Download presentation
Presentation is loading. Please wait.
1
A Holistic Approach to School Security
ASIS International 53rd Annual Seminar 09/25/07 Ó 2001 RETA Security, Inc. Ó 2007 RETA Security, Inc.
2
Presenter Background President, RETA Security, Inc.
Physical Security Professional (PSP) VAM – Certified (SNL) SCAT Member (NOVA) Illinois Terrorism Task Force (ITTF) Assessments, Policy Development, Training, Expert Witness Ó 2007 RETA Security, Inc.
3
Configuration Control
Security Planning Controlled Documents Assets Threats Protection Elements Configuration Control Management Building Security Violence Prevention Staff Training Crisis Management Building the plan involves three basic steps: Build a list of and categorize assets to be protected Build a list of threats and fully describe those threats Determine the protection required to deliver the acceptable level of risk It is very important that the Security plan be fully documented and controlled. The Asset List and Threat Identification/Description must be formally drawn up and signed off by Management. Once approved, these documents need to be placed under document control. Management and Security Personnel need to be working from the same set of assets and threats. The Protection Plan needs to be formally documented and maintained as protection needs change. It is this security plan that defines all security components, builds the resulting Risk level and provides the framework for performance testing of the system. It is very important that this document fully reflects the system as implemented and tracks any changes made to the system. Secure Ó 2007 RETA Security, Inc.
4
Asset Definition People – students, staff, visitors
Places – buildings and grounds Things – equipment, records, positive climate Ó 2007 RETA Security, Inc.
5
Asset Locations FACILITY GROUNDS PARKING OFF-SITE www.retasecurity.com
Ó 2007 RETA Security, Inc.
6
Adversary Tactics Tactics that can be used are:
Force: physical power exerted against a person or thing Deceit: representing as true what is known to be false Stealth: artfully sly action These are the tactics that an adversary can employ to complete the objective(s). Adversaries can employ any or all of these tactics in a single attack. However, once force is employed, it is assumed that force will be used for the remainder of the attack. For example, an adversary can’t shoot his way through the front gate, and then deceive a building guard through the use of a false badge. In this example, if force is used to get through the front gate, then the assumption is that force will be used to gain access to the MAA. Important note, Stealth and Force may be used to defeat sensors and other mechanical security components as well as personnel. Deceit can only be used against personnel. Ó 2007 RETA Security, Inc.
7
Security Assessments Ó 2007 RETA Security, Inc.
8
Security Policies Closed Campus Policy - requires exterior doors to be closed and locked when the facility is occupied. Visitors must enter through the main entrance and sign-in at the main office. Lock Down Policy - identifies areas inside the building, such as classrooms, that can serve as “safe havens” or shelters should a dangerous situation (i.e. an incident involving an intruder) arise. Ó 2007 RETA Security, Inc.
9
Operating Profile Operations: Normal Operations Facility Open
Facility Closed Assessment Topics: Management Building Security Crisis Management Violence Prevention Staff Training 12 6 8 3 10 12 Ó 2007 RETA Security, Inc.
10
Building Security Elements
Deterrence: training, briefings, awareness, testing, lighting, signage, fencing, prevention programs Detection: alarm system, CCTV, duress button, entry control, contraband detector, personnel Delay: locks, doors, glazing Communication: radio, wireless, intercom, PA* Response: security personnel, law enforcement *PA systems should have battery backup. Ó 2007 RETA Security, Inc.
11
Visual Inspection Regularly scheduled tests Periodic spot checks
Personnel interviews Tests, results & interviews should be fully documented Note: Tests and spot checks should include both security hardware and staff/faculty practices. Ó 2007 RETA Security, Inc.
12
Security Resources ncpc.org/besafe familywatchdog.us
ed.gov/emergencyplan Responders & Carriers Tip Lines (866-SPEAKUP) isbe.net/sos/htmls/safe_at_school.htm Lock Down (cpsv.org, ) Ó 2007 RETA Security, Inc.
13
How Can You Make Your School Safer?
Ó 2001 RETA Security, Inc. Ó 2007 RETA Security, Inc.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.