Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
PhysicalPhysical SecurityEducation:University

What Can Security Leaders Learn From Prevented University Attack?

By Jordyn Alger, Managing Editor
Smiling officer
Arthur Ogleznev via Unsplash
December 19, 2025

A student from the University of Delaware planned an attack against the campus police, according to ABC News. 

The student, Luqmaan Khan, 25, was arrested after authorities discovered within his vehicle a written intention for the attack, a handgun, and ammunition. In this notebook, Khan reportedly listed the University’s campus police as a target. Subsequent searches of his residence revealed body armor, a scoped rifle, and a modified handgun, which included a machine gun conversation device, also known as a switch. This device, the report notes, was illegal. 

Additionally, the notebook contained combat techniques for various weapons and a sketched layout of the University of Delaware Police Department. 

Fortunately, the attack was prevented. To break down this incident and better understand what insights security leaders can glean from it, I spoke with Danielle Weddepohl, Director of Public Safety and Emergency Management at George Brown Polytechnic. 

How Security Succeeded 

“The biggest successes in this case seem twofold,” says Weddepohl. 

First, efforts from local law enforcement helped to prevent the attack. Weddepohl explains, “Proactive patrolling and engagement by New Castle County police officers meant that they noticed a car in a park after hours which led to a conversation where they determined that the person in the vehicle seemed agitated. Through a deeper inspection, Police then determined that this person was planful, well-equipped and committed to engaging in serious and potentially wide-spread violence.” 

Second, the campus police have proactively engaged in communication with the community. Weddepohl states, “The University of Delaware will also likely be able to successfully lessen fear in their well-prepared and safety-conscious community members. The University of Delaware Police Department has a website full of great safety resources such as their use of ‘Send Word Now,’ which alerts those that are registered about emergencies or situations where ‘imminent danger to the safety and welfare of students, faculty and staff’ could occur over voice messages and text, and their use of a ‘Live Safe’ App and overhead notification system are only a few examples of the work that they’ve done to best prepare their community and to keep safety top of mind. This case should also serve to illustrate the importance of robust safety strategies, notification tools and training to other institutions and their leadership who are considering additions to their own security programming.”

What Are the Key Takeaways for Security Leaders? 

Proactive patrolling was integral to security’s success in this incident, but Weddepohl warns that “in terms of preparation and response, patrolling and engagement will not always uncover threats to institutional safety.” 

“This case underscores the need for security specialists who can perform threat assessments based on reported concerning behaviors, and the need for close collaboration with local police and community partners for information sharing,” she asserts. “Threat Assessment and Behavioral Intervention Teams are now a standard in many post-secondary institutions so that a broad group of diverse specialists can examine threats, determine if threats can be mitigated and administer supports that may be required for both a person who is being assessed and for people who may be impacted by their actions. Although we cannot assume that there will be ‘plan leakage’ to the degree obtained by Police from Khan’s notebook, there can be a great deal of disparate information collected to better paint a picture of indicators of violence, interactions across the institution that may seem unrelated, and a chance to canvas people who may have interacted with the individual but who may have not reported things.” 

Another lesson security leaders can glean from this incident is the value of proper training and collaboration with law enforcement. 

“We need to take time to ensure that our security guarding staff and campus police are not only properly trained and have the equipment that they need, but they are also provided with as much information as possible to improve their situational awareness through our own information collection and through information shared to us by police to keep them safe,” says Weddepohl. “Collaboration with police partners should occur weekly or as often as possible, Police and other first responders should be invited to familiarize themselves with your buildings, and there should be proactive Police relationship building initiated with both your community members and your security team who should feel comfortable establishing their own relationships with local divisions/detachments. Visible police collaboration will also instill confidence in the institution that you support that police are partnering with you and will share information that you need to know to make your team the most effective in keeping your people safe.” 

Proper training doesn’t just help a security team to engage in best practices, but it also supports the team’s mental wellness by providing clear resources and expectations. Earlier this year, Weddepohl and I spoke about how to promote a security team’s wellness, and in that conversation, the value of through training was emphasized — in addition to other useful strategies. 

Foundational steps, such as proactivity and comprehensive security training, can be the difference between a prevented attack or a successful one. This incident at the University of Delaware is evidence of it. 

In regards to the prevented University attack, FBI Baltimore Special Agent in Charge Jimmy Paul states, “I commend the devoted officers with the New Castle County Police Department whose exceptional actions led to Khan’s arrest before anyone was harmed.” 

KEYWORDS: campus assault campus police campus security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Jordynalger

Jordyn Alger is the managing editor for Security magazine. Alger writes for topics such as physical security and cyber security and publishes online news stories about leaders in the security industry. She is also responsible for multimedia content and social media posts. Alger graduated in 2021 with a BA in English – Specialization in Writing from the University of Michigan. Image courtesy of Alger

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

Popular Stories

Tree shaped as dollar sign

The Salary of a Chief Security Officer

Classroom with rows of desks facing a chalkboard

The AI Powered Classroom Network of the Future: Because Hackers Never Take Recess

Jaguar logo

New Update on Jaguar Land Rover Cyberattack: Q3 Wholesales Down 43%

Cloud icon

Google Cloud Service Exploited in New Phishing Campaign

Person holding phone to smart lock

Why it’s Time to Move on From Legacy Access Control Systems

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

February 26, 2026

Zero Incidents vs. Zero Tolerance – Workplace Violence Prevention Best Practices that Work

Workplace violence remains one of the most complex challenges facing healthcare organizations today. For executive security professionals, the stakes have never been higher: protecting staff, patients, and visitors while preserving a culture of compassion, dignity, and service.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Officers at an event

    What Can Security Leaders Learn from Charlie Kirk’s Shooting?

    See More
  • Microphone

    What security leaders can learn from Smashing Pumpkins hacker attack

    See More
  • Monitors with keyboard

    2B Weekly Downloads at Risk: Supply Chain Attack Targets Popular npm Packages, Security Leaders Discuss

    See More

Related Products

See More Products
  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

  • Optimizing Social Media from a B2B Perspective

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing