SlideShare ist ein Scribd-Unternehmen logo
1 von 69
Downloaden Sie, um offline zu lesen
Threat Assessments for
K-12 & University Campuses
Today’s
Moderator
Keith Harris
Marketing Manager
LENSEC
Webinar
Sponsor
Based in Houston, TX
Since 1998
IP Video Management
System Design
Installation
Project Management
LENSEC is committed to empowering our clients and partners to prevent or mitigate physical
security risks. We want to help protect people and assets as well as improve operations through
our evolutionary and intuitive technology. We can do this by providing expertise in security and
software development.
Our Mission
Webinar
Logistics
Q&A at the end
Questions for the panelist
Audio from attendees muted
Poll questions
Survey
Today’s
Panelist
Gary L. Sigrist, Jr.
President & CEO
Safeguard Risk Solutions
30 year career as an educator, administrator, &
police officer
Nationally known speaker
Safety Consultant
Helps clients identify vulnerabilities, plan accordingly,
train thoroughly & respond effectively
Training
Goal
Threat Assessment for K-12 & University Campuses
Topics for Webinar:
Threat Assessment Principles
Facts About Targeted Attacks
Five Phases of an Active Shooter Incident
Prevention of the Threat
Assessing Mental Health Risk
Profiling for Potential Threats
Research
Secret Service Safe
School Initiative
Response to Columbine
Marisa Reddy, Ph.D.
Threat Assessments for
K-12 & University Campuses
https://www2.ed.gov/admins/lead/safety/preventingattacksreport.pdf
Facts About Targeted Attacks
Campus Violence Perpetrators
Don’t ‘Just Snap’
Incidents Aren’t Impulsive or
Random
Consider, Plan & Prepare
Violent Behavior
Discuss Plans With Others
Before the Attack
Threat Assessments for K-12 & University Campuses
Facts About Targeted Attacks
Subject’s Appearance Doesn’t Elicit
Concern
Subject’s Behavior Does Elicit Concern
No Unique Profile for a Campus Attacker
Others are Concerned With Troubling
Behavior Before Attacks
Subject’s are Suicidal or Display
Desperation Before Attacks
Threat Assessments for K-12 & University Campuses
Poll
Question
Poll Question #1
Is an active shooter event typically well
planned or spontaneous?
Five Phases of an Active Shooter Incident
Threat Assessments for K-12 & University Campuses
Conceptualization
Fantasy
Difficult to detect
Possible leakage
Planning
Who, what, where and when
Weapons
Possible Leakage
Preparation
Obtaining weapons
Overt leakage
Approach
Implementation
Threat Assessment
Threat Assessments for K-12 & University Campuses
Threat - An expression of intent to
harm someone
Threat Assessment is a process of
evaluating a threat and the
circumstances around it to uncover
facts to indicate whether the threat
is likely to be carried out and then
what should be done about it
Implications for Prevention
Threat Assessments for K-12 & University Campuses
Many targeted attacks can be prevented.
Information about a subject’s ideas and plans for
violence can be observed or discovered before
harm can occur.
Information available is likely to be scattered and
fragmented.
Key is to act quickly upon an initial report of concern.
Determine who else has a piece of the puzzle.
Pull all the information together to see what
picture emerges.
Implications for Prevention
Threat Assessments for K-12 & University Campuses
Assessment involves asking: Is this person on a
pathway toward violence?
Using a team can be particularly effective
Gathering and evaluating information
Intervening if necessary
Threat assessment and case management is
not an adversarial process
Engagement with a person of concern can be critical to preventing violence or
harm
Implications for Prevention
Threat Assessments for K-12 & University Campuses
Assessment involves asking: Is this person on a
pathway toward violence?
Using a team can be particularly effective
Gathering and evaluating information
Intervening if necessary
Threat assessment and case management is
not an adversarial process
Engagement with a person of concern can be critical to preventing violence or
harm
Poll
Question
Poll Question #2
A mental health assessment of a
threatening student helps …
Mental Health Risk Assessment
Threat Assessments for K-12 & University Campuses
Also known as a clinical assessment of
dangerousness
Evaluates a person’s risk for more
general/prevalent types of affective
violence
Not intended (nor effective) for
evaluating risk of a targeted attack
May supplement threat assessment
process but is not a replacement
Automated Decision Making
Threat Assessments for K-12 & University Campuses
Two Areas of Concern:
The statistical or mathematical
process for making the
evaluation is unknown
No correlation between
satisfaction with using the
automated tool and the
accuracy of the decision
made
Profiling
Threat Assessments for K-12 & University Campuses
Most commonly used as an
investigative tool to describe the
person or type of person who
committed a particular crime
It is retrospective in that it uses
clues from a crime that has
already occurred to narrow
down possible suspects
When used with respect to
evaluating risk of violence,
profiling is prospective, not
retrospective
Prospective Profiling
Threat Assessments for K-12 & University Campuses
Profiling
Threat Assessments for K-12 & University Campuses
Two Major Failings:
It identifies far more people
that match a profile but do
not pose a threat
It fails to identify a person
whose behavior suggests real
concern but whose traits or
characteristics do not match
the profile
Threat Assessment Process
Threat Assessments for K-12 & University Campuses
Threat Assessment Process
Threat Assessments for K-12 & University Campuses
Why Threat Assessment?
Threat Assessments for K-12 & University Campuses
Evidence-based and derived from:
U.S. Secret Service protective intelligence research
Safe School Initiative
FBI research regarding workplace violence
Student development (Ursula Delworth, 1989)
Used successfully to prevent campus, school, and workplace shootings
Threat Assessment Principles
Threat Assessments for K-12 & University Campuses
#1 Prevention is Possible
Acts of targeted violence typically
follow a logical progression of
behavior
Conceptualization
Planning
Preparation
Approach
Implementation
This allows opportunities for
behavioral progression to observed
Threat Assessment Principles
Threat Assessments for K-12 & University Campuses
#2 Violence is a Dynamic Process
Not asking whether this is a
“violent person”
Looking at changes in
circumstances, situation, and its
impact on the person in question
Threat Assessment Principles
Threat Assessments for K-12 & University Campuses
#3 Targeted Violence is the product of an interaction among four factors:
- SUBJECT may take violent action
- Vulnerabilities of the TARGET of such actions
- ENVIRONMENT facilitates/permits violence, or does not discourage it
- PRECIPITATING EVENTS may trigger reactions
Source: G. Deisinger & M. Randazzo
Threat Assessment Principles
Threat Assessments for K-12 & University Campuses
Threat Assessment Principles
Threat Assessments for K-12 & University Campuses
Threat Assessment Principles
Threat Assessments for K-12 & University Campuses
Threat Assessments for K-12 & University Campuses
Distress Disturbance Dysregulation Medical Disability(a parallel level of
risk to Dysregulation)
Emotionally troubled (e.g.,
depressed, manic, unstable)
Increasingly
behaviorally
disruptive; unusual,
and/or bizarrely acting
Suicidal (thoughts, feelings, expressed
intentions and ideations)
Profoundly disturbed, detached view of
