Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
PhysicalPhysical SecurityEducation:University

What Can Security Leaders Learn From Prevented University Attack?

By Jordyn Alger, Managing Editor
Smiling officer
Arthur Ogleznev via Unsplash
December 19, 2025

A student from the University of Delaware planned an attack against the campus police, according to ABC News. 

The student, Luqmaan Khan, 25, was arrested after authorities discovered within his vehicle a written intention for the attack, a handgun, and ammunition. In this notebook, Khan reportedly listed the University’s campus police as a target. Subsequent searches of his residence revealed body armor, a scoped rifle, and a modified handgun, which included a machine gun conversation device, also known as a switch. This device, the report notes, was illegal. 

Additionally, the notebook contained combat techniques for various weapons and a sketched layout of the University of Delaware Police Department. 

Fortunately, the attack was prevented. To break down this incident and better understand what insights security leaders can glean from it, I spoke with Danielle Weddepohl, Director of Public Safety and Emergency Management at George Brown Polytechnic. 

How Security Succeeded 

“The biggest successes in this case seem twofold,” says Weddepohl. 

First, efforts from local law enforcement helped to prevent the attack. Weddepohl explains, “Proactive patrolling and engagement by New Castle County police officers meant that they noticed a car in a park after hours which led to a conversation where they determined that the person in the vehicle seemed agitated. Through a deeper inspection, Police then determined that this person was planful, well-equipped and committed to engaging in serious and potentially wide-spread violence.” 

Second, the campus police have proactively engaged in communication with the community. Weddepohl states, “The University of Delaware will also likely be able to successfully lessen fear in their well-prepared and safety-conscious community members. The University of Delaware Police Department has a website full of great safety resources such as their use of ‘Send Word Now,’ which alerts those that are registered about emergencies or situations where ‘imminent danger to the safety and welfare of students, faculty and staff’ could occur over voice messages and text, and their use of a ‘Live Safe’ App and overhead notification system are only a few examples of the work that they’ve done to best prepare their community and to keep safety top of mind. This case should also serve to illustrate the importance of robust safety strategies, notification tools and training to other institutions and their leadership who are considering additions to their own security programming.”

What Are the Key Takeaways for Security Leaders? 

Proactive patrolling was integral to security’s success in this incident, but Weddepohl warns that “in terms of preparation and response, patrolling and engagement will not always uncover threats to institutional safety.” 

“This case underscores the need for security specialists who can perform threat assessments based on reported concerning behaviors, and the need for close collaboration with local police and community partners for information sharing,” she asserts. “Threat Assessment and Behavioral Intervention Teams are now a standard in many post-secondary institutions so that a broad group of diverse specialists can examine threats, determine if threats can be mitigated and administer supports that may be required for both a person who is being assessed and for people who may be impacted by their actions. Although we cannot assume that there will be ‘plan leakage’ to the degree obtained by Police from Khan’s notebook, there can be a great deal of disparate information collected to better paint a picture of indicators of violence, interactions across the institution that may seem unrelated, and a chance to canvas people who may have interacted with the individual but who may have not reported things.” 

Another lesson security leaders can glean from this incident is the value of proper training and collaboration with law enforcement. 

“We need to take time to ensure that our security guarding staff and campus police are not only properly trained and have the equipment that they need, but they are also provided with as much information as possible to improve their situational awareness through our own information collection and through information shared to us by police to keep them safe,” says Weddepohl. “Collaboration with police partners should occur weekly or as often as possible, Police and other first responders should be invited to familiarize themselves with your buildings, and there should be proactive Police relationship building initiated with both your community members and your security team who should feel comfortable establishing their own relationships with local divisions/detachments. Visible police collaboration will also instill confidence in the institution that you support that police are partnering with you and will share information that you need to know to make your team the most effective in keeping your people safe.” 

Proper training doesn’t just help a security team to engage in best practices, but it also supports the team’s mental wellness by providing clear resources and expectations. Earlier this year, Weddepohl and I spoke about how to promote a security team’s wellness, and in that conversation, the value of through training was emphasized — in addition to other useful strategies. 

Foundational steps, such as proactivity and comprehensive security training, can be the difference between a prevented attack or a successful one. This incident at the University of Delaware is evidence of it. 

In regards to the prevented University attack, FBI Baltimore Special Agent in Charge Jimmy Paul states, “I commend the devoted officers with the New Castle County Police Department whose exceptional actions led to Khan’s arrest before anyone was harmed.” 

KEYWORDS: campus assault campus police campus security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Jordynalger

Jordyn Alger is the managing editor for Security magazine. Alger writes for topics such as physical security and cyber security and publishes online news stories about leaders in the security industry. She is also responsible for multimedia content and social media posts. Alger graduated in 2021 with a BA in English – Specialization in Writing from the University of Michigan. Image courtesy of Alger

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Cybersecurity
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

Popular Stories

Red and blue pawns with thought bubbles

Implementing Meaningful De-Escalation Training in Your Security Program

Fingerprint on computer board

Enhancing Incident Response with Integrated Access Control and Video Verification

Iran on map

Iran Conflict and Cybersecurity: What to Expect in the Next 30 Days

World Cup trophy beside goal

World Cup Safety and Security Is About More than Just Crime

Woman in suit

Can the Industry Do More for Women in Security?

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 8, 2026

The Future of Executive Protection: Layering Technology, Intelligence, and Response

Digital threats to executives and other high-profile employees are evolving faster than most corporate protection programs. Learn why modern executive protection programs require data-driven, intelligence-led strategies to keep pace with the magnitude of today’s threats.

April 15, 2026

How AI is Closing the Decision Gap in Leading GSOCs

Learn how modern security teams are evolving from alert-driven workflows to outcome-driven operations and how AI is enabling faster, more confident decisions at every stage of the incident response lifecycle.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • Officers at an event

    What Can Security Leaders Learn from Charlie Kirk’s Shooting?

    See More
  • Microphone

    What security leaders can learn from Smashing Pumpkins hacker attack

    See More
  • What Security Leaders Can Learn From the Coronavirus Threat

    See More

Related Products

See More Products
  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

  • Optimizing Social Media from a B2B Perspective

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing