4422-a2d3-73680b0014d8;L0|#0cd529cb2-129a-4422-a2d3-73680b0014d8|Physical Security;GTSet|#8accba12-4830-47cd-9299-2b34a43444652019-05-01T04:00:00Z<p>​Use of body-worn cameras, or body cams, by police departments continues to trend up. According to a survey released in August 2018 by the Police Executive Research Forum, more than 80 percent of U.S. police agencies are either using body cams now or have plans to do so in the near future. More than 85 percent of the departments that currently use body cams would recommend them to others.<br><br>“Body-worn cameras can demonstrate that a police agency is willing to be transparent and accountable for its actions. The conceptual appeal of body-worn cameras has led to rapid adoption of the technology in police agencies across the country,” the report found. </p><p>Other developments have helped drive this swift adoption. In late 2014, the Obama administration proposed the $263 million Body-Worn Camera Partnership Program, a federally funded body-camera advocacy initiative for states and localities. The program was later approved.</p><p>At around the same time, the police department in Rialto, California, participated in an influential study, <em><a href="">Self-Awareness to Being Watched and Socially-Desirable Behavior: A Field Experiment on the Effect of Body-Worn Cameras on Police Use-of-Force</a>.</em> The study found that, during a year-long trial period of body cam use, public complaints against officers fell 88 percent compared with the previous 12 months.</p><p>But lately, there have been a few reality checks. In 2017, Washington, D.C., officials released the surprising results of their own randomized controlled trial of body cam use by the city’s police department. The study found that body cam use had no detectable effects on police discretion, as measured by arrests for disorderly conduct. And the D.C. study featured more than 2,000 police officers, compared to 54 in the Rialto experiment.</p><p>“These results suggest we should recalibrate our expectations” that body cams will cause a large-scale behavioral change in policing, particularly in contexts similar to Washington, D.C., the study explained. </p><p>Another challenge is cost. Video storage can be expensive, especially when dealing with a high volume. These cost factors recently caused some police departments to drop, or consider dropping, their body cam programs, according to recent media reports.</p><p>For example, in February, Unified Police Department officers in Salt Lake County, Utah, said their agency may discontinue use of body cameras, partly due to the high costs for digital video storage. Previously, the department outfitted 125 of its 410 officers with body cams, using funding from a grant that expires this year. But supplying all officers would cost more than $400,000 per year, according to the agency.</p><p>Cost can also present an issue for smaller departments, such as the one in East Dundee, a village suburb of Chicago. The police department there ordered body cameras for its 17 police officers. Before they could be put to use, a new police chief persuaded local officials to cancel the program. The chief argued that the $20,000 annual fee for the cameras and video storage could not be justified as a budget expense.</p><p>Still, while not every police department is jumping on the body cam bandwagon, others have expressed great satisfaction with their programs. Jeff Karpovich, CPP, the chief of security and director of transportation at High Point University in High Point, North Carolina, found that his security force’s use of body cameras—called “chest cams” because of where they are worn on the uniform—has been a big help, for several reasons.</p><p>One is that they have increased accountability. “Our officers are as human as anyone else out there, and some may have the inclination to say things and do things that they probably shouldn’t do if nobody is looking,” says Karpovich, who is a member of ASIS International. But an active chest cam acts as a “digital supervisor,” nudging officers to comply with all rules and regulations.</p><p>Another reason is that chest-cam video frequently serves as a means of exoneration in response to complaints lodged against officers. “It proves to others they did what they were supposed to do,” he explains. “It has exonerated them time and time again.”​</p><p>Furthermore, chest-cam video provides great value as evidence. “If a picture is worth a thousand words, video is worth a million words,” Karpovich says. </p><p>However, this value comes with a responsibility: video must be produced when it is needed, so technical glitches are costly. Citizens understand if a scuffle between an officer and a civilian leads to unwatchable or unusable video, Karpovich explains. But if an incident that should have been recorded was not recorded, or if there is an unexplained gap during crucial moments in a video, citizens become suspicious. “The absence of chest-cam video reeks of cover-up,” Karpovich says. “If we have a program like this, we had best have it working properly.”