reality
Individuals impacted by
actual/perceived situational
stressors and traumatic events
May be destructive,
apparently harmful or
threatening to others
Parasuicidal (extremes of self-injurious
behavior, eating disorder, personality
disorder)
Unable to care for themselves (poor
self care, protection, or judgment)
Behavior may subside when
stressor is removed or trauma is
addressed/processed
Substance misuse and
abuse; self-medication
Individuals engaging in risk-taking
behaviors (e.g., substance abusing)
At risk of grievous injury or death
without an intent to self-harm
May be psychiatrically
symptomatic if not
coping/adapting to
stressors/trauma
Hostile, aggressive, relationally abusive Often seen in psychotic breaks
Individuals deficient in skills that
regulate emotion, cognition, self,
behavior, and relationships
Threat Assessment Principles
Threat Assessment Principles
Threat Assessments for K-12 & University Campuses
Threat Assessment Principles
Threat Assessments for K-12 & University Campuses
Threat Assessment Principles
Threat Assessments for K-12 & University Campuses
Threat Assessment Team
Threat Assessments for K-12 & University Campuses
Threat Assessment Process
Threat Assessments for K-12 & University Campuses
THREAT
ASSESSMENT
PROCESS
Ability
(e.g., access,
means, capacity,
opportunity)
Thresholds
Crossed
(e.g., attack-
related behaviors,
rules broken)
Compliance with
Risk Reduction
(e.g., interest in
reducing risk)
Concern by
Others
(e.g., student
discussed plan,
others are afraid)
Intent
(e.g., specificity
of plan, action
taken toward
plan)
Model Developed by the U.S. Secret Service
Threat Assessment Flow Chart
Threat Assessments for K-12 & University Campuses
Threat Assessment Flow Chart
Threat Assessments for K-12 & University Campuses
Poll
Question
Poll Question #3
What is a transient threat?
Evaluating & Classifying Threats
Threat Assessments for K-12 & University Campuses
Practice Classifying Threats
Threat Assessments for K-12 & University Campuses
Practice Classifying Threats
Threat Assessments for K-12 & University Campuses
Practice Classifying Threats
Threat Assessments for K-12 & University Campuses
Practice Classifying Threats
Threat Assessments for K-12 & University Campuses
Practice Classifying Threats
Threat Assessments for K-12 & University Campuses
Practice Classifying Threats
Threat Assessments for K-12 & University Campuses
Practice Classifying Threats
Threat Assessments for K-12 & University Campuses
Practice Classifying Threats
Threat Assessments for K-12 & University Campuses
Discipline & Threat Assessment
Threat Assessments for K-12 & University Campuses
Two Different Processes
The District discipline code
determines the disciplinary
consequences for a threat
The “duty to protect” drives threat
assessment
Issues in Responding to Substantive Threats
Threat Assessments for K-12 & University Campuses
The prevention of serious acts of planned violence requires a
systematic approach to assessing and managing risk for violence.
Management of threatening situations typically involves three
functions:
Controlling/containing the situation and/or student in a way that will prevent
the possibility of an attack
Protecting and aiding possible targets of the attack
Providing support and guidance to help the student resolve the issues giving
rise to an attack motive
Issues in Responding to Substantive Threats
Threat Assessments for K-12 & University Campuses
The prevention of serious acts of planned violence requires a
systematic approach to assessing and managing risk for violence.
Management of threatening situations typically involves three
functions:
Controlling/containing the situation and/or student in a way that will prevent
the possibility of an attack
Protecting and aiding possible targets of the attack
Providing support and guidance to help the student resolve the issues giving
rise to an attack motive
Privacy & Emergency Communications
Threat Assessments for K-12 & University Campuses
Federal and state law prevents the
disclosure of personally identifiable
information from a pupil record
unless the school can establish a
legally sufficient reason for the
disclosure
Privacy & Emergency Communications
Threat Assessments for K-12 & University Campuses
A school district may disclose information from a pupil record in
connection with an emergency if knowledge of the information is
necessary to protect the health or safety of the pupil or other person,
the determination is based on an articulable and significant threat to
the health or safety of a pupil or other individuals, and the disclosure
is limited to those persons who can take protective actions
(Title 34, Code of Federal Regulations, Section 99.32)
https://www2.ed.gov/policy/gen/guid/fpco/pdf/ferpa-disaster-guidance.pdf
Practice Responding to Threats
Threat Assessments for K-12 & University Campuses
An angry student says, “I’m going
to kill you.” Now that the threat has
been resolved as transient, what is
the next thing to do?
Take No Further Action
Suspend The Student For 5 days
Refer The Student For A Mental
Health Assessment
Refer The Two Students For Conflict
Mediation
Practice Responding to Threats
Threat Assessments for K-12 & University Campuses
An angry student says, “I’m going
to kill you.” Now that the threat has
been resolved as transient, what is
the next thing to do?
Take No Further Action
Suspend The Student For 5 days
Refer The Student For A Mental
Health Assessment
Refer The Two Students For Conflict
Mediation
Practice Responding to Threats
Threat Assessments for K-12 & University Campuses
Two students argue, and one punches the other. The
student has assaulted his classmate, but he has not
expressed an intent to harm him in the future, so no
threat has been made. The student admitted that he
should not have lost his temper but acted in self-
defense. Is there anything else to do?
Take No Further Action
Discipline The Student For Punching A Peer
Interview The Students To Determine If They Still
Want To Fight
Refer The Two Students For Conflict Mediation
Practice Responding to Threats
Threat Assessments for K-12 & University Campuses
Two students argue, and one punches the other. The
student has assaulted his classmate, but he has not
expressed an intent to harm him in the future, so no
threat has been made. The student admitted that he
should not have lost his temper but acted in self-
defense. Is there anything else to do?
Take No Further Action
Discipline The Student For Punching A Peer
Interview The Students To Determine If They Still
Want To Fight
Refer The Two Students For Conflict Mediation
Practice Responding to Threats
Threat Assessments for K-12 & University Campuses
A student tells a friend that he will beat up
someone in the parking lot after school. The
student was uncooperative, and you classified the
case as a serious substantive threat. What else do
you do?
Notify the intended victim
Ask the school police officer to arrest the student
Refer the student for a mental health assessment
Take protective action by notifying the student’s
parents and having them take their son home
after school
Practice Responding to Threats
Threat Assessments for K-12 & University Campuses
A student tells a friend that he will beat up
someone in the parking lot after school. The
student was uncooperative, and you classified the
case as a serious substantive threat. What else do
you do?
Notify the intended victim
Ask the school police officer to arrest the student
Refer the student for a mental health assessment
