Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
PhysicalFire & Life SafetyPhysical SecurityEducation:University

Randomness to complement the active shooter threat

By Andy Alitzer
rows of gray desks

Image via Unsplash

December 8, 2023

School safety is an ever-present concern, especially in regards to preventing active shooter situations. Security leaders have begun to complement existing security programs with a Random Antiterrorism Measures Program (RAMP) that involves implementing multiple security measures in a random fashion to change the appearance of critical infrastructure/key resources. Could a similar security approach prevent or deter an active shooter in an educational setting?

The Department of Homeland Security’s (DHS) attack planning cyle and the Federal Bureau of Investigation’s (FBI) Pathway to Violence provides examples of when a randomness approach may have the most affect. Remember, terrorist (and, active shooters) looks at procedures, routines, people and security measures.

DHS terrorist attack planning cycle

  1. Preliminary target selection
  2. Individual surveillance
  3. Final target selection
  4. Pre-attack surveillance
  5. Planning
  6. Rehearsal
  7. Execution
  8. Escape & exploitation

Pathway to violence

  1. Grievances
  2. Ideation
  3. Research & Planning
  4. Pre-Attack Preparation
  5. Probing & Breaching
  6. Attack

Enhancing security through a randomness concept requires open mindedness, buy-in and empowerment. Expect some “old school” resistance of “that’s not going to work.”  Of course, getting buy-in from executive staff will be important, but including all levels, including security officers, will lay the groundwork for success. Encourage creativity from everyone. Random measures should also reduce complacency that seems to creep into security programs that may have been part of the problem in the recent attacks on Israel.

Ideas to implement a randomness component, and to get others thinking:

  • Vary patrol (foot, bike and vehicle) times and routes — undoubtedly the most effective, but often the most difficult to accomplish to persuade others to break routines and patterns.
  • Occasionally station security in front of buildings and greet students as they enter. 
  • Request local police to occasionally drive through campus, or even eat lunch in the cafeteria.
  • Randomly check entrance doors at different times, and spend a variety of times at campus entrance locations and ingress routes to classroom buildings.
  • Periodically police turn on the lights for a few minutes at different locations on campus and athletic venues.
  • Ask local police to conduct K9 and other training on campus.
  • Vary times of required activities, like fire drills.
  • Conduct security meetings at different locations other than in the security office.
  • Occasionally enhance security officer presence for no apparent reason.
  • Although active shooter incidents generally happen during the school day, drop by athletic events, club meetings, etc.
  • Invite nearby municipal first responders to campus, including those with visible markings (fire department, special operations police, etc.)
  • Random bag checks or wanding at random locations (not for all schools).
  • Park security vehicles in different locations.
  • Consider drone flights in differ areas of campus.
  • Encourage security offices to eat in the cafeteria at different times. 
  • Programs to enhance safety on campus, but also increase security/police presence:
    • Coffee with a cop (or something similar)
    • Campus Safety Day
    • Seat belt checks at intersections
    • Participating in “special” focused programs (national preparedness month, fire safety week, alcohol awareness week, etc., although these types of programs are typically at the same time periods each year)

Although security leads the randomness effort, others should be asked to participate, including:

  • School leadership: Simply getting out of the office and being visible.
  • Grounds can vary their routine as well — mowing, leaf blowing, etc.

Randomness also serves as a great crime prevention technique. And, it is crucial to train security and others on benefits of the program, what to look for within the detection phase and truly grasp the importance of situational awareness and what constitutes an anomaly on campus.

All simple suggestions that could disrupt the planning, preparedness and pre-attack efforts of an active shooter. The additional visibility may also enhance relationships with students as well as increase the safety and security confidence on campus.  

Enhancing trained security officers and police presence on campus, campus wide involvement, a variety of security technologies (CCTV, drones, weapons detection, access control, etc.), and executive support may be the backbone of a successful security program, but something as simple as implementing a randomness to security measures should be considered to deter, and possibly prevent, a school attacker.

KEYWORDS: active shooter active shooter protocol campus safety campus safety officer campus security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Andy Altizer is the Emergency Operations Coordinator at Westminster Schools in Atlanta, and a part-time instructor in Georgia State University’s undergraduate criminal justice department. Altizer previously served as the Director of Emergency Management at Kennesaw State University, Director of Emergency Preparedness at Georgia Institute of Technology, and Critical Infrastructure Protection Program Manager at Georgia Emergency Management/Homeland Security.  He also has over 10 years of active and reserve military experience, including returning to active duty after 9/11 and deploying to Afghanistan in the Spring of 2002 as an Inspector General.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Leadership and Management
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Person holding large ball of twine

Preventing Burnout in The Security Industry

Harrods

Harrods’ Cyberattack: Cybersecurity Leaders Weigh In

2025 Security Benchmark banner

Events

September 29, 2025

Global Security Exchange (GSX)

 

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Person in crowd holding gun safety sign

    Active shooter preparedness: What’s being omitted in training?

    See More
  • Laptop and notebook open on wood desk next to a coffee cup

    Inhibitors to good decision making

    See More
  • shooter

    5 Keys to Building a Successful Active Threat Plan

    See More

Related Products

See More Products
  • The-Complete-Guide-to-Physi.gif

    The Complete Guide to Physical Security

  • Physical-Security-and-Safet.gif

    Physical Security and Safety: A Field Guide for the Practitioner

  • Physical-Layer-Security.gif

    Physical Layer Security in Wireless Communications

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!