<br></p><p>High Point’s security force follows rules set out in its standard operating procedure (SOP), but since it is not a police department, it is not covered by the growing types of state regulations that are now being formulated regarding public access to body cam video. In 2018, lawmakers in 36 states and D.C. introduced legislation aimed at creating statewide rules governing the use of body cameras, according to a recent <em>Washington Post </em>report<em>. </em>Often, these efforts are driven by an attempt to increase transparency.</p><p>For example, in February, a New York appellate court determined that the public has the right to view footage from body cameras. The ruling rejected an argument made by the Patrolmen's Benevolent Association, the New York City police union, that public access to video should be blocked under a state law that requires police personnel records be kept secret.</p><p>At High Point, Karpovich says the chest cam program developed into a successful and beneficial enterprise. Although video is not kept forever, it is stored for a limited amount of time in case relevant complaints are made, making costs manageable. Also, certain safeguards prevent video from being released on YouTube or social media, such as password protections that greatly limit the number of people in-house who can access video. <br></p><p>“I don’t see anything derailing this,” he says of the camera program. “It’s a proven tool.”</p>

Guard Force Management Camera Complications Force Trends: Multipliers and the Market Future of Office Security Relationships the Control Room of Tomorrow.aspx2018-12-01T05:00:00ZBuilding the Control Room of Tomorrow,-Individual-Wellness.aspx2018-08-01T04:00:00ZOrganizational Health, Individual Wellness Balk on Bud,-Unarmed-Officer.aspx2018-04-01T04:00:00ZActive Assailant, Unarmed Officer the Force and the United Nations in the Workplace Are People First Technology with a Personal Touch a Professional Guard Force Education Sessions Address Security Challenges Thanks: National Security Officer Appreciation Week Kicks Off Color Theory 2 Peer Protection Guard Scheduling Conundrum¡PRESTA-ATENCIÓN!.aspx2017-07-13T04:00:00Z¡PRESTA ATENCIÓN!

 You May Also Like... 2018 Industry News<h4>City Safety</h4><div><div>The borough of Runnymede, about an hour from London, contracted service provider Safer Runnymede to improve safety for the area. Working with Nottinghamshire-based systems integrator Central Security Systems, the experts installed a platform combining public safety technology with personal safety services such as care solutions for the elderly.</div><div><br> </div><div>All connected solutions are consolidated in a control room where three operators monitor security feeds from more than 500 security cameras deployed around the district, as well as in schools, hospitals, and other public buildings.</div><div> </div><div>The video security system originally used hardware from several manufacturers. Aiming for a future-proof and scalable system, officials asked Bosch to design a fully IP-based security camera architecture. Because the system already included a Bosch monitor wall plus encoders, cameras, management system, and storage devices, integrators could leverage the initial investment into a full suite of Bosch solutions. Migrating to an integrated IP network has proven effective.</div><div><br> </div><div><h4>PARTNERSHIPS AND DEALS</h4><div>ABP Technology is distributing end-to-end environmental monitoring and access control solutions from Kentix.</div><div><br> </div><div>ACRE and its subsidiaries formed a strategic alliance with AlertEnterprise to expand and diversify technology options for customers.</div><div><br> </div><div>Amika Mobile and Dell EMC announced an OEM partnership for critical and emergency communications relating to FirstNet.</div><div><br> </div><div>AT&T and Ericsson are joining forces to help safeguard IoT devices from growing cybersecurity threats.​</div><div><br> </div><div>The Australian Transport Safety Bureau and the Australian Certified UAV Operators Inc. joined forces to improve transport safety as the unmanned sector of aviation grows.</div><div><br> </div><div>Critical Response Group, Inc., and Capita Secure Solutions and Services formed a strategic partnership to bring Capita’s 911eye emergency video streaming service to the United States.</div><div><br> </div><div>Exiger announced that Transparency International UK will adopt its artificial intelligence solution. </div><div><br> </div><div>Kingston Technology Company, Inc., is partnering with Ontrack to offer data erasure services.</div><div><br> </div><div>LaSorsa & Associates is partnering with Tony Scotti’s Vehicle Dynamics Institute for specialized driver training.</div><div><br> </div><div>LumenVox LLC and SmilePass Ltd. are making voice-based biometric authentication available in the SmilePass Identity and Authentication Platform.</div><div><br> </div><div>NetDiligence formed a strategic alliance with InfoArmor.</div><div><br> </div><div>Artificial intelligence technology from Onfido is helping Remitly prevent fraud and financial crime.</div><div><br> </div><div>OnSolve and RockDove Solutions are working together to improve secure crisis communications.</div><div><br> </div><div>PSA is partnering with Brivo to offer its members opportunities for increasing recurring monthly revenue.</div><div><br> </div><div>Qualys, Inc., announced a new integration with Microsoft Azure Stack for security and compliance.</div><div><br> </div><div>RapidSOS is partnering with Google to deliver 911 caller location information to public safety agencies nationwide.</div><div><br> </div><div>Spear, Incorporated, and LexisNexis Risk Solutions are working together to broaden and secure public access to U.S. federal agencies using</div><div><br> </div><div>Systech and FarmaTrust are working on a blockchain-enabled solution to ensure product authenticity for the pharmaceutical industry.</div><div><br> </div><div>Toppan Printing Co., Ltd., teamed up with Trusona to provide Trusona’s login solution to financial institutions and large enterprises throughout Japan.</div><div><br> </div><div>Trident Manor Limited announced a partnership with Newcastle International Airport Training Academy to deliver a range of security training programs.</div><div><br> </div><div>Trillium Secure, Inc., partnered with the University of Michigan TechLab at Mcity program to conduct research on defending vehicles from cyberattack.</div><div><br> </div><h4>GOVERNMENT CONTRACTS</h4><div>The City of Fort Lauderdale chose Agile Interoperable Solutions to provide integrative communications technologies for its first responders and public safety managers.</div><div> </div><div>Ava Group announced that its solution was selected to protect a major military closed data network from the threat of tampering and tapping in support of India’s Ministry of Defence.</div><div><br> </div><div>The Boston Police Department contracted with Axon for a body-worn camera program.</div><div><br> </div><div>Bittium will supply tactical radios to the pilot vehicles of the Spanish Army’s VCR 8x8 vehicle program.</div><div><br> </div><div>Cubic Corporation announced that its Cubic Transportation Systems division has signed a contract with the San Francisco Bay Area’s Metropolitan Transportation Commission to deliver next-generation fare payment technology and operational services.</div><div><br> </div><div>IDEMIA will provide its Universal Enrollment Platform for statewide applicant fingerprinting to the agencies and citizens of Colorado.</div><div><br> </div><div>Integrated Defense and Security Solutions announced that the Transportation Security Administration acquired additional advanced DETECT 1000 screening systems.</div><div><br> </div><div>Arlington, Texas, selected Knight Security Systems as its primary security integrator, partner, and long-term architect for a security infrastructure overhaul.</div><div><br> </div><div>Miami International Airport and San Jose International Airport were selected by the Transportation Security Administration as test sites for perimeter intrusion detection and deterrence.</div><div><br> </div><div>Smiths Detection announced the sale of its screening devices to several Chinese airports managed by Yunnan Airport Group.</div><div><br> </div><div>Trumbull County, Ohio, has a new public safety call-handling solution from Total Response.</div><div><br> </div><div>Valiant Integrated Services was awarded a key contract to support the U.S. Army National Guard and provide training services.</div><div><br> </div><div>With support from the Iraqi Ministry of Interior, Veridos is building an identity document factory in Baghdad for electronic ID cards and passports.</div><div><br> </div><h4>AWARDS AND CERTIFICATIONS</h4><div>ASIS International presented its Innovative Product Awards, formerly known as Accolades, at GSX 2018 in Las Vegas in September. Among the winners are MorphoWave Compact by IDEMIA; FaceDetect by Verint; UNG52 Speech Protector by Santor Security Inc.; IntelAssure powered by Viakoo by STANLEY Security; Halo IOT Multi-Sensor by IPVideo Corp.; Fortem SkyDome by Fortem Technologies; AXIS Device Manager by Axis Communications; PMN – 9000VQ by Hanwha Techwin America; Pivot3 Large-scale Surveillance Solution by Pivot3; and Verkada Security Cameras by Verkada.</div><div><br> </div><div>Delta Scientific was awarded SAFETY Act certification by the U.S. Department of Homeland Security.</div><div> </div><div>Edesix was named in <em>The Sunday Times</em> Hiscox Tech Track 100, which highlights the fastest-growing private technology companies in the United Kingdom.</div><div> </div><div>Nok Nok Labs announced that its award winning Nok Nok S3 Authentication Suite is FIDO2 certified by the FIDO Alliance.</div><div><br> </div><div>Pivot3 infrastructure solutions for mission-critical IoT, safe cities and smart building environments are certified for operating with Milestone Systems video management software.</div><div>SCI Technology, Inc., announced that its AeroGuard CUAS (Counter-Unmanned Aircraft Systems) product was named the 2018 Drone Security New Product of the Year by <em>Security Today</em> magazine.</div><div><br> </div><div>TruTag Technologies received the 2018 Best for Pharmaceutical Brand Protection award from <em>GHP Magazine</em>.</div><div><br> </div><div>V5 Systems won the SSI Security Solutions Award for its V5 Acoustic Gunshot Sensor with Video.</div><div><br> </div><h4>ANNOUNCEMENTS</h4><div>The American Foundation for Suicide Prevention and the American College of Emergency Physicians will jointly develop a mental health and suicide prevention national awards program.</div><div><br> </div><div>ASSA ABLOY and its brands have launched a digital library for fast access to production information.</div><div><br> </div><div>CenTrak, Inc., acquired select assets of Elpas Solutions Ltd., an indirect subsidiary of Johnson Controls International Plc. </div><div><br> </div><div>Check Point and Dallas-based El Centro College will offer a free cybersecurity curriculum for more than 12,000 students.</div><div><br> </div><div>The Cloud Security Alliance is opening a new CSA Europe head­quarters and creating a new General Data Protection Regulation (GDPR) Center of Excellence for cloud computing in Berlin.</div><div><br> </div><div>The Committee to Protect Journalists released a Safety Kit that includes safety notes to help journalists prepare for assignments, first aid videos, an updated <em>Journalist Security Guide, </em>and an expanded resource center. </div><div><br> </div><div>The Electronic Transactions Association announced the ETA Self-Regulation Program, which seeks to improve security and reduce risk in the payments industry.</div><div><br> </div><div>The FIDO Alliance announced its Biometric Component Certification Program.</div><div><br> </div><div>G4S launched a new Security Risk IQ tool to help clients measure potential risk to an organization. The tool is part of G4S’ new online magazine, <em>Security Risk IQ.</em></div><div><br> </div><div>Magos Systems is expanding into the North American market.</div><div><br> </div><div>Marquee Security opened a new U.S. headquarters in Morris Plains, New Jersey.</div><div><br> </div><div>The National Health Information Sharing and Analysis Center (NH-ISAC) changed its name to the Health Information Sharing and Analysis Center (H-ISAC).</div><div><br> </div><div>Sevatec announced a new partnership with George Mason University to help prepare the next generation of students for careers in information technology.</div><div><br> </div><div>TEAM Software announced a strategic investment from Accel-KKR, a technology-focused private equity firm.</div><div>Veratad Technologies, LLC, joined the New Jersey Tech Council. </div><div><br> </div><div>VMD Systems Integrators has rebranded as VMD Corp to bring the company’s name in line with its current work.</div></div><br></div>GP0|#3795b40d-c591-4b06-959c-9e277b38585e;L0|#03795b40d-c591-4b06-959c-9e277b38585e|Security by Industry;GTSet|#8accba12-4830-47cd-9299-2b34a4344465 the Control Room of Tomorrow.aspxBuilding the Control Room of Tomorrow<p>​At the center of an enterprise organization’s security op­eration stands its nucleus, arguably one of the most important pieces for overall functionality and efficiency: a command center or security operations center (SOC). A place where a variety of systems and solutions come together, the command center exists to provide a common operational picture, mitigate threats, and promote enhanced communication during an incident.</p><p>The goal of any command center is to monitor, assess, and respond to a variety of threats and incidents. As technologies advance and trends develop, so too do the strategies in place to meet this goal. There are several considerations that must be made when designing the control room of the future. </p><p><strong>Space</strong>. For many companies, a control room may be allotted space in a basement or small windowless room chosen as an afterthought. While some companies are limited by space, many decide the SOC’s location is unimportant. This can be a big mistake when designing a control room that will serve the company now and into the future. It’s critical for this space to be large enough to house important equipment that allows operators to view the relevant incoming data and make informed decisions, but it’s also necessary for the space to be scalable as needs change, technology evolves and coverage increases, and a company grows.</p><p><strong>Operator comfort</strong>. Space isn’t the only consideration when designing an SOC or control room. Central to the success of any organization is the ability for security operators to quickly and efficiently take information coming into an SOC and act on that information to identify risks and mitigate threats. Operator comfort, as a result, should be central to the design of a control room, taking lighting, console comfort, ergonomics, ambient noise, and temperature into careful consideration. If operators are uncomfortable or distracted, in pain with a sore neck due to bad viewing angles, or too warm in a room without proper ventilation, they can miss out on critical events or emergencies. Addressing these before they become problematic is crucial in the design stage of an SOC.</p><p><strong>Technology. </strong>When it comes to building a mission-critical SOC, there's a reason why large-scale video walls that showcase a number of incoming data points are dominant. Uniform and integrated visual elements are imperative to the success of an SOC or control room, because operators and first responders require the most up-to-date and complete information regarding incoming security-related events. Additionally, the technology needed to bring multiple data streams together in a single-pane-of-glass view is an important consideration to make, and hiring a control room integrator that specializes in this technology can streamline the process and result in better situational awareness across the board.</p><p><strong>Data convergence</strong>. Command centers today combine a number of security components, but as end users demand an emphasis on the full umbrella of security rather than small silos, facilities are focused on including additional pieces, such as risk and threat assessment, employee travel, and social media monitoring. Data incorporation is also a critical element, and command centers must be able to collect any number of data points for effective data aggregation. Dashboards that can make sense of a large amount of information can streamline decision-making and response.</p><p><strong>Innovation</strong>. While words like artificial intelligence and machine learning are often whispers around the industry, for innovative companies, these terms are becoming more commonplace as they enter a new frontier in how data is collected and analyzed to deliver information to security operators. The control room of the future brings innovative software and systems to the forefront, taking existing sensors that are providing a wealth of information and layering an additional method by which to understand what is happening and make decisions about the organization’s health. </p><p>Enterprise organizations rely on their SOC for business operations. In times of an emergency, and as risks become more severe, a complete situational picture is necessary. Taking into consideration the space, operator comfort, technology, data convergence, and future innovation can set security managers up for success in protecting their enterprises.  </p><p>Dan Gundry is director of national control room sales at Vistacom.</p><p><br></p>GP0|#69b4a912-eafa-43d2-b6a4-8aed47f69245;L0|#069b4a912-eafa-43d2-b6a4-8aed47f69245|Security Technology;GTSet|#8accba12-4830-47cd-9299-2b34a4344465 Security Trends<p>School security often involves response tools, from mass notification to surveillance to reporting. However, experts note that trends are moving away from technology as a single solution to prevention-based programs centered around information sharing, all-hazards training, and public-private partnerships.</p><p>Preventing a tragedy often starts with getting critical information into the right hands. </p><p>Take the case of two teens in Spotsylvania County, Virginia, who were arrested and charged with conspiracy to commit murder in October 2015. The two had plans to phone in a bomb threat to their school, then shoot people as they evacuated, CNN reported. A school resource officer discovered that one of the boys had threatened violence on the Internet, and the resulting investigation uncovered the plot. </p><p>In December 2015, an anonymous tip was sent to a Denver school district’s “Text-a-Tip” threat reporting hotline. Based on that information, two 16-year-old girls were found with plans to commit a mass killing at Mountain Vista High School. They were arrested and charged with conspiracy to commit first-degree murder, reported Reuters. </p><p>These stories, and many like them, have a common thread throughout: critical information was reported and acted upon in a timely manner, stopping any plans to commit harm. While some security experts do not like to classify tragedies as preventable, they say there are key threat indicators that pointed to the mass shootings and other attacks before they occurred. If communities, schools, and law enforcement work together to identify and connect these dots, future threats could be stopped. </p><p><em>Security Management </em>speaks to experts about their experience conducting threat assessments in schools and communities. ​</p><h4>Connecting the Dots</h4><p>After the December 2012 Sandy Hook shooting that killed 20 elementary-age children and six educators, Connecticut Governor Dannel Malloy created a 16-member panel to review policies pertaining to school safety, gun-violence prevention, and mental health. The panel recommended in a 277-page report that all schools create safety committees that include police, first responders, administrators, and custodians. The report also urged each school to take an “all-hazards” approach to safety and security training for faculty, staff, and students. </p><p>Furthermore, the panel recommended that schools form threat assessment teams that “gather information from multiple sources in response to indications that a student, colleague, or other person’s behavior has raised alarms.” The report cites the U.S. Secret Service’s behavioral threat assessment model, which has been adopted for educational institutions, the workplace, and military settings. </p><p>“Once a team has identified someone who appears to be on a pathway to violence, the team ideally becomes a resource connecting the troubled child, adolescent, or adult to the help they