Take protective action by notifying the student’s
parents and having them take their son home
after school
Practice Responding to Threats
Threat Assessments for K-12 & University Campuses
A student is found with a list of student names
under the heading “Scheduled to Die.” The
student was sullen and uncooperative, and you
did not believe the student was joking or simply
trying to get attention. The threat also involved
a felonious assault, so you classified the threat
as a very serious substantive threat. What
should you do?
Refer the student for a mental health assessment
Notify the intended victims and the victims’ parents
Consult with law enforcement
Expel the student for his plans to carry out a very
serious substantive threat
Practice Responding to Threats
Threat Assessments for K-12 & University Campuses
A student is found with a list of student names
under the heading “Scheduled to Die.” The
student was sullen and uncooperative, and you
did not believe the student was joking or simply
trying to get attention. The threat also involved
a felonious assault, so you classified the threat
as a very serious substantive threat. What
should you do?
Refer the student for a mental health assessment
Notify the intended victims and the victims’ parents
Consult with law enforcement
Expel the student for his plans to carry out a very
serious substantive threat
Internal Threat Detection
Threat Assessments for K-12 & University Campuses
Listen, Watch, Report
Develop a culture that
encourages students to speak up
and to seek a trusted adult
Encourage students that it’s OK to
“talk” about things they hear and
see. Sometimes their peers are
not “just joking”
Encourage faculty to share
concerns
Offer some form of anonymous
reporting
Threat Assessments
Threat Assessments for K-12 & University Campuses
Recommended by the US Secret Service
and the US Department of Education
Preventive measures not reactive
measures
Protects the victim
Gets help for the troubled person
Questions
Q&A
Contacts
Keith Harris
LENSEC
(512) 913-3907
kharris@lensec.com
Gary L. Sigrist, Jr.
Safeguard Risk Solutions
(614) 679-5608
gary@safeguardrisksolutions.com
Thanks for Attending
Today’s Webinar
SIS11-16 Webinar: Threat Assessments – Questions & Answers
Poll Question #1
Is an active shooter event typically well planned or spontaneous?
1 - Well Planned
2 - Spontaneous
Poll Question #2
A mental health assessment of a threatening student helps ____________________.
1 - Evaluate a person’s risk for violence
2 - Evaluate a risk of targeted attack
3 - Administration develop a risk plan
Poll Question #3
What is a transient threat?
1 - Threat is committed by a person not regularly on campus
2- Threat to kill a faculty member or student
3 - Threat not expressing lasting intent to harm another person
Questions & Answers
Q: Is it true that threat assessment teams have been known to prevent targeted acts of
school violence?
A: I would say almost every week a targeted act of violence is stopped in a school simply
because a threat was made know to school officials and the threat was investigated.
Long before Homeland Security’s “See Something, Say Something” campaign, this is
what we were recommending for schools based on the Secret Service’s safe school
initiative. Every threat is evaluated to determine if it is a very serious, substantive threat
that poses a risk to students. If you want to look your parents in the eyes and say, “One
of the ways we are preventing violence from happening in our school is we have a
threat assessment team to evaluate every threat to our school.” This threat assessment
process for those of you that attended the bomb threat protocol training, it’s the same
thing. Every time a bomb threat comes in, we assess that threat.
Q: Should law enforcement have direct access to school video surveillance systems?
A: The answer is, they’re not allowed to unless they can articulate a specific threat at a
specific time. Here’s an example: I received a call from a local law enforcement agency
requesting video of a fight in a local high school. The incident occurred two weeks prior
and the parents were pressing charges. If it happened two weeks ago, there is not a
current threat. In that case I said, “I will get you a copy of the tape, but I need for you to
get me a subpoena.” So it was not an adversarial process, they gave me the subpoena
and I gave them a copy of the tape. A public records request is not enough to get a copy
of the tape. The news media can’t get access to the same tape. The police, with a
subpoena, can get it as a part of their investigation. After the investigation is over, the
news media can obtain a copy of the tape from the police department via an open
records or Freedom of Information request. The school can’t be held liable. On the
other hand, if there is a kidnapping in front of the school and police request immediate
access to the surveillance video, a subpoena is not needed because it’s an exigent
circumstance. That means we can articulate that the safety of that child overrides
FERPA.
Q: We have a limited budget for safety and security. We want to spend our money on
something that is sustainable. How are threat assessment teams sustainable?
A: Threat assessment teams are sustainable because you can train staff. For example, let’s
say we have five buildings. In each building, we train the administrators, counselors and
staff members. That training can last 5 to 10 years depending on the longevity of your
staff. If you lose one or two members in one building, you can get staff members from
other buildings to help fill in the gap in your threat assessment team. If you put a metal
detector in your building and it breaks down, how are you going to pay for it? But, if you
train your staff, that training can be passed along which is what makes it sustainable.
Q: Why do we want to keep a student who has made a threat in school? Wouldn’t it be
safer to expel the student and keep them away from other children?
A: We are going to temporarily remove that child from school for a couple of reasons. First
of all, we have to create a safety plan. The number one thing is making sure that the
students and staff are safe in the school. However, if we take a typical sixteen year old
who is expelled from school, that child is going to be home alone because parents work.
So now that child is going to be home alone with access to the internet and access to
other things. If that child is not getting the help they need to get them off of the
pathway to violence, you’ve got a problem situation just waiting. But if we create a
safety plan to bring the child back to school, assuming we have cooperative parents, the
child has to meet certain criteria in order to regain admission.
Q: How does the threat assessment team fit into the four phases of emergency
management?
A: The threat assessment team fits into the prevention and mitigation phase as well as the
planning stage. We recommend putting something into place to prevent the attack from
occurring. Do we want to prevent a car crash from happening or do we want to deal
with it after it occurs? Let’s prevent the car crash from occurring in the first place. It’s
less traumatic emotionally, it’s less traumatic physically, and it’s better for our school
and our community.
LINKS
Secret Service Safe School Initiative:
https://www2.ed.gov/admins/lead/safety/preventingattacksreport.pdf
FERPA Disaster Guidance:
https://www2.ed.gov/policy/gen/guid/fpco/pdf/ferpa-disaster-guidance.pdf

Weitere ähnliche Inhalte

Ähnlich wie Step Into Security Webinar - Threat Assessments for K-12 & University Campuses

Workplace Violence - Your Recieved a Threat, Should You Worry
Workplace Violence - Your Recieved a Threat, Should You WorryWorkplace Violence - Your Recieved a Threat, Should You Worry
Workplace Violence - Your Recieved a Threat, Should You Worry
Michael Julian, CPI PPS CSP
 
Guardian SafeSchool Consulting - Low Res
Guardian SafeSchool Consulting - Low ResGuardian SafeSchool Consulting - Low Res
Guardian SafeSchool Consulting - Low Res
Jeff Ezell
 
24 Maart Versie Bijlage Xx Bij De Modellen En Theorie Module 1
24 Maart Versie Bijlage Xx Bij De Modellen En Theorie Module 124 Maart Versie Bijlage Xx Bij De Modellen En Theorie Module 1
24 Maart Versie Bijlage Xx Bij De Modellen En Theorie Module 1
Bram Langen
 
Threat Assessment
Threat AssessmentThreat Assessment
Threat Assessment
bradburns
 
N Wilson, Dynamic Risk and Protective Assessment
N Wilson, Dynamic Risk and Protective Assessment N Wilson, Dynamic Risk and Protective Assessment
N Wilson, Dynamic Risk and Protective Assessment
NZ Psychological Society
 
Spring Quant Final Presentation-Camp Viololence (1)
Spring Quant Final Presentation-Camp Viololence (1)Spring Quant Final Presentation-Camp Viololence (1)
Spring Quant Final Presentation-Camp Viololence (1)
Elliott Coney, Ed.D
 
Risk assessment a
Risk assessment aRisk assessment a
Risk assessment a
NDRC Nepal
 
Supervising the Mental Health Client for APPAinLA2015
Supervising the Mental Health Client for APPAinLA2015Supervising the Mental Health Client for APPAinLA2015
Supervising the Mental Health Client for APPAinLA2015
Paul Brown
 

Ähnlich wie Step Into Security Webinar - Threat Assessments for K-12 & University Campuses (20)

Workplace Violence - Your Recieved a Threat, Should You Worry
Workplace Violence - Your Recieved a Threat, Should You WorryWorkplace Violence - Your Recieved a Threat, Should You Worry
Workplace Violence - Your Recieved a Threat, Should You Worry
 
CapTech Talks Webinar April 2023 Joshua Sinai.pptx
CapTech Talks Webinar April 2023 Joshua Sinai.pptxCapTech Talks Webinar April 2023 Joshua Sinai.pptx
CapTech Talks Webinar April 2023 Joshua Sinai.pptx
 
Guardian SafeSchool Consulting - Low Res
Guardian SafeSchool Consulting - Low ResGuardian SafeSchool Consulting - Low Res
Guardian SafeSchool Consulting - Low Res
 
24 Maart Versie Bijlage Xx Bij De Modellen En Theorie Module 1
24 Maart Versie Bijlage Xx Bij De Modellen En Theorie Module 124 Maart Versie Bijlage Xx Bij De Modellen En Theorie Module 1
24 Maart Versie Bijlage Xx Bij De Modellen En Theorie Module 1
 
Handling Threats and Other Disturbing Behavior on Campus
Handling Threats and Other Disturbing Behavior on CampusHandling Threats and Other Disturbing Behavior on Campus
Handling Threats and Other Disturbing Behavior on Campus
 
Relating Risk to Vulnerability
Relating Risk to Vulnerability Relating Risk to Vulnerability
Relating Risk to Vulnerability
 
Security Site Surveys and Risk Assessments
Security Site Surveys and Risk AssessmentsSecurity Site Surveys and Risk Assessments
Security Site Surveys and Risk Assessments
 
Threat Assessment
Threat AssessmentThreat Assessment
Threat Assessment
 
resume 1
resume 1resume 1
resume 1
 
Managing Risk or Reacting to Compliance
Managing Risk or Reacting to ComplianceManaging Risk or Reacting to Compliance
Managing Risk or Reacting to Compliance
 
