Risk Management Series
Primer 
to Design Safe School Projects in Case of 
Terrorist Attacks
December 2003


FEMA


FEMA 428 / December 2003


RISK MANAGEMENT SERIES

Primer to 
Design Safe School 
Projects in Case of 
Terrorist Attacks
PROVIDING PROTECTION TO PEOPLE AND BUILDING


www.fema.gov


Any opinions, findings, conclusions, or recommendations expressed in this 
publication do not necessarily reflect the views of FEMA. Additionally, neither FEMA 
or any of its employees makes any warrantee, expressed or implied, or assumes any 
legal liability or responsibility for the accuracy, completeness, or usefulness of any 
information, product, or process included in this publication. Users of information 
from this publication assume all liability arising from such use




The creation of the Department of Homeland Security (DHS) is one of the most 
significant transformations in the Federal Government in decades, establishing a 
department whose first priority is to protect the nation against terrorist attack. 
Within the DHS, the Directorate of Emergency Preparedness and Response (EP&R) is 
focused on ensuring that our nation is prepared for catastrophes, including both 
natural disasters and terrorist assaults.
This Primer for Protection of Schools Against Terrorist Attacks provides guidance to 
protect students, faculty, staff, and their school buildings from terrorist attacks. It also 
provides guidance to the building science community of architects and engineers 
working for local institutions on school projects.  
This document is intended for use by schools who feel that they are at risk to terrorist 
attacks. It provides necessary guidance to those who desire to increase the 
performance of their school and related infrastructure. Not all schools are at risk of 
terrorist attacks. The decision-makers in each school district should use current and 
available threat information from the proper sources to make this determination. 
The use of experts to apply the methodologies contained in this document is 
encouraged. 
This primer references several sources for additional information, including 
publications completed by other government agencies. The reader is encouraged to 
obtain additional guidance.
This document was prepared by the Building Sciences and Technology Branch of the 
Mitigation Division, part of EP&R. DHS would like to thank the following agencies 
for their contribution and input to this publication:
_	General Services Administration
_	Naval Facilities Engineering Service Center
_	Naval Facilities Command (NAVFAC) Criteria Office
_	USACE Protective Design Center
_	Department of Veterans Affairs
_	Centers for Disease Control and Prevention/National Institute for 
Occupational Safety and Health
_	Department of Justice, Office of Domestic Preparedness (DHS - Border and 
Transportation Security)
_	United States Air Force - Civil Engineer Support Agenc




FOREWORD AND ACKNOWLEDGMENT


BACKGROUND
The purpose of this primer is to provide the design community and school 
administrators with the basic principles and techniques to make a school that is safe 
from terrorist attacks and at the same time is functional, aesthetically pleasing, and 
meets the needs of the students, staff, administration, and general public. Protecting 
a school building and grounds from physical attack is a significant challenge 
because the ability to design, construct, renovate, operate, and maintain the facility is 
spread across numerous building users, infrastructure systems, and many building 
design codes. 
There is a strong interest in the United States (U.S.) in ensuring the safety of 
students, faculty, and staff in our schools. Schools are integral parts of their com-
munities. On any given weekday, nearly 53 million young people aged 5 to 17 attend 
more than 117,000 public and private schools where 6 million adults work as teachers 
or staff (counting students, faculty, and staff, this constitutes more than one-fifth of 
the U.S. population). Additionally, schools are resources for their communities.  
Many schools are used as shelters, command centers, or meeting places in times of 
crisis. Schools are also used widely for polling and voting functions. In some 
communities, schools are places of health care delivery.
Schools may or may not be the targets of terrorism, but they are certain to be affected 
by terrorism, whether directly or indirectly. On September 11, 2001, four elementary 
schools and three high schools located within 6 blocks of the World Trade Center 
were just beginning classes when the first plane hit the north tower. Thousands of 
children were exposed to the dust clouds from the collapsing buildings. Even those 
children not in the immediate vicinity experienced a great deal of anxiety. Children 
in at least three states (New York, New Jersey, and Connecticut) had parents working 
in or around the World Trade Center that day.  In the Washington, DC, area, schools 
faced similar situations after the Pentagon was attacked.1
Many Americans feel that schools should be the safest place our children can be, 
perhaps at times even safer than the homes in which they live. Security is not a 
standalone capability; it is a critical design consideration that should be constantly 
reviewed and scrutinized from the design phase through construction or reha-
bilitation and onto building use.
The focus of this primer will be on the threats posed by potential physical attacks on 
a school by terrorists. Attacking schools and school children could be a highly 
emotional and high profile event. At the time of publication of this primer, there 
have been no direct terrorist threats against a school known to the public; however, 
schools could be indirectly threatened by collateral damage from a terrorist attack 
directed at nearby facilities. Protecting a school against terrorist attack is a 
challenging task. A school may have considerable vulnerabilities, because of its well 
defined periods of use, designated access points, storage of sensitive personal 
information, minimal security forces, and numerous avenues of penetration and 
escape for attackers.
This primer should be used in conjunction with the Federal Emergency Management 
Agency (FEMA) 426, Reference Manual to Mitigate Potential Terrorist Attacks Against Buildings, 
and FEMA 427, Primer for Design of Commercial Buildings to Mitigate Terrorist Attacks.
SCOPE
This primer presents an approach to protecting schools at risk from terrorist attacks. 
The information presented is intended primarily for architects and engineers, or 
school administrators with a technical background. This publication is designed to 
meet the needs of all schools, including those with serious security concerns. 
Because security concerns of individual schools vary greatly, some users with modest 
security concerns may feel beleaguered by the amount of information and technical 
approach presented. They should feel free to select the methods and measures that 
best meet their individual situations while gaining a general appreciation of security 
concerns and risk management.
Several design philosophies and techniques have been incorporated into this primer, 
including the Department of Defense (DoD) Minimum Antiterrorism Standards, the 
Army and Air Force Security Engineering Manual, the General Services Ad-
ministration (GSA) Public Building Standards, the Department of Veterans Affairs 
(VA) Building Vulnerability Assessment Checklist, and the Centers for Disease 
Control and Prevention (CDC)/National Institute for Occupational Safety and Health 
(NIOSH) Guidelines for Airborne Contaminants.
ORGANIZATION AND CONTENT OF THE PRIMER
This publication contains many how-to aspects based upon current information 
contained in FEMA, Department of Commerce (DOC), DoD (including Army, Navy, 
and Air Force), Department of Justice (DOJ), GSA, VA, CDC/NIOSH, and other 
publications. It is intended to provide an understanding of the current 
methodologies for assessing threat/hazard, vulnerability, and risk, and the design 
considerations needed to improve protection of new and existing buildings and the 
people occupying them. As needed, this primer should be supplemented with more 
extensive technical resources, as well as the use of experts when necessary.
_		Chapter 1 presents a methodology for architects, engineers, and school 
administrators to analyze the safety of students, teachers, and staff for 
vulnerabilities to various terrorist threats. The methodology presented will assist 
schools in performing risk management by helping them to identify the best and 
most cost-effective terrorism mitigation measures for their unique security needs.
_		Chapters 2 and 3 discuss site and layout, and building design guidance and 
safety plans, respectively, and mitigation measures or comprehensive architectural 
and engineering design considerations to provide an acceptable level of 
protection. Specifically, Chapter 2 discusses comprehensive architectural and 
engineering design considerations for the school site, from the property line to 
the school building. Chapter 3 presents design considerations for the building 
envelope.
_		Chapter 4 is a brief discussion of explosive blast theory. Chapter 5 presents 
chemical, biological, and radiological (CBR) measures that can be taken to 
mitigate school vulnerabilities and reduce associated risk for these terrorist tactics 
or technological hazards.
_		Chapter 6 is a standalone description of the concept of safe rooms within 
schools that will resist CBR and blast threats intended to provide school board 
members and decision-makers with the basic components of a protective system.
_		Appendices A, B, and C contain acronyms, general definitions, and chemical 
and biological agent characteristics, respectively. Appendix B is an extensive 
glossary with terminology used in the report.
_		Appendices D and E present a comprehensive bibliography of publications 
(including information for obtaining the publications), and the associations and 
organizations capturing the building security guidance needed by the building 
sciences community (including web sites), respectively. 
_		Appendix F contains the Building Vulnerability Assessment Checklist.
ACKNOWLEDGEMENTS
Principal Authors:
Michael Chipley, UTD, Inc.
Wesley Lyon, UTD, Inc.
Robert Smilowitz, Weidlinger Associates, Inc.
Pax Williams, Battelle Memorial Institute
Contributors:
Milagros Kennett, FEMA, Project Officer, Risk Management Series Publications
Eric Letvin, Greenhorne & O'Mara, Inc., Consultant Project Manager
Michael Kaminskas, UTD, Inc.
Christopher Arnold, Building Systems Development, Inc.
Shawn Fenn, FEMA
Randall Hoffman, UTD, Inc.
Damian Kolbay, UTD, Inc.
Eve Hinman, ATC/Hinman Consulting Engineers, Inc.
Robert Burns, UTD, Inc.
Curt Betts, U.S. Army Engineer District, Omaha
Connie Deshpande, Department of Education
Bill Modzeleski, Department of Education
Randy Haslam, Jordan, Utah, School District
Deb Daly, Greenhorne & O'Mara, Inc.
Wanda Rizer, Greenhorne & O'Mara, Inc.
Julie Liptak, Greenhorne & O'Mara, Inc.
Bob Pendley, Greenhorne & O'Mara, Inc.

This primer was prepared under contract to FEMA. It will be revised periodically, and 
comments and feedback to improve future editions are welcome. Please send 
comments and feedback by e-mail to riskmanagementseriespubs@dhs.go v






TABLE OF CONTENT



FOREWORD AND ACKNOWLEDGMENTSi
CHAPTER 1 - ASSET VALUE, THREAT/HAZARD, VULNERABILITY, AND RISK1-
1
1.1   Asset Value Assessment 1-2
1.1.1  Identifying School Core Functions1-4
1.1.2  Identifying School Infrastructure1-4
1.1.3  Quantifying Asset Value1-5
1.2   Threat/Hazard Assessment1-7
1.2.1  Threat Identification1-9
1.2.2  Threat Definition1-13
1.2.3  Threat Assessment Products1-15
1.2.4  Design Basis Threat1-18
1.3   Vulnerability Assessment1-20
1.4   Risk Assessment1-23
1.5   The Risk Management Process1-28
CHAPTER 2 -  SITE AND LAYOUT DESIGN GUIDANCE 2-1
2.1   Land Use Considerations 2-2
2.2   Site Planning 2-4
2.2.1   Site Design2-4
2.2.2   Layout and Form2-4
2.2.3   Vehicular and Pedestrian Circulation2-9
2.2.4   Landscape and Urban Design2-10
2.3   Stand-off Distance2-14
2.4   Controlled Access Zones 2-16
2.5   Entry Control and Vehicular Access2-20
2.6   Signage2-21
2.7   Parking2-22
2.8   Loading Docks and Service Access2-24
2.9   Physical Security Lighting2-25
2.10  Site Utilities2-26
2.11  Summary of Site Mitigation Measures2-28
2.12  Crime Prevention Through  Environmental Design (CPTED)2-33
CHAPTER 3 - BUILDING DESIGN GUIDANCE AND SAFETY PLANS3-1
3.1  Architectural3-2
3.2   Building Structural and Non-structural Systems3-5
3.3  Building Envelope3-10
3.3.1 Building Exterior3-10
3.3.2  Exterior Wall Design3-10
3.3.3  Window Design3-12
3.3.4  Doors3-17
3.3.5   Roofs3-18
3.4   Mechanical Systems3-18
3.5   Electrical Systems3-24
3.6   Fire Protection Systems3-25
3.7   Communications Systems3-26
3.8   Physical Security Systems3-27
3.9   Summary of Building Envelope Mitigation  Measures3-29
3.10  Recommendations Based on the  Homeland Security Advisory System3-32
3.11  School Safety Emergency Management Plan3-33
3.12 Emergency Plans and Training3-36
CHAPTER 4 - EXPLOSIVE BLAST4-1
4.1   Blast Effects4-1
4.1.1  Building Damage4-3
4.1.2  Casualties and Injuries4-5
4.1.3  Levels of Protection4-5
4.2   Stand-off Distance and the Effects of Blast4-10
CHAPTER 5 - CHEMICAL, BIOLOGICAL, AND RADIOLOGICAL MEASURES5-1
5.1  Evacuation5-2
5.2   Sheltering in Place5-3
5.3   Personal Protective Equipment5-6
5.4   Air Filtration and Pressurization5-8
5.5   Exhausting and Purging5-8
5.6   CBR Detection5-9
5.7  Indications of CBR Contamination5-11
CHAPTER 6 - SAFE ROOMS WITHIN SCHOOLS6-1
6.1   Types of CBR Hazards6-2
6.1.1  Toxic Industrial Chemicals6-2
6.1.2  Incapacitating and Tear-producing Agents6-3
6.1.3  Biological Agents6-3
6.1.4  Radiological Agents6-4
6.2   Most Likely Delivery Methods for CBR Agents6-4
6.2.1  Internal Release6-5
6.2.2  External Proximate Release6-5
6.2.3  Remote Release6-5
6.2.4  Remote Release with Forewarning6-6
6.3   Vulnerability to Remote CBR Release6-6
6.4   Vulnerability to Remote CBR Release with  Forewarning6-10
6.5   Vulnerability to Internal CBR Release6-11
6.6   Vulnerability to External Proximate CBR Release6-11
6.7   Recommendations for CBR Protection  6-16
6.8   Safe Rooms in Response to the Domestic Explosive Threat6-16
6.9   Locating Safe Rooms to Mitigate Threats  6-20
6.10  Fragment Mitigating Upgrades  6-24
6.11  Structural Upgrades  6-30
APPENDIX A - ACRONYMS
APPENDIX B - GENERAL GLOSSARY
APPENDIX C - CBR AGENT CHARACTERISTICS
APPENDIX D - BIBLIOGRAPHY
APPENDIX E - ASSOCIATIONS AND ORGANIZATIONS
APPENDIX F - BUILDING VULNERABILITY ASSESSMENT CHECKLIST

