1 North Georgia Security Consultants LLC.Residential and Commercial Security Planning
2 About the owner Active Duty Army Captain20+ Years as a Military Policeman 5 Deployments (Iraq x1) (Afghanistan x4) Bachelor's Degree in Criminal Justice Master of Arts in Business and Organizational Security Management Terrorist Attacks on Places of Worship Extensive Anti-Terrorism Schooling and Weapons training Army Physical Security School (Site Security/Asset Protection) Army Protective Services School (24 Countries with the NATO CG) Special Reaction Team and Marksman School Top Secret Security Clearance
3 William B. O’Neal North Georgia Security ConsultantsCampus Ministry Security Considerations William B. O’Neal North Georgia Security Consultants
4 Agenda Mission Statement Team Concept Key tasks VulnerabilitiesAtmospheric Shifts Rehearsals Situational Awareness Category Indicators Threat Detection Identification (concealed Carry) Summary
5 Mission Statement “To provide a realistic, effective and proactive security approach that encourages a safe mission focused environment fostering trust and confidence within the community and across the Georgia Baptist mission boards area of operation”
6 Statistics Active ShooterThe following characteristics of the 160 active shooter incidents identified between 2000 and 2013 are noted: INCIDENTS An average of 11.4 incidents occurred annually. An average of 6.4 incidents occurred in the first 7 years studied, and an average of 16.4 occurred in the last 7 years. 70.0% of the incidents occurred in either a commerce/business or educational environment.10 Shootings occurred in 40 of 50 states and the District of Columbia. 60.0% of the incidents ended before police arrived. * Information provided by
7 Places of worship incidentsMore Statistics Places of worship incidents From 1/1/1999 to 12/31/2015 there were 1198 “deadly force incidents” in churches or faith-based operations 364 resulted in the “death of others” The three main motivators were identified as Domestic Violence Personal Conflict Robbery
8 Team concept Attempt to avoid less than a two people while interacting with personnel that may come to the building seeking assistance No one should be left alone at anytime during the day. This creates opportunity for someone who does not necessarily want to cause harm to an individual but may take advantage of the current situation. If traveling to areas of the building that are outdoors for any reason, take a buddy. Buddy teams need to be used at all times of limited visibility. Tell Someone!!!! If there is not enough room to bring a GA inside the meeting then make sure someone is assigned the GA role inside to cover the principal/advisor Never travel alone always use a battle buddy and a GA to accompany the principal/advisor even to use the toshnob/bathroom If you look professional and conduct yourself as a trained team you will deter some threat, make yourself a hard target There may be people that are advisors that have special skills like AFPAK Hands
9 Key tasks To Serve: To create a safe environment conducive to worshiping and learning Responding to various campus incidents and calls for aid Monthly inspection of security systems, equipment, buildings, and property Service to the community, providing a variety of services and assistance by the use of trained employees and Campus Ministry staff Safeguarding Campus Ministry property and equipment to prevent and/or minimize physical loss across the state Crime Prevention: Providing educational programs to select personal which cultivate safety and security awareness Engaging in proactive anticipation, recognition, and appraisal of crime risks, and taking the action needed to remove or reduce that risk to better serve. Violence Reduction: To bring awareness to and provide education and training in De-Escalation, Harassment, Intimidation and Domestic Violence Cultivate a community of responsibility, caring, and willingness to report possibly situations that may arise during Campus Ministry events and services.
10 Mission Board Campus
11 ATMOSPHERIC SHIFTS QUICKEST SIGN OF DANGERAsk the class what an atmospheric shift is Have the class identify different shift from their everyday activities Chow hall : eruption of laughter, what does the room do ? Does a shift in atmospherics result in a defensive posture for you? Market with 200 people that is empty Great source to gather atmospherics is your interpreter
12 Situational AwarenessMental representation and understanding of objects, events, people, system states, interactions, environmental conditions, and other situation-specific factors affecting human performance in complex and dynamic tasks Baseline Gut Feeling Every Team member must be fully cognizant of atmospherics and be actively searching for them at all times. Observable indicators are broken down into three categories Paranoia vs situational awareness Restaurant Traffic Discuss with the class the following 3 slides and ask for examples from them Situational awareness starts with pre mission planning and briefings
13 Category I Indicators Category I: Indicators should be closely monitored Category I indicators include but are not limited to: Complaints about church standing on high level issues Abrupt behavioral shift Desires control Appears frustrated with church leadership and ideals Experiences personal crisis Demonizes others Reclusive Strange habits Peculiar discussions
14 Category II indicatorsCategory II: Indicators should be referred to law enforcement. Category II indicators include but are not limited to: Verbally defends radical groups and or ideologies Speaks about seeking revenge Associates with persons who have extremist beliefs Exhibits intolerance Personally connected to a grievance Intense ideological rhetoric Attempts to recruit others Choice of questionable reading materials presented to defend position
15 Category III IndicatorsCategory III: Indicators require immediate action such as use of distress button and call for help. Category III indicators include but are not limited to: Advocates violence as a solution to problems Verbal hatred of religion and church Exhibits sudden interest in key personnel Makes threatening gestures or verbal threats
16 The 6 Domains of Threat DetectionHeuristics Proxemics Atmospherics Geographics Biometrics Kinesics -There are different types of human behavior that can help us identify when an incident may be about to occur, pre-event indicator. -We can divide these types into five different domains, whereas the sixth domain, namely heuristics, is the template we can use to make sense of what we actually see. -We can use these domains to look to the world outside, but we must also keep in mind that our enemy uses the exact same elements to look back at us. -Key take away is that the concepts are important, not the terms, and the indicators can be blurred into more than one category.
