390 likes | 563 Views
All Hazard Approach Rationale. The Department of Homeland Security (DHS) has identified schools as part of the critical infrastructure of the country. While many school safety initiatives have been funded to provide for site security analysis and safety equipment, less effort has gone into traini
E N D
1. Homeland Security and Your Safe SchoolPresented byProfessor Skip LawverEastern Michigan University
2. All Hazard Approach Rationale The Department of Homeland Security (DHS) has identified schools as part of the critical infrastructure of the country.
While many school safety initiatives have been funded to provide for site security analysis and safety equipment, less effort has gone into training staff and students in school security procedures and emergency response to incidents occurring in the school.
Many school officials do not see a need for law enforcement until an event occurs, and many law enforcement officials do not have the resources to support a school based officer.
Further, little attention has been given to involving youth in the country’s overall emergency preparedness and response endeavor.
3. Perspective Another week, another rumbling train of tornadoes that obliterate entire city blocks moves through the country.
Think of the School you attended
Given a catastrophic event
Mass Causality
How many law enforcement officers would respond?
How many fire personnel would respond?
How many EMS would respond respond?
Did YOUR School Have A Emergency Response Plan
4. Brutal Numbers - 2008 900 Tornadoes (June 08, so far)
30 Killer Tornadoes
110 Killed
Record year 1,817 in 2004
Parkersburg, Iowa – Population 100
288 Homes Destroyed
High School Destroyed
5. National School Statistics 2005-2006 54.8 Million Students K-12
Ages 5-18
14 homicides
3 suicides
2005
Ages 12 – 18
1.5 Million victims of nonfatal crimes
868,100 thefts
628,200 violent crimes, assaults
National Center of Education Statistics
6. High Education 6,441 Title IV Institutions
Enrollment 15 million students, plus faculty & staff
30,000 campus and public safety officers
7. National School Statistics The National Association of School Security speculates that:
9,000 rapes
12,000 armed robberies,
270,000 burglaries
70,000 serious physical assaults against teachers
204,000 other aggravated assaults occur in the nation’s schools each year.
8. National School Statistics An estimated 580,000 teen age students or about one in 20 carry weapons into American schools every year.
In recent academic years in the United states there were approximately 409 cases of school associated violent deaths.
9. National School Statistics In the United States 80% of the public school teachers reported being physically threatened.
71% of children aged seven to ten in the U.S. worry they might get shot or stabbed at school or home.
10. National School Statistics 78% of schools reported having some type of formal violence prevention or violence reduction program.
2% of schools reported stringent security measures. (full- & part time security guards) or random metal detector checks.
11. National Association School Resource Officers (2002 Survey) 95% of school-based police officers feel that their school is vulnerable to a terrorist attack.
79% feel that their schools in their district are adequately prepared to respond.
12. National Association School Resource Officers (2002 Survey) Significant gaps exist between their schools’ security plan, and crisis plans are inadequate, untested and not exercised.
School based officers receive limited training along with security personnel.
Teachers, Administrators and support personnel receive little or no training in crisis management
13. National Incident Management System NIMS Teachers
Administrators
School Support Personnel
School Resource Officers
Students
14. All Hazard Approach Technical Disasters
CBRNE
Fire
Natural Disasters
Hurricanes
Flooding
Tornados
15. People Involved in Bombings 1995 International Terrorism Groups 1
Organized Crime 2
Domestic Terrorists 9
Labor Organization Member 18
Racial/Bias/Ethnic Group 28
Drug/Narcotic Related 36
Domestic/Love Triangle 90
Acquaintance/Neighbor 86
Other 216
Juvenile 1014
16. Soft Targets Bombing Targets (Sample)
State/Local Government Property
46 - Explosive ---- 2 - Incendiary
Law Enforcement/Judiciary
15 - Explosive --- 9 - Incendiary
Academic Facilities
100 - Explosive --- 17 - Incendiary
17. Basic Management Principles
18. 3 R’s in Education(Mitigation – Preparedness - Response – Recovery) Readiness
Planning – Understanding the “IF” and “WHEN”
Training
Response
Unified Command Approach
Recovery
Business Continuity and Disaster Recovery
19. Readiness – Response Recovery Personal
Facilities
Equipment
Communications
20. Managing Enterprise Security Risk
21. Risk Management Security is relative
There are many risks, and they all have to be managed
There are many different solutions, depending on your requirements
Things go wrong
You have a variety of options:
Accept (“a cost of doing business”)
Mitigate the risk with technology
Mitigate the risk with procedures
Mitigate the risk by transferring it (through contracts or insurance)
22. Essential Elements of Risk Threats
Assets
Vulnerabilities
Safeguards
Products
Procedures
People
23. Definition of Risk Risk may be defined as the possibility of suffering harm or loss.
Risk from a security perspective is defined as the process involved in the anticipation, recognition, and appraisal of a risk and the initiation of action to eliminate the risk entirely or reduce the threat of harm to an acceptable level.
