Professional Documents
Culture Documents
Active Shooter ROCIC Special Research Report PDF
Active Shooter ROCIC Special Research Report PDF
©2006 ROCIC
S
ome of the most tragic events in our coun- enough explosive force to collapse the room, but
try’s recent history have been episodes fortunately failed to detonate.
where a deviant has carried out shootings
in public places. These killings take place for
no other reason than to harm as many innocent
people as possible. They are often unpredictable
and strike in places dear to us, such as our schools,
churches, and places of work. They also can occur
in random public settings.
SNIPER ATTACKS
Sniper attacks, while less frequent than other
shootings, were made nationally relevant by the
Oct. 2002 “Beltway Sniper” killings that lasted
for more than three weeks. John A. Muhammad
and Lee B. Malvo, his young accomplice, killed
ten and critically injured three others around the
Washington, D.C. area. Their vehicle was modi-
fied so shots could be made from inside the closed
trunk.
waves. Contact and rescue teams should move past active shooter-related videos or CD-ROMs to law
any devices. enforcement agencies.
When deploying, a team should be composed of Clearly, each scenario involving an active shooter
two to five officers. As officers arrive on the scene, poses a unique set of dangers. Officers must make
as many teams as are necessary to control the quick, but careful decisions that keep safety, both
situation can be formed. Teams should deploy in a for potential victims and for law enforcement,
manner that gets them to the shooter quickly, and at top priority. It is a good idea to train for team
offers a tactical advantage. deployments in active shooter scenarios, especially
plausible ones within specific jurisdictions. Also,
There are many officer training classes on active it is wise to have building schematics available
shooter scenarios sponsored by various agencies. quickly in the event of a mass shooting. All offi-
Additional and hands-on training can be garnered cers must prepare themselves, mentally and physi-
at these events. Several institutions also distribute cally, in order to effectively limit these tragedies.
SOURCES
• Virginia Crime Prevention Association. “Active Shooter” briefing. December, 2005.
• U.S. Department of Justice- Federal Bureau of Investigation. “Uniform Crime Reporting Program
Releases Crime Statistics for 2002.” Oct. 27, 2003.
• U.S. Department of Justice- Federal Bureau of Investigation. “Terrorism in the United States,
1999.” http://www2.fbi.gov/publications/terror/terror99.pdf
• U.S. Department of Justice- Federal Bureau of Investigation. “The School Shooter: A Threat
Assessment Perspective.” http://www.fbi.gov/publications/school/school2.pdf
• The Indianapolis Star. “School violence around the world.” Nov. 5, 2005.
• The Tennessean. “Former postal worker kills five, herself.” Feb. 1, 2006.
• CNN. “Emotionally disturbed gunman named in church killings.” Sept. 16, 1999. http://
www.cnn.com/US/9909/16/church.shooting.03/
• Terrorism Threat Assessment for Large Natural Disasters • Civil Disorder: Preparing for the Worst
Facilities
• Eco Terrorism: Extremists Pose Domestic • Ecstasy: Harmless Party Drug Or
• Check 21: New Banking Technology Threat Dangerous Trend?
Challenges Law Enforcement
• Cold Case Units: Turning up the Heat • Heroin: More Purity For Less Money
• ICE: Crystal Methamphetamine: Imported
• Gypsies and Travelers • OxyContin Abuse Explodes In Southeast
High-Purity Meth Replacing Domestic Lab
Output • User’s Guide to ATIX: Automated Trusted • Just Say NO To Telemarketers
Information Exchange
• Meth Lab Safety Issues: How to Protect • School Security Crisis Response Manual
Law Enforcement, First Responders, and • DNA: Law Enforcement’s New Investigative
the General Public from the Dangers of • XML: Communications Through Connectivity
Tool
Clandestine Methamphetamine Labs • Credit Card Security Features
• False ID: National Security Threat
• CERT (Community Emergency Response • Stop Phone Cramming: Check Your Phone
Team): Civilian Support for First Responders • Salvia Divinorum: Herbal Hallucinogen Bill
Raises Law Enforcement Concerns
• Taxing Illegal Drugs: States Attacking Profit • Shaken Baby Syndrome: What To Look For,
Motive of Dealers • Smallpox: The Deadly Virus
What To Do
• Diplomatic Immunity: Rules of Engagement • Human Trafficking: International Criminal • Children and Internet Safety
for Law Enforcement Trade in Modern Slavery
• ROCIC’s Illicit Drug Pricing: A Regional
• Violence Against Law Enforcement: Law • Network Security: Safeguarding Systems
Comparison
Enforcement Officers Murdered, Accidentally Against the Latest Threats
Killed, Assaulted in the Line of Duty • RAVES: When It’s More Than A Party
• Dirty Bombs: Radiological Dispersion
• Mara Salvatrucha (MS-13): Violent Street Devices • Identity Theft: From Low Tech to High Tech
Gang with Military Background • Ethics in Law Enforcement • Hoaxes and Legends: How to Detect
• Indicators of Terrorist Activity: Stopping the Hoaxes on the Internet
• Law Enforcement Officers and Safety
Next Attack in the Planning Stages • Truce or Consequences: Motorcycle Gangs
• Computer Forensics: Following the
• Internet Fraud: Techniques Used to Scam Talking to Each Other
Electronic Trail
Online Consumers • Child Pornography: Protecting the Innocent
• Huffing: Teens Abusing Inhalants
• DXM: Teens Abusing Cough Medicine Risk • Meth Threat: Seizure of Labs by Untrained
Brain Damage, Death • RISSLeads Bulletin Board: Information in an
Personnel Recipe for Death and Destruction
Instant
• RISS Activity Report for G-8 Summit • Illusion and Confusion: The Crime and
• Bioterrorism
• Mail Center Security Culture of Irish Travelers
• Criminal Intelligence: Its Use in Law
• Safety & Security for Electrical • Date Rape Drugs: Rohypnol, GHB Gaining
Enforcement in Our Changing World
Infrastructure: Protecting Law Enforcement Popularity in Southeast, Southwest
and the Public in Emergency Situations • Terrorism: Defending the Homeland
• Security Threat Groups in Prison
• Crisis Response Report: Terrorist Attacks & • Law Enforcement and the Mentally Ill
ROCIC has been serving its criminal justice ROCIC provides a variety of services, free • Loaning of specialized, high-tech surveillance
members since 1973, and served as the of charge, to its criminal justice member equipment and vehicles
prototype for the modern RISS (Regional agencies: • Publications, including criminal intelligence
Information Sharing Systems) Centers. • Centralized law enforcement databases bulletin
ROCIC serves more than 180,000 sworn with connectivity among law enforcement • Specialized training and membership &
personnel in over 1,800 criminal justice agencies and the RISS Centers using the information exchange
agencies located in 14 southeastern and RISS Nationwide Intelligence Network.
southwestern states, Puerto Rico, and the U.S. • Use of investigative funds
• Analytical processing of criminal intelligence,
Virgin Islands. including phone tolls and document sorts • On-site personal assistance by law
enforcement coordinators
© 2006 ROCIC • This publication was supported by Grant No. 2005-RS-CX-0002, awarded by the Bureau of Justice Assistance,
Office of Justice Programs, U.S. Department of Justice. The Office of Justice Programs also coordinates the activities of the
Bureau of Justice Statistics, the National Institute of Justice, the Office of Juvenile Justice and Delinquency, and the Office for
Victims of Crime. This document was prepared under the leadership, guidance and funding of the Bureau of Justice Assistance
(BJA), Office of Justice Programs, U.S. Department of Justice in collaboration with the Regional Organized Crime Information Center (ROCIC). The opinions, findings, and conclusions
or recommendations expressed in this document are those of the authors and do not necessarily represent the official position or policies of the U.S. Department of Justice. Regional
Organized Crime Information Center and ROCIC are protected by copyright laws.