1 / 39

Homeland Security and Your Safe School Presented by Professor Skip Lawver Eastern Michigan University

All Hazard Approach Rationale. The Department of Homeland Security (DHS) has identified schools as part of the critical infrastructure of the country. While many school safety initiatives have been funded to provide for site security analysis and safety equipment, less effort has gone into traini

mills
Download Presentation

Homeland Security and Your Safe School Presented by Professor Skip Lawver Eastern Michigan University

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


    1. Homeland Security and Your Safe School Presented by Professor Skip Lawver Eastern Michigan University

    2. All Hazard Approach Rationale The Department of Homeland Security (DHS) has identified schools as part of the critical infrastructure of the country. While many school safety initiatives have been funded to provide for site security analysis and safety equipment, less effort has gone into training staff and students in school security procedures and emergency response to incidents occurring in the school. Many school officials do not see a need for law enforcement until an event occurs, and many law enforcement officials do not have the resources to support a school based officer. Further, little attention has been given to involving youth in the country’s overall emergency preparedness and response endeavor.

    3. Perspective Another week, another rumbling train of tornadoes that obliterate entire city blocks moves through the country. Think of the School you attended Given a catastrophic event Mass Causality How many law enforcement officers would respond? How many fire personnel would respond? How many EMS would respond respond? Did YOUR School Have A Emergency Response Plan

    4. Brutal Numbers - 2008 900 Tornadoes (June 08, so far) 30 Killer Tornadoes 110 Killed Record year 1,817 in 2004 Parkersburg, Iowa – Population 100 288 Homes Destroyed High School Destroyed

    5. National School Statistics 2005-2006 54.8 Million Students K-12 Ages 5-18 14 homicides 3 suicides 2005 Ages 12 – 18 1.5 Million victims of nonfatal crimes 868,100 thefts 628,200 violent crimes, assaults National Center of Education Statistics

    6. High Education 6,441 Title IV Institutions Enrollment 15 million students, plus faculty & staff 30,000 campus and public safety officers

    7. National School Statistics The National Association of School Security speculates that: 9,000 rapes 12,000 armed robberies, 270,000 burglaries 70,000 serious physical assaults against teachers 204,000 other aggravated assaults occur in the nation’s schools each year.

    8. National School Statistics An estimated 580,000 teen age students or about one in 20 carry weapons into American schools every year. In recent academic years in the United states there were approximately 409 cases of school associated violent deaths.

    9. National School Statistics In the United States 80% of the public school teachers reported being physically threatened. 71% of children aged seven to ten in the U.S. worry they might get shot or stabbed at school or home.

    10. National School Statistics 78% of schools reported having some type of formal violence prevention or violence reduction program. 2% of schools reported stringent security measures. (full- & part time security guards) or random metal detector checks.

    11. National Association School Resource Officers (2002 Survey) 95% of school-based police officers feel that their school is vulnerable to a terrorist attack. 79% feel that their schools in their district are adequately prepared to respond.

    12. National Association School Resource Officers (2002 Survey) Significant gaps exist between their schools’ security plan, and crisis plans are inadequate, untested and not exercised. School based officers receive limited training along with security personnel. Teachers, Administrators and support personnel receive little or no training in crisis management

    13. National Incident Management System NIMS Teachers Administrators School Support Personnel School Resource Officers Students

    14. All Hazard Approach Technical Disasters CBRNE Fire Natural Disasters Hurricanes Flooding Tornados

    15. People Involved in Bombings 1995 International Terrorism Groups 1 Organized Crime 2 Domestic Terrorists 9 Labor Organization Member 18 Racial/Bias/Ethnic Group 28 Drug/Narcotic Related 36 Domestic/Love Triangle 90 Acquaintance/Neighbor 86 Other 216 Juvenile 1014

    16. Soft Targets Bombing Targets (Sample) State/Local Government Property 46 - Explosive ---- 2 - Incendiary Law Enforcement/Judiciary 15 - Explosive --- 9 - Incendiary Academic Facilities 100 - Explosive --- 17 - Incendiary

    17. Basic Management Principles

    18. 3 R’s in Education (Mitigation – Preparedness - Response – Recovery) Readiness Planning – Understanding the “IF” and “WHEN” Training Response Unified Command Approach Recovery Business Continuity and Disaster Recovery

