Ready and Waiting

More schools turning to database-driven, crisis management software solutions for emergency preparedness

THICK, dusty, three-ring binders are no place to keep school emergency response protocols. In the event of an emergency, information and time is critical. Precious time can be lost in locating the binder, flipping through the tabs to find the correct section and finally finding the vital information. And what if an evacuation is necessary? Lug the binder out and start the information search all over again during different stages of the emergency? Even then, its contents are only as good as the people who wrote the information, limited to how much the binder can hold and only accessible to those on site.

To a first responder, there's nothing worse than arriving to a site and not knowing exactly where the emergency is and how to get to it. Rapid Responder is designed to eliminate this scenario.

But in today's IT age, where information can be securely accessed and disseminated in an instant, more schools are turning to advanced measures such as database-driven, crisis management software solutions.

A Better Response
Seattle-based Prepared Response was founded to help prevent tragedies like the one at Columbine High School in 1999. There were no established protocols for the type of attack, and it forever changed the concept of school security.

Prepared Response wants to use technology to better respond to emergencies like Columbine. The company wants schools to engage in state-of-the art pre-planning measures with school officials, police, fire, state patrol and emergency services, and distribute the critical information via a secure Internet connection, network or USB storage device. Company officials believe that preparedness is part of a strong defense.

To a first responder, there's nothing worse than arriving to a site and not knowing exactly where the emergency is and how to get to it. Rapid Responder is designed to eliminate this scenario.

"We usually implement the system a whole district at a time, which includes working closely with local responders. We notify them that if they get a 911 call at a specific address, that site has the Rapid Responder system. We database everything you would want to know about a critical infrastructure so when first responders arrive at the scene, they don't have to go looking for information in order to make decisions," said Jim Finnell, president and CEO of Rapid Response. "The system is not meant to replace a 911 system, but when that call does occur, within seconds, first responders can get right on the system and have immediate access to everything they need to know."

"There's no limit to what kind of information can be entered," said Walt Pegram, district resource officer for Spokane public schools.

With these systems, school officials and first responders can instantly access more than 300 data points, including tactical pre-plans, satellite and geospatial imagery, interior and exterior photos, floor plans, staging areas, hazardous materials, utility shut-offs, best access and evacuation routes, incident response plans, and containment and family reunification locations. Try stuffing all that in a binder.

In Action
On Sept. 22, 2003, Prepared Response accomplished what it set out to do. A student pulled out a 9-millimeter handgun during science class at Lewis and Clark High School in Spokane, Wash., shot at a cabinet and demanded the teacher and students leave the room.

Fortunately, Rapid Responder was already in place. Within minutes of the shot, the software was up and running in a command center, providing site-specific information. Arriving officers were able to isolate the gunman in less than 12 minutes while more than 2,000 students were quickly evacuated.

Officials using Rapid Responder noticed the room in which the gunman was in had unobstructed views of a field where the students had evacuated to along with eight lanes of traffic on an adjacent freeway. Using contacts listed in the database, officials called a transportation vendor to immediately send buses to relocate the students offsite. A list of predetermined roadblocks from Rapid Responder was sent to Spokane City Streets Department to block adjacent streets and to Washington State Patrol to block access to the freeway.

During negotiations, the gunman asked for matches. Fire officials knew from Rapid Responder that the student was in a science lab with a number of natural gas outlets. Rapid Responder located the utility shut-offs, and a crew from the local gas company shut off the gas.

Fire officials, concerned about possible hazardous chemicals, used Rapid Responder to access a list of chemicals stored in the room. The database listed the chemical types, location, quantity, MSDS profiling of chemical characteristics and safety precautions.

The gunman acted aggressively towards the SWAT team and was wounded in the subsequent gunfire but survived.

The situation was defused in less than an hour, and no innocent people were hurt thanks to the pre-planning measures and quick access to crucial information.

"In addition to the active shooter scenario, the program also comes in handy for everyday use. Two years ago, students grabbed a fire suppression pipe and broke it. Hundreds of gallons of water began spilling out on a brand-new parkay, hardwood floor in the gym. The head custodian was out, and no one knew where shutoffs were. I pulled up Rapid Responder and quickly accessed the fire suppression fire shutoff. Having access to that information, the $150,000 gym floor was saved," Pegram said.

This article originally appeared in the February 2007 issue of Security Products, pg. 16.

Featured

  • Analysis of AI Tools Shows 85 Percent Have Been Breached

    AI tools are becoming essential to modern work, but their fast, unmonitored adoption is creating a new kind of security risk. Recent surveys reveal a clear trend – employees are rapidly adopting consumer-facing AI tools without employer approval, IT oversight, or any clear security policies. According to Cybernews Business Digital Index, nearly 90% of analyzed AI tools have been exposed to data breaches, putting businesses at severe risk. Read Now

  • Software Vulnerabilities Surged 61 Percent in 2024, According to New Report

    Action1, a provider of autonomous endpoint management (AEM) solutions, today released its 2025 Software Vulnerability Ratings Report, revealing a 61% year-over-year surge in discovered software vulnerabilities and a 96% spike in exploited vulnerabilities throughout 2024, amid an increasingly aggressive threat landscape. Read Now

  • Evolving Cybersecurity Strategies: Uniting Human Risk Management and Security Awareness Training

    Organizations are increasingly turning their attention to human-focused security approaches, as two out of three (68%) cybersecurity incidents involve people. Threat actors are shifting from targeting networks and systems to hacking humans via social engineering methods, living off human errors as their most prevalent attack vector. Whether manipulated or not, human cyber behavior is leveraged to gain backdoor access into systems. This mainly results from a lack of employee training and awareness about evolving attack techniques employed by malign actors. Read Now

  • Report: 1 in 3 Easily Exploitable Vulnerabilities Found on Cloud Assets

    CyCognito recently released new research highlighting critical security vulnerabilities across cloud-hosted assets, revealing that one in three easily exploitable vulnerabilities or misconfigurations are found on cloud assets. As organizations increasingly shift to multi-cloud strategies, the findings underscore significant security gaps that could provide attackers with potential footholds into networks. Read Now

  • Built for Today, Ready for Tomorrow

    Selecting the right VMS is critical for any organization that depends on video surveillance to ensure safety, security and operational efficiency. While many organizations focus on immediate needs such as budget and deployment size, let us review some of the long-term considerations that can significantly impact a VMS's utility and flexibility. Read Now

New Products

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation.

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.