TABLES
Chapter 1
Table 1-1  Asset Value Scale1-6
Table 1-2   Nominal High School People and  Asset Value Assessment 1-7
Table 1-3 Homeland Security Threat Conditions1-10
Table 1-4 Event Profiles for Terrorism and  Technological Hazards1-15
Table 1-5 Threat Rating Scale 1-16
Table 1-6 Nominal High School Threat Assessment1-17
Table 1-7 Vulnerability Rating Scale1-21
Table 1-8 Nominal High School Vulnerability  Assessment1-22
Table 1-9 Risk Rating System1-24
Table 1-10 Risk Color Value System1-25
Table 1-11 Nominal School Risk Assessment Matrix1-26
Chapter 2
Table 2-1 Correlation of Mitigation Measures  to Threats2-30
Chapter 3
Table 3-1 Glazing Protection Levels Based  on Fragment Impact Locations3-13
Table 3-2 Correlation of GSA Glazing Performance  Conditions and DoD Levels of 
Protection  for New Buildings3-14
Table 3-3 Safety/Security Recommendations3-32

Chapter 4
Table 4-1 DoD Minimum Antiterrorism (AT)  Standards for New Buildings4-6
Table 4-2 Correlation of DoD Level of Protection  to Incident Pressure4-6
Table 4-3 Damage Approximations4-13
Chapter 5
Table 5-1 Indicators of a Possible Chemical Incident5-13
Table 5-2 Indicators of a Possible Biological Incident5-15
Table 5-3 Indicators of a Possible Radiological Incident5-15
Chapter 6
Table 6-1 Pressures Exerted on a School Building  Face by Wind6-13
FIGURES
Chapter 1
Figure 1-1 The assessment process model1-2
Figure 1-2 Typical building design and  construction process1-19
Figure 1-3 Risk management choices1-19
Chapter 2
Figure 2-1  Non-redundant critical functions collocated near loading dock2-6
Figure 2-2  Clustering to enhance surveillance  opportunities while minimizing views 
into  buildings2-7
Figure 2-3  Blocking of sight lines2-13
Figure 2-4  Improper building siting and view relationships2-13
Figure 2-5  Clear zone with unobstructed views2-14
Figure 2-6  Concept of stand-off distance2-15
Figure 2-7  Exclusive and non-exclusive zones2-17
Figure 2-8  Sample bollard applications2-18
Chapter 3
Figure 3-1  Re-entrant corners in a floor plan3-3
Figure 3-2  Glazed areas oriented perpendicularly  away from streets3-4
Figure 3-3  Offset doors through the foyer3-5
Figure 3-4  Side view of a test structure illustrating  performance conditions of Table 
3-23-13
Figure 3-5  An unprotected window after a large  explosion3-15
Figure 3-6  Sacrificial roof3-18
Figure 3-7  Example of protecting outdoor air intakes3-20
Figure 3-8  Another example of protecting air intakes3-21
Figure 3-9  Example of elevated air intake3-21
Figure 3-10  Example of enclosing an existing  vulnerable air intake3-22
Figure 3-11  Considerations for the design of a new  security system3-28
Figure 3-12  Physical security devices3-29
Chapter 4
Figure 4-1  Blast pressure effects on a structure4-4
Figure 4-2  Explosives environments - blast range to effects4-8
Figure 4-3  Blast analysis of a high school for a  typical car bomb detonated in the  
school's parking lot4-9
Figure 4-4  Blast analysis of a high school for a  typical large truck bomb detonated in  
the school's parking lot4-9
Figure 4-5  Relationship of cost to stand-off distance4-10
Figure 4-6  Incident overpressure measured in pounds  per square inch, as a function 
of stand-off  distance and net explosive weight  (pounds-TNT)4-13
Chapter 5
Figure 5-1  Example of chemical dispersion5-3
Figure 5-2  Universal-fit escape hood5-7
Figure 5-3  An IMS chemical detector designed for  installation in HVAC systems5-10
Figure 5-4  Placards associated with chemical incidents5-14
Figure 5-5  Placards associated with biological incidents5-15
Figure 5-6  Placards associated with radiological incidents5-1





ASSET VALUE, THREAT/HAZARD, VULNERABILITY, AND RISK 1 
his chapter presents methodologies for architects, engi-
neers, school administrators, and state and local officials 
working in the building sciences field to identify the most 
effective mitigation measures to achieve a desired level of 
protection against terrorist attacks. These methodologies 
will help designers define asset value and evaluate 
vulnerability assessment information for the purpose of 
integrating threat/hazard into a design basis. Architects 
and engineers will be able to identify the best and most 
cost-effective terrorism mitigation measures for each 
building's unique security needs. Mitigation measures are 
conceived by the design professional and are best 
incorporated into the building architecture, building 
systems, and operational parameters, with consideration 
for life-cycle costs. The methodologies described in this 
chapter can be used for new buildings during the design 
process, as well as for existing buildings undergoing 
renovation. A key tool in the assessment process is 
provided for the designer in the last section of this 
chapter, the Building Vulnerability Assessment Checklist. 
In order to create a safe school environment, many factors 
must be considered. Figure 1-1 depicts the assessment 
process presented in this primer to help each school 
identify the best and most cost-effective terrorism 
mitigation measures for its own unique security needs. 
Section 1.1 identifies the value of a school's assets (e.g., 
people, buildings, equipment, and processes) that need to 
be protected, recognizing that students, faculty, and staff 
will always be a school's most vital asset requiring 
protection. Section 1.2 describes how to conduct a 
threat/hazard assessment to identify and define the threats 
and hazards that could cause harm to a school. Section 1.3 
discusses how to perform a vulnerability assessment to 
identify school weaknesses that might be exploited by a 
terrorist or aggressor. Combining the results of the asset 
value, threat, and vulnerability assessments in Sections 1.1 
through 1.3, the next step in the assessment process is to 
perform a risk assessment (Section 1.4) to determine to 
what degree a school's assets are vulnerable 
Figure 1-1 The assessment process model 
to attack. The final step of the process is presented in 
Section 1.5, where risk management decisions are 
discussed to prioritize and decide on the best and most 
cost-effective terrorism mitigation measures to implement 
to achieve the desired level of protection. 
A school assessment is best performed by engineering and 
security professionals who are experts in risk management, 
building design, blast effects, and chemical, biological, and 
radiological (CBR) attacks, as well as the latest 
antiterrorism (AT) security measures. If it is not feasible to 
hire professionals, members of the design community 
and/or school administrators can perform an assessment 
using the methodology presented in this primer. Some 
schools may choose to take a hybrid approach, hiring 
specialists or consultants to help perform individual 
portions of the assessment process. 
1.1 ASSET VALUE ASSESSMENT 
This section will describe how to perform an asset value 
assessment (the first step of the assessment process), to 
identify people and the asset value. To facilitate 
identifying people and the value of a school's assets, it is 
useful to conduct interviews of the people who are most 
familiar with them. Inputs from school administrators, 
teachers, nurses, custodial staff, cafeteria staff, and 
students, as well as any others who can help identify the 
most valuable assets should be sought. In order to 
conduct productive interviews, a list of areas to be covered 
should be generated and prioritized prior to the actual 
interviews. Thorough planning and research to generate 
relevant questions will aid the process and yield better 
results. 
An asset is a resource of value requiring protection.1 An asset can be tangible (e.g., 
students, faculty, staff, school buildings, facilities, equipment, activities, operations, 
and information) or intangible (e.g., processes or a school's reputation). In order to 
achieve the greatest risk reduction at the least cost, identifying and prioritizing a 
school's critical assets is a vital first step in the process to identify the best mitigation 
measures to improve its level of protection prior to a terrorist attack. Recognizing that 
people are a school's most critical asset, the process described below will help identify 
and prioritize school infrastructure where people are most at risk and require 
protection. 
Identifying a school's critical assets is accomplished in a two-step process: 
Step 1: Define and understand the school's core functions and processes 
Step 2: Identify school infrastructure 
. _	 Critical components/assets 
. _	 Critical information systems and data 
. _	 Life safety systems and safe haven areas 
. _	 Security systems 

1 Appendix B is a glossary of assessment and security terminology. Appendix C contains chemical and biological agent characteristics. 
1.1.1 Identifying School Core Functions 
The initial step of an asset value assessment is the determination of core functions and 
processes necessary for the school to continue to operate or provide services after an 
attack. The reason for identifying core functions/processes is to focus the design team 
and school administrators on what a school does, how it does it, and how various 
threats can affect the school. This provides more discussion and results in a better 
understanding of asset value. Factors that should be considered include: 
. _	 What are the school's primary services or outputs? 
. _	 What critical activities take place at the school? 
. _	 Who are the school's occupants or visitors? 
. _	 What inputs from external organizations are required for a school's 
success? 


1.1.2 Identifying School Infrastructure 
After the core functions and processes are identified, an evaluation of school 
infrastructure is the next step. To help identify and value rank infrastructure, the 
following should be considered, keeping in mind that the most vital asset for every 
school is its people: 
. _	 Identify how many people may be injured or killed during a terrorist 
attack that directly affects the infrastructure. 
. _	 Identify what happens to school functions, services, or student 
satisfaction if a specific asset is lost or degraded. (Can primary services continue?) 
. _	 Determine the impact on other organizational assets if the component 
is lost or can not function. 
. _	 Determine if critical or sensitive information is stored or handled at the 
school. 
. _	 Determine if backups exist for the school's assets. 
. _	 Determine the availability of replacements. 

. _	 Determine the potential for injuries or deaths from any catastrophic 
event at the school's assets. 
. _	 Identify any critical faculty, staff, or administration whose loss would 
degrade, or seriously complicate the safety of students, faculty, and staff during an 
emergency. [Consider first responders or the personnel responsible for shelter 
operations at a school that is a designated shelter for natural hazards.] 
. _	 Determine if the school's assets can be replaced and identify 
replacement costs if the school building is lost. 
. _	 Identify the locations of key equipment. 
. _	 Determine the locations of personnel work areas and systems within a 
school. 
. _	 Identify the locations of any personnel operating "outside" a school's 
controlled areas. 
 ._	 Determine, in detail, the physical locations of critical support architectures: 
. � Communications and information technology (IT - the flow of critical 
information) 
. � Utilities (e.g., facility power, water, air conditioning, etc.) 
. � Lines of communication that provide access to external resources and 
provide movement of students and faculty (e.g., road, rail, air transportation) 
. _	 Determine the location, availability, and readiness condition of 
emergency response assets, and the state of training of school staff in their use. 


1.1.3 Quantifying Asset Value 
After a list of a school's assets or resources of value requiring protection have been 
identified, they should be assigned a value. Asset value is the degree of debilitating 
impact that would be caused by the incapacity or destruction of the school's assets. 
There are many scales that can be used, each with advantages and disadvantages. 
Because some people are used to working with linguistic scales, although many 
engineers and designers prefer numerical systems, this publication will use a 
combination of a seven-level linguistic scale and a ten-point numerical scale as shown 
in Table 1-1. Obviously, the key asset for every school is its people (e.g., students, 
faculty, and staff). They will always be assigned the highest asset value as in the 
example below. 
Table 1-1: Asset Value Scale 

Asset Value 

Very High 

10 
High 

8-9 
Medium High 

7 
Medium 

5-6 
Medium Low 

4 
Low 

2-3 
Very Low 

1 

Very High - Loss or damage of the school's assets would have exceptionally grave 
consequences, such as extensive loss of life, widespread severe injuries, or total loss 
of primary services and core functions and processes. 
High - Loss or damage of the school's assets would have grave consequences, such as 
loss of life, severe injuries, loss of primary services, or major loss of core functions and 
processes for an extended period of time. 
Medium High - Loss or damage of the school's assets would have serious 
consequences, such as serious injuries, or impairment of core functions and processes 
for an extended period of time. 
Medium - Loss or damage of the school's assets would have moderate to serious 
consequences, such as injuries, or impairment of core functions and processes. 
Medium Low - Loss or damage of the school's assets would have moderate 
consequences, such as minor injuries, or minor impairment of core functions and 
processes. 
Low - Loss or damage of the school's assets would have minor consequences or 
impact, such as a slight impact on core functions and processes for a short period of 
time. 
Very Low - Loss or damage of the school's assets would have negligible consequences 
or impact. 
Asset Value Example. A nominal list of assets for a typical high school with assigned 
value is presented in Table 1-2. Please note that this is a nominal example; each school 
should tailor its list to its own unique situation. In Section 1.4, the results of the asset 
value assessment will be combined with the results of a threat assessment (Section 1.2) 
and a vulnerability assessment (Section 1. 3) to determine total risk.



1.2 THREAT/HAZARD ASSESSMENT 
After identifying asset value, the next step in the assessment process is to conduct a 
threat/hazard assessment wherein the threats or hazards are identified, defined, and 
quantified. Within the Department of Defense (DoD), intelligence community, and 
law enforcement, the term "threat" is typically used to describe the design criteria for 
terrorism or manmade disasters. Within the Federal Emergency Management Agency 
(FEMA) and other civil agencies, the term "hazard" is used in several different 
contexts. "Natural hazard" typically refers to a natural event such as an earthquake, a 
flood, or a wind disaster. "Manmade hazards" are "technological hazards" and 
"terrorism." These are distinct from natural hazards primarily in that they originate 
from human activity. Furthermore, "technological hazards" are generally assumed to 
be accidental, and their consequences are considered unintended. For the sake of 
simplicity, this primer will use the terms "threat" and "hazard" when referring to 
terrorism and manmade disasters, respectively. 
Table 1-2: Nominal High School Asset Value Assessment

For terrorism, the threat is from aggressors (those people with intent to do harm) that 
are known to exist, have the capability for hostile actions, and have expressed 
intentions for using hostile actions. They may seek publicity for their cause or political 
gain through their actions to injure or kill people, and destroy or damage facilities, 
property, equipment, or resources. 
Aggressor tools can be forced entry tools, vehicles, or surveillance (visual/audio). 
Their weapons can be incendiary devices; small arms (rifles and handguns); stand-off 
military-style weapons (rocket propelled grenades or mortars); explosive devices; and 
CBR agents. Their tactics run the gamut: moving vehicle bombs; stationary vehicle 
bombs; exterior attacks (thrown objects like rocks, Molotov cocktails, hand grenades, 
or hand-placed bombs); stand-off weapons attacks (small arms, military or improvised 
direct and indirect fire weapons); covert entries (gaining entry by false credentials or 
circumventing security with or without weapons); mail bombs (delivered to individuals 
or institutions); airborne contamination (CBR agents used to contaminate the air, 
water, or food supply to a school); and waterborne contamination (CBR agents 
injected into the water supply of a school facility). 
A threat assessment is a continual process of compiling and examining all available 
information concerning potential threats and manmade hazards. It can be broken 
down into two processes (1) defining threats and (2) identifying threat event profiles 
and tactics. 
1.2.1 Threat Identification 
The beginning point for security design is to define threats (hazards) and tactics that 
may be employed. From a physical attack viewpoint, schools maybe susceptible to 
attack by a number of different threats and tactics especially in areas of high risk. 
Schools are typically site constrained, have well defined traffic control and entry 
points, and operate on standard schedules. Designers and school administrators need 
to evaluate attack objectives, threat event profiles, and the effects or impact of the 
attack on the school and its occupants. It should also be noted that weapons and 
tactics change faster than the construction of schools. Table 1-3 provides a broad 
spectrum of manmade threats/hazards to consider and can be used as a tool in the 
threat assessment process. An extensive list of potential chemical and biological agents 
that can be used in terrorist attacks is provided in Appendix C. Blast range effects are 
indicated throughout Chapter 4. 
Table 1-3: Event Profiles for Terrorism and Technological Hazards* 

Table 1-3: Event Profiles for Terrorism and Technological Hazards* (continued)

Table 1-3: Event Profiles for Terrorism and Technological Hazards* (continued)

Table 1-3: Event Profiles for Terrorism and Technological Hazards* (continued)

*ADAPTED FROM: FEMA 386-7, INTEGRATING HUMAN-CAUSED HAZARDS INTO MITIGATION PLANNING, SEPTEMBER 2002.


