Defeating the Active Shooter Part II

Share This Post:

Share on facebook
Share on linkedin
Share on twitter
Share on email

Part II: Deny Free Access 

Last week we covered how to prevent ambush attacks at a school or facility. This week we’ll cover proven practices, procedures and technologies to prevent unlawful and unchecked access.

Someone has breached your school’s perimeter, so now you need to play defense. The difficulties encountered by intruders when attempting to move through your facility may determine how serious the breach becomes. The challenge; make defensive measures as seamless as possible for students, patrons and employees.

Statistics show that rural and exurban schools have a greater need for self-reliant methods to protect themselves.  

Here are ways to defend against unregulated access from unauthorized people while maintaining a seamless and free-flowing environment. The first is essential.

A) Start with a total staff & student “Buy-In” mindset, and commitment to safety & security, with student meetings and training exercises for faculty and staff.   

B) After hours alarm systems, with presence & motion sensors integrated with local law enforcement.

C) Lock all doors from the inside to secure against unauthorized outside entries.

D) Require Photo ID badges or cards be worn at all times, with visitor badges contrasting in color and shape.

E) Require appointments for guest visitors.

F) Require off hour entries through monitored visitor entrances.

G) Lock doors to sensitive areas and classrooms during class periods.

H) Approach and identify all off hours occupants in hallways or rooms.

I) Random walkthrough of isolated or normally unoccupied areas for scrutiny at irregular times.

J) Project authority with IP surveillance systems and intercom communications, networked with law enforcement.

Next week we discuss creating a hostile environment toward the shooter that can delay, disorient, and even defeat the assailant. 





More To Explore

OpenGate – A Game Changer

At Isotec Security, Inc, we pride ourselves on consistently being on the cutting edge of security technology; This is one of the reasons we strictly use Ceia metal detectors in all of our standard units. The newest innovation by the

How to Run A Physical Security Risk Assessment on Your Business

With frequent warnings about hackers, digital theft, and general cybersecurity, it’s easy to overlook physical security as a concern of the past. But crime hasn’t gone completely digital and never will. Most companies wait until they face a major threat