17 The 6 Domains of Threat DetectionHeuristics Using information that is already known to an individual to construct a immediate decision. With just enough information about a situation a person can draw a reasonable conclusion about their environment using their: Intellect Experiences Training Intuition The human brain uses known information and past experiences (file folders) to “fill in the rest”, even if you haven’t processed every detail. Tactical shortcut: it is a trick of your brains to very quickly make sense of a situation, based on file folders it already built in the past. But it can also work against you (using corrupt file folders at the wrong time). The brain wants to put order to chaos: it doesn’t like divided attention. Especially under stress, it wants to focus on 1-3 things at a time at the most. For example, while doing a body search. After the tenth person, the danger is you will get a routine for it; “the next will probably be the same again”. Dangerous: T.I.A. Always force yourself to be open for every course of action. Key points: When you know something but don’t know why you know something. Developed through intellect, experiences, training, and intuition. Application is different for everyone and changes throughout our lives. The quick associations to past experiences are like drawing from mental file folders: someone far off walks like Joe, it most likely is Joe. When something seems wrong, it probably is (trust your intuition). You still have to examine or investigate (if time permits) due to corrupt file folders. Enemy understands Heuristics and tries to use it against us.
18 The 6 Domains of Threat DetectionProximics Displays affiliations through the dynamics of proximity. How do people react to your company? Try to come close? Turn their back? Push you away with their eyes? Push vs. Pull Push / Pull: How does someone react to your company. You’ll all recognize the moment; you enter the room, and what happens? Do people try to come close to you. Or do they ‘push you away’ with their eyes, turn their back etc.? It shows how people see their relationship with one another: Show three ways to shake hands: Formal Dominant Informal - Submissive Show ‘open the gate’ or not in conversation
19 The 6 Domains of Threat DetectionGeographics Consists of three (3) distinct terrain features: Natural Lines of Drift Habitual Areas Certain areas that you know to be challenging Anchor Points Can be used to conduct a predictive analysis of the how, when, and where persons wanting to cause harm may strike. The domain of Geographics has three elements to it. The first one being Natural lines of drift: people are naturally lazy. They will always take the easiest road towards their goal. What is the most logical route one will take in a certain place? Are there any signs?
20 The 6 Domains of Threat DetectionAtmospherics The sights, sounds, smell, feel or mood of a particular area. Atmospherics that rapidly change can indicate an impending problem, called an “Atmospheric Shift”. An atmospheric anomaly may be your only pre-event indicator to a pending issue! Everything about a place contributes to the atmospherics.
21 The 6 Domains of Threat DetectionAtmospheric Shifts: Why is something missing? Or why is something there? What do they say they using it for? And do they indeed use it for this purpose? INS also react to our presence, the atmospheric shifts that we cause: pay attention to this. -Stores closed that are normally open. Goats without a shepherd, while goats often are the most important possession here. A film crew at a certain location (sometimes warned in advance of an incident). Busy areas empty. -Presence or absence of women or children.
22 The 6 Domains of Threat DetectionBiometrics Biometrics are observable and measurable physiological signs: a response to an extern stimuli: one can not hide it! Biometrics can assist church personnel to detect possible deception or imminent aggression. Catecholamine: adrenaline, dopamine, histamines Biometric pre-event indicators Sweating Shaking Flushing Dilated/Constricted pupils Fish Eye, fingerprint scanner and cameras Catecholamine: they are the lubricating oil for your brains. They influence the brain and its behavior. The prefrontal cortex, or the decision making process. Adrenaline: the body uses it to focus, be alert, have more energy. Dopamine: a reward given by the brain, when it feels you have achieved something. Very important substance; it makes you feel good. You get it after you accomplish something; people always strive to get this reward. You get it after sex, from groundbreaking activities like bungee jumping, maybe computer games, or perhaps while eating delicious food. Drug addicts get it after they smoke or inject. The problem is, the body needs just a little more next time. This is heavily science based. The key take away is that obvious signs (unusual sweating, wiping hands, facial discoloration) can be observed by anyone.
23 The 6 Domains of Threat DetectionKinesics Body Language or Para Language: The ability to assess one’s emotional state (angry, sad, violent, deceitful) from ANY observable distance. Kinesics can help mission board personnel determine whether a situation is becoming increasingly volatile or inherently dangerous. Mouth Eyes Hands Feet The body as one thing (posture) can provide an indicator of one’s thoughts and intentions as can the components (mouth, eyes, hands, feet). Elements of kinesics can conflict, which is an indicator that one is trying to hide his or her intentions. Women are much better at this; for example lying. Much like smiling at your in-laws.
25 The 6 Domains of Threat DetectionHands can say a lot. What are they doing? And how? What is their position? It’s the hands that will perform the act. -Picture 1: President Clinton: “His Press Officer had taught him to never use that hand in conversations. It was something he used to do, a bad habit, before he went to the White House. For years he doesn’t do it, until suddenly, under great tension; “I did not have sex with that woman”). Was it the stress that caused him to suddenly fall back to this gesture? Perhaps lying? -Picture 2: Biometrics - repeatedly rubbing the mouth, or rubbing the nose, wiping away sweat could indicate a dry mouth, or an increase in body temperature around the nose. Which could mean lying. -Pictures : In many different cultures, some hand expressions can mean the same thing. Key take away: hands are used for expression (nervousness, frustration, rejoicing, grief, anger). -Picture 6: Mimicking on the other hand; if someone mimics you during a conversation, it means the conversation is probably going well. The ‘push & pull’ principle. During a conversation, the feet can show if everything is going well, if you have his full attention. Remember, the body wants to tell the truth.
26 The 6 Domains of Threat Detection
27 Advanced Situational Awareness
28 Identify concealed weapons1. Security Check: Gun violators in particular will typically touch and/or adjust the weapons concealed on their bodies numerous times during the day. This may be a gentle, and difficult to observe, bump with the elbow, wrist or hand. On rare occasions, it could be a distinct grasping of the weapon as they adjust it. Violators often make this gesture when getting out of a chair or a car or when walking up a flight of stairs or high curb. 2. Unnatural Gait: Gun violators may walk with an awkward gait. They may fail to bend their knees because they have rifles or shotguns in their pants. They may also walk uncomfortably because they have guns, knifes or other weapons hidden in their boots or shoes causing discomfort. Again, the total circumstances will indicate the likelihood of a weapon being present. For example, an individual with a disability may also not bend the leg or walk with an unnatural gait, but he or she will likely not appear to be nervous. You will also not see the rigid line of a rifle running down the outer pants leg as the person walks or the periodic bulge from the butt of the gun above the waistband as it moves back and forth.
29 Concealed weapons cont.3. Jacket Sag: When you place a handgun in a jacket pocket, the coat typically hangs lower on the side where the weapon is located. In addition, you will often see the fabric pulled tight from the weight of the gun, and the weapon may swing as a violator walks. Often, the outline of the weapon may be observed in the pocket area. In some cases, the violator will attempt to hold or pin the weapon if it begins to swing or beat against their body. 4. Hunchback Stride: When trying to conceal a shotgun, rifle or submachine gun under a coat while walking, the butt of the weapon will often cause a noticeable bulge behind the armpit. Additionally, the jacket does not move naturally because it is supported by the outline of the weapon. Also, when someone wears a shoulder holster or straps on a sawed-off rifle, shotgun or submachine gun under his or her arm, a bulge in front of or behind the armpit will often be visible.
30 Concealed weapons cont.5. Bulges and the Outline of a Weapon: An alert Guardian Angel can often spot the telltale bulge of the weapon or, in some instances, the distinct outline of a handgun, knife or brass knuckles in a violator’s pocket. This may also sometimes be observed in a woman’s purse, book bag or other hand carried item. In some instances, violators wrap a long gun in a blanket or long jacket. 6. Visible Weapon: Clearly the most reliable of all the indicators is when the weapon can actually be seen. It is astounding how many times an armed intruder has entered a facility with a rifle or shotgun protruding from under his or her jacket without being observed by staff. In some cases, the butt of a handgun is visible because it is sticking out from a back or front pocket. A more common instance is the clip-on pocketknife that can be observed clipped to a front pocket or in the waistband.
31 Concealed weapons cont.7. Palming: Most often observed with the edged weapon violator but occasionally seen with gun violators, palming behaviors often indicate imminent risk to the observer. The knife violator may run the blade of the weapon up along the arm or behind the leg to conceal it from frontal view. Just before a target is attacked, a violator will also typically have his or her eyes fixed on the intended victim.
32 Summary The ability to secure your personnel and assets will continue to become more important and challenging in the future. The need to be creative when implementing security strategies will improve postures and help mitigate the possibility of problems that may arise through the use of the planning, education and training model.