24. Types of Risk Pure Risk
Exists when there is a potential for injury, damage, or loss with no possible benefit.
Potential medical claims resulting from accidents.
Dynamic Risk
Exists when threat conditions fluctuate.
Areas of the world that are subject weather extremes
Communities that depend on seasonal tourism or political conditions.
25. Types of Risk Speculative Risk
Exists when there is a potential for benefit or loss, depending on activity or inactivity.
Product research
Static Risk
Is constant and unchanging
Only one supplier for a critical part in manufacturing
Inherent Risk
Those risks that are unavoidable because of the nature of the business.
26. Risk Management Techniques The identification of risks and vulnerabilities through continuous threat assessment
Analysis of the risks and vulnerabilities identified
Optimization of cost-effective risk management alternatives designed to avoid, reduce, spread, or transfer identified risk.
27. Factors that Influence Risk Vulnerability
What are your exposures
Probability
What is the likelihood
Criticality
What is the impact
28. Risk Assessment and the Security Survey Involves a critical objective analysis of an organizations entire protective system
Collection of subjective as well as objective data
Subjective Measures – use of forecasting, expert opinion
Delphi Technique – use of several experts providing input
Objective Measures – use of audits, marketing, operations research, incident and statistical reports, threat assessment, investigations, risk analysis, inspections, and security (loss prevention) surveys.
29. Security Survey Used to evaluate and entire organization to identify risks and security deficiencies.
Assets (people, property, information) to be protected
Anything (or anyone) that could adversely threaten the well-being of the assets
The vulnerabilities (weaknesses) that could conceivable be exploited by the threats
30. Points to Ponder In a world of limited budgets, risk assessment provides an organization with the information it requires to accurately prioritize its needs. Options for meeting those needs can then be considered, ranked accordingly, and funded to reflect priority.
31. School SafetyProtecting One Facility at a Time Five Step Process
Your Model Secure Facility
Gap Analysis
Gap Closure
Strategic Plan
Implementation
32. Integrated Physical Security The Goal of implementing an integrated physical security plan is achieving sensible and sustainable security
People
Operations
Information
Interdependence
33. -DDDRRR- The six primary elements are:
Deterrence – Provides Countermeasures
Detection – Monitors potential breakdowns
Delay – Slow down intruders
Response – Procedures and actions
Recovery – Business Continuity
Re-evaluation – Review – Revisit - Retrain
34. Step One – Your Model Facility Core Functions
Critical Assets
Threats and Vulnerabilities
Appropriate Measures to Mitigate
Benchmark to compare
35. Step Two – Gap Analysis The Assets to be protected
Anything that can be destroyed, damaged, stolen
The threat to those assets
Crime prevention through Environmental Design
The vulnerability of those assets
Use GLOBAL Approach
Your priorities
Risk Assessment
36. Step Three – Gap Closure Perimeter Security
Surveillance, protection basics – countermeasures
Vehicles
Protect approaches, control access and parking
Internal Security
Access controls, alarms, barriers, safe areas
Information Technology
Integrate IT and Physical Security
37. Step Three – Gap Closure Building Design/Security
Code Laws – exits, fences, gates, lighting, etc
Community Risk Assessment/Community Involvement
Assess Local risks and incorporate into plan
Technology Solutions
CCTV - GIS
38. Step Four – Strategic Plan Having Identified
Assets
Adversaries
Threats and Vulnerabilities
Priorities and Options
NOW strategize the security change process
Cost
Timeframe
Implementation
39. Step Five - Implementation Implementation
Approval Process
Project Management
Quality Assurance
Quality Control
Revising Policy Procedures
Re-Analyze your current situation
What has changed – new threats
40. Conclusion To Change the Security Profile of Schools in this Country we must start with School Administrators, First Responders and Youth
One School at a Time