Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Podcasts
    • Photo Galleries
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Hospitals & Medical Centers

Recognizing Security Blowback: Active Shooter Prevention and Response and Best Practices

shooter-enews
July 12, 2017

In the webinar, “Recognizing Security Blowback: Active Shooter Prevention and Response and Best Practices,” Jim Sawyer, Security Director for Seattle Children’s Hospital, discussed why security blowback is essential to understand to mitigate active shooters and workplace violence.

Sawyer said that the term blowback is used for individuals who retaliate against government or others in the workplace and society in general. The term originated in 1953 from the CIA in 1953 when it orchestrated the overturn in Iran of the Mosadeq government.

Why is it important/relevant for security professionals to understand the term? Because often, you have no idea that the retaliation is coming. “Retaliation is an event you may have no knowledge about, so the goal is to prepare for it. We have to plan for domestic and international blowback,” he said. “Oklahoma City was “blowback” for Waco, Texas. We have to anticipate there are people who are out there with an ax to grind. For security, if you understand it, there’s a lot to do to mitigate it.”

Sawyer noted that security often has a zero tolerance policy when it comes to blowback and violence and guns in the workplace, but he said that implies that something has happened you will respond and make sure that it never happens again. A “zero incidents” policy, he said, emphasizes that you want to prevent the run, hide, fight, incident from happening. The whole foundation is prevention, he said.

Weapons are readily available in the United States, Sawyer said, so recognizing that domestic weapons availability as a security executive, one must adopt:

  • Have Threat policy that emphasizes documentation
  • Firearms recognition policy
  • Have a weapons storage policy
  • Develop a strong signage policy
  • Build strong law enforcement ties

 

Regarding prevention and “zero incidents” what strategies can security executives embrace in preventing an active shooter?

  1. Have a domestic violence plan for organization
  2. Promote domestic violence education
  3. Build in hardwire a threat reporting requirement
  4. Create a threat assessment team
  5. Consider license plate cameras
  6. Require de-escalation training for all staff
  7. Develop hostile termination plan
  8. Build safety – when hiring plan – Remember 10% rule.
  9. Have background check capability for security
  10. Develop strong mutual aid ties with security contractors
  11. Regulate control access to facility
  12. Do annual CPTED audits
  13. Don’t allow filming

According to Sawyer, domestic violence plays a large role in blowback prevention. He noted that 74% of women in domestic violence are harassed at work, and 1 in 4 women in the United States are in a dangerous relationship. He said: “You need to emphasize domestic violence prevention. You do not want domestic violence seeping in the workplace.”

Sawyer offered 13 warning signs of potential violence:

  1. Past history of violence
  2. History of treats
  3. Weapons fascination
  4. Fascination with recent news of extreme violence
  5. Animal cruelty
  6. Extreme political extremism
  7. Extreme racism – hatred of diversity
  8. Talk of hopelessness
  9. Isolate themselves
  10. Start giving things away
  11. History of domestic violence
  12. Extreme dislike of management
  13. Pathological blamer                                                       

 

He also offered seven thoughts to hard target and institution, including:

  1. Cameras – license plate
  2. Screening – access control
  3. Metal detectors at key areas
  4. Prox readers/electronic locks
  5. Maintain key control – 90% have lost it
  6. Designate safe rooms that lock.  Have them on each floor
  7. Recover all property during hostile termination from a staff

 

And if you identify a party of concern, he offered the following ways to mitigate risk:  

  1. Run a background check on the individual
  2. Contact them when appropriate
  3. Learn their work schedule
  4. Trespass them from property
  5. Consider a protection order
  6. Learn the make of their car and license
  7. Add perimeter security
  8. Share pictures of the individual
  9. Alert all staff of the concern
  10. Share all information with law enforcement

 

Last, Sawyer offered some thoughts on assuring and supporting staff who are anxious about their physical environment:

  1. Provide safe rooms
  2. Change locks
  3. Provide cameras
  4. Do a walk through
  5. Do annual Risk Assessments RVAs
  6. Ask for their ideas

 

Sawyer also suggested that security teams should designate one to two officers to become Facebook – Social media “experts, as he said that people of concern will post “incredible things on social media,” so monitoring it offers security teams a snapshot of how a person is thinking.

Sawyer also explained the term “low tech terror,” which involves the use of clubs, knives, cars and trucks. He said: “Terror will not always involve intricate and exotic plots. Individuals acting alone may utilize ‘low tech terror’ and use those weapons instead.”   

View the webinar ondemand. 

KEYWORDS: active shooter healthcare security workplace violence

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 13, 2025

Inside the 2025 Security Benchmark Report

The 2025 Security Benchmark Report unveils the top trends CSOs and enterprise security executives are facing in today’s current climate and how each of these trends could potentially impact the enterprise’s global reputation with the public, governments, and business partners. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • active-enews

    Active Shooter: Best Practices for The Worst Case

    See More
  • gun

    How Active Shooter Technology can Enhance Emergency Response

    See More
  • Unarmed Security Officer

    The role of unarmed security officers in active shooter response

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing