Construction

 

 

https://sm.asisonline.org/Pages/Disaster-Recovery.aspxDisaster RecoveryGP0|#28ae3eb9-d865-484b-ac9f-3dfacb4ce997;L0|#028ae3eb9-d865-484b-ac9f-3dfacb4ce997|Strategic Security;GTSet|#8accba12-4830-47cd-9299-2b34a43444652014-09-01T04:00:00ZSean M. Scoot; Reviewed by Mayer Nudell ​Heritage Communications Ltd; theredguidetorecovery.com<br>172 pages; $19.95<br><br>The police, firemen, and other first responders have left, and you are taking stock of the emergency that has befallen you, your organization, or your family. What now? A Step-By-Step Guide to Disaster Recovery can help everyone prepare for and deal with such situations.<br><br>This compact, easy-to-use guide begins with the departure of the first responders and sets out the key considerations and pitfalls to be faced during recovery and reconstruction. Author Sean Scott brings more than 30 years of experience in construction and restoration to walk readers through the real world of “getting back to normal.” Chapters cover everything from insurance and choosing a contractor to trauma interventions, and an associated Web site provides tools, checklists, and templates for everything from home inventories to contractor questionnaires to lost pet posters. It is a comprehensive package that will help victims find a path to recovery without being victimized.<br><br>The publisher offers customization for use by agencies, corporations, universities, and other groups—for example, if an organization would like to have a custom cover and specific contact information added.<br><br> Reviewer: Mayer Nudell, CSC (Certified Security and Safety Consultant), is an independent consultant on crisis management and related issues. He is also an adjunct professor at Webster University and the coauthor of The Handbook for Effective Emergency and Crisis Management and No One a Neutral: Political Hostage-Taking in the Modern World. He is a member of ASIS.<br><br><br>

Construction

 

 

https://sm.asisonline.org/Pages/Disaster-Recovery.aspx2014-09-01T04:00:00ZDisaster Recovery
https://sm.asisonline.org/Pages/21st-century-security-and-cpted-designing-critical-infrastructure-protection-and-crime-prev-0.aspx2014-05-01T04:00:00Z21st Century Security and CPTED: Designing for Critical Infrastructure Protection and Crime Prevention, Second Edition.
https://sm.asisonline.org/Pages/security-design-abu-dhabi-0013246.aspx2014-04-01T04:00:00ZSecurity by Design in Abu Dhabi
https://sm.asisonline.org/Pages/hard-lessons-0010123.aspx2012-08-01T04:00:00ZHard Lessons
https://sm.asisonline.org/migration/Pages/greening-security.aspx2008-07-01T04:00:00ZThe Greening of Security
https://sm.asisonline.org/Pages/builders-contstruct-better-security.aspx2005-05-01T04:00:00ZBuilders Construct Better Security
https://sm.asisonline.org/Pages/cctv-lowers-stakes.aspx2005-04-01T05:00:00ZCCTV Lowers the Stakes
https://sm.asisonline.org/Pages/challenge-making-safer-structures.aspx2005-03-01T05:00:00ZThe Challenge of Making Safer Structures
https://sm.asisonline.org/Pages/buzz-over-zigbee.aspx2004-11-01T05:00:00ZThe Buzz Over ZigBee
https://sm.asisonline.org/migration/Pages/security-planning-and-design-guide-architects-and-building-design-professionals.aspx2004-06-01T04:00:00ZSecurity Planning and Design: A Guide for Architects and Building Design Professionals

 You May Also Like...

 

 

https://sm.asisonline.org/Pages/ASIS-Awards-School-Security-Grant-and-More-ASIS-News.aspxASIS Awards School Security Grant & More ASIS News<p>This month, the Dallas Independent School District opens the doors to its newest transformational school, which is designed specifically for high school students interested in architecture, urban planning, environmental science, and community development. CityLab High School will offer students the opportunity to leverage the city of Dallas as their own hands-on laboratory.</p><p>But this cutting-edge “best-fit-school” concept, part of the city's public school choice program, comes with a daunting challenge: ensuring a safe and secure environment in an urban city center, and doing so on a limited budget.</p><p>That’s where the School Security Grant Competition, started by ASIS International and the ASIS Foundation in 2003, plays a critical role. This year, in conjunction with the ASIS International 63rd Annual Seminar and Exhibits, ASIS is awarding CityLab High School a $22,000 grant to pay for upgrades to the school’s camera system, access control system, and classroom intercoms. Axis Communications is making an in-kind donation of cameras and other equipment.</p><p>ASIS 2017 Host Committee Chairman Martin Cramer, CPP, worked closely with the Dallas Independent School District Police Department to get the word out about the grant and to identify the school with the greatest need.</p><p>“CityLab really stood out,” said Cramer. “Parents had voiced concerns about the school’s proximity to downtown Dallas, a busy interstate highway, and a homeless shelter. But with most of the school’s budget going to new construction, renovations, and asbestos removal for the 1950s building, there was little more the school could afford to improve security. These funds will go a long way to provide students and staff a safe and secure learning environment.”</p><p>The school identified a number of needed security upgrades, including network improvements, new security cameras, access control devices, and classroom intercoms covering all five floors of the building. </p><p>“In a large urban school district with limited funds, the responsibility of campus safety falls within the school’s budget,” wrote CityLab High School Principal Tammy Underwood, in her grant competition application. “This grant is an amazing opportunity for CityLab students and staff to be in a safe environment so that they can focus on their highest educational goals.”</p><p>The School Security Grant Competition is just one of the many ways ASIS International pursues its mission to advance security management best practices and give back to the community hosting the Annual Seminar and Exhibits. </p><p>“Without a doubt, school safety contributes to academic success, and promotes innovation, inquiry, and risk taking in high-poverty, high-performing schools,” wrote Underwood. “Students who feel safe are more attentive and efficient in the classroom, and they also have fewer symptoms of depression. I want parents, students, staff, and visitors to be comfortable and confident coming to our building.”​</p><h4>A World of Opportunity at the ASIS 2017 Career Center </h4><p>As the premier education and technology event for security professionals worldwide, ASIS 2017 promises unparalleled networking and career development options. </p><p>Now in its sixth year, the Career Center will continue to offer unprecedented professional value. Free to all attendees, the Career Center offers résumé reviews, career coaching, networking opportunities with employers and peers, and access to career development tools and job postings—plus free professional headshots in the Headshot Studio.</p><p>The excitement starts on Tuesday, September 26, with a Coffee and Careers Networking Event sponsored by the Young Professionals Council, a perfect place for great networking. Attendees currently seeking jobs in the security field will want to return later for an interactive panel session, “What Security Employers Look For and What Makes Candidates Stand Out,” where senior security executives and hiring managers will share what elements in an applicant’s history impress employers, describe what they look for in interviews, and provide advice on how to stand out from the crowd. </p><p>The day culminates with a session for ambitious professionals who have set their eyes on the top and are looking for an answer to the question, “How do you become a CSO?” This is their opportunity to hear straight from senior executives how they reached the top, lessons learned along the way, and how attendees can benefit from their experiences. </p><p>On Wednesday, the Career Center will hold another Coffee and Careers Networking Event for those looking to transition into the security field to help them create new professional connections, foster ones already made, and take part in engaging discussions on career development. Afterwards, attendees will have a chance to further build on those discussions when they take part in the “Career Development in Security” session, which will offer young security professionals the tools and best practices they need to grow their security careers.</p><p>The Career Center wraps up with a bang on Thursday with two of its most impactful sessions. The first, “Mentoring: Guiding Tomorrow’s Leaders” will provide the next generation of security industry leaders with another avenue to hone their skills to achieve their career goals, whether it’s to embark on a new challenge or advance within their organization. Panelists will examine the importance of mentoring, as well as what to look for in a mentor, key factors in building an effective relationship, and the qualities of a successful mentee. </p><p>Attendees will continue examining the future of security with a convergence panel that will explore the ever-changing relationship between information technology and physical security. As threats around the globe become increasingly sophisticated, it is vital that security professionals in every focus area can collaborate and identify comprehensive solutions for the risks facing citizens, industry, and governments around the world.</p><p>Career Coaching and résumé reviews will take place during exhibit hours. Stop by to book an appointment. </p><p>“ASIS has been instrumental to my professional development and as cochair of the Young Professionals Council, it has been particularly rewarding to help shape the high-caliber programming. From CSO perspectives to employer hiring needs to mentorship best practices and leadership skills, ASIS 2017 will provide security professionals at every stage of their careers with the tools they need to succeed in today’s job environment,” says Angela Osborne, PCI, regional director for Guidepost Solutions. “I encourage security professionals across every sector to take advantage of the breadth of career-enhancing education, advice, and professional development that will be available.”</p><p>Whether attendees are new to the security field and looking for those first valuable connections, or seasoned veterans of the industry seeking to further their existing careers, the Career Center offers a world of opportunity ready to be explored.</p><h4>International Buyer Program Helps Expand ASIS 2017’s Global Footprint</h4><p>Attendees and exhibitors at ASIS 2017 will have the chance to expand the scope of their business opportunities to a global level. Thanks to the U.S. Department of Commerce International Buyer Program (IBP), a joint government-industry effort, hundreds of global buyers from multiple delegations will attend ASIS 2017 for business-to-business matchmaking with exhibitors and attendees. The buyers represent security professionals from around the world.  </p><p>“The International Buyer Program provides an excellent opportunity for security professionals globally to benefit from the collective wisdom of the 22,000 attendees and exhibitors at ASIS 2017,” says Godfried Hendriks, CPP, managing consultant at GOING Consultancy BV and secretary of the ASIS International Board of Directors. “In today’s threat environment, security professionals need a global community of peers they can turn to year-round for support, best practices, and information sharing. ASIS 2017 will help facilitate these relationships.” </p><p>Every year, the IBP generates approximately $1 billion in new business for U.S. companies, primarily through increased international attendance at participating U.S. trade shows. </p><p>ASIS 2017’s participation in the IBP provides attendees with access to a broad array of security professionals, qualified international buyers, representatives, and distributors. It also increases the chances of finding the right international business partner. Not only will attendees meet more global buyers, representatives, and distributors, but exhibitors’ products and services can be listed in the Export Interest Directory and distributed to all international visitors for additional awareness.</p><p>Once a potential partner is identified, attendees have complimentary use of the on-site International Trade Center, where companies can meet privately with prospective international buyers, prospective sales representatives, and other business partners.</p><p>To assist in facilitating conversations, international trade specialists will be available on-site in the International Trade Center to provide matching assistance and expert trade counseling to global delegates and U.S. exhibitors.</p><p>Don’t miss out on the chance to expand your global footprint. Stop by the International Trade Center on the expo floor to learn more. ​</p><h4>All the Hub-Bub</h4><p>ASIS 2017 promises a show floor filled with fantastic networking opportunities, groundbreaking security products and service solutions from industry-leading exhibitors, and second-to-none education opportunities. At the center of it all is the ASIS Hub, an enormous 1,600-square-foot presence on the show floor that is serving as the place for all things ASIS International. </p><p>The Hub is the primary location for meeting with ASIS staff and learning more about becoming a member, obtaining one of the three board certifications, and getting involved in one of the professional interest councils. It’s also the place to unwind and recharge—literally—in the lounge with several charging stations.</p><p>The Hub will function as the go-to space for everything related to ASIS councils, with council members standing by to answer questions and offer expertise. The 34 ASIS councils explore focus areas like Crime Prevention and Loss Prevention, Healthcare Security, Information Technology Security, Investigations, Physical Security, and much more. There is a council for security professionals in nearly every discipline and industry sector.</p><p>The staging point for multiple Fireside Chats, the Hub will provide attendees an opportunity to interact in small groups with speakers after select education sessions. Members can visit the Hub for updates on the certification programs and exhibitor press conferences. And this year, the prize booth is located inside the Hub, where, twice a day, lucky attendees will walk away with exciting prizes.</p><p>Members of ASIS International are part of the largest community of security professionals worldwide, all with the shared goal of advancing global security. Engaged in their local communities year-round, members are dedicated to the security mission and making all communities safer places to live. Additionally, ASIS certifications are recognized worldwide as the gold standard of excellence in security management. Offering Certified Protection Professional® (CPP), Professional Certified Investigator® (PCI), and Physical Security Professional® (PSP) accreditations that are transferable across all industry sectors and geographic borders, ASIS certifications are valuable investments in advancing a security career. </p><p>Those who stop by the Hub can gain insights and tools needed to further their careers, get more involved in the Society, and learn about the unmatched benefits of membership in ASIS International. ​</p><h4>LIFETIME CERTIFICATION</h4><p>Congratulations to the following members who have been named Lifetime Certificants.</p><p>• Thomas M. Prochaska, CPP</p><p>• W. David Rabern, CPP</p><p>• David O. Best, CPP</p><p>• Walter F. Bodner, CPP</p><p>• James M. Gill, CPP</p><p>• Peter Urbach, CPP, PCI, PSP</p><p>• Richard G. Steele, CPP</p><p>• Samuel E. Manto, CPP​</p><h4>LIFE MEMBER </h4><p>The ASIS Board of Directors has granted life membership to Bob Battani, CPP.</p><h4>MEMBER BOOK REVIEW</h4><p><em>The Key to Keys: 5 Steps to Developing an Effective Access Control System</em>. By Randy Neely. CreateSpace Publishing; available from Amazon.com; 118 pages; $15.95.</p><p>While this book could more aptly be titled <em>Keys: A Memoir</em>, author Randy Neely does a sound job of highlighting a widespread challenge that everyone in the security business has experienced at one time or another—the effective control and accountability of key and access systems.</p><p>Neely employs first-person narrative to recount his professional history and how he invented key and access control systems, relying too much on personal description for a professional publication. </p><p>Nonetheless, the author does a superb job of bringing to life the adage that necessity is the mother of invention. After experiencing a series of expensive lost key episodes, he created a system to more effectively manage keys. Valuable first-hand stories help round out the problem-impact-solution triad. </p><p>Neely chronicles the financial and legal impacts that inadequate controls can bring. For example, a single set of lost master keys cost a university nearly $350,000. The impact doesn’t end with the bottom line, but it can also adversely affect legal documents and court cases, as well as an organization’s reputation.</p><p><em>The Key to Keys </em>has some instructive value to students of security management, but it goes too far in promoting the author’s products. Further, some of the photos, tables, and figures lack defining labels or captions, are presented out of focus, or do not adequately line up.  </p><p>The most valuable lesson from this book is that motivation and initiative can inspire an earnest practitioner to not only safeguard people and property, but also to take that next step and invent new and effective ways to help improve security practices.</p><p><em><strong>Reviewer: Terry Lee Wettig, CPP</strong>, is an independent security consultant. He was previously director of risk management with Brink’s Incorporated and a U.S. Air Force chief master sergeant. He is a doctoral candidate in organizational management and a member of ASIS. ​</em></p>GP0|#28ae3eb9-d865-484b-ac9f-3dfacb4ce997;L0|#028ae3eb9-d865-484b-ac9f-3dfacb4ce997|Strategic Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465
https://sm.asisonline.org/Pages/21st-century-security-and-cpted-designing-critical-infrastructure-protection-and-crime-prev-0.aspx21st Century Security and CPTED: Designing for Critical Infrastructure Protection and Crime Prevention, Second Edition.<div class="body"> <p> <em> <span style="font-size:small;"> <span style="font-family:arial;">CRC Press. Available from ASIS, item #2078; 954 pages; $120 (ASIS member), $132 (nonmember). Also available as e-book.</span> </span> </em> </p> <p> <span style="font-size:small;"> <span style="font-family:arial;">As good as the first edition of 21st Century Security and CPTED was, this second edition surpasses it. Atlas, known in security circles as a consummate professional, has done an outstanding job in creating this second edition, which has twice as much material as the original edition. It also includes voluminous references and hundreds of outstanding clarifying photos in both color and black-and-white. Using humor and candid insight he incorporates all the concepts of CPTED, including design, construction, security countermeasures, and risk management strategies, and merges them into a highly informative reference manual for security practitioners at every level.</span> </span> </p> <p> <span style="font-size:small;"> <span style="font-family:arial;">There is a logical flow to the book. It lays a solid foundation by discussing architecture and its intent, as well as environmental crime control theories and premises liability. There is something here for everyone as it also discusses terrorism and critical infrastructure from differing perspectives. Several chapters on problem solving provide guidance on conducting threat, risk, and vulnerability assessments.