top of page

Creating an effective Active Shooter Mitigation Program


active shooter mitigation strategy

Given recent events, I'd like to share a few thoughts and considerations in regard to security personnel tasked with mitigating #activeshooter situations. I'd like to emphasize the "mitigation strategy" concept. I've learned that there are many interconnecting components that must be considered in an effort to develop an effective program. I have had the opportunity to build help a critical incident response security program for a corporate client, and recent events have brought the mitigation thought-process back to the forefront of my mind. I'm aiming to promote awareness and collaboration in an effort to help better these types of programs.

The following excerpt is from a portion of a study that I complied meant to act as a pillar for a framework to the program I was working on. Over the course of several weeks I reviewed various after action reviews (AAR's) from some of the most notable active shooter events. I was able to prepare the key findings and generate a clear case for specific protocols and guidelines. I believe that it's very important for #securitymanagement professionals to clearly articulate security protocols that will lay the ground work for the preparation of programs based on historical data, and proven methods. In most every case, I have found all of the information to build a successful program has already been complied, it then becomes a matter of research and critical thinking to bring the components together. Determining how the findings apply to your security program will be a matter of assessing the vulnerabilities/risks and ensuring your project checks the boxes in accordance with the applicable findings.

Begin excerpt:

According to FBI statistics Active Shooter (AS) events are on the rise. While there have been many advances in the development of active shooter mitigation programs and response strategies; the basic guidelines for interdicting and responding to these threats remain consistent.

According to a combination of studies, the average time AS events have lasted, is about 10-15 minutes. Some events, such as the 2013, LAX Airport shooting lasted a little as 7 minutes; while other events have lasted much longer. The Orlando Night Club Massacre, which turned into a hostage barricade situation, lasted over 3 hours. While the initial active shooting in Orlando was in the 10-15 minute timeframe, severely injured victims remained in the kill zone for several hours. The AS style, terrorist attack on the Westgate mall in Nairobi, Kenya is another example of an extended AS situation that lasted for 2 days.

Timing when considering a response to an AS is critical. It is vitally important to remember that minutes and even seconds count; not just during the initial response, but also throughout the duration of the event. With respect to timing, AS events can be divided into two distinct phases; the initial response and the secondary response.

The initial response phase will involve #First-Responders that will deal directly with the threat. The secondary response phase will involve First-Responders, but also include additional resources to help deal with the aftermath. Both phases should be considered when developing emergency response and preparedness plans. Emergency medical care and triage for victims are examples of a time sensitive secondary response phase considerations.

How time is utilized during the initial phases of the response will have a detrimental impact on potential loss of life. Loss of life, according to all of the studies reviewed for this report, can be very specifically quantified as it correlates to response time.

Response priorities should be clearly defined and established based on key findings from actual events. For the purposes of this report, response time can be characterized as the time it takes to process an AS event, and coordinate an effective response founded on pre-established measures and procedures. Response priorities are specifically categorized in order of the ability to prevent loss of life.

The primary way that the time gap/lapse in response activities can be mitigated is through proper preparation and planning. Once specific vulnerabilities in regard to timely, capable response are identified, an effective safety and security program can begin to take shape. This is a suggested outline of key priorities for building and effective AS mitigation program:

1) Coordination and Awareness

Organization of First-Responders – First-Responders from all organizations who will be involved in AS events should coordinate, prepare and plan together.

Employee & Security Team Awareness – It is vitally important that key personnel at all levels have an awareness and understanding of the key components that are involved in creating an effective AS mitigating and response plan.

Employee Training – Viable workplace violence policies and procedures, including “run, hide fight” training.

Employee & Security Team Preparation – The identification of hard points or safe rooms.

Security Team Threat Mitigation – Awareness and proper dissemination of viable or perceived threats to the appropriate First-Responders.

2) Operational Procedures and Security Measures

Communications – Operational communications has been identified as the single biggest contributing factor as it correlates to AS response time and loss of life.

Immediate notification of the AS event to potential victims. Potential victims who are prepared to respond in accordance with “run, hide fight” doctrine are the single most effective means to putting an immediate end to an AS event, or protecting themselves from loss of life.

Security measures can be assed in advance to better prepared for an AS event.

3) First-Responder Actions and Preparedness

Immediate Actions – First-Responders should be prepared to move as quickly as possible to interdict the threat during an AS event.

End except:

In the completed report identified and outlined many sub-subcategories (which I omitted) that were broken down into specific segments or protocols. I chose conclude this excerpt with the "direct to threat" phase. As conclusive as this phase is, according to research, there are many components and preparedness measures that must be in place to create an effective and holistic approach to building a complete AS mitigation program.

I've seen a shift in awareness, and an acknowledgment that there is a necessity for these programs in both the public and private sector. It is a frustrating and sad reality, but a reality of world we all live in, but a reality none the less. Hopefully both sectors can continue to remain progressive and prepared - success begins with critical thinking and the careful consideration of historical data as it applies to your project.

"By failing to prepare, you are preparing to fail." - Benjamin Franklin

APPLICATIONS 
  • LinkedIn Social Icon
  • Google+ Basic Square
bottom of page