need to address their underlying problems,” states the report, which goes on to say that such multidisciplinary teams can conduct risk assessments when questionable behaviors arise. “These would not only identify students at risk for committing violence, but also serve as a resource for children and families facing multiple stressors.” ​</p><h4>Partnerships</h4><p>As outlined in the Sandy Hook report, it is critical for organizations, schools, and communities to take an all-hazards approach to assessing and preparing for threats. If there is a dedicated platform or channel where they know they can report pertinent information, those dots can be connected in a meaningful way to prevent tragedy. </p><p>Two security experts share best practices with Security Management based on their experiences with threat assessments. These programs were bolstered by building partnerships with law enforcement and the community. </p><p>Working with stakeholders. Sometimes a threat assessment reveals an obvious problem that needs fixing, while other issues are uncovered only by working and communicating with stakeholders. Such was the case for school security professional Gary Sigrist, Jr., CEO and president at Safeguard Risk Solutions. </p><p>He tells Security Management that when he first started working at the South-Western City School district in Ohio, there were some obvious changes that needed to be made. “We had building principals who told their staff members they weren’t allowed to call 911 [in an emergency], that they have to call the office first,” he says. “We changed that.” </p><p>There was one building principal who told the cafeteria cooks that if there was a fire in the kitchen, not to pull the fire alarm until they had notified him first. “I brought the fire marshal in, and we had a conversation about that,” he notes. </p><p>Sigrist explains that working with law enforcement isn’t always a seamless process; sometimes schools and police in his district differed on their vision for a safe and secure environment. </p><p>“It’s not that the police were wrong, it’s just that some of their goals and objectives didn’t sync with the goals and objectives of the school,” according to Sigrist. But establishing regular meetings with law enforcement and other first responders was key to successful collaboration. “The police would say, ‘we think you should do this,’ and the school could say, ‘that’s not a bad idea, but let’s look at it from the point of view of the school,’” he notes. “Fire drills became better because we involved the fire department in the planning of our drills, where our command posts would be, and how we were going to check students in.” </p><p>He adds that first responder collaboration should go beyond just police and fire; schools rely on medical professionals when faced with health epidemics, for example. “When the Avian Flu and H1N1 sprang into effect, we worked with our county and state boards of health, and were able to develop a pandemic plan,” he says. “We had those subject matter experts.” </p><p>Over the course of his career at SouthWestern City Schools, Sigrist twice helped secure the Readiness and Emergency Management for Schools (REMS) Grant, in 2008 and 2010, from the U.S. Department of Homeland Security. These funds helped him establish many safety programs around the district. “Those are things people say, ‘wow, you must be a wonderful person to be able to get all of this done’–no, we had grant money,” he says. “It’s amazing what you can do with half a million dollars in grant money, and also the right support from the superintendents.” </p><p>No matter how prepared a school is for an emergency, those plans are truly put to the test when disaster strikes. Such was the case for South-Western City Schools when an explosion occurred at an elementary school. </p><p>“We had a building in a rural area, and the water table shifted, causing methane gas to build up in the basement. When it built up to a certain level with the right oxygen mix, there was an explosion,” Sigrist says. A custodian was injured, but everyone was able to evacuate the building safely as they had in many drills before. </p><p>The staff had been trained on how to function as a crisis team that was three members deep. Because the principal was not present at the time of the explosion, the building secretary assumed the role of incident commander, safely evacuating everyone from the building. “And it’s just evacuation training,” he says. “We never trained her on what to do when a building blew up.” </p><p>There were some key takeaways from the event that the district saw as areas of improvement. “Did we have lessons learned? Yes,” says Sigrist. “This happened almost right at dismissal, and we had school buses parked right in front of the building. Well–they didn’t move.” </p><p>These buses prevented fire trucks and other emergency vehicles from pulling right up to the scene. “And so one of our lessons learned is, if you have an incident, how are the buses going to pull out of the parking lot so the fire equipment can get in?” </p><p>Hometown security. Schools are a major focal point of the community, but they are not the only one. Societies are also made up of private businesses whose security is paramount to the overall environment of safety. Marianna Perry, CPP, a security consultant with Loss Prevention and Safety Management, LLC, explains that because about 85 percent of critical infrastructure in the United States is privately owned, “it makes sense that these businesses and communities partner with law enforcement to address problems.”  </p><p>Perry has more than 20 years of experience in conducting threat assessments for private businesses, as well as communities, including school districts. She recounts examples of how these reviews helped strengthen those localities, businesses, and law enforcement alike. </p><p>While Perry was the director of the National Crime Prevention Institute, there was a particular community with high crime rates, homelessness, and drug problems, as well as health-related issues. “There were abandoned properties, rental properties in disrepair, homes that had been foreclosed,” she says. “We were looking for a solution to help fix this community.” </p><p>Perry helped form a team of key stake­­holders and partners, including law en­forcement, a local university, security consultants, area churches, and the local health department. The public housing authority was also a major partner, as well as some local residents and business representatives. Initially, everyone came together for a week-long training program. The goal was to involve all partners in helping to develop strategies to improve the overall condition of the neighborhood, which in turn would help prevent crime. She says that much of the training was centered on crime prevention through environmental de­sign (CPTED), which predicates that the immediate environment can be designed in such a way that it deters criminal activity.  </p><p>She adds that the training wasn’t just focused only on preventing crime, but on several aspects of the community. “The goal was to improve the overall quality of life for everyone who lived or worked in that neighborhood,” says Perry. </p><p>The training also helped the partners learn to speak a common language. “We had all of these different people from different professional backgrounds and business cultures, and we needed them all on the same page,” she says. “They needed to be able to communicate with each other.” </p><p>A critical outcome of the training program, she says, was facilitating interaction among stakeholders, as well as developing and building trust. “It was a really successful partnership, and a lot of good was done for that community because everyone worked together to achieve common goals.” </p><p>Businesses also benefit from such assessments. Perry recently conducted a security assessment for one organization that was located in an area with one of the highest violent crime rates in the city. “Management was very concerned about the safety of their employees,” she notes. </p><p>During the assessment, Perry recommended that the company install additional cameras on the perimeter of their property for added surveillance and employee safety. The company could also share camera footage with law enforcement by tying their camera system into the citywide surveillance program. Perry worked with a local vendor to install IP cameras to cover a 10-block area. A control center operator would then monitor the cameras, and if he or she saw suspicious activity, either a security officer would be dispatched to respond, or 911 would be called. “I think people are now embracing the concept of public-private partnerships because they’re beginning to realize that they work,” Perry says.</p><p>Training. Preventing and detecting threats, while challenging, is possible when stakeholders share critical information. Having a centralized place for reporting such information is key, as well as training students, employees, and the community on how to use those platforms. </p><p>However, if the threat remains unde­tected or cannot be stopped, organiza­tions should conduct all-hazards training that covers a range of possible scenarios to ensure minimal damage and loss of life, says Kenneth Trump, president of National School Safety and Security Services. </p><p>“Active shooter is one concern, certainly, but it’s just that–one concern,” he says. “There’s a much greater likelihood that school employers are going to deal with a noncustodial parent issue multiple times during a school year than that they will ever deal­­—during their entire career working in the school—with an active shooter incident.” </p><p>Sigrist adds that having a laser-like focus on active shooter training can be a drawback for schools, because they lose sight of issues that have a greater likelihood of occurring. </p><p>“I asked one of my clients at a Head Start school how many times they have had a drunk parent show up to pick up a child, and they said, ‘it happens all the time,’” he says. “We still teach active shooter, but by teaching how to respond in an all-hazards approach, they will know how to take action.” </p>GP0|#cd529cb2-129a-4422-a2d3-73680b0014d8;L0|#0cd529cb2-129a-4422-a2d3-73680b0014d8|Physical Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465