</span> </span> </p> <p> <span style="font-size:small;"> <span style="font-family:arial;">Throughout, Atlas provides a roadmap for merging security and CPTED into management principles and practices in a wide variety of facility settings, including healthcare facilities, critical infrastructure, ATMs, office buildings, parking lots and structures, and parks and green spaces. The latter portion of the book is reserved for concepts including lighting, LEED and GREEN certification, workplace violence, signage, data capture and analysis, and conducting CPTED surveys.</span> </span> </p> <p> <span style="font-size:small;"> <span style="font-family:arial;">Atlas has created the definitive book on CPTED and security. Despite the magnitude and complexity of the science and art of security management, he has done an outstanding job of merging these and other disciplines and concepts together into a cogent display of information that the reader should be able to apply in a wide variety of locations and situations. If you are only going to buy one book this year, it is strongly suggested you purchase this one. </span> </span> </p> <hr /> <p> <span style="color:#800000;"> <strong> <span style="font-size:small;"> <span style="font-family:arial;">Reviewer:</span> </span> </strong> </span> <span style="font-size:small;"> <span style="font-family:arial;"> Glen Kitteringham, CPP, has worked in the security industry since 1990. He holds a master’s degree in security and crime risk management. He is president of Kitteringham Security Group Inc., which consults with companies around the globe. </span> </span> </p> </div>GP0|#28ae3eb9-d865-484b-ac9f-3dfacb4ce997;L0|#028ae3eb9-d865-484b-ac9f-3dfacb4ce997|Strategic Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465
https://sm.asisonline.org/Pages/hard-lessons-0010123.aspxHard Lessons<p>On April 2, 2012, One Goh, a former student at Oikos University, in Oakland, California, opened fire on the campus, killing seven people and wounding three others. That incident happened nearly five years to the day after the April 16, 2007, mass shooting at Virginia Polytechnic Institute and State University (Virginia Tech), in Blacksburg, Virginia. It was a sad reminder that, though rare, shootings are a threat to universities large and small, and school authorities must be prepared to handle them.</p><p>In the Virginia Tech tragedy, a current student first shot two students in a dormitory; a few hours later, he entered an academic building and opened fire in several classrooms before turning the gun on himself. Thirty-three people were killed in the massacre, including the gunman, Seung-Hui Cho. The Virginia Tech community has been through much since that day. It has also attempted to learn important lessons to limit the chances of a similar tragedy in the future. Other campuses have taken note. Ahead is a look at some of the long-term lessons and evolving best practices for communications, sheltering in place, and threat assessment teams.</p><p><strong><span style="font-size:medium;">Communications</span></strong></p><p>A key factor in the Virginia Tech shooting was that the gunman first murdered two students in the dorms in the morning. The university took more than an hour after that first incident to warn students that there had been a shooting on campus. The school was ultimately judged by the U.S. Department of Education (DOE) to have violated a provision in the applicable law, the Clery Act, which calls for “timely warnings” when reportable crimes occur on campus. Some examples of reportable Clery Act crimes are robbery, murder, and assault.</p><p>Virginia Tech officials disagreed with that judgment. According to Mark Owczarski, Virginia Tech’s director of news and information, while there was no clear definition of what constituted a “timely” warning at the time, precedent and DOE guidelines had those warnings coming out within 48 hours of the incident. An hour seemed reasonable in that context. Moreover, the Virginia Tech warnings were not more immediate because universities were expected to first determine the facts and then put as much information into the warning as possible, asserted Virginia Tech in its defense.</p><p>The reason for the delay was not accepted initially, and the school was fined $55,000. But in March 2012, the school got some vindication when the DOE’s chief administrative judge overturned the DOE fine. However, also in March, a civil trial jury awarded $4 million to two families of Virginia Tech victims who accused the school of negligence.</p><p>The fuzziness around the definition of what would be considered “timely” with regard to a warning prompted a legislative change in 2008, when the Clery Act was amended to include an additional responsibility for a more instantaneous emergency notification whenever a school has reason to believe that there is any imminent threat to the health and safety of students on campus. Situations meriting a notification might include chemical spills or even concerns about an infectious disease, in addition to crimes and active shooters.</p><p>Emergency notifications must be issued immediately even if all of the facts of the case are not yet gathered. The objective is to let people in and around the campus know that they may be in danger. “Immediate” is defined as meaning “as soon as law enforcement officers can confirm the threat,” says Owczarski.</p><p>The notification should be made by the police department as soon as possible after it responds to a call and confirms that there is a potentially threatening situation. When both an emergency notification and a timely warning would apply (Clery-reportable crimes, for example), the DOE has stated that a redundant timely warning is not necessary in addition to the emergency notification.</p><p>Conversely, when emergency notifications are not needed, the subsequent “timely warning” is still required under the law and should be issued after the school or police gather basic information. Schools have up to 48 hours to do that, but Owczarski says few, if any, institutions would wait that long today. </p><p>“The landscape has changed,” says Owczarski. “[I]n light of what happened five years ago, colleges and universities are far more likely to communicate first, think and respond second.”</p><p>Virginia Tech’s VT Alert system has about 10 mechanisms for disseminating information (more on these ahead). Each has its application. For example, outdoor sirens might be used for tornado warnings, but they would not likely be used in a timely-warning situation.</p><p>Communication is the most important aspect of security, says Paul Timm, PSP, president of RETA Security. Virginia Tech did have mass notification capabilities when the 2007 tragedy occurred, and it did use such mechanisms as e-mail to send out information about the shootings, but technology has made instant mass communications far easier since then.</p><p>For example, many notification systems in effect before the shooting did not use text messages. That was because it was complicated. “[Y]ou had to buy Sprint’s [service] or Verizon, or what have you, and you then had to carry their particular device,” explains Bob Lang, CPP, assistant vice president of safety and security at Kennesaw State University in Georgia.</p><p>A 2008 report called <em>The Ripple Effect of Virginia Tech</em> from the Midwestern Higher Education Compact found that nearly three-quarters of respondents whose schools did not previously possess the ability to send notification via text had since implemented a system capable of doing that or planned on implementing such a system.</p><p>Helping to facilitate this change is the fact that today’s notification systems can generally be used with all carriers, and most every student has a smartphone. Thus, it’s not just that mass notification systems are more widespread, says Timm, it’s that they are easier to implement and, therefore, end up being more useful.</p><p>Schools are also getting more students to sign up for notifications. That’s because “schools are speaking to other schools, and we’re learning from each other,” says Timm. “So we’re not just going to leave it up to the student to walk in and sign up. We’re saying ‘here, if you’re going to register for classes, the screen that you get before you’re allowed to register is the sign-up for mass notification.”</p><p>It is best practice to have numerous ways to reach members of the campus with pertinent information. In the International Association of Campus Law Enforcement Administrators (IACLEA) blueprint for safer campuses, “one of the things that we focused on was to have redundant systems so that if cell phones didn’t work because they were jammed, you had other ways of getting the word out to the campus if there was an imminent danger,” says Christopher G. Blake, IACLEA’s associate director and campus preparedness project director.</p><p>Virginia Tech’s current alert system includes text messaging, e-mail, message boards, sirens, and desktop alerts, among other mechanisms. “The bottom line to a lot of this is coming up with a layered approach to notifications,” says Lang.<br> Virginia Tech added digital message boards in classrooms and laboratories to its system after the 2007 tragedy. “Those are immediate; they literally will send a message within a second of deployment. Text messaging can take up to 20 minutes depending on cell phone service, the number of people, the number of subscribers, says Owczarski.</p><p>Owczarski says the university prioritized which classrooms would have the signs first, and the installation process is ongoing as opportunity and funding becomes available. For example, large lecture halls and the most widely used spaces received the signs initially. There are about 700 signs currently. University policy states that the boards must be included in new construction projects and renovations.</p><p>The notification process is ever-developing based upon technology improvements. For example, Virginia Tech has also added Twitter and Facebook to its cadre of notification media.</p><p>Content and context. Another issue universities have to wrangle with is exactly what the content of the message will be for any given situation.</p><p>Owczarski says that in these situations it is important to keep information updated, “because of the world in which we live in; people tweet, people Facebook, rumors go rampant.” He says that if 30 minutes goes by with no news, he will repeat what has been said or confirm that police are continuing to investigate.</p><p>For example, in December 2011, a campus police officer was shot on the Virginia Tech campus following a routine traffic stop. The police sent out the initial emergency notification when the shooting was confirmed and then quickly updated it when they knew the shooter had been spotted in a parking lot, says Owczarski. He says he then took over the communications to flesh out the warnings and information being delivered to the community. The emergency response plan was implemented, and the school was in a state of emergency response until police could confirm that the gunman was no longer a threat to the community.