Active Shooter

active shooter
 

An active shooter is an individual actively engaged in killing or attempting to kill people in a confined and populated area.  In most cases, active shooters use firearms(s) and there is no pattern or method to their selection of victims. Active shooter situations are unpredictable and evolve quickly. Typically, the immediate deployment of law enforcement is required to stop the shooting and mitigate harm to victims. Because active shooter situations are often over within 10 to 15 minutes, before law enforcement arrives on the scene, individuals must be prepared both mentally and physically to deal with an active shooter situation.

Nevertheless, there are things you can do to prepare for the unexpected.  Preparing for such events will reduce the stress that you may feel now, and later, should another emergency arise.  Explore the information below to see how you can better prepare yourself for these types of situations.

Eights Signs of Terrorism

Terrorist operations usually begin with extensive planning and can happen anytime, anywhere, but you can help detect and prevent terrorism by watching out for suspicious activities and by reporting them to the proper authorities. Be alert for the eight signs of terrorism!

VIDEO: Recognizing the 8 Signs of Terrorism(link is external)

 
  1. Surveillance: Terrorists may conduct surveillance to determine a target’s strengths and weaknesses. Be aware of someone who appears to be monitoring security personnel or equipment, or gaging emergency response time.  Suspicious activities may include using vision enhancing devices or cameras, acquiring floor plans or blueprints, drawing diagrams and showing interest in security and access to facilities.
  2. Elicitation: People or organizations attempting to gain information about military operations, capabilities, or people. Elicitation attempts may be made by mail, email, telephone, in person or even by gaining employment at the location.
  3. Tests of Security: Any attempt to measure reaction times to security breaches, attempts to penetrate physical security barriers, or monitor procedures in order to assess strengths and weaknesses.
  4. Funding: Terrorists need to raise money for their operations and spend it in a way that doesn’t draw attention.  Be aware of unusually large transactions paid with cash or gift cards, collections for donations and solicitations for money.
  5. Supplies: To conduct an attack, terrorists may need a variety of supplies, such as weapons, uniforms, badges, and communication systems.
  6. Impersonation: Terrorists may impersonate law enforcement officers, firefighters, mail carriers, or company employees to gain information. Someone who seems suspicious in what they say or do on the job could be a red flag.
  7. Rehearsal: Terrorists often rehearse a planned attack to make sure their operation runs smoothly. This may include measuring response time by emergency responders, mapping routes and determining the timing of traffic lights.
  8. Deployment: This is when terrorists are putting their plans into place, getting into position, and moving equipment and supplies.  If you observe this type of activity, this is your last chance to alert authorities before the attack is launched.  If you believe there is imminent danger, call 911 immediately.

   

  

Cover photo courtesy of the DHS and banner photo and photo within text courtesy of the FBI.