1.2.2 Threat Definition 
A threat (hazard) is any indication, circumstance, or event with 
the potential to cause loss of, or damage to an asset. It is impor-
tant to understand who are the people with the intent to cause 
harm; or who, by process, materials, or proximity, can cause in-
direct harm to a school building. With the goal of reducing the 
potential risk of a school building, the design team and school 
administration should seek threat assessment information from 
local law enforcement, the local office of the Federal Bureau of 
Investigation (FBI), State Health Departments, the Department of 
Homeland Security (DHS), and the Homeland Security Offices 
(HSOs) at the state level. In many areas of the country, there are 
threat coordinating committees that facilitate the sharing of 
information. Local fire departments and hazardous materials 
(HazMat) units will frequently understand the threat of 
technological hazards due to hazardous materials on school 
grounds as well as those in surrounding industries that could 
cause a collateral threat to schools. In many jurisdictions, the 
HazMat unit is part of the fire department. 
After information on potential aggressors is gathered, it should be analyzed. A 
common method to evaluate terrorist threats uses five factors: existence, capability, 
history, intention, and targeting. 
Existence addresses the questions: Who is hostile to our school building or 
community of concern? Are they present or thought to be present? Are they able to 
enter the country or are they readily identifiable in a local community upon arrival? 
Capability addresses the questions: What weapons have been used in carrying out past 
attacks? Do the aggressors need to bring them into the area or are they available 
locally? 
History addresses the questions: What has the potential threat element done in the 
past and how many times? When was the most recent incident and where, and against 
what target? What tactics did they use? Are they supported by another group or 
individuals? How did they acquire their demonstrated capability? 
Intention addresses the questions: What does the potential threat element or 
aggressor hope to achieve? How do we know this (e.g., published in books or news 
accounts, speeches, letters to the editor, informant)? 
Targeting addresses the questions: Do we know if an aggressor (we may not know 
which specific one) is performing surveillance on our school, nearby facilities, or 
facilities that have much in common with our school? Is this information current and 
credible, and indicative of preparations for terrorist operations (manmade hazards)? 
The threat/hazard analysis for a school can range from a general threat/hazard 
scenario shared by all members of a community to a very detailed examination of 
specific groups, individuals, and tactics that must be repelled or defended against by 
means of school design. The Homeland Security Advisory System has five threat levels 
that provide a general indication of risk of terrorist attack. In Table 1-4, the five factors 
commonly used to evaluate terrorist threats have been layered onto the Homeland 
Security Advisory levels. It illustrates threat levels and provides a representation of the 
likelihood of a terrorist attack. If the anticipated threat or projected character/use of 
the facility warrant, a detailed threat analysis should be developed in coordination 
with local law enforcement, intelligence, and civil authorities in order to more 
quantitatively determine the vulnerability or risk. All schools should identify actions to 
be taken for each threat level. A table with specific recommendations for schools 
based on the Homeland Security Threat Advisory Level is presented in Chapter 3 
(Table 3-3). 
Table 1-4: Homeland Security Threat Conditions 
_ Factor must be present _	Factor may or may not be present 
Please note the DHS does not use these threat analysis factors to determine threat level. 
SOURCE: COMMONWEALTH OF KENTUCKY OFFICE OF HOMELAND SECURITY.


1.2.3 Threat Assessment Products 
A threat assessment is a continual process of compiling and examining all 
available information concerning potential threats and manmade 
hazards. The product of a threat assessment is a list of threats and hazards 
with a threat rating assigned. The threat rating is a subjective judgment 
based on existence, capability, history, intention, and targeting. Often, 
information is sketchy and analysts must rely more on thejudgment of 
experts, statistical probability, and occasionally assumptions to help 
quantify and qualify the threat (all assumptions should be documented). 
The same combination of linguistic scale and numerical scale used in the 
asset value assessment (Table 1-1) can be used for the threat assessment 
as presented in Table 1-5. Assessing terrorist threats is much more diffi-
cult than assessing the risk from natural hazards such as earthquakes, 
floods, and winds. Historical data form the basis of threat and locality 
indicates vulnerability to a great extent in regard to natural hazards. For 
terrorist threats, the likelihood of occurrence is less defined and the 
associated vulnerabilities have many considerations that impact making 
good risk management decisions. 
Table 1-5: Threat Rating Scale 

Threat Rating 

Very High 


10 
High 


8-9 
Medium High 


7 
Medium 


5-6 
Medium Low 


4 
Low 


2-3 
Very Low 


1 

Very High - Known aggressors or hazards, highly capable of causing loss of, or damage 
to the school exist. One or more vulnerabilities are present. The aggressors are known 
or highly suspected of having intent to exploit the school's assets and are known or 
highly suspected of performing surveillance on a facility. 
High - Known aggressors or hazards, capable of causing loss of, or damage to the 
school exist. One or more vulnerabilities are present and the aggressors are known 
or reasonably suspected of having intent to exploit the school's assets. 
Medium High - Known aggressors or hazards, capable of causing loss of, or damage to 
the school exist. One or more vulnerabilities are present and the aggressor is 
suspected of having intent to exploit the school's assets. 
Medium - Known aggressors or hazards that may be capable of causing loss of, or 
damage to the school exist. One or more vulnerabilities may be present; however, the 
aggressors are not believed to have intent to exploit the school's assets. 
Medium Low - Known aggressors or hazards that may be capable of causing loss of or 
damage to the school exist. Aggressors have no intent to exploit the school's assets. 
Low - Few or no aggressors or hazards exist. Their capability of causing damage to 
the school's assets is doubtful. 
Very Low - No aggressors or hazards exist. 
Threat Assessment Example. A nominal list of threats/hazards with assigned threat 
rating is presented in Table 1-6. Please note that this is a nominal example; each 
school should tailor its list to its own unique situation. 
Table 1-6: Nominal High School Threat Assessment 
Stationary vehicle bomb 
Low 
2 
Attack with small arms 
Medium Low 
4 
Hydrogen sulfide "stink bomb" 
Medium 
5 
Forced entry at night to damage school 
property 
Medium High 
7 
Electronic attack to destroy or alter school 
academic records 
Medium High 
7 


1.2.4 Design Basis Threat 
Traditionally, the building regulatory system has addressed natural disaster 
mitigation (hurricane, tornado, flood, earthquake, windstorm, and snow storm) 
through prescriptive building codes supported by well-established and accepted 
reference standards, regulations, inspection, and assessment techniques. Some man-
made risks (e.g., HazMat storage) and specific societal goals (energy conservation 
and life safety) have also been similarly addressed. However, the building regulation 
system has not yet fully addressed most manmade hazards or terrorist threats. 
Soon after September 11, 2001, the New York City Building Department initiated an 
effort to analyze the building code in relation to terrorist threats. The task force 
issued a report recommending code changes based on the attack on the World 
Trade Center. The National Fire Protection Association (NFPA) has a committee on 
premises security and security system installation standards. These advancements 
may some day result in the building regulatory system developing prescriptive 
building codes to mitigate security threats. 
In the absence of such regulations, identifying design basis threats (e.g., threat tactics, 
weapons, tools, or explosives against which a building must be protected) should be 
considered as part of a school's threat assessment to facilitate the work of designers 
during new construction or rehabilitation of an existing school building. The DoD, 
General Services Administration (GSA), and Department of State (DOS) all have 
established processes to identify design basis threats for their facilities. 
The typical building design and construction process is sequential, progressing from 
identifying building use and design goals through actual construction. This process is 
illustrated in Figure 1-2. 
Figure 1-2 Typical building design and construction process 
In every school design and renovation project, there are ultimately three choices of 
how to address the risk posed by terrorism: 
1. 1.	Do nothing and accept the risk 
2. 2.	Perform a risk assessment and manage the risk by installing reasonable 
mitigation measures to achieve a desired level of protection 
3. 3.	Harden the building against all threats to achieve the least amount of 
risk 

Figure 1-3 is a graphical representation of the three choices. Since September 11, 
2001, terrorism has become a dominant concern. Life, safety, and security issues 
should be a design goal from the beginning for all schools. 
Figure 1-3 Risk management choices



1.3 VULNERABILITY ASSESSMENT 
A vulnerability assessment evaluates vulnerability, or any weaknesses that can be 
exploited by an aggressor, of critical assets across a broad range of identified threats 
and provides a basis for determining mitigation measures for protection of people and 
critical assets. 
The Building Vulnerability Assessment Checklist provided in Appendix F is based on 
the checklist developed by the Department of Veterans Affairs (VA) and compiles 
many best practices based upon technologies and scientific research to consider 
during the design of a new building or an assessment of an existing school building. 
It allows a consistent security evaluation of designs at various levels. The checklist can 
be used as a screening tool for an initial vulnerability assessment or be used by 
subject matter experts for a comprehensive vulnerability assessment of existing 
school buildings. 
The assessment of any vulnerability of a school building should be done within the 
context of the defined threats and the value of the school's assets. That is, each 
element of the school building should be analyzed for vulnerabilities to each threat 
and a vulnerability rating should be assigned. The same combination of linguistic scale 
and numerical scale used in the asset value and threat assessments (Tables 1-1 and 1-
5) can also be used for the vulnerability assessment as presented in Table 1-7. It should 
be noted that a vulnerability assessment may change the value rating of assets due to 
the identification of critical nodes or some other factor that makes the school's assets 
more valuable. 
Table 1-7: Vulnerability Rating Scale


Vulnerability Rating 

Very High 


10 
High 


8-9 
Medium High 


7 
Medium 


5-6 
Medium Low 


4 
Low 


2-3 
Very Low 


1 

Very High - One or more major weaknesses have been identified
that make the school's assets extremely susceptible to an aggressor
or hazard.

High- One or more significant weaknesses have been identified that

make the school's assets highly susceptible to an aggressor or hazard.
Medium High - An important weakness has been identified that
makes the school's assets very susceptible to an aggressor or hazard.

Medium - A weakness has been identified that makes the school's

assets fairly susceptible to an aggressor or hazard.
Medium Low - A weakness has been identified that makes the
school's assets somewhat susceptible to an aggressor or hazard.

Low - A minor weakness has been identified that slightly increases
the susceptibility of the school's assets to an aggressor or hazard.
Very Low - No weaknesses exist.

Vulnerability Assessment Example. To create the vulnerability
assessment of a school, a site vulnerability assessment should be
performed using the checklist in Appendix F. The results of the
vulnerability assessment are then analyzed in conjunction with the
results of the asset value and threat assessments developed earlier.
Each asset/threat pair is then assigned a vulnerability rating as
shown in Table 1-8 and forms the basis for identifying measures
to mitigate threat vulnerability and improve protection of the
building and its occupants. Please note that this is a nominal example; each school 
should tailor its list to its own unique situation.

Table 1-8: Nominal High School Vulnerability Assessment

VH = Very High; H = High; MH = Medium High; M = Medium; ML = Medium Low; L = Low; VL 
= Very Low


1.4 RISK ASSESSMENT 
Risk is the potential for a loss of or damage to an asset. It is measured based upon the 
value of the asset in relation to the threats and vulnerabilities associated with it. Risk 
is based on the likelihood or probability of the hazard occurring and the conse-
quences of the occurrence. A risk assessment analyzes the threat (probability of 
occurrence), and asset value and vulnerabilities (consequences of the occurrence) to 
ascertain the level of risk for each asset against each applicable threat/hazard. Thus, 
a very high likelihood of occurrence with very small consequences may require 
simple, low cost mitigation measures, but a very low likelihood of occurence with very 
grave consequences may require more costly and complex mitigation measures. The 
risk assessment provides engineers, architects, and school administrators with a 
relative risk profile that defines which assets are at the greatest risk against specific 
threats. Chapters 2 and 3 explore mitigation measures to reduce the vulnerability 
and risk for valuable assets with a high risk. 
There are numerous methodologies and techniques for conducting a risk assessment. 
One approach is to assemble the results of the asset value assessment, threat 
assessment, and vulnerability assessment, and determine a numeric value of risk for 
each asset and threat/hazard pair in accordance with the following formula: 
Risk = Asset Value x Threat Rating x Vulnerability Rating 
The completed matrix provides a quantitative value for risk that can be converted into 
a linguistic value as shown in Table 1-9. The following rating system can be used for 
assessing the risk of schools. 
Table 1-9: Risk Rating System

Very High - The potential for loss or damage of the school's assets is so great as to 
expect exceptionally grave consequences, such as extensive loss of life, widespread 
severe injuries, or total loss of primary services, and core functions and processes. 
High - The potential for loss or damage of the school's assets is so great as to expect 
grave consequences, such as loss of life, severe injuries, loss of primary services, or 
major loss of core functions and processes for an extended period of time. 
Medium High - The potential for loss or damage of the school's assets is such as to 
expect serious consequences (e.g., as serious injuries, or impairment of core 
functions and processes for an extended period of time). 
Medium - The potential for loss or damage of the school's assets is such as to expect 
serious consequences (e.g., injuries, or impairment of core functions and processes). 
Medium Low - The potential for loss or damage of the school's assets is such as to 
expect only moderate consequences (e.g., minor injuries, or minor impairment of 
core functions and processes). 
Low - The potential for loss or damage of the school's assets is such as to expect only 
minor consequences or impact (e.g., a slight impact on core functions and processes 
for a short period of time). 
Very Low - The potential for loss or damage of the school's assets is so low that there 
would only be negligible consequences or impact. 
Because of the large amount of information in a risk assessment matrix, it is useful to 
assign a color code (red, yellow, or green) based on the total numeric value of risk 
determined based on the scale in Table 1-10. 
Table 1-10: Risk Color Value System 
As a minimum, mitigation measures to reduce risk and create an acceptable level of 
protection should be considered for those critical assets determined to be at highest 
risk. 
Risk Assessment Example. A nominal risk assessment is presented in Table 1-11 based 
on the asset value, threat, and vulnerability assessment examples presented earlier. As 
mentioned previously, each school should tailor its list to its own unique situation. 
Table 1-11: Nominal High School Risk Assessment Matrix

Table 1-11: Nominal High School Risk Assessment Matrix (continued)

Table 1-11: Nominal High School Risk Assessment Matrix (continued)


1.5 THE RISK MANAGEMENT PROCESS 
Risk management is the process of selecting and implementing mitigation measures 
to achieve an acceptable level of risk at an acceptable cost. Because it is cost-
prohibitive to protect against the entire range of possible threats, it is important to 
develop a realistic prioritization of mitigation measures. When considering mitigation 
measures, the following factors should be considered: 
. _	 Results of the risk assessment, including asset value and asset 
vulnerabilities 
. _	 Costs of the mitigation measures 

. _	 The value of risk reduction to the school 
. _	 Frequency with which the benefits of the mitigation measures will be 
realized 
. _	 The deterrence or preventive value of the mitigation measures 
. _	 The expected lifespan of the mitigation measures and the time value of 
money 

To evaluate prospective mitigation measures, the design team should first calculate 
new values of risk based on how the installation or use of mitigation measures would 
change vulnerability and/or asset values. Some mitigation measures will affect mul-
tiple asset/threat risk values. After the amount of risk reduction each mitigation 
measure will produce has been calculated, the cost of each mitigation measure 
should be estimated using resources such as R.S. Means Construction Cost Data. The 
final step is to perform a benefit/cost analysis to determine which mitigation 
measures will produce the greatest reduction of risk at an acceptable cost. 
When dealing with manmade hazards and terrorism, it is much more difficult to 
predict how often an event will occur and the deterrent value of mitigation measures. 
Although there are historical data to help predict how often natural hazards such as 
floods or tornadoes occur in various regions, the probability or frequency of manmade 
hazards/threats is not known. Therefore, subjective approaches for frequency must be 
combined with quantitative estimates of cost-effectiveness. 
Additionally, the deterrent or preventive value of a mitigation measure is also difficult 
to quantify. Deterrence, in the case of terrorism, may also have a secondary impact in 
that, once a school is "hardened," a terrorist may turn to a less protected building, 
changing the likelihood of an attack for both targets. For example, the Murrah 
Federal Building in Oklahoma City became the target of an aggressor when he was 
deterred from attacking his primary target, the FBI building, because it was too 
difficult to get the attack vehicle close to the target. He was able to park immediately 
adjacent to the Murrah Federal Building and successfully target the Bureau of 
Alcohol, Tobacco, and Firearms (ATF). 
All these factors should be considered when calculating the value of mitigation 
measures, and weighing their value against their cost. Ideally, sufficient resources 
would be available to achieve a desired level of protection against design basis threats 
through mitigation measures. This is not always the case, so it is also important that 
every school identify or designate an appropriate authority that is authorized to accept 
risk on behalf of the school. Sometimes when decisions are left up to committees or 
personnel at an inappropriate level, poor choices or decisions can be made. 
It is also essential to maintain analytic integrity and objectivity during the assessment 
process in order to achieve an honest and unbiased risk assessment. Legitimate 
differences of professional opinion may occur; therefore, it is also important that the 
process be transparent and repeatable. For example, there could be an honest 
disagreement about the threat rating assigned to an "electronic attack to destroy 
school records." An open and repeatable methodology facilitates healthy debate to 
help the risk acceptance authority, who is ultimately responsible, make informed 
decisions. 
In sum, the risk management process is a benefit/cost analysis to decide and prioritize 
which mitigation measures to implement to achieve the desired level of protection 
with available resources. This is accomplished by repeating risk assessment 
calculations adjusting for how mitigation measures change a school's asset values and 
vulnerabilities. As pointed out earlier, mitigation measures may also change how an 
aggressor views a school, thus changing the threat assessment as well.



SITE AND LAYOUT DESIGN GUIDANCE     

his chapter discusses comprehensive architectural and engineering design 
considerations (mitigation measures) for the school site, from the property line to the 
school building, including: land use, site planning, stand-off distance, controlled 
access zones, entry control and vehicular access, signage, parking, loading docks and 
service access, physical security lighting, and site utilities. The intent of this guidance is 
to provide concepts for integrating mitigation strategies to the design basis threats as 
identified during the risk assessment. Integrating security requirements into a larger, 
more comprehensive approach necessitates achieving a balance among many 
objectives such as reducing risk; facilitating proper school building function; aesthetics 
and matching architecture; creating a school environment conducive to learning; and 
hardening of physical structures beyond required building codes and standards for 
added security. 
The design community must work closely with school districts and school 
administrators to ensure that the optimal balance of all these considerations is 
achieved; thus, coordination within the design team is critical. Many school asset 
protection objectives can be achieved during the early stages of the design process 
when mitigation measures are the least costly and most easily implemented. Planners, 
architects, and landscape designers play an important role in identifying and 
implementing crucial asset protection measures while considering land use; site 
selection; the orientation of buildings on the site; and the integration of vehicle 
access, control points, physical barriers, landscaping, parking, and protection of 
utilities to mitigate threats. 
It is important to remember that the nature of any threat is always changing. Although 
indications of potential future threats may be scarce during the design stage, 
consideration should be given to accommodating enhanced protection measures in 
response to future threats that may emerge. School protection objectives must be 
balanced with other design objectives, such as the efficient use of land and resources, 
and must also take into account existing physical, programmatic, and fiscal constraints. 
2.1 LAND USE CONSIDERATIONS 
Land use is a broad planning process that encompasses zoning ordinances, subdivision 
regulations, and master planning. Regulating land use development has been a 
common practice in the United States for many years, with numerous regulations and 
other tools in use by state and local governments to influence the configuration of 
urban sites. Comprehensive planning can encourage certain types of development, 
incentives, allocation of resources, and capital improvement programs oriented to 
improve the security of areas vulnerable to manmade disasters. In most cases, sound 
site planning will increase the land area needed for individual school buildings and 
maximize the protection measures to be adopted. Other potential terrorist targets in 
the surrounding area should also be considered. Students and teachers might be 
killed or injured by collateral damage from a terrorist attack directed at another 
nearby facility. When designing a school, the designer should consider external and 
internal land use design concerns, including the characteristics of the surrounding 
area (e.g., construction type, occupancies, and the nature and intensity of adjacent 
activities), as well as the implications of these characteristics for the protection of the 
students, faculty, and staff on the school site under consideration. The amount of land 
available on the site for stand-off and the inherent ability of the school site to 
accommodate the implementation of natural and manmade antiterrorism and 
security design features could help the designers to determine if other measures such 
as hardening the school building should also be considered. 
It is important to recognize that conflicts sometimes arise between security-oriented 
site design and conventional site design. For example, open circulation and common 
spaces (which are desirable for conventional design) may be detrimental to certain 
aspects of security. 
When designing new school buildings or evaluating existing schools, the designer 
should evaluate key protection measures to ensure they are appropriate, desirable, 
and cost-effective in terms of mitigating the risk of potential terrorist attacks. Security 
measures must be evaluated carefully to understand which measures are truly 
beneficial and which are not practical. 
When making decisions about site antiterrorism and security, designers should 
consider the following: 
. _	 Adjacent land use and zoning plans for potential development that 
would impact security within the school (assess by using land use maps and 
Geographic Information Systems [GISs]) 
. _	 Building footprint(s) relative to total land available 
. _	 Building location(s) or, if undeveloped, suitable building location(s) 
relative to the site perimeter and adjacent land uses; distance between the perimeter 
fence and improved areas off site 
. _	 Access via foot, road, rail, water, and air; suitability to support a secure 
perimeter 
. _	 Current and planned infrastructure and its vulnerabilities, including 
easements, tunnels, pipes, and rights-of-way 
. _	 Infrastructure nodes that constitute single-point vulnerabilities 
. _	 Adjacent land uses and occupancies that could enable or facilitate 
attacks or that are potential targets themselves and thus present collateral damage or 
cascading failure hazards 
. _	 Proximity to fire and police stations, hospitals, shelters, and other 
critical facilities that could be of use in an attack 
. _	 Presence of natural physical barriers such as water features, dense 
vegetation, and terrain that could provide access control and/or shielding, or 
suitability of the site for the incorporation of such features 
. _	 Topographic and climatic characteristics that could affect the 
performance of chemical agents and other weapons 

_	 Observability from outside site boundaries; ability of vegetation in proximity to 
building or site to screen covert activity


2.2 SITE PLANNING 
The single most important goal in planning a site to resist terrorism and security 
threats is the protection of life, property, and operations. Decision-making in support 
of this purpose should be based first and foremost on a comprehensive assessment of 
the manmade threats and hazards so that planning and design countermeasures are 
appropriate and effective in the reduction of vulnerability and risk as described in 
Chapter 1. It is important to recognize that a given countermeasure can mitigate one 
or more vulnerabilities, but may be detrimental to other important design goals. This 
section will highlight several aspects of site design and will present some of the unique 
characteristics arising from their application to antiterrorism and security. 
2.2.1 Site Design 
Because the economics of development dictate the construction of schools, security 
concerns should be evaluated carefully. Conflicts sometimes arise between security 
site design and conventional site design. For example, open circulation and common 
spaces, which are desirable for conventional school design, are often undesirable for 
security design. To maximize safety, security, and sustainability, designers should 
implement a holistic approach to site design that integrates form and function to 
achieve a balance among the various design elements and objectives. Even if resources 
are limited, significant value can be added to a project by integrating security 
considerations into the more traditional design tasks in such a way that they 
complement, rather than compete with, the other elements.


2.2.2 Layout and Form 
The overall layout of a school site (e.g., the placement and form of its buildings, 
infrastructures, and amenities) is the starting point for development. Choices made 
during this stage of the design process will steer decision-making for the other 
elements of the site. A number of aspects of site layout and building type present 
security considerations and are discussed below. 
_	 Clustered versus dispersed functions. There is a strong correlation between 
building functions and building layout and forms. Typically, the former dictates 
the other two. Depending on the site characteristics, the occupancy requirements, 
and other factors, school buildings may cluster key functions in one particular 
area or have these functions designed in a more dispersed manner. Both patterns 
have compelling strengths and weaknesses in terms of security. 
Concentrating key functions in one place may create a target-rich environment 
and increase the risk of collateral impacts. Additionally, it increases the potential 
for the establishment of more single-point vulnerabilities, such as indicated in 
Figure 2-1. This figure shows several key functions grouped in a particular area of 
the building (i.e., the mechanical rooms, stairs, telephone switch room, and 
loading docks). If these areas become a target, the school may be closed for a 
substantial period of time, even if the attack is not severe and the rest of the 
school remains unharmed. However, grouping high-risk activities, concentrations 
of personnel, and critical functions into a cluster can help maximize stand-off 
from the perimeter and create a "defensible space." This also helps to reduce the 
number of access and surveillance points, and minimize the size of the perimeter 
needed to protect the school areas. 
In contrast, the dispersal of key functions reduces the risk 
that an attack on any one part of the site will impact the other 
parts. However, this could also have an isolating effect and 
reduce the effectiveness of on-site surveillance, increase the 
complexity of security systems and emergency response, and 
create a less defensible space. 
To the extent that site, economic, and other factors allow, the designer should 
consolidate school designs that are functionally 
Figure 2-1 Non-redundant critical functions collocated near loading dock 
compatible and have similar threat levels. For example, 
visitor areas and receiving/loading areas constitute a 
school's innermost line of defense, because they are 
the first places where people and materials enter the 
school building. Logically, they should be physically 
separated from other key functions such as the main 
operational areas or where people concentrate. 
. _	 School building orientation. The orientation of a school building can 
have significant impact on its performance, not only in terms of energy efficiency, but 
also the ability to protect occupants (see Figure 2-2). A school building's orientation 
relative to its surroundings defines its relationship to that area. In aesthetic terms, a 
school building can open up to the area or turn its back; it can be inviting to those 
outside, or it can "hunker down" defensively. The physical positioning of a building 
relative to its surroundings may seem more subtle, but can be a greater determinant of 
this intangible quality than exterior aesthetics. Nevertheless, the proximity of a 
vulnerable 
. _	 Open space. The incorporation of open space into school site design 
presents a number of benefits. First and foremost is the ability to easily monitor an 
area and detect intruders, vehicles, and weapons. Closely related to this benefit is the 
stand-off value of open space; as discussed in Chapter 4, blast energy decreases as the 
inverse of the cube of the distance from the seat of the explosion, so every additional 
increment of distance provides increasingly more protection. In addition, pervious 
open space allows stormwater to percolate back into the ground, reducing the need 
for culverts, drainage pipes, manholes, and other covert site access and weapon 
concealment opportunities. Also, if the open space is impassible for vehicles (as in the 
case of a wetland or densely vegetated area), it can provide not only environmental 
and aesthetic amenities, but prevent vehicle intrusion as well. 
. _	 Infrastructure and lifelines. Providing power, gas, water, wastewater, 
and communications services is one of the most basic requirements of any school 
development. At the site scale, all critical lifelines should have at least one layer of 
redundancy, or backup. By eliminating single-point vulnerabilities, designers will 
reduce the chance that service will be interrupted if an attack damages or destroys a 
lifeline either outside the school perimeter or on site. It is important to note that 
collocating a backup lifeline with its primary lifeline does not eliminate single-point 
vulnerability; only physical separation can substantially increase the likelihood of 
continuity of service. 

Additionally, all controls, interconnections, exposed lines, and other vulnerable 
elements of school infrastructure systems should be protected from access and 
exploitation by surveillance and/or physical countermeasures. Service entrances 
and other secondary access points should be monitored and access-controlled; 
special attention should also be paid to any locations where multiple systems or 
primary and backup systems come together, such as control rooms and 
mechanical spaces. Again, these facilities should be designed for maximum 
observability, including the use of opportunity reduction and target hardening 
strategies where appropriate, and should be equipped with adequate lighting and 
emergency communications capabilities wherever possible. For additional 
information, see Sections 2.9 and 2.10.


2.2.3 Vehicular and Pedestrian Circulation 
The movement of people and materials into, through, and out of a school facility is 
determined by the design of its access, circulation, and parking systems. Such systems 
should be designed to maximize efficiency while minimizing conflicts between vehicle 
and pedestrian modes. Designers should begin with an understanding of the school's 
transportation requirements based on an analysis of how the school will be used. This 
includes studying the number and types of access points that are required, bus 
requirements, the parking volume needed, where users need to go to and from, and 
the modes of transportation they will use. Several aspects of transportation planning 
can impact security and are discussed below. 
_	 Roadway network design. Streets are generally designed to minimize travel time 
and maximize safety, with the end result typically being a straight path between two 
or more endpoints. Although a straight line may be the most efficient course, 
designers should use caution when orienting streets relative to school buildings 
requiring high protection. Designers should design a roadway system to minimize 
vehicle velocity, thus using the roadway itself as a protective measure. This is 
accomplished through the use of several strategies. 
First, straight-line or perpendicular approaches to school buildings should not be 
used in a school at high risk, because these give vehicles the opportunity to gather 
the speed necessary to ram through protective barriers and crash into or 
penetrate buildings. Instead, approaches should be parallel to the fa�ade, with 
berms, high curbs, appropriate trees, or other measures used to prevent vehicles 
from departing the roadway. A related technique for reducing vehicle speeds is 
the construction of serpentine (curving) roadways with tight-radius corners. 
Existing streets can be retrofitted with barriers, bollards, swing gates, or other 
measures to force vehicles to travel in a serpentine path. Again, high curbs and 
other measures should be installed to keep vehicles from departing the roadway in 
an effort to avoid these countermeasures. 
Less radical than these techniques are traffic calming strategies, which seek to use 
design measures to cue drivers as to the acceptable speed for an area. These 
include raised crosswalks, speed humps and speed tables, pavement treatments, 
bulbouts, and traffic circles. In addition to creating a more pedestrian-friendly 
environment, which increases "eyes on the street" surveillance, designing 
roadways to physically limit speeds can have the added benefits of increasing 
safety and, subsequently, lowering liability. Designers should be aware, however, 
that many of these techniques can have detrimental effects for emergency 
response, including slowing response time, interfering with en route emergency 
medical treatment, and increasing the difficulty of maneuvering fire apparatus. 
They also may present problems for snow removal, and their outer ends should 
remain flat so that bicycles can proceed unimpeded. 
_	 Parking. Surface lots can be designed and placed to keep vehicles away from 
school buildings, but they can consume large amounts of land and, if constructed 
of impervious materials, can contribute greatly to stormwater runoff. They can also 
be hazardous for pedestrians if dedicated pedestrian pathways are not provided. 
For additional information, see Section 2.7.


2.2.4 Landscape and Urban Design 
Designing to meet user needs while maintaining stewardship of the natural and built 
environments becomes increasingly more challenging when security requirements 
are factored in. Design principles at the school site should include an emphasis on 
selection of low-impact development techniques and environmental stewardship; 
compatibility of context and relationship with adjacent uses, forms, and styles; 
establishment of scale and identity through aesthetic design; connectivity among 
buildings, uses, activities, and transportation modes; resource conservation; cultural 
responsiveness; and the creation of appealing public spaces. These objectives are 
generally achieved through the work of two closely related disciplines, landscape 
design and urban design. For the purposes of this document, these two disciplines 
are virtually overlapping and will, therefore, be addressed together. 
_	 Landscape design. Many landscape features can be used in school design to 
enhance security. Landscape design features should be used to create the level of 
protection without turning the school into a fortress. Elements such as landforms, 
water features, and vegetation are among the building blocks of attractive and 
welcoming spaces, and they can also be powerful tools for enhancing security. 
These features can be used not only to define or designate a space, but also to 
deter or prevent hostile surveillance or unauthorized access. Vegetative groupings 
and landforms can even provide some level of blast shielding. Stands of trees, 
earthen berms, and similar countermeasures generally cannot replace setbacks, 
but they can offer supplementary protection. However, landscaping can also have 
detrimental impacts for safety and security, and designers should consider the 
unique requirements of the school project to ensure that the landscape design 
elements they choose will be appropriate and effective. 
With careful selection, placement, and maintenance, landscape elements can 
provide visual screening that protects school gathering areas and other activities 
from surveillance without creating concealment for covert activity. However, 
dense vegetation in close proximity to a school building can screen illicit activity 
and should be avoided. Additionally, thick ground cover such as English ivy or 
vegetation over 4 inches tall such as monkey grass can be used to conceal bombs 
and other weapons; in setback clear zones, vegetation should be selected and 
maintained with eliminating concealment opportunities in mind. Similarly, 
measures to screen visually detractive components such as transformers, trash 
compactors, and condensing units should be designed to minimize concealment 
opportunities for people and weapons. 
_	 Urban design. Numerous urban design elements present opportunities to provide 
school security. The scale of the streetscape should be appropriate to its primary 
users, and it can be manipulated to increase the comfort level of desired users 
while creating a less inviting atmosphere for users with malicious intent. However, 
even at the pedestrian scale, certain operational requirements must be 
accommodated. For example, although efficient pedestrian and vehicle circulation 
systems are important for school functions and operations, they are also critical for 
emergency response, evacuation, and egress, and must be able to accommodate 
vehicles up to the largest fire apparatus in the community. Furthermore, despite an 
emphasis on downsizing the scale of the streetscape, it is critical to maintain the 
maximum stand-off distance possible between vehicles and structures. 
At the school perimeter, walls and fences used for space 
definition may be hardened to resist the impact of a weapon-
laden truck; however, planters, bollards, or decorative 
boulders could accomplish the same objective in a much more 
aesthetically pleasing manner. Such an approach also creates 
permeability, which would allow pedestrians and cyclists to 
more easily move through the space. 
Landscape and urban design inherently define the "lines of 
sight" in a space. These techniques seek to deny aggressors a 
"line of sight" to a potential target, either from on or off site. This 
increases the protection of sensitive information and operations 
by using stand-off weapons (see Figures 2-3 and 2-4). In addition 
to the use of various types of screening options, anti-surveillance 
measures (e.g., using building orientation, landscaping, 
screening, and landforms) to block sight lines can also be used. 
Depending on the circumstances, landforms can be either beneficial or detrimental 
to anti-surveillance. Elevated sites may enhance surveillance of the surrounding area 
from inside the facility, but may also allow observation of on-site areas by adversaries. 
School buildings should not be sited immediately adjacent 
Figure 2-5 Clear zone with unobstructed views



2.3 STAND-OFF DISTANCE 
The most cost-effective solution for mitigating explosive effects on school 
buildings is to keep explosives as far away from them as possible. The 
distance between an asset and a threat is referred to as the stand-off 
distance as shown in Figure 2-6. There is no ideal stand-off distance; it is 
determined by the type of threat, the type of construction, and desired 
level of protection. The easiest and least costly opportunity for achieving 
appropriate levels of protection against terrorist threats is to incorporate 
sufficient stand-off distance into school designs. Maximizing stand-off 
distance also ensures that there is opportunity in the future to upgrade 
school buildings to meet increased threats or to accommodate higher 
levels of protection. Stand-off distance must be coupled with appropriate 
building hardening as discussed in Chapter 3, to provide the necessary 
level of protection to the school. 
Figure 2-6 Concept of stand-off distance 
For schools located in high-risk areas, additional considerations follow: 
. _	 The first mode of site protection is to create "keep out zones" that can 
ensure a minimum guaranteed distance between an explosion (i.e., from a vehicle) 
and the school structure. 
. _	 The perimeter line is the outermost line that can be protected by the 
security measures incorporated during the school design process. It is recommended 
that the perimeter line be located as far as is practical from the building exterior. 
Many vulnerable school buildings are located in urban areas where only the exterior 
wall of the building stands between the outside world and the building occupants. In 
this case, the options are obviously limited. Often, the perimeter line can be pushed 
out to the edge of the sidewalk by means of bollards, planters, and other obstacles. To 
push this line even further outward, restricting or eliminating parking along the curb 
often can be arranged with local authorities. In some extreme cases, elimination of 
loading zones and the closure of streets are an option. 

. _	 "Keep out zones" can be achieved with perimeter barriers that cannot 
be compromised by vehicular ramming. A continuous line of security should be 
installed along the perimeter of the site to protect it from unscreened vehicles and to 
keep all vehicles as far away from the school as possible. 
. _	 The following critical building components should be located away 
from main entrances, vehicle circulation, parking, and maintenance areas. If this is 
not possible, harden as appropriate: 

�	 Emergency generator, including fuel systems, day tank, fire sprinkler, and water 
supply 
. � Normal fuel storage 
. � Telephone distribution and main switchgear 
. � Fire pumps 
. � Building control centers 
. � Uninterrupted power supply (UPS) systems controlling critical functions 
. � Main refrigeration systems if critical to building operation 
. � Elevator machinery and controls 
. � Shafts for stairs, elevators, and utilities 
. � Critical distribution feeders for emergency power 


2.4 CONTROLLED ACCESS ZONES 
For a school at high risk, one method to attain the appropriate protection is with the 
creation of a controlled access zone. These zones define minimum distances between 
a school building and potential threats through the installation of barriers (such as 
bollards, planters, fountains, walls, and fences). The barriers are designed to withstand 
assaults by terrorist vehicles; however, their placement must be designed to allow for 
access by fire and rescue vehicles in the event of an emergency. Selection of barriers is 
based on operational considerations related to vehicle access and parking. Good 
design principles for high-risk schools endorse the complete surround of a school 
building with a stand-off zone that has perimeters set at distances that consider threat 
levels, desired level of protection, building construction, and land availability. Entry 
into the controlled area should only be through an entry control point. 
When designing schools at high risk, controlled access zones may be exclusive or non-
exclusive, as shown in Figure 2-7. An exclusive zone is the area surrounding a school 
building within the exclusive control of the building. Anyone entering an exclusive 
zone must have a purpose related to the building. A non-exclusive zone is either a 
public right-of-way or a particular area related to the main school building. 
The following are some security considerations applicable to controlled access zones 
and enforcement: 
. _	 Design and select barriers based on threat capabilities. 
. _	 If the limited availability of land precludes the creation of an exclusive 
zone, the use of screening surrounding the school building is an alternative. 
. _	 Design and locate security devices to establish consistent rhythm 
patterns within the site. Incorporate subtle and aesthetically pleasing security 
measures to reach the desired level of protection. 
. _	 Locate security measures so that they do not impede the free access to 
school public entrances or internal pedestrian flow. Miscellaneous decorative 
elements (e.g., flag poles, fountains, pools, gardens, and similar features) may be 
located within access ways to slow movement or restrict access. 
. _	 Use a combination of barriers. Some barriers are fixed and obvious 
(fences and gates), while others are passive (sidewalks far away from buildings, curbs 
with grassy areas, etc.). See Figure 2-8. 

Figure 2-8 Sample bollard applications 
. _	 Consider using landscape materials to create barriers that are soft and 
natural rather than manmade where physical barriers are required. 
. _	 Use vehicles as temporary physical barriers by placing them in front of 
buildings or across access roads. 
 ._	 Maintain as much stand-off distance as possible between potential vehicular 
bombs and the school building. 
. � Provide traffic obstacles near entry control points to slow down traffic. 
. � Consider vehicle barriers at building entries and drives. 
. � Offset vehicle entrances from the direction of a vehicle's approach to force a 
reduction in speed. 
. � Position gates and perimeter boundary fences outside the blast vulnerability 
envelope, when possible. 
. � Provide a vehicle crash resistance system in the form of a low wall or earth 
berm, if the threat level warrants it. 
. _	 Design entry control points (if provided) to screen the building from 
vehicles entering it. 
 ._	 Provide passive vehicle barriers to keep stationary vehicle bombs at a distance 
from the school building. 
. � Use high curbs, low berms, shallow ditches, trees, shrubs, and other physical 
separations to keep stationary bombs at a distance. 
. � Do not allow vehicles to park next to perimeter walls of the secured area. 
Consider using bollards or other devices to keep vehicles away. 
. _	 Provide adequate lighting to aid in threat detection in controlled 
access zones. 
. _	 Use CCTV to control entry points, the site perimeter, and exclusive and 
non-exclusive zones. 


2.5 	ENTRY CONTROL AND VEHICULAR ACCESS 
In the case of a school, the objective of the design professional is to save lives by 
mitigating building damages and reducing the chances of a catastrophic collapse of 
the building at least until it is fully evacuated. Although there are many forms of 
attacks against a school, from the standpoint of school structural design, the vehicle 
bomb governs design because historically it has been used on multiple occasions by 
terrorists. Where a school perimeter barrier is required for security, it will be necessary 
to provide points of access through the perimeter for school users (i.e., students, 
faculty, staff, visitors, and service providers). An entry control point or guard building 
serves as the designated point of entry for site access. It provides a point for 
implementation of desired/required levels of screening and access control. The 
objective of the entry control point is to prevent unauthorized access to school 
grounds while maximizing the rate of authorized access by foot or vehicle. These 
measures will not be required for all schools; they may only be appropriate for schools 
considered at high risk. Designs should be flexible to allow implementation of 
increased security controls when schools are placed in high alert and easing of 
controls at lower threat levels. For a school considered to be at high risk, the following 
should be considered in the design of entry control points: 
. _	 Design entry roads to schools so that they do not provide direct or 
straight-line vehicular access to the main building. Route major corridors away from 
key school areas and functions. 
. _	 Design access points at an angle to oncoming streets so that is difficult 
for a vehicle to gain enough speed to break through them. 
. _	 Minimize the number of access roads and entrances into a school. 
. _	 Provide a drop-off/pick-up lane for buses only. 

. _	 Minimize the number of driveways or parking lots that students will 
have to walk across to get to the school building. 
. _	 Designate an entry to the school for commercial, service, and delivery 
vehicles, preferably away from key school areas and functions, whenever possible. 
. _	 Design the entry control point and guard building so that the 
authorization of approaching vehicles and occupants can be adequately assessed, and 
the safety of both gate guards and approaching vehicles can be maintained when a 
school is placed at high alert). 
. _	 Design (if they are required) traffic calming strategies and barriers 
(road alignment, retractable bollards, swing gates, or speed bumps) to control vehicle 
speed and slow incoming vehicles before they reach the gate so that entry control 
personnel have adequate time to respond to unauthorized activities. 
. _	 Provide inspection areas that are not visible to the public. Place 
appropriate landscape plantings to accomplish screening. 
. _	 Provide pull-over lanes at site entry gates to check suspect vehicles. 
Also, provide a visitor/site personnel inspection area to inspect vehicles prior to 
allowing access to the school site. 
. _	 Consider providing a walkway and turnstile for pedestrians and a 
dedicated bicycle lane. 