N Wilson, Dynamic Risk and Protective Assessment
N Wilson, Dynamic Risk and Protective Assessment N Wilson, Dynamic Risk and Protective Assessment
N Wilson, Dynamic Risk and Protective Assessment
 
Step Into Security Webinar – Best Practices for Bomb Threat Response at Schools
Step Into Security Webinar – Best Practices for Bomb Threat Response at SchoolsStep Into Security Webinar – Best Practices for Bomb Threat Response at Schools
Step Into Security Webinar – Best Practices for Bomb Threat Response at Schools
 
Spring Quant Final Presentation-Camp Viololence (1)
Spring Quant Final Presentation-Camp Viololence (1)Spring Quant Final Presentation-Camp Viololence (1)
Spring Quant Final Presentation-Camp Viololence (1)
 
Risk assessment a
Risk assessment aRisk assessment a
Risk assessment a
 
Is My Child Safe On Your Campus?
Is My Child Safe On Your Campus?Is My Child Safe On Your Campus?
Is My Child Safe On Your Campus?
 
Risk Management.pptx
Risk Management.pptxRisk Management.pptx
Risk Management.pptx
 
Adversarial Safety Analysis
Adversarial Safety AnalysisAdversarial Safety Analysis
Adversarial Safety Analysis
 
6 Keys to Preventing and Responding to Workplace Violence
6 Keys to Preventing and Responding to Workplace Violence6 Keys to Preventing and Responding to Workplace Violence
6 Keys to Preventing and Responding to Workplace Violence
 
Risk management
Risk managementRisk management
Risk management
 
Supervising the Mental Health Client for APPAinLA2015
Supervising the Mental Health Client for APPAinLA2015Supervising the Mental Health Client for APPAinLA2015
Supervising the Mental Health Client for APPAinLA2015
 

Mehr von Keith Harris

Mehr von Keith Harris (9)

LENSEC Corporate Presentation 2017
LENSEC Corporate Presentation 2017LENSEC Corporate Presentation 2017
LENSEC Corporate Presentation 2017
 
Step Into Security Webinar - Securing Campuses for the New School Year
Step Into Security Webinar - Securing Campuses for the New School Year Step Into Security Webinar - Securing Campuses for the New School Year
Step Into Security Webinar - Securing Campuses for the New School Year
 
Step Into Security Webinar - IP Security Camera Techniques for Video Surveill...
Step Into Security Webinar - IP Security Camera Techniques for Video Surveill...Step Into Security Webinar - IP Security Camera Techniques for Video Surveill...
Step Into Security Webinar - IP Security Camera Techniques for Video Surveill...
 
Step Into Security Webinar - Securing Your Facilities Using Technology
Step Into Security Webinar - Securing Your Facilities Using Technology Step Into Security Webinar - Securing Your Facilities Using Technology
Step Into Security Webinar - Securing Your Facilities Using Technology
 
Step Into Security Webinar - Planning for Outdoor Video Surveillance Projects
Step Into Security Webinar - Planning for Outdoor Video Surveillance ProjectsStep Into Security Webinar - Planning for Outdoor Video Surveillance Projects
Step Into Security Webinar - Planning for Outdoor Video Surveillance Projects
 
Step Into Security Webinar - Surveillance Solutions in Special Education Clas...
Step Into Security Webinar - Surveillance Solutions in Special Education Clas...Step Into Security Webinar - Surveillance Solutions in Special Education Clas...
Step Into Security Webinar - Surveillance Solutions in Special Education Clas...
 
Step Into Security Webinar - Physical Security Integration & Access Control -...
Step Into Security Webinar - Physical Security Integration & Access Control -...Step Into Security Webinar - Physical Security Integration & Access Control -...
Step Into Security Webinar - Physical Security Integration & Access Control -...
 
Step Into Security Webinar - Video Surveillance in Classrooms & Around Campus
Step Into Security Webinar - Video Surveillance in Classrooms & Around Campus Step Into Security Webinar - Video Surveillance in Classrooms & Around Campus
Step Into Security Webinar - Video Surveillance in Classrooms & Around Campus
 
Step Into Security Webinar - Improving Physical Security on Your Campus
Step Into Security Webinar - Improving Physical Security on Your Campus Step Into Security Webinar - Improving Physical Security on Your Campus
Step Into Security Webinar - Improving Physical Security on Your Campus
 

Kürzlich hochgeladen

Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Krashi Coaching
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
SoniaTolstoy
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 

Kürzlich hochgeladen (20)

Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 

Step Into Security Webinar - Threat Assessments for K-12 & University Campuses

  • 1. Threat Assessments for K-12 & University Campuses
  • 3. Webinar Sponsor Based in Houston, TX Since 1998 IP Video Management System Design Installation Project Management LENSEC is committed to empowering our clients and partners to prevent or mitigate physical security risks. We want to help protect people and assets as well as improve operations through our evolutionary and intuitive technology. We can do this by providing expertise in security and software development. Our Mission
  • 4. Webinar Logistics Q&A at the end Questions for the panelist Audio from attendees muted Poll questions Survey
  • 5. Today’s Panelist Gary L. Sigrist, Jr. President & CEO Safeguard Risk Solutions 30 year career as an educator, administrator, & police officer Nationally known speaker Safety Consultant Helps clients identify vulnerabilities, plan accordingly, train thoroughly & respond effectively
  • 6. Training Goal Threat Assessment for K-12 & University Campuses Topics for Webinar: Threat Assessment Principles Facts About Targeted Attacks Five Phases of an Active Shooter Incident Prevention of the Threat Assessing Mental Health Risk Profiling for Potential Threats
  • 7. Research Secret Service Safe School Initiative Response to Columbine Marisa Reddy, Ph.D. Threat Assessments for K-12 & University Campuses https://www2.ed.gov/admins/lead/safety/preventingattacksreport.pdf
  • 8. Facts About Targeted Attacks Campus Violence Perpetrators Don’t ‘Just Snap’ Incidents Aren’t Impulsive or Random Consider, Plan & Prepare Violent Behavior Discuss Plans With Others Before the Attack Threat Assessments for K-12 & University Campuses
  • 9. Facts About Targeted Attacks Subject’s Appearance Doesn’t Elicit Concern Subject’s Behavior Does Elicit Concern No Unique Profile for a Campus Attacker Others are Concerned With Troubling Behavior Before Attacks Subject’s are Suicidal or Display Desperation Before Attacks Threat Assessments for K-12 & University Campuses
  • 10. Poll Question Poll Question #1 Is an active shooter event typically well planned or spontaneous?
  • 11. Five Phases of an Active Shooter Incident Threat Assessments for K-12 & University Campuses Conceptualization Fantasy Difficult to detect Possible leakage Planning Who, what, where and when Weapons Possible Leakage Preparation Obtaining weapons Overt leakage Approach Implementation
  • 12. Threat Assessment Threat Assessments for K-12 & University Campuses Threat - An expression of intent to harm someone Threat Assessment is a process of evaluating a threat and the circumstances around it to uncover facts to indicate whether the threat is likely to be carried out and then what should be done about it
  • 13. Implications for Prevention Threat Assessments for K-12 & University Campuses Many targeted attacks can be prevented. Information about a subject’s ideas and plans for violence can be observed or discovered before harm can occur. Information available is likely to be scattered and fragmented. Key is to act quickly upon an initial report of concern. Determine who else has a piece of the puzzle. Pull all the information together to see what picture emerges.
  • 14. Implications for Prevention Threat Assessments for K-12 & University Campuses Assessment involves asking: Is this person on a pathway toward violence? Using a team can be particularly effective Gathering and evaluating information Intervening if necessary Threat assessment and case management is not an adversarial process Engagement with a person of concern can be critical to preventing violence or harm
  • 15. Implications for Prevention Threat Assessments for K-12 & University Campuses Assessment involves asking: Is this person on a pathway toward violence? Using a team can be particularly effective Gathering and evaluating information Intervening if necessary Threat assessment and case management is not an adversarial process Engagement with a person of concern can be critical to preventing violence or harm
  • 16. Poll Question Poll Question #2 A mental health assessment of a threatening student helps …
  • 17. Mental Health Risk Assessment Threat Assessments for K-12 & University Campuses Also known as a clinical assessment of dangerousness Evaluates a person’s risk for more general/prevalent types of affective violence Not intended (nor effective) for evaluating risk of a targeted attack May supplement threat assessment process but is not a replacement
  • 18. Automated Decision Making Threat Assessments for K-12 & University Campuses Two Areas of Concern: The statistical or mathematical process for making the evaluation is unknown No correlation between satisfaction with using the automated tool and the accuracy of the decision made
  • 19. Profiling Threat Assessments for K-12 & University Campuses Most commonly used as an investigative tool to describe the person or type of person who committed a particular crime It is retrospective in that it uses clues from a crime that has already occurred to narrow down possible suspects When used with respect to evaluating risk of violence, profiling is prospective, not retrospective
  • 20. Prospective Profiling Threat Assessments for K-12 & University Campuses
  • 21. Profiling Threat Assessments for K-12 & University Campuses Two Major Failings: It identifies far more people that match a profile but do not pose a threat It fails to identify a person whose behavior suggests real concern but whose traits or characteristics do not match the profile
  • 22. Threat Assessment Process Threat Assessments for K-12 & University Campuses
  • 23. Threat Assessment Process Threat Assessments for K-12 & University Campuses
  • 24. Why Threat Assessment? Threat Assessments for K-12 & University Campuses Evidence-based and derived from: U.S. Secret Service protective intelligence research Safe School Initiative FBI research regarding workplace violence Student development (Ursula Delworth, 1989) Used successfully to prevent campus, school, and workplace shootings
  • 25. Threat Assessment Principles Threat Assessments for K-12 & University Campuses #1 Prevention is Possible Acts of targeted violence typically follow a logical progression of behavior Conceptualization Planning Preparation Approach Implementation This allows opportunities for behavioral progression to observed
  • 26. Threat Assessment Principles Threat Assessments for K-12 & University Campuses #2 Violence is a Dynamic Process Not asking whether this is a “violent person” Looking at changes in circumstances, situation, and its impact on the person in question
  • 27. Threat Assessment Principles Threat Assessments for K-12 & University Campuses #3 Targeted Violence is the product of an interaction among four factors: - SUBJECT may take violent action - Vulnerabilities of the TARGET of such actions - ENVIRONMENT facilitates/permits violence, or does not discourage it - PRECIPITATING EVENTS may trigger reactions Source: G. Deisinger & M. Randazzo
  • 28. Threat Assessment Principles Threat Assessments for K-12 & University Campuses
  • 29. Threat Assessment Principles Threat Assessments for K-12 & University Campuses
  • 30. Threat Assessment Principles Threat Assessments for K-12 & University Campuses