</p><p>Every situation will require different directives. In a potential or actual active-shooter situation, for example, the message might be to shelter in place, which simply means not to leave the building you are in. That was the case after the December shooting, though some media called it a “lockdown.”</p><p>Owczarski says that “lockdown” is a word that his school does not use, because it’s probably impossible to accomplish on a campus the size of a small municipality.</p><p>By contrast, it is feasible to advise anyone on campus to shelter in place, though that has its limitations as well. “It is not enforceable, and it might even be counterproductive if the people are in the same building as the shooter when they receive the warning,” says Owczarski.</p><p>Communicating is challenging when you have maybe a minute or two to make a decision about what to say, he says. And part of the challenge is that things are reported over Twitter and rumors and facts are often confused in the heat of a moment. “Yet what litigation and lawsuits will often say is you’re better off saying something, anything, and then reacting second. And that’s one of the great challenges that all of higher education in all municipalities face,” he says.</p><p>Virginia Tech has developed a Web portal with emergency messages for authorized individuals to send. The portal walks the user through a series of steps. The person would first put in information such as which campus the message is for and the delivery mechanisms to use (in an emergency, the default is to use them all).</p><p>There are about 30 templates of scenarios to provide a starting point for the notification. The template provides language appropriate to each type of incident and delivery mechanism; for example, e-mails might be longer and more conversational than text messages. The messages go out simultaneously. The language for the templates has been refined, and new templates have been created as drills and real-life emergencies have yielded lessons.<br><strong><span style="font-size:medium;"><br> Threat Assessment Teams</span></strong></p><p>Virginia Tech shooter Cho had behavioral issues that professors and mental health professionals knew about. After the fact, there were discussions about whether he should have been monitored more closely or removed from campus before the tragedy. It is impossible to know whether anything might have prevented that situation, but schools are trying to do what they can to focus on potentially risky situations—or people in need of assistance on or outside of their campuses—and to spot red flags that might signal trouble ahead.</p><p>The Virginia Tech incident led to a state law that requires colleges to have threat assessment teams for just that purpose. When that law came about, Virginia Tech was already putting together its behavioral threat assessment program.</p><p>Dewey Cornell, clinical psychologist and professor of education at the Curry School of Education, University of Virginia, thinks colleges traditionally have spent more resources on dealing with a tragedy than preventing it, so he sees the rise of threat assessment teams as a positive change. “I really think more emphasis should be given to prevention than just to crisis response,” he says.</p><p>Virginia Tech has spent a lot of time on refining its behavioral threat assessment team. The team consists of various individuals from different departments and disciplines.</p><p>Gene Deisinger joined Virginia Tech as threat management director in 2009. He says the school threat management team evaluates a few hundred cases a year, most of which are closed if no threat is perceived.</p><p>There are numerous ways a case can be opened, including reports from an individual on campus. When a case is reported, the team must examine the risks and the behavior in the context of whatever the individual is going through. The team will talk to the individual directly to assess and address any problems. The team also gathers information from various resources. One of the first orders of business is to determine whether the person is already being helped by other counseling or campus services. If that help is deemed to be adequate or the team determines that the person poses no threat, the case is closed.</p><p>Cornell points out that revisions to Virginia law and clarifications by the DOE have been made to facilitate information sharing with law enforcement and other groups, such as those in the medical professions. For example, a DOE clarification of the Family Educational Rights and Privacy Act (FERPA) states that school officials are not prohibited from sharing information obtained through school officials’ observation and personal knowledge, such as threatening remarks.</p><p>That is not considered part of student educational records, which makes it easier for the information to be shared.</p><p>The threat assessment team is separate from the CARE Team, which is a student aid team that was in existence prior to the 2007 shootings. The CARE Team will focus on student assistance issues, but some cases may go back and forth between CARE and threat assessment. For example, a financial-aid issue might start with CARE and then go to threat assessment if the student’s behavior becomes inflammatory. But both teams will not be working on the same case at once.</p><p>The threat assessment team is charged with identifying dangerous behaviors not just from students or faculty members but anyone who might pose a danger.</p><p>The threat assessment team mostly acts after concerns are reported, but Virginia Tech also introduced a proactive threat assessment element to the admissions process. During admissions, various background questions are asked in the application, and behavior is assessed during interaction with admissions officers.</p><p>If it is determined that an applicant has a history of violent offenses or other potentially disruptive behavior, for example, he or she would be referred to the threat assessment team. The team will then assess whether it’s possible to have a support plan to help that person be successful at the school. If the team doesn’t believe that’s possible, the applicant will not be permitted to attend the school. But, says Deisinger, “We recommend denial of very few applications.”</p><p><strong>Red flags.</strong></p><p>The school also tries to provide some guidance to the campus community with regard to what red flags they should look for. These are listed on Virginia Tech’s Web site, but Deisinger emphasizes that there is no absolutely reliable list of behaviors, and all behavior must be taken in context. Just because a person was violent in the past doesn’t mean they will be in the future. Similarly, a person with no violent past might still pose a risk.</p><p>Deisinger says that simplistic ways of predicting who is going to be violent have not worked, and he doesn’t anticipate that changing. He adds that though most of the referrals to his team do not end up requiring long-term monitoring, they’re still helpful.</p><p>“One side of the equation is, is the subject of concern dangerous or significantly disruptive? Even if the answer is no, if they’re perceived that way, there’s still an issue, because others will continue to respond to them based on the perception. And so, for many of the cases, we’re not actively working the subject of concern so much as we are the persons who shared the concern,” Deisinger says. The objective is “to share to the extent it’s lawful and appropriate to do so, the information that would help mitigate their concerns.”</p><p>Deisinger adds that it’s the nature of the beast of dealing with potentially violent and disruptive behavior that it’s unlikely that any individual in the community would be in a position to know the whole story, “so we set up a process that we know will [yield] false positives, because that enables us to look at potential linkages across the institution.”</p><p>Awareness training. Schools also are seeking ways to make students comfortable with reporting any issues or concerns. At the University of Virginia, Cornell says, they hold a series of meetings with students to discuss such issues. The school also developed a Web site with videos that depict different kinds of situations where people might want to seek help.</p><p>Additionally, many universities have special Web sites or systems set up to receive information or concerns. Deisinger stresses how important it is to do community outreach, because the campus population is always changing. “The things we did for outreach or awareness last year do not mean that this year the community knows what resources are available to assist with concerns,” he says, adding “So that has to be a continual process.”<br><strong><span style="font-size:medium;"><br>Response Coordination</span></strong></p><p>Another key issue is how various authorities will work together in the event of a major incident where they all respond to the scene. Many schools had good relationships with local law enforcement prior to the Virginia Tech tragedy, but even with good relations, coordinating activity on the scene can be challenging.</p><p>The National Incident Management System (NIMS) and the Incident Command System (ICS) lay out protocols for such situations. In recent years, more schools are adopting the NIMS and ICS approaches even when they are not required to follow them.</p><p>The basic ICS course is actually tailored for administrators in higher education, says Timm. “Now, not enough of them are taking advantage of that, but…we’re on a crusade to help them at least be aware and then get on board,” he says. He adds that it helps them become more familiar with first responders and gets everyone speaking the “same language.”</p><p>IACLEA’s Blake stresses the importance of mutual-aid agreements and working with local law enforcement. “You don’t want to be introducing yourself to these folks at the scene [of an incident]; you want to have working relationships with them in advance.”</p><p>Five years after the 2007 shooting, Virginia Tech received high marks for its reaction to the police officer shooting, says Blake. “They were really applauded by the media and others about what a fantastic job they did of getting the word out, almost immediately, to the community, and they had regular updates and so forth.”</p><p>That proficiency was the result of lessons learned the hard way after the 2007 tragedy. But at least they have been learned. “Virginia Tech sadly has a degree of experience that hopefully will serve us in the future for when those instances will happen again,” says Owczarski, adding, “And if we can help others prepare better for the instances that have yet to occur, [we are] glad to do that.”</p><p> </p>GP0|#cd529cb2-129a-4422-a2d3-73680b0014d8;L0|#0cd529cb2-129a-4422-a2d3-73680b0014d8|Physical Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465