Active Shooter Training for Churches
We should mourn the loss of our fellow brothers and sisters in Christ and weep with their loved ones affected by Active shooters.
What we should not do, however, is let this act of terror cause us to be afraid of gathering with our fellow believers in worship.
We will discuss The Center for Homicide Research study using online newspaper archive articles to document all cases of shootings on church property within the United States from 1980 to 2005
What Church Staff can do- Discussion
- Create a survey for law enforcement
- Create a lockdown policy
- Prevent an incident
- Increase early identification
- Reduce risk
- Reduce provocation
- If a Shooter Gets In
Train the Congregation
- Figure Out
- Get Out
- Call Out
- Hide Out
- Keep Out
- Spread Out
- Take Out
Awareness, Preparation, Rehearsal
How can you prepare your first line of defense?
First Responder Approach
What We Need Congregation To Do
Comprehensive Safety and Security Level 1
This course provides students with the basic knowledge and proficiency skills needed to safely handle and shoot a handgun (revolver or semiautomatic pistol). Along with extensive educational material on firearms safety and the mechanical operation of firearms, this course also includes material on various legal aspects of the security profession. Discussion of Cover and Concealment, Warrior Mindset and tactical clearing. At the conclusion of the classroom portion of this 20-hour course, an examination will be administered to test the student’s mastery of content. Finally, students will be required to demonstrate proficiency in shooting a handgun by passing the course of fire outlined in this training manual.
Objectives 1: Upon the completion of this course, the student should be able to demonstrate the following skills and techniques:
- Safe weapon handling
- Identification of weapons parts and ammunition
- Weapons cleaning and maintenance
- Handgun drawing and holstering
- Weapon loading and unloading
- Basic shooting principles
- Proficiency with a firearm by shooting a qualifying score with a handgun (revolver or semiautomatic pistol)
- Proficiency for weapon handling
- Proper intervention for weapon malfunctions
- Identify the legal authority allowing security officers and private investigators to carry a firearm
- Identify the limitations of a security officer’s ability to carry a firearm and use deadly force
- Use of force continuum
- Identify crimes that may serve as a justification for the use of deadly force
- Identify the types of liability that may result from the improper use of a firearm
Objective 2: Upon the completion of this course, the student should be able to demonstrate the following skills and techniques:
- Cover- An academic understanding of Cover as being an object which effectively stops or deflects a projectile.
- Concealment- as being anything which hides a person from the observation of another along with rules about when and when not to use a barricade for support.
- Clearing Techniques- This technique which maintains a balanced, stable platform allows the officer to respond efficiently to any threat encountered.
- Low-light or no-light conditions- It is not only our duty, but necessity to make every effort possible to identify threats quickly and accurately.
- Warrior Mindset- Since police officers, private security officers and soldiers move toward the Universal Human Phobia, intentionally moving into this domain where other human beings will try to hurt or kill them, it is vital that they understand that realm and understand combat
- Stress Management- Because stress reduces focus and increases error, there is a greater cause for injury
Dealing with Aggressive Behavior
This section is designed to provide the officer with the basic skills necessary to identify aggressive or potentially aggressive behavior. The officer will be given communication and behavior tools to either prevent the aggression or to diffuse it as low on the force continuum as possible. This also includes a discussion of a variety of diversionary techniques which can be used to counter physical assaults if the techniques are ineffective or deemed inappropriate for the situation.
- Describe the characteristics of and identify the benefits of utilizing an assertive attitude while communicating with the public.
- Identify and demonstrate active listening skills.
- Identify the appropriate intervention response for behaviors such as anxiety, verbal aggression, and physical violence.
- Identify and demonstrate intervention techniques to diffuse anxiety behavior.
- Identify and demonstrate intervention techniques to diffuse verbal aggression.
- Identify and demonstrate intervention diversionary techniques to counter physical assault.
Dignitary and Executive Protection
Whether you’re in government or private sectors, the principles and information presented during this course of instruction can be applied. These security measures can be implemented to support personal security requirements in a number of circumstances, including, but not limited to:
- Dignitaries that may visit your area of responsibility.
- Providing security to CEOs, entertainers and other public figures that may require it.
- Providing law enforcement response to controversial or high-profile investigations/court cases by creating security programs for judges, witnesses, suspects or others as may be needed.
- Responding to work place violence or stalking issues.
- Providing security for person(s) working in environments characterized by civil strife, high crime, incidence of terrorism and even conditions of war
There is no one-size-fits-all personal security program, each of these sample circumstances may require different security approaches but we can use the principles provided during this course of instruction to assist in designing the security program for every circumstance that we may encounter in this regard.
Our objective is to discuss a method of determining what resources are needed to establish, or modify, a personal protective effort when needed in order to familiarize you with the process. The approach we will use is viewed from the threat assessment perspective
After completing this course participants should be able to:
- Identify what Dignitary/Executive Security is, who it can support and what it does.
- Outline the methodology for conducting threat assessments pertaining to Dignitary / Executive security operations and to identify what information should be obtained and where to get it.
- Identify what security components are available to form a dignitary or executive security effort and how they can benefit the overall effort.
After Completing this course participants should be able to:
- Summarize a methodology for selecting security components to fit the address the concerns identified during the threat assessment process.
- Identify and discuss management considerations pertaining to providing oversight of executive security operations.
LET’S START LEADING!
- LEADERSHIP clearly makes the difference in the success or failure of organizations.
- A change of LEADERSHIP can turn the tide of failure, replace stagnation with excitement and energy, and bring about a renewal in the sense of PURPOSE AND MISSION.
We will discuss the ability to learn and understand technical issues is the basis of our careers.
- Ability to lead is a function of influence:
- Ability to communicate
- Ability to resolve conflicts
- Ability to solve problems and make decisions
Learn the difference between LEADER VS. MANAGER
- Leader , 1. A person who is followed by others.
- Manager A person controlling or administering a business or a part of a business.
LEADERSHIP is the ability to develop a vision that motivates others to move with a passion toward a common goal; seeks improvement through change (disorder).
- MANAGEMENT seeks stability & predictability (order).
Other topics of discussion
SIX KEYS TO STRESS FREE LIVING
STRESS MANAGEMENT TECHNIQUES
TODAYS PROBLEMS STEM FROM:
- Divisions in the workplace
- Destruction of the work ethic
- Obsession with harmony
- Fear of change
TO PREPARE FOR THE FUTURE, LEADERS MUST
10 TRAITS OF A GOOD LEADER
LEADERSHIP TRAITS ASSOCIATED WITH FAILURE
Security reports are referenced for several reasons and potentially by several people. Your supervisor might want a rundown of the events you encountered the night before, clients may want to know about incidents that affected their businesses, and law enforcement may need your report to help with an investigation. It’s vital that your report is well-written so all the facts are covered and there is no confusion that renders it useless.
The basic rules of report writing sets the foundation for an effective report. Reports must be organized in a chronological manner and aim to answer the five W’s and one H:
Who, was involved
When, date and time it happened
Where, the incident happened
Why, it happened
How, it happened
Introduction to Bullet Style Report Writing:
Bullet style is an effective and time-saving way to organize details in a police report. Instead of writing a complete sentence about each detail, you organize your information in lists. Each item in the list is marked with a symbol called a “bullet.”
Response to Active Shooter For Businesses and Corporations
Items of discussion
- Tactical Response to an active shooter situation
- History of active shooter incidents
- Key terms and definitions
- Law enforcement response (tools, training, threat assessment, and incident management)
- Define and discuss key terms related to an active shooter incident:
- Warrior Mindset
- Figure Out
- Get Out
- Call Out
- Hide Out
- Keep Out
- Spread Out
- Take Out
- Explain the role of law enforcement during the incident
- Explain the role of management during the incident
- List the steps management can take to plan for and mitigate damage and injury during an active shooter incident
- List pre-incident indicators that may precede a violent incident
Situations of Concern
Conditions/stressors which lead to violence
- Personality conflict (co-workers or supervisor/worker)
- Mishandled termination or disciplinary action
- Drug or alcohol use on the job
- Grudge over a real or imagined grievance
- Breakup of a marriage or relationship
- Other family conflicts
- Financial or legal problems
- Mental health issues
What the Leadership Can Do
- Communicate program policy to employees
- Provide recurring training in preventive measures
- Support, not punish, victims of workplace violence or domestic violence
- Foster a climate of trust and respect
- Seek advice and assistance from outside resources
- Be aware of and comply with organization’s workplace violence prevention program
- Recognize and report behaviors of concern observed in the workplace
- Treat everyone with respect, dignity, kindness, and compassion
- Workplace violence is real and can occur in any type of workplace
- In 2014, homicide was the 4th leading cause of fatal workplace injuries
- Each year nearly 2 million American workers report being the victim of workplace violence
- Incidents are usually over quickly (10-15 minutes)
- Workplace shootings can occur anytime, anywhere, to anyone
- When a workplace shooting occurs, it will be unlike any situation ever experienced
- Employees are the first line of defense
At the end of the presentation we offer a one to two-hour hands on scenario based training with the students in their work environment to develop muscle memory to their response to an active shooter incident. Instructors will be on site to direct the training to include a safety instructor to oversee operational training. No weapons are used in any of the training however customer safety is still a priority.
The Scenario will simulate if an active shooter enters the building or office space, the students will then train on appropriate and immediate response to their environment. This training will implement a recall of training (Muscle Memory) and reduce anxiety to be able to perform necessary life saving measures.
Often proprietary and contract security personnel are tasked with watching for activities that may indicate criminal activity or even worse, terrorist activities. The fact that a terrorist organization will most likely conduct surveillance on a facility to evaluate its potential for targeting is commonly understood; but the training on the characteristics of those activities is not taught enough. In most companies’ security comprises only a small segment of the overall employee population. Yet it is the security personnel that are expected to detect suspicious activities alone.
Suspicious people may often be identified by their behavior. While no one behavioral activity is proof that someone is planning to act inappropriately (and many of the following behavioral indicators are perfectly consistent with innocent behavior), these factors can help you assess whether someone poses a threat
- How to identify suspicious behavior
- How to identify suspicious person
- How to identify suspicious packages or mail
- Reporting Procedures for Suspicious Persons and Activities
- Procedures for I.E.D.
Verbal De-escalation tactics that are non-physical skills used to prevent a potentially dangerous situation from escalating into a physical confrontation or injury
Verbal De-escalation Tactics and Objectives:
- Simply listening (Active Listening)
- Distracting the other person
- Re-focusing the other person on something positive
- Changing the subject
- Use humor (sparingly) to lighten the mood (be very careful with this!)
- Motivating the other person
- Empathizing with the other person
- Giving choices
- Setting limits
- Not Listening
- Engaging in Power Struggles
Intro to Body Language:
- 80% — 90% of our communication is non-verbal. It is very important to be able to identify exactly what we are communicating to others non-verbally.
- You may be trying to de-escalate the situation by talking to the other person, but your body language may be showing a willingness to get physical.
- It is also important that we recognize and understand the non-verbal cues from another person who has the potential of escalating.
- Challenging postures that tend to threaten another person and escalate any situation include:
- Face to face
- Nose to nose
- Toe to toe
- Eyeball to eyeball
- Finger pointing