  • 31. Threat Assessments for K-12 & University Campuses Distress Disturbance Dysregulation Medical Disability(a parallel level of risk to Dysregulation) Emotionally troubled (e.g., depressed, manic, unstable) Increasingly behaviorally disruptive; unusual, and/or bizarrely acting Suicidal (thoughts, feelings, expressed intentions and ideations) Profoundly disturbed, detached view of reality Individuals impacted by actual/perceived situational stressors and traumatic events May be destructive, apparently harmful or threatening to others Parasuicidal (extremes of self-injurious behavior, eating disorder, personality disorder) Unable to care for themselves (poor self care, protection, or judgment) Behavior may subside when stressor is removed or trauma is addressed/processed Substance misuse and abuse; self-medication Individuals engaging in risk-taking behaviors (e.g., substance abusing) At risk of grievous injury or death without an intent to self-harm May be psychiatrically symptomatic if not coping/adapting to stressors/trauma Hostile, aggressive, relationally abusive Often seen in psychotic breaks Individuals deficient in skills that regulate emotion, cognition, self, behavior, and relationships Threat Assessment Principles
  • 32. Threat Assessment Principles Threat Assessments for K-12 & University Campuses
  • 33. Threat Assessment Principles Threat Assessments for K-12 & University Campuses
  • 34. Threat Assessment Principles Threat Assessments for K-12 & University Campuses
  • 35. Threat Assessment Team Threat Assessments for K-12 & University Campuses
  • 36. Threat Assessment Process Threat Assessments for K-12 & University Campuses THREAT ASSESSMENT PROCESS Ability (e.g., access, means, capacity, opportunity) Thresholds Crossed (e.g., attack- related behaviors, rules broken) Compliance with Risk Reduction (e.g., interest in reducing risk) Concern by Others (e.g., student discussed plan, others are afraid) Intent (e.g., specificity of plan, action taken toward plan) Model Developed by the U.S. Secret Service
  • 37. Threat Assessment Flow Chart Threat Assessments for K-12 & University Campuses
  • 38. Threat Assessment Flow Chart Threat Assessments for K-12 & University Campuses
  • 39. Poll Question Poll Question #3 What is a transient threat?
  • 40. Evaluating & Classifying Threats Threat Assessments for K-12 & University Campuses
  • 41. Practice Classifying Threats Threat Assessments for K-12 & University Campuses
  • 42. Practice Classifying Threats Threat Assessments for K-12 & University Campuses
  • 43. Practice Classifying Threats Threat Assessments for K-12 & University Campuses
  • 44. Practice Classifying Threats Threat Assessments for K-12 & University Campuses
  • 45. Practice Classifying Threats Threat Assessments for K-12 & University Campuses
  • 46. Practice Classifying Threats Threat Assessments for K-12 & University Campuses
  • 47. Practice Classifying Threats Threat Assessments for K-12 & University Campuses
  • 48. Practice Classifying Threats Threat Assessments for K-12 & University Campuses
  • 49. Discipline & Threat Assessment Threat Assessments for K-12 & University Campuses Two Different Processes The District discipline code determines the disciplinary consequences for a threat The “duty to protect” drives threat assessment
  • 50. Issues in Responding to Substantive Threats Threat Assessments for K-12 & University Campuses The prevention of serious acts of planned violence requires a systematic approach to assessing and managing risk for violence. Management of threatening situations typically involves three functions: Controlling/containing the situation and/or student in a way that will prevent the possibility of an attack Protecting and aiding possible targets of the attack Providing support and guidance to help the student resolve the issues giving rise to an attack motive
  • 51. Issues in Responding to Substantive Threats Threat Assessments for K-12 & University Campuses The prevention of serious acts of planned violence requires a systematic approach to assessing and managing risk for violence. Management of threatening situations typically involves three functions: Controlling/containing the situation and/or student in a way that will prevent the possibility of an attack Protecting and aiding possible targets of the attack Providing support and guidance to help the student resolve the issues giving rise to an attack motive
  • 52. Privacy & Emergency Communications Threat Assessments for K-12 & University Campuses Federal and state law prevents the disclosure of personally identifiable information from a pupil record unless the school can establish a legally sufficient reason for the disclosure
  • 53. Privacy & Emergency Communications Threat Assessments for K-12 & University Campuses A school district may disclose information from a pupil record in connection with an emergency if knowledge of the information is necessary to protect the health or safety of the pupil or other person, the determination is based on an articulable and significant threat to the health or safety of a pupil or other individuals, and the disclosure is limited to those persons who can take protective actions (Title 34, Code of Federal Regulations, Section 99.32) https://www2.ed.gov/policy/gen/guid/fpco/pdf/ferpa-disaster-guidance.pdf
  • 54. Practice Responding to Threats Threat Assessments for K-12 & University Campuses An angry student says, “I’m going to kill you.” Now that the threat has been resolved as transient, what is the next thing to do? Take No Further Action Suspend The Student For 5 days Refer The Student For A Mental Health Assessment Refer The Two Students For Conflict Mediation
  • 55. Practice Responding to Threats Threat Assessments for K-12 & University Campuses An angry student says, “I’m going to kill you.” Now that the threat has been resolved as transient, what is the next thing to do? Take No Further Action Suspend The Student For 5 days Refer The Student For A Mental Health Assessment Refer The Two Students For Conflict Mediation
  • 56. Practice Responding to Threats Threat Assessments for K-12 & University Campuses Two students argue, and one punches the other. The student has assaulted his classmate, but he has not expressed an intent to harm him in the future, so no threat has been made. The student admitted that he should not have lost his temper but acted in self- defense. Is there anything else to do? Take No Further Action Discipline The Student For Punching A Peer Interview The Students To Determine If They Still Want To Fight Refer The Two Students For Conflict Mediation
  • 57. Practice Responding to Threats Threat Assessments for K-12 & University Campuses Two students argue, and one punches the other. The student has assaulted his classmate, but he has not expressed an intent to harm him in the future, so no threat has been made. The student admitted that he should not have lost his temper but acted in self- defense. Is there anything else to do? Take No Further Action Discipline The Student For Punching A Peer Interview The Students To Determine If They Still Want To Fight Refer The Two Students For Conflict Mediation
  • 58. Practice Responding to Threats Threat Assessments for K-12 & University Campuses A student tells a friend that he will beat up someone in the parking lot after school. The student was uncooperative, and you classified the case as a serious substantive threat. What else do you do? Notify the intended victim Ask the school police officer to arrest the student Refer the student for a mental health assessment Take protective action by notifying the student’s parents and having them take their son home after school
