Pennsylvania Student Goes on Stabbing Spree at High School

Pennsylvania Student Goes on Stabbing Spree at High School

Pennsylvania Student Goes on Stabbing Spree at High SchoolAs security professionals, I’m sure we’re all tuned in to the Murrysville, Pa. stabbing rampage of a 16-year-old Alex Hribal, who brought two kitchen knives, 8 to 10 inches in length, to his high school. Using the knives as weapons, Hribal slashed and stabbed a total of 20 students and a security officer before assistant principal, Sam King, tackled Hribal, detaining him for authorities.

One of the many eerie parts of this tragic story is the fact that most students didn’t even realize they had been stabbed, leading outsiders to believe that hallways were crowded, allowing Hribal to execute his reign of terror within the walls of Franklin Regional Senior High School. This leads me to believe that Hribal actually took the time to analyze and think out when the perfect time would be to begin his stabbing spree.

Dr. Timothy VanFleet, chief of emergency medicine at the University of Pittsburgh Medical Center, who treated six victims said, “They just felt pain and noticed they were bleeding. Almost all of them said they didn’t see anyone coming at them.”

I can’t even imagine being in a crowded hallway, felling a rush of pain, looking down and realizing that blood was gushing from my body. Reality at that moment would be surreal.

I feel like I'm seeing a pattern with these children who are shooting and stabbing people in their schools. It seems that most of them are shy and/or quiet and keep to themselves.

According to a sophomore student at Franklin Regional Senior High School, she said that Hribal was “really shy” and “always kept to himself…he didn’t talk to many people.”

As an ex-teacher, I really wonder what the adults (parents, teachers, counselors, librarians, custodians, etc.) are doing to ensure that they are tuned in to ALL students. It's so important for students to feel like they belong to a group...not at all saying that belonging to a group is the answer to school violence, but if a child has an outlet for whatever is going on in his or her life that he or she perceives is so terrible to kill or attempt to kill, then

a.) A group could be an outlet to disassociate from the student's reality or perceived reality, whether it's the a chess, movie or book club; being on a team; or some other type of group; and

b.) By belonging to a group, the child could divulge information that he or she intends to do harm, and hopefully, it could be intercepted in a healthy way.

We all know school violence is increasing and that something must be done to prevent it. We’re getting good at acting during and after violent acts at schools; however, we must become more proactive, preventing violence occurring in the first place.

Pictures from NY Daily News and The Australian.

About the Author

Ginger Hill is Group Social Media Manager.

Featured

  • Why Communication is Key in an Emergency

    During an emergency, communication with the outside world can be a critical component when it comes to response time and saving lives. Emergency communications typically consist of alerts and warnings; directives about evacuating the premises; information about response status, and other matters that can impact response and recovery. Read Now

  • Trust But Verify

    Today’s world is built on software—whether it is third-party applications, open-source libraries, in-house developed tools, operating systems, containers or firmware. Organizations worldwide depend on these diverse software components to power their operations, connect with customers, and drive innovation. However, this reliance on software comes with hidden dangers: the blind trust placed in these software products. Many companies assume that the software they purchase, and use is secure and free from vulnerabilities, but recent high-profile software supply chain breaches have proven otherwise. The reality is that every piece of software, no matter how reputable the source, increases the organization’s attack surface and poses new risks. Read Now

  • Impact on Digital Transformation

    A 2023 Statista report projects that by 2030 there will be 30 billion Internet of Things (IoT) devices in use. That is three times as many as there were in 2020. The numbers continue to grow because connecting sensors and systems, especially across a business, promises big efficiency gains and new insights. As such, the IoT and IIoT (Industrial Internet of Things) have become a launching pad for digital transformation -- not only for individual organizations but for entire industries. Read Now

  • Optimizing Security and Business Performance with Clarity and Control

    In recent years, the security sector has experienced a significant influx of innovative technologies that have fundamentally transformed how organizations design, implement, and oversee their security programs. The widespread adoption of cloud-based infrastructure, edge processing, and AI or machine learning (ML) driven analytics has brought about revolutionary changes in applications such as access control, video surveillance and emerging areas like threat detection and drone identification. Read Now

Featured Cybersecurity

Webinars

New Products

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file. 3