    19. Readiness – Response Recovery Personal Facilities Equipment Communications

    20. Managing Enterprise Security Risk

    21. Risk Management Security is relative There are many risks, and they all have to be managed There are many different solutions, depending on your requirements Things go wrong You have a variety of options: Accept (“a cost of doing business”) Mitigate the risk with technology Mitigate the risk with procedures Mitigate the risk by transferring it (through contracts or insurance)

    22. Essential Elements of Risk Threats Assets Vulnerabilities Safeguards Products Procedures People

    23. Definition of Risk Risk may be defined as the possibility of suffering harm or loss. Risk from a security perspective is defined as the process involved in the anticipation, recognition, and appraisal of a risk and the initiation of action to eliminate the risk entirely or reduce the threat of harm to an acceptable level.

    24. Types of Risk Pure Risk Exists when there is a potential for injury, damage, or loss with no possible benefit. Potential medical claims resulting from accidents. Dynamic Risk Exists when threat conditions fluctuate. Areas of the world that are subject weather extremes Communities that depend on seasonal tourism or political conditions.

    25. Types of Risk Speculative Risk Exists when there is a potential for benefit or loss, depending on activity or inactivity. Product research Static Risk Is constant and unchanging Only one supplier for a critical part in manufacturing Inherent Risk Those risks that are unavoidable because of the nature of the business.

    26. Risk Management Techniques The identification of risks and vulnerabilities through continuous threat assessment Analysis of the risks and vulnerabilities identified Optimization of cost-effective risk management alternatives designed to avoid, reduce, spread, or transfer identified risk.

    27. Factors that Influence Risk Vulnerability What are your exposures Probability What is the likelihood Criticality What is the impact

    28. Risk Assessment and the Security Survey Involves a critical objective analysis of an organizations entire protective system Collection of subjective as well as objective data Subjective Measures – use of forecasting, expert opinion Delphi Technique – use of several experts providing input Objective Measures – use of audits, marketing, operations research, incident and statistical reports, threat assessment, investigations, risk analysis, inspections, and security (loss prevention) surveys.

    29. Security Survey Used to evaluate and entire organization to identify risks and security deficiencies. Assets (people, property, information) to be protected Anything (or anyone) that could adversely threaten the well-being of the assets The vulnerabilities (weaknesses) that could conceivable be exploited by the threats

    30. Points to Ponder In a world of limited budgets, risk assessment provides an organization with the information it requires to accurately prioritize its needs.  Options for meeting those needs can then be considered, ranked accordingly, and funded to reflect priority.

    31. School Safety Protecting One Facility at a Time Five Step Process Your Model Secure Facility Gap Analysis Gap Closure Strategic Plan Implementation

    32. Integrated Physical Security The Goal of implementing an integrated physical security plan is achieving sensible and sustainable security People Operations Information Interdependence

    33. -DDDRRR- The six primary elements are: Deterrence – Provides Countermeasures Detection – Monitors potential breakdowns Delay – Slow down intruders Response – Procedures and actions Recovery – Business Continuity Re-evaluation – Review – Revisit - Retrain

    34. Step One – Your Model Facility Core Functions Critical Assets Threats and Vulnerabilities Appropriate Measures to Mitigate Benchmark to compare

    35. Step Two – Gap Analysis The Assets to be protected Anything that can be destroyed, damaged, stolen The threat to those assets Crime prevention through Environmental Design The vulnerability of those assets Use GLOBAL Approach Your priorities Risk Assessment

    36. Step Three – Gap Closure Perimeter Security Surveillance, protection basics – countermeasures Vehicles Protect approaches, control access and parking Internal Security Access controls, alarms, barriers, safe areas Information Technology Integrate IT and Physical Security

    37. Step Three – Gap Closure Building Design/Security Code Laws – exits, fences, gates, lighting, etc Community Risk Assessment/Community Involvement Assess Local risks and incorporate into plan Technology Solutions CCTV - GIS

    38. Step Four – Strategic Plan Having Identified Assets Adversaries Threats and Vulnerabilities Priorities and Options NOW strategize the security change process Cost Timeframe Implementation

    39. Step Five - Implementation Implementation Approval Process Project Management Quality Assurance Quality Control Revising Policy Procedures Re-Analyze your current situation What has changed – new threats

    40. Conclusion To Change the Security Profile of Schools in this Country we must start with School Administrators, First Responders and Youth One School at a Time

More Related