  • 59. Practice Responding to Threats Threat Assessments for K-12 & University Campuses A student tells a friend that he will beat up someone in the parking lot after school. The student was uncooperative, and you classified the case as a serious substantive threat. What else do you do? Notify the intended victim Ask the school police officer to arrest the student Refer the student for a mental health assessment Take protective action by notifying the student’s parents and having them take their son home after school
  • 60. Practice Responding to Threats Threat Assessments for K-12 & University Campuses A student is found with a list of student names under the heading “Scheduled to Die.” The student was sullen and uncooperative, and you did not believe the student was joking or simply trying to get attention. The threat also involved a felonious assault, so you classified the threat as a very serious substantive threat. What should you do? Refer the student for a mental health assessment Notify the intended victims and the victims’ parents Consult with law enforcement Expel the student for his plans to carry out a very serious substantive threat
  • 61. Practice Responding to Threats Threat Assessments for K-12 & University Campuses A student is found with a list of student names under the heading “Scheduled to Die.” The student was sullen and uncooperative, and you did not believe the student was joking or simply trying to get attention. The threat also involved a felonious assault, so you classified the threat as a very serious substantive threat. What should you do? Refer the student for a mental health assessment Notify the intended victims and the victims’ parents Consult with law enforcement Expel the student for his plans to carry out a very serious substantive threat
  • 62. Internal Threat Detection Threat Assessments for K-12 & University Campuses Listen, Watch, Report Develop a culture that encourages students to speak up and to seek a trusted adult Encourage students that it’s OK to “talk” about things they hear and see. Sometimes their peers are not “just joking” Encourage faculty to share concerns Offer some form of anonymous reporting
  • 63. Threat Assessments Threat Assessments for K-12 & University Campuses Recommended by the US Secret Service and the US Department of Education Preventive measures not reactive measures Protects the victim Gets help for the troubled person
  • 65. Contacts Keith Harris LENSEC (512) 913-3907 kharris@lensec.com Gary L. Sigrist, Jr. Safeguard Risk Solutions (614) 679-5608 gary@safeguardrisksolutions.com
  • 67. SIS11-16 Webinar: Threat Assessments – Questions & Answers Poll Question #1 Is an active shooter event typically well planned or spontaneous? 1 - Well Planned 2 - Spontaneous Poll Question #2 A mental health assessment of a threatening student helps ____________________. 1 - Evaluate a person’s risk for violence 2 - Evaluate a risk of targeted attack 3 - Administration develop a risk plan Poll Question #3 What is a transient threat? 1 - Threat is committed by a person not regularly on campus 2- Threat to kill a faculty member or student 3 - Threat not expressing lasting intent to harm another person Questions & Answers Q: Is it true that threat assessment teams have been known to prevent targeted acts of school violence? A: I would say almost every week a targeted act of violence is stopped in a school simply because a threat was made know to school officials and the threat was investigated. Long before Homeland Security’s “See Something, Say Something” campaign, this is what we were recommending for schools based on the Secret Service’s safe school initiative. Every threat is evaluated to determine if it is a very serious, substantive threat that poses a risk to students. If you want to look your parents in the eyes and say, “One of the ways we are preventing violence from happening in our school is we have a threat assessment team to evaluate every threat to our school.” This threat assessment process for those of you that attended the bomb threat protocol training, it’s the same thing. Every time a bomb threat comes in, we assess that threat. Q: Should law enforcement have direct access to school video surveillance systems? A: The answer is, they’re not allowed to unless they can articulate a specific threat at a specific time. Here’s an example: I received a call from a local law enforcement agency requesting video of a fight in a local high school. The incident occurred two weeks prior and the parents were pressing charges. If it happened two weeks ago, there is not a
  • 68. current threat. In that case I said, “I will get you a copy of the tape, but I need for you to get me a subpoena.” So it was not an adversarial process, they gave me the subpoena and I gave them a copy of the tape. A public records request is not enough to get a copy of the tape. The news media can’t get access to the same tape. The police, with a subpoena, can get it as a part of their investigation. After the investigation is over, the news media can obtain a copy of the tape from the police department via an open records or Freedom of Information request. The school can’t be held liable. On the other hand, if there is a kidnapping in front of the school and police request immediate access to the surveillance video, a subpoena is not needed because it’s an exigent circumstance. That means we can articulate that the safety of that child overrides FERPA. Q: We have a limited budget for safety and security. We want to spend our money on something that is sustainable. How are threat assessment teams sustainable? A: Threat assessment teams are sustainable because you can train staff. For example, let’s say we have five buildings. In each building, we train the administrators, counselors and staff members. That training can last 5 to 10 years depending on the longevity of your staff. If you lose one or two members in one building, you can get staff members from other buildings to help fill in the gap in your threat assessment team. If you put a metal detector in your building and it breaks down, how are you going to pay for it? But, if you train your staff, that training can be passed along which is what makes it sustainable. Q: Why do we want to keep a student who has made a threat in school? Wouldn’t it be safer to expel the student and keep them away from other children? A: We are going to temporarily remove that child from school for a couple of reasons. First of all, we have to create a safety plan. The number one thing is making sure that the students and staff are safe in the school. However, if we take a typical sixteen year old who is expelled from school, that child is going to be home alone because parents work. So now that child is going to be home alone with access to the internet and access to other things. If that child is not getting the help they need to get them off of the pathway to violence, you’ve got a problem situation just waiting. But if we create a safety plan to bring the child back to school, assuming we have cooperative parents, the child has to meet certain criteria in order to regain admission. Q: How does the threat assessment team fit into the four phases of emergency management? A: The threat assessment team fits into the prevention and mitigation phase as well as the planning stage. We recommend putting something into place to prevent the attack from occurring. Do we want to prevent a car crash from happening or do we want to deal with it after it occurs? Let’s prevent the car crash from occurring in the first place. It’s less traumatic emotionally, it’s less traumatic physically, and it’s better for our school and our community.
  • 69. LINKS Secret Service Safe School Initiative: https://www2.ed.gov/admins/lead/safety/preventingattacksreport.pdf FERPA Disaster Guidance: https://www2.ed.gov/policy/gen/guid/fpco/pdf/ferpa-disaster-guidance.pdf