2.6 SIGNAGE 
Signs are an important element of school security. They are meant to keep intruders 
out of restricted areas. Confusion over site circulation, parking, and entrance locations 
can contribute to a loss of site security. Signs should be provided off site and at school 
entrances; there should be on-site directional, parking, and cautionary signs for 
students, faculty, staff, visitors, service vehicles, and pedestrians. Unless required, signs 
should not identify sensitive areas. A comprehensive signage plan should include the 
following: 
. _	 Prepare entry control procedures signs that explain current entry 
procedures for drivers and pedestrians. 
. _	 Prepare traffic regulatory and directional signs that control traffic flow 
and direct vehicles to specific appropriate points. 
. _	 Consider using street addresses or building numbers instead of 
detailed descriptive information inside the school grounds. 
. _	 Minimize the number of signs identifying high-risk areas; however, a 
significant number of warning signs should be erected to ensure that possible 
intruders are aware of entry into restricted areas. 
. _	 Minimize signs identifying critical utility complexes (e.g., power 
stations and significant gas, water, and sewer). Post easily understandable signs to 
minimize accidental entry by unauthorized visitors into critical areas. 
. _	 In areas where English is one of two or more languages commonly 
spoken, warning signs must contain the other language(s) in addition to English. The 
signs should be posted at intervals of no more than 100 feet and should not be 
mounted on fences equipped with intrusion-detection equipment. 
. _	 Locate variable message signs, which give information on 
site/organization special events and visitors, far inside site perimeters. 


2.7 PARKING 
Parking restrictions can help to keep potential threats away from a school building. 
In urban settings, however, curbside or underground parking is often necessary and 
sometimes difficult to control. Mitigating the risks associated with parking requires 
creative design measures, including parking restrictions, perimeter buffer zones, 
barriers, structural hardening, and other architectural and engineering solutions. 
The following considerations may help designers to implement parking measures for 
schools that may be at high risk: 
. _	 Locate vehicle parking areas away from school buildings to minimize 
blast effects from potential vehicle bombs. 
. _	 Provide separate parking areas for students, faculty, staff, and visitors 
who may be going in and out during the school day. (This allows the main student 
parking lot to be closed off during the school day.) 
. _	 If possible, locate visitor or general public parking near, but not on, the 
site itself. 
. _	 Locate general parking in areas that provide the fewest security risks to 
school personnel. 
. _	 Consider one-way circulation within a school parking lot to facilitate 
monitoring for potential aggressors. 
. _	 Locate parking within view of occupied school buildings while 
maintaining stand-off. 
. _	 Prohibit parking within the stand-off zone. 
. _	 Request appropriate permits to restrict parking in the curb lane for 
school vehicles or key employee parking only where distance from the building to the 
nearest curb provides insufficient setback, and compensating design measures do not 
sufficiently protect the building from the assessed threat. If necessary, use structural 
features to prevent parking. 
. _	 Provide appropriate setback from parking on adjacent properties, if 
possible. Structural hardening may be required if the setback is insufficient. In new 
designs, it may be possible to adjust the location of the school building on the site to 
provide adequate setback from adjacent properties. 
. _	 When establishing parking areas, provide emergency communications 
systems (e.g., intercom, telephones, etc.) at readily identified, well-lighted, CCTV 
monitored locations to permit direct contact with security personnel. 

. _	 Provide parking lots with CCTV cameras connected to the security 
system and adequate lighting capable of displaying and videotaping lot activity. 
. _	 If possible, prohibit parking beneath or within a school building. 
. _	 If parking beneath a building is unavoidable, limit access to the parking 
areas and ensure they are secure, well-lighted, and free of places of concealment. 
 ._	 Apply the following restrictions If parking within a school building is required: 
. � Public parking with identification (ID) check 
. � School vehicles and school employees and students only 
. � Selected school employees only, or those requiring security 


2.8 LOADING DOCKS AND SERVICE ACCESS 
Loading docks and service access areas are commonly required for a school building 
and are typically desired to be kept as invisible as possible. For this reason, special 
attention should be devoted to these service areas in order to avoid intruders. Design 
criteria for school loading docks and service access include the following: 
. _	 Separate by at least 50 feet, loading docks and shipping and receiving 
areas in any direction from utility rooms, utility mains, and service entrances, 
including electrical, telephone/ data, fire detection/alarm systems, fire suppression 
water mains, cooling and heating mains, etc. 
. _	 Locate loading docks so that vehicles will not be allowed under the 
building. If this is not possible, the service area should be hardened for blast. Loading 
dock design should limit damage to adjacent areas and vent explosive forces to the 
exterior of the building. 
. _	 If loading zones or drive-through areas are necessary, monitor them 
and restrict height to keep out large vehicles. 

. _	 Avoid having driveways within or under school buildings. 
. _	 Provide adequate design to prevent extreme damage to loading docks. 
The floor of the loading dock does not need to be designed for blast resistance if the 
area below is not occupied and or does not contain critical utilities. In certain cases, 
significant structural damage to the walls and ceiling of the loading dock may be 
acceptable; however, the areas adjacent to the loading dock should not experience 
severe structural damage or collapse. 
. _	 Provide signage to clearly mark separate entrances for deliveries. 


2.9 PHYSICAL SECURITY LIGHTING 
Security lighting can be provided for overall school ground/ building illumination 
and the perimeter to allow security personnel to maintain visual-assessment during 
darkness. It may provide both a real and psychological deterrent for continuous or 
periodic observation. Lighting is relatively inexpensive to maintain and may reduce 
the need for security personnel while enhancing personal protection by reducing 
opportunities for concealment and surprise by potential attackers. 
Provide sufficient lighting at entry control points to ensure adequate lighting for the 
area. Where practical, place lighting elements as high as possible to give a broader, 
more natural light distribution. This requires fewer poles (less hazardous to drivers) 
and is more aesthetically pleasing than standard lighting. 
The type of site lighting system used depends on the school's overall security 
requirements. Four types of lighting are used for security lighting systems: 
_	 Continuous lighting is the most common security lighting system. It consists of a 
series of fixed lights arranged to flood a given area continuously during darkness 
with overlapping cones of light. 
. _	 Standby lighting has a layout similar to continuous lighting; however, 
the lights are not continuously lit, but are either automatically or manually turned on 
when suspicious activity is detected or suspected by the security personnel or alarm 
systems. 
. _	 Movable lighting consists of manually operated, movable searchlights 
that may be lit during hours of darkness or only as needed. The system normally is 
used to supplement continuous or standby lighting. 
. _	 Emergency lighting is a backup power system of lighting that may 
duplicate any or all of the above systems. Its use is limited to times of power failure or 
other emergencies that render the normal system inoperative. It depends on an 
alternative power source such as installed or portable generators or batteries. Consider 
emergency/backup power for security lighting as determined to be appropriate. 


2.10 SITE UTILITIES 
Utility systems can suffer significant damage when subjected to the shock of an 
explosion. Some of these utilities may be critical for safely evacuating people from 
the school building. Their destruction could cause damage that is disproportionate 
to other building damage resulting from an explosion. To minimize the possibility 
of such hazards, apply the following measures: 
. _	 Where possible, provide underground, concealed, and protected 
utilities. 
. _	 Provide redundant utility systems (particularly electrical services) to 
support school security, life safety, and rescue functions. 
. _	 Consider quick connects for portable utility backup systems if 
redundant sources are not available. 
. _	 Prepare vulnerability assessments for all utility services to the school, 
including all utility lines, storm sewers, gas transmission lines, electricity transmission 
lines, and other utilities that may cross the site perimeter. 

. _	 Protect drinking water supplies from waterborne contaminants by 
securing access points, such as manholes. If warranted, maintain routine water testing 
to help detect waterborne contaminants. 
. _	 Minimize signs identifying critical utilities. Provide fencing to prevent 
unauthorized access and use landscape planting to conceal aboveground systems. 
. _	 Locate petroleum, oil, and lubricants storage tanks and operations 
buildings downslope from all other occupied school buildings. Locate fuel storage 
tanks at least 100 feet from buildings. 
. _	 Consider providing utility systems with redundant or loop service, 
particularly in the case of electrical systems. Where more than one source or service is 
not currently available, provisions should be made for future connections. In the 
interim, consider "quick connects" at the building for portable backup systems. 
. _	 Decentralize a school's communications resources, when possible; the 
use of multiple communication networks will strengthen the communications system's 
ability to withstand the effects of a terrorist attack. 
. _	 Place trash receptacles as far away from the building as possible; trash 
receptacles should not be placed within 30 feet of a building. 
. _	 Provide a school-wide public address system that extends from the 
interior to the exterior of buildings. 
. _	 Conceal and harden incoming utility systems within schools to provide 
blast protection, including burial or proper encasement wherever possible. 
. _	 Locate utility systems at least 50 feet from loading docks, front 
entrances, and parking areas. 
. _	 Route critical or fragile utilities so that they are not on exterior walls or 
on walls shared with mailrooms. 

. _	 Ensure that the redundant utilities are not collocated or do not run in 
the same chases. This minimizes the possibility that both sets of utilities will be 
adversely affected by a single event. 
. _	 Ensure backup systems are located away from the systems components 
for which they provide backup. 
. _	 Mount all overhead utilities and other fixtures weighing 31 pounds (14 
kilograms) or more to minimize the likelihood that they will fall and injure school 
occupants. Design all equipment mountings to resist forces of 0.5 times the equipment 
weight in any direction and 1.5 times the equipment weight in the downward 
direction. This standard does not preclude the need to design equipment mountings 
for forces required by other criteria such as seismic standards. 
. _	 Ensure that access to crawl spaces, utility tunnels, and other means of 
under school building access is controlled to limit opportunities for aggressors placing 
explosives underneath buildings. 
. _	 Screen, seal, or secure all utility penetrations of the site's perimeter to 
prevent their use as access points for unauthorized entry into the school site. If access 
is required for maintenance of utilities, secure all penetrations with screening, grating, 
latticework, or other similar devices. 


2.11 	SUMMARY OF SITE MITIGATION MEASURES 
A general spectrum of site mitigation measures ranging from the least protection, cost, 
and effort going to the greatest protection, cost, and effort for a school site is 
presented below. Detailed discussions of individual measures can be found earlier in 
the chapter. This is a nominal ranking of mitigation measures. In practice, the 
effectiveness and cost of individual mitigation measures may be different for specific 
applications. Table 2-1 can be used by designers and school administrators to correlate 
the mitigation measures described in this chapter to specific terrorist threats and 
tactics. 
. �	Place trash receptacles as far away from the school building as possible. 
. �	Remove any dense vegetation that may screen covert activity. 
. �	Use thorn-bearing plant materials to create natural barriers. 
. �	Identify all critical resources in the school area (fire and police stations, hospitals, etc.) for 
design consideration. 
. �	Identify all potentially hazardous facilities in the area (nuclear plants, chemical labs, etc.). 
. �	Use temporary passive barriers to eliminate straight-line vehicular access to areas of limited 
access. 
. �	Use vehicles as temporary physical barriers during elevated threat conditions. 
. �	Make proper use of signs for traffic control, building entry control, etc. Minimize signs 
identifying high-risk areas. 
. �	Identify, secure, and control access to all utility services to the school. 
. �	Limit and control access to all school crawl spaces, utility tunnels, and other means of under 
building access to prevent the planting of explosives. 
. �	Utilize GIS to assess adjacent land use. 
. �	Provide open space inside the fence along the school perimeter. 
. �	Locate fuel storage tanks at least 100 feet from all occupied school buildings. 
. �	Block sight lines through building orientation, landscaping, screening, and landforms. 
. �	Use temporary and procedural measures to restrict parking and increase stand-off. 
. �	Locate and consolidate high-risk land uses in the interior of the school site. 
. �	Select and design barriers based on threat levels. 
. �	Maintain as much stand-off distance as possible from potential vehicle bombs. 
. �	Separate backup utility systems. 
. �	Conduct periodic water testing to detect waterborne contaminants. 
. �	Enclose the perimeter of the school. Create a single controlled entrance for vehicles (entry 
control point). 
. �	Establish law enforcement or security force presence for schools facing high threats. 
. �	Install quick connects for portable utility backup systems. 
. �	Install security lighting in areas where needed. 
. �	Install CCTV cameras in areas where needed. 
. �	Mount all equipment to resist forces in any direction. 
. �	Include security and protection measures in the calculation of school land area requirements. 
. �	Redesign and construct parking to provide adequate stand-off for vehicle bombs. 
. �	Position buildings to permit occupants and security personnel to monitor the site. 
. �	Do not site the school building adjacent to potential threats or hazards. 
. �	Locate critical school building components away from the main entrance, vehicle circulation, 
parking, or maintenance area. Harden as appropriate. 
. �	Provide a site-wide public address system and emergency call boxes at readily identified 
locations. 
. �	Prohibit parking beneath or within a school building. 
. �	Redesign and construct access points at an angle to oncoming streets. 
. �	Designate entry points for commercial and delivery vehicles away from high-risk areas. 
. �	In urban areas, push the perimeter out to the edge of the sidewalk by means of bollards, 
planters, and other obstacles. For even better stand-off, push the line even farther outward by restricting or 
eliminating parking along the curb, eliminating loading zones, or through street closings. 
. �	Provide intrusion detection sensors for all utility services to the school. 
. �	Provide backup utility systems to support school security, life safety, and rescue functions. 
. �	Conceal and/or harden incoming utility systems. 
. �	Install active vehicle crash barriers. 

Table 2-1 Correlation of Mitigation Measures to Threats*

Table 2-1: Correlation of Mitigation Measures to Threats* (continued)

CONTROLLED ACCESS ZONES 






Exclusive zone/Non-exclusive zone 
_ 
_ 



_ 



Clear zone 
_ 
_ 



_ 



Fencing and physical barriers 
_ 
_ 
_ 
_ 
_ 
_ 



Active barriers 
_ 
_ 
_ 
_ 
_ 
_ 



Passive barriers 
_ 
_ 
_ 


_ 




ENTRY CONTROL AND VEHICULAR 
ACCESS 









Minimize access roads 
_ 
_ 



_ 
_ 


Control points 
_ 
_ 
_ 
_ 
_ 
_ 



Active monitoring 
_ 
_ 
_ 
_ 
_ 
_ 
_ 
_ 
_ 
Provide enhanced protection at school entrances 
_ 
_ 
_ 
_ 
_ 
_ 



Include pull-over lanes at checkpoints to inspect 
vehicles 
_ 
_ 
_ 
_ 
_ 
_ 



Avoid straightline vehicular access to high-risk 
areas 
_ 
_ 







Avoid straightline entry approach roads 
_ 
_ 







Locate vehicle parking areas far from high-risk 
areas 
_ 
_ 







Provide separate service and delivery access 
_ 
_ 







Route major corridors away from high-risk areas 
_ 
_ 

_ 
_ 




Locate high-risk resources remote from primary 
roads 
_ 
_ 

_ 
_ 




Minimize directional identification signs 
_ 
_ 
_ 
_ 
_ 
_ 



Limit vehicular access to high-risk areas 
_ 
_ 
_ 
_ 
_ 
_ 



SIGNAGE 
Minimize signage 
_ 
_ 
_ 
_ 
_ 
_ 
_ 
_ 
_ 

Table 2-1: Correlation of Mitigation Measures to Threats* (continued)

Table 2-1: Correlation of Mitigation Measures to Threats* (continued)

* ADAPTED FROM U.S. AIR FORCE INSTALLATION FORCE PROTECTION GUIDE.


2.12 	CRIME PREVENTION THROUGH ENVIRONMENTAL 
DESIGN (CPTED) 
CPTED is a crime reduction technique that has several key elements applicable to the 
analysis of building function and site design against physical attack. It is used by 
architects, city planners, landscape and interior designers, and law enforcement with 
the objective of creating a climate of safety in a community by designing a physical 
environment that positively influences human behavior. Although CPTED principles 
are not incorporated into the assessment process presented in this primer, it is useful 
to briefly discuss CPTED because it is often entwined with terrorism protection 
measures. 
CPTED concepts have been successfully applied in a wide variety of applications, 
including streets, parks, museums, government buildings, houses, and commercial 
complexes. The approach is particularly applicable to schools, where outdated 
facilities are common. Most schools in the United States were built 30 to 60 or more 
years ago. Security issues were almost nonexistent at the time, and technology was 
dramatically different. As a result, building designs are not always compatible with 
today's more secu-rity-conscious environment. 
According to CPTED principles, depending upon purely conventional physical 
security measures (e.g., security guards and metal detectors) to correct objectionable 
student behavior may have its limitations. Although employing physical security 
measures will no doubt increase the level of physical security, in some cases physical 
security measures employed as stand-alone measures may lead to a more negative 
environment, thereby enhancing violence. In short, employing stand-alone physical 
security measures may fail to address the underlying behavioral patterns that adversely 
affect the school environment. CPTED analysis focuses on creating changes to the 
physical and social environment that will reinforce positive behavior. 
CPTED builds on three strategies: 
. _	 Territoriality (using buildings, fences, pavement, sign, and landscaping 
to express ownership) 
. _	 Natural surveillance (placing physical features, activities, and people to 
maximize visibility) 
. _	 Access control (the judicial placement of entrances, exits, fencing, 
landscaping, and lighting) 

A CPTED analysis of a school evaluates crime rates, office-referral data, and school 
cohesiveness and stability, as well as core design shortcomings of the physical 
environment (e.g., blind hallways, uncontrolled entries, or abandoned areas that 
attract problem behavior). The application of CPTED principles starts with a threat 
and vulnerability analysis to determine the potential for attack and what needs to be 
protected. Protecting a school from physical attack by criminal behavior or terrorist 
activity, in many cases, only reflects a change in the level and types of threats. The 
CPTED process asks questions about territoriality, natural surveillance, and access 
control that can: 
. _	 Increase the effort to commit crime or terrorism 
. _	 Increase the risks associated with crime or terrorism 
. _	 Reduce the rewards associated with crime or terrorism 
. _	 Remove the excuses as to why people do not comply with the rules and 
behave inappropriately 

The CPTED process provides direction to solve the challenges of crime and terrorism 
with organizational (people), mechanical (technology and hardware), and natural 
design (architecture and circulation flow) methods. 
CPTED concepts can be integrated into expansion or reconstruction plans for existing 
buildings as well as new buildings. Applying CPTED concepts from the beginning 
usually has minimal impact on costs, and the result is a safer school. Each school, 
district, and community should institute measures appropriate for their own 
circumstances because there is no a single solution that will fit all schools. 
Many CPTED crime prevention techniques for a school complement conventional 
terrorism and physical attack prevention measures. For example, as part of the 
CPTED strategy of improving territoriality, schools are encouraged to direct all 
visitors through one entrance that offers contact with a receptionist who can 
determine the purpose of the visit and the destination, and provide sign-in/sign-out 
and an ID tag prior to building access. These CPTED measures are similar to and 
complement physical security entry control point stations. 
However, in some cases, CPTED techniques can conflict with basic physical security 
principles. The CPTED strategy of natural surveillance calls for locating student 
parking in areas that allow ease of monitoring. A design that locates student parking 
close to the principal's office also reduces vehicle stand-off and could create a 
vulnerability of the school structure to a vehicle bomb. In cases where CPTED 
techniques conflict with security principles, designers and school administrators 
should seek innovative solutions tailored to their unique situation.



BUILDING DESIGN GUIDANCE AND SAFETY PLANS 
his chapter addresses explosive blast and CBR concerns 
from terrorist attacks, highlighting mitigation measures, 
including architectural, structural, and building envelope 
systems, and school safety plans. After the site design 
considerations to enhance protection presented in 
Chapter 2 have been taken into account, additional 
building design measures, such as hardening and CBR 
mitigation measures, must be considered to protect school 
occupants. Historically, the majority of fatalities that occur 
in terrorist attacks directed against buildings are due to 
building collapse. This was true for the Oklahoma City 
bombing in 1995 when 87 percent of the building 
occupants who were killed were in the collapsed portion 
of the Murrah Federal Building. 
When considering mitigation measures for explosive blast 
threats, the primary strategy is to keep explosive devices as 
far away from the school building as possible (maximize 
stand-off distance). This is usually the easiest and least 
costly way to achieve a desired level of protection. In cases 
where sufficient stand-off distance is not available to 
protect against progressive collapse of a school building 
(i.e., schools located in urban settings), hardening of the 
building's structural systems may be required. Designers 
should try to minimize hazardous flying debris during an 
explosive event because a high number of injuries can 
result from flying glass fragments and debris from walls, 
ceilings, and non-structural features. Another 
consideration is to balance the hardening of the building 
envelope so that the columns, walls, windows, and glazing 
have approximately equal response for damage and 
injury/casualty for the design basis threat weapon at the 
available stand-off distance. Window design is the element 
that is usually the most diverse in conventional 
construction. Good blast engineering is a multi-disciplinary 
effort that requires the concerted efforts of the architect, 
structural engineer, mechanical engineer, and the other 
design team members in order to achieve a balanced 
building envelope. 
When considering mitigation measures for CBR hazards, heating, ventilation, and air 
conditioning (HVAC) systems are of particular concern. A school building can 
provide protection against CBR agents released outdoors if the flow of fresh air is 
filtered or interrupted; however, HVAC systems can also become an entry point and 
distribution system for hazardous contaminants. If installed, HVAC air filtration and 
air-cleaning systems can reduce the effects of a CBR agent by removing the 
contaminants from the air within a building. There are a variety of ways to protect 
school building occupants from airborne hazards. These protective measures can be 
as simple as defining a protective action plan or as complex as strict design measures 
practical only for new construction. Specific HVAC design measures will be discussed 
in this chapter. In addition, Chapter 5 contains a discussion of CBR protective actions. 
School building design should be optimized to facilitate emergency evacuation, 
rescue, and recovery efforts through effective placement, structural design, and 
redundancy of emergency exits and critical mechanical/electrical systems. Through 
effective structural design, the overall damage levels may be reduced to make it easier 
for people to get out safely and allow emergency responders to enter safely. The 
designer must also balance measures to protect people with the requirements of the 
Americans with Disabilities Act Accessibility Guidelines (ADAAG), Uniform Federal 
Accessibility Standards (UFAS), National Fire Protection Codes (NFPC), and all 
applicable local building codes. Additional information is available in FEMA 426, 
Reference Manual to Mitigate Potential Terrorist Attacks Against Buildings, and FEMA 427, 
Primer for Design of Commercial Buildings to Mitigate Terrorist Attacks. 
3.1 ARCHITECTURAL 
Several architectural considerations can be implemented to mitigate the effects of a 
terrorist bombing on a school facility. These considerations often cost nothing or 
very little if implemented early in the design process. 
The shape of the school building can contribute to the overall damage to the 
structure. For example, "U" or "L" shaped buildings tend to trap shock waves, which 
may exacerbate the effect of explosive blasts. For this reason, it is recommended that 
re-entrant corners be avoided (see Figure 3-1). In general, convex rather than concave 
shapes are preferred when designing the exterior of a school building. Other 
considerations follow: 
. _	 Orient school buildings horizontally rather than vertically to reduce 
the building's profile and exposure. 
. _	 Elevate the ground floors of school buildings above grade to prevent 
vehicles from being driven into the facility. 
. _	 Avoid eaves and overhangs, because they can be points of high local 
pressure and suction during blasts. When these elements are used, they should be 
designed to withstand blast effects. 
. _	 Locate utility systems away from likely areas of potential attack, such as 
loading docks, lobbies, and parking areas. 
. _	 Orient glazing perpendicular to the primary facade to reduce exposure 
to blast and projectiles (see Figure 3-2). 
. _	 Avoid having exposed structural elements (e.g., columns) on 
the exterior of the school.


Figure 3-1 Re-entrant corners in a floor plan 
SOURCE: U.S. AIR FORCE, INSTALLATION FORCE PROTECTION GUIDE 
Figure 3-2 Glazed areas oriented perpendicularly away from streets 
. _	 Connect interior non-load bearing walls to the structure with flexible 
connections. 
. _	 Place areas of high visitor activity away from key assets. 
. _	 Eliminate hiding places within the school building. 
. _	 Locate assets in areas where they are visible to more than one person. 
. _	 Use interior barriers to differentiate levels of security within a school 
building. 
. _	 Stagger doors located across from one another in interior hallways to 
limit the effects of a blast through the school structure (see Figure 3-3). 
. _	 Provide foyers with reinforced concrete walls, and offset interior and 
exterior doors from each other in the foyer. 
. _	 Locate stairwells required for emergency as remotely as possible from 
areas where blast events might occur. 

. _	 Wherever possible, do not discharge stairs into lobbies, parking, or 
loading areas. 
. _	 Separate unsecured areas of the main school building as much as 
possible. For example, a separate lobby pavilion or loading dock area outside of the 
main footprint of the building provides enhanced protection against damages and 
potential building collapse in the event of an explosion. This can also be done by 
creating internal "hard lines" or buffer zones, using 

SOURCE: U.S. AIR FORCE, INSTALLATION FORCE PROTECTION GUIDE 
secondary stairwells, elevator
shafts, corridors, and storage areas Figure 3-3 Offset doors through the foyer
between public and secured areas.

_	 Place parking areas outside the main footprint of the 
school building to reduce the vulnerability to 
catastrophic collapse.


3.2 	BUILDING STRUCTURAL AND 
NONSTRUCTURAL SYSTEMS 
For schools that require high security measures, explosive 
blast threats may govern building design. A structural 
engineer should determine the school design features 
needed to achieve the desired level of protection against 
the design blast threat, considering both the collapse of 
the school building as well as incipient injuries and 
fatalities of students, faculty, and staff. 
Progressive collapse is a situation where local failure of a 
primary structural component leads to the collapse of 
adjoining members which, in turn, leads to additional 
collapse. Hence the total damage is disproportionate to 
the original cause. Progressive collapse is a chain reaction 
of structural failures that follows from damage to a 
relatively small portion of a structure. 
All new school buildings should be designed with the intent of reducing the potential 
for progressive collapse as a result of an abnormal loading event, regardless of the 
required level of protection. The following structural characteristics (from GSA 
Progressive Collapse Analysis and Design Guidelines for New Federal Office Buildings and Major 
Modernization Projects, November 2000) should be considered in the initial phases of 
structural design. Incorporation of these features will provide a much more robust 
structure and decrease the potential for progressive collapse. 
. _	 Redundancy. The use of redundant lateral and vertical force resisting 
systems is highly encouraged when considering progressive collapse. Redundancy 
tends to promote a more robust structure and helps to ensure that alternate load paths 
are available in the case of a structural element(s) failure. Additionally, redundancy 
provides multiple locations for yielding to occur, which increases the probability that 
damage will be constrained. 
. _	 The use of ductile (flexible) structural elements and detailing. 

It is critical that both the primary and secondary structural elements be capable of 
deforming well beyond the elastic limit without experiencing structural collapse. 
Hence, the use of ductile construction materials (i.e., steel, cast-in-place 
reinforced concrete, etc.) for both the structural elements and connection 
detailing is encouraged. The capability of achieving a ductile response is 
imperative when considering an extreme redistribution of loading such as that 
encountered in a structural element(s) failure. 
. _	 Capacity for resisting load reversals. Both the primary and secondary 
structural elements should be designed to resist load reversals in the case of a 
structural element(s) failure. 
. _	 Capacity for resisting shear failure. Primary structural elements 
maintain sufficient strength and ductility under an abnormal loading event to 
preclude a shear failure. If the shear capacity is reached before flexural capacity, a 
sudden, 

non-ductile failure of the element could potentially lead to a 
progressive collapse of the structure. 
Both the GSA and DoD take a threat-independent approach to progressive collapse. 
The goal of a threat-independent approach is not to prevent collapse from a specific 
design threat, but to control and stop the continuing spread of damage after 
localized damage or localized collapse has occurred. 
The GSA and DoD require that the structural response of a building be analyzed in a 
test that removes a key structural element (e.g., vertical load carrying column, section 
of bearing wall, beam, etc.) to simulate local damage from an explosion. If effective 
alternative load paths are available for redistributing the loads, originally supported by 
the removed structural element, the building has a low potential for progressive 
collapse. 
For higher levels of protection from blast, cast-in-place reinforced concrete is 
normally the construction type of choice. Other types of construction such as properly 
designed and detailed steel structures are also allowed. Several material and 
construction types, although not disallowed by these criteria, may be undesirable and 
uneconomical for protection from blast. 
The following guidelines are commonly used to mitigate the effects of blast on 
structures and to mitigate the potential for progressive collapse. See sidebar for details 
and more guidance. 
_	Use multiple barrier materials and construction techniques to mitigate the effects 
of blast on a structure at less expense than a single material or technique. 
. _	 Incorporate internal damping into the structural system to absorb blast 
impact. 
. _	 Use symmetric reinforcement to increase the ultimate load capacity of 
the structure. 
. _	 Incorporate design redundancy and alternative load paths to help 
mitigate blasts and reduce the chance of progressive collapse. The Murrah Federal 
Building's structural system did not have any redundancy for the slab and beam 
systems. 
. _	 Strengthen the structural system to help resist the effects of a blast. 
. _	 Incorporate inelastic or post elastic design to allow the structure to 
absorb the energy of the explosion through plastic deformation. 
. _	 Recognize that components might act in directions for which they were 
not designed. This is due to the engulfment of structural members by blast, the 
negative phase, the upward loading of elements, and dynamic rebound of members. 
Making steel reinforcement (positive and negative faces) symmetric in all floor slabs, 
roof slabs, walls, beams, and girders will address this issue. Symmetric reinforcement 
also increases the ultimate load capacity of the members. 
. _	 Ensure that lap splices fully develop the capacity of the reinforcement. 
. _	 Stagger lap splices and other discontinuities. 
. _	 Control deflections around certain members, such as windows, to 
prevent premature failure. Additional reinforcement is generally required. 
. _	 Use wire mesh in plaster to reduce the incidence of flying fragments. 
. _	 Avoid the use of masonry when blast is a threat. Masonry walls break up 
readily and become secondary fragments during blasts. 

. _	 Use ductile connections for steel construction and develop as much 
moment connection as practical. Connections for cladding and exterior walls to steel 
frames should develop the capacity of the wall system under blast loads. 
. _	 Avoid single-point failures that can cascade, producing widespread 
catastrophic collapse. A prime example is the use of transfer beams and girders that, if 
lost, may cause progressive collapse and are, therefore, highly discouraged. 
. _	 Incorporate redundancy and alternative load paths into design to 
mitigate blast loads. One method of accomplishing this is to use two-way 
reinforcement schemes where possible. 
. _	 Minimize column spacing so that reasonably sized members can be 
designed to resist the design loads and increase the redundancy of the system. A 
practical upper level for column spacing is 30 feet for the levels of blast loads 
described herein. 
. _	 Minimize floor to floor heights. Unless there is an overriding 
architectural requirement, a practical limit is generally less than or equal to 16 feet. 
. _	 Use architectural or structural features that deny contact with exposed 
primary vertical load members in school lobbies. A minimum stand-off of at least 6 
inches from these members is required. 
. _	 Minimize the use of venetian blinds and false ceilings, and locating 
equipment such as light fixtures, partitions, ductwork, and air conditioners above 
ceilings wherever possible. These items may become flying debris in the event of an 
explosion. Placing heavy equipment such as air conditioners near the floor rather than 
the ceiling is one idea for limiting this hazard; using exposed ductwork as an 
architectural device is another possibility. 


3.3 BUILDING ENVELOPE 
3.3.1 Building Exterior 
The exterior envelope of the school building is the most vulnerable to an exterior 
explosive threat because it is the part of the building closest to the weapon. It also is 
a critical line of defense for protecting the occupants of the school building. 
The design philosophy to be used here is that simpler is better. Generally simple 
geometries, with minimal ornamentation (which may become flying debris during an 
explosion) are recommended. If ornamentation is used, it is recommended that it 
consists of a lightweight material such as timber or plastic, which is less likely to 
become a projectile in the event of an explosion than, for example, brick, stone, or 
metal.


3.3.2 Exterior Wall Design 
The exterior walls provide the first line of defense to prevent air-blast pressures and 
hazardous debris from entering the school building. At a minimum, the objective of 
design is to ensure that these members fail in a flexible mode rather than in a brittle 
mode such as shear. The walls also need to be able to resist the loads transmitted by 
the windows and doors. Beyond ensuring a flexible failure mode, the exterior wall may 
be designed to resist the actual or reduced pressure levels of the defined threat. 
Special reinforcing and anchors should be provided around blast-resistant window and 
door frames. 
Poured-in-place reinforced concrete will provide the highest level of protection, but 
solutions like pre-cast concrete, reinforced concrete masonry unit (CMU) block, and 
metal studs may also be used to achieve lower levels of protection. 
For pre-cast panels, consider a minimum thickness of 5 inches with two-way 
reinforcing bars placed at spacing not greater than the thickness of the panel. 
Connections into the structure should provide as a straight a line of load transmittal as 
practical, using as few connecting pieces as possible. 
For CMU block walls, use 8-inch block walls, fully grouted with vertical centered 
reinforcing bars placed in each cell and horizontal reinforcement at each layer. 
Connections into the structure should be able to resist the ultimate lateral capacity of 
the wall. A preferred system is to have a continuous exterior CMU wall that laterally 
bears against the floor system. For increased protection, consider using 12-inch blocks 
with two layers of reinforcement. 
For metal stud systems, use metal studs back to back and mechanically attached, to 
minimize lateral torsion effects. To catch exterior cladding fragments, attach a wire 
mesh to the exterior side of the metal stud system. The supports of the wall are to be 
designed to resist the ultimate lateral capacity load of the system. 
When designing schools in areas perceived as high risk, engineers and architects 
should consider the following recommendations: 
. _	 Substitute strengthened building walls and systems when stand-off 
distances cannot be accommodated. 
. _	 Use ductile materials capable of very large plastic deformations without 
complete failure. 
. _	 Design exterior walls to resist the actual pressures and impulses acting 
on the exterior wall surfaces from the threats defined for the school building. 
. _	 Design exterior walls to withstand the dynamic reactions from the 
windows. 
. _	 Design exterior shear walls to resist the actual blast loads predicted 
from the threats specified. Consider shear walls that are essential to the lateral and 
vertical load bearing system, and that also function as exterior walls, to be primary 
structures. 
. _	 Consider reinforced concrete wall systems in lieu of masonry or curtain 
walls to minimize flying debris in a blast. 

. _	 Reinforced wall panels can protect columns and assist in preventing 
progressive collapse, because the wall will assist in carrying the load of a damaged 
column. 
. _	 Give special consideration to construction types that reduce the 
potential for collapse where exterior walls are not designed for the full design loads. 
. _	 Consider use of sacrificial exterior wall panels to absorb blast. 


3.3.3 Window Design 
Window systems (e.g., glazing, frames, anchorage to supporting walls, etc.) on the 
exterior fa�ade of a school building should be designed to mitigate the hazardous 
effects of flying glass during an explosion event. In an effort to protect school 
occupants, designers should integrate the features of the glass, connection of the glass 
to the frame (bite), and anchoring of the frame to the building structure to achieve a 
"balanced design." This means all the components should have compatible capacities 
and theoretically would all fail at the same pressure-pulse levels. In this way, the 
damage sequence and extent of damage are controlled. Table 3-1 presents six GSA 
glazing protection levels based on how far glass fragments would enter a space and 
potentially injure its occupants. Figure 3-4 depicts how far glass fragments could enter 
a structure for each GSA performance condition. 
Table 3-1: Glazing Protection Levels Based on Fragment Impact Locations1 
* In conditions 2, 3a, 3b, 4 and 5, glazing fragments may be thrown to the outside of the protected 
space toward the detonation location. 

Figure 3-4  Side view of a test structure illustrating performance conditions of Table  3-2

1 From GSA PBS-PQ100.1, Facilities Standards for the Public Building Service, June 14, 1996 BUILDING DESIGN GUIDANCE 
AND SAFETY PLANS  3-13

The divide between performance conditions 3a and 3b can be equated to the 
"threshold of injury." The divide between performance conditions 4 and 5 can be 
equated to the "threshold of lethality." The GSA glazing performance conditions 
shown above correlate with the DoD levels of protection presented in Table 3-2. 
Table 3-2: Correlation of GSA Glazing Performance Conditions and DoD Levels of 
Protection for New Buildings 
FEMA 426, Reference Manual to Mitigate Potential Terrorist Attacks Against Buildings, 
contains a detailed description of window system design considerations. Although not 
all windows in a school can be designed to resist the full forces from very large 
explosive blast events, hardened window systems can provide significant protection for 
students, faculty, and staff. Preferred systems include: thermally tempered glass with a 
security film installed on the interior surface and attached to the frame; laminated 
thermally tempered glass; laminated heat strengthened, or laminated annealed glass; 
and blast curtains. Glazing systems that do not provide any protection include: 
untreated monolithic annealed or heat-strengthened glass and wire glass. Figure 3-5 
depicts an unprotected window after a large explosion. 
Figure 3-5 An unprotected window after a large explosion 
General Guidelines for Windows and Glazing. General guidelines for windows and 
glazing include the following: 
. _	 Do not place windows adjacent to doors because, if the windows are 
broken, the door can be unlocked. 
. _	 In schools requiring high security, minimize the number and size of 
windows in a fa�ade. If possible, limit the amount of glazed area in building facades to 
15 percent. The amount of blast entering a space is directly proportional to the 
amount of opening on the facade. 
. _	 Consider using burglary- and ballistic-resistant glazing in high-risk 
school areas. 
. _	 Consider using laminated glass in place of conventional glass. 
. _	 Consider window safety laminate (such as mylar) or another fragment 
retention film (FRF) over glazing (properly installed) to reduce fragmentation. 

. _	 Consider placing guards, such as grills, screens, or meshwork, across 
window openings to protect against covert entry. Affix protective window guards firmly 
to the structure. Fire egress considerations must be judged against window guards. 
. _	 Position the operable section of a sliding window on the inside of the 
fixed section and secure it with a broomstick, metal rod, or similar device placed at 
the bottom of the track. 
. _	 Provide horizontal windows 6 feet above the finished floor to limit 
entry. 
. _	 Consider using steel window frames securely fastened or cement 
grouted to the surrounding structure. 
. _	 Minimize interior glazing in high-risk areas (e.g., lobbies, loading 
docks). 

Mullion and Wall Design. The frame members connecting adjoining windows are 
referred to as mullions. These members may be designed using a static approach 
when the breaking strength of the window glass is applied to the mullion, or a dynamic 
load may be applied using the peak pressure and impulse values. Although the static 
approach may seem easier, it often yields a design that is not practical, because the 
mullion can become very deep and heavy, driving up the weight and cost of the 
window system. In addition, it may not be consistent with the overall architectural 
objectives of the project. A dynamic approach is likely to provide a section that meets 
the design constraints of the project. To accomplish this, a single-degree-of-freedom 
solution is often used. The governing equation of motion may be solved using 
numerical methods. There are also charts available for linearly decaying loads that 
circumvent the need to solve differential equations. These charts only require that the 
fundamental period of the mullion (including the tributary area of the window glass), 
the ultimate resistance force of the mullion, the peak pressure, and the equivalent 
linear decay time are known. 
Peak lateral response of the mullion is to be limited to a 2-degree support rotation. 
Also, the displacement ductility is to be limited to a 4degree support rotation. As with 
frames, it is good engineering practice to limit the number of interlocking parts used 
for the mullion.


3.3.4 Doors 
Door assemblies include the door, its frame, and anchorage to the building. As part of 
a balanced school design approach, exterior doors in high-risk buildings should be 
designed to withstand the maximum dynamic pressure and duration of the load from 
the design threat explosive blast. Other general door considerations for these types of 
buildings are as follows: 
. _	 Provide hollow steel doors or steel-clad doors with steel frames. Ensure 
the strength of the latch and frame anchor equals that of the door and frame. 
. _	 Consider blast-resistant doors for schools considered to be at high risk. 
. _	 Permit normal entry/egress through a limited number of doors, if 
possible, while accommodating emergency egress. 
. _	 Ensure that exterior doors into inhabited areas open outward. In 
addition to facilitating egress, by doing so, the doors will seat into the door frames in 
response to an explosive blast, increasing the likelihood that the doors will not enter 
the school building as hazardous debris. 
. _	 Replace externally mounted locks and hasps with internally locking 
devices because the weakest part of most door assemblies is the latching component. 
. _	 Locate hinges on interior or use exterior security hinges to reduce 
their vulnerability. 
. _	 Install emergency exit doors so that they facilitate only exiting 
movement. 
. _	 Consider using solid doors or walls as a backup for glass doors in foyers. 
. _	 Strengthen and harden the upright surfaces of a door jamb into which 
the door fits. 


3.3.5 Roof System Design 
Control access to school roofs to minimize the possibility of aggressors placing 
explosives or CBR agents there or otherwise threatening school occupants or critical 
infrastructure. Designers should consider the following: 
. _	 For new school buildings, eliminate all external roof access by 
providing access from internal stairways or ladders, such as in mechanical rooms. 
. _	 For existing school buildings, eliminate external access, where possible, 
or make roof access ladders removable, retractable, or lockable. 
. _	 Provide pitched roofs to allow deflection of explosives. 
. _	 Make school roof access hatches secure from intruders. 
. _	 Consider designing buildings with a sacrificial sloping roof that is above 
a protected ceiling (see Figure 3-6). 

Figure 3-6 Sacrificial roof



3.4 MECHANICAL SYSTEMS 
Mechanical systems design standards address limiting damage to critical infrastructure 
and protecting school building occupants against CBR threats. The primary goal of a 
mechanical system after a terrorist attack should be to continue to operate key life 
safety systems for school occupants. School designers should be aware that during an 
interior bombing event, smoke removal and control are of paramount importance. 
They should consider the fact that, if window glazing is hardened, a blast may not blow 
out windows, and smoke may be trapped in the school building. In the event of a blast, 
the available smoke removal system may be essential to smoke removal, particularly in 
large, open spaces. This equipment should be located away from high-risk areas such 
as loading docks and garages. The system controls and power wiring to the equipment 
should be protected. The system should be connected to emergency power to provide 
smoke removal. Smoke removal equipment should be provided with standalone local 
control panels that can continue to individually function in the event the control 
wiring is severed from the main control system. 
Designers should consider locating components in less vulnerable areas, limiting 
access to mechanical systems, and providing a reasonable amount of redundancy. 
Specific considerations include the following: 
. _	 Avoid mounting plumbing, electrical fixtures, or utility lines on the 
inside of exterior school walls. When this is unavoidable, mount fixtures on a separate 
wall at least 6 inches from the exterior wall face. 
. _	 Avoid placing plumbing on the top of the roof deck of the school 
building. 
. _	 Avoid suspending plumbing fixtures and piping from the ceiling. 
. _	 Reduce the number of utility openings, manholes, tunnels, air 
conditioning ducts, filters, and access panels into the school structure. 
. _	 Protect school building operational control areas and utility feeds to 
lessen the negative effects of a blast. 
. _	 Design operational redundancies to survive all kinds of attacks. 
. _	 Use lockable systems for school utility openings and manholes where 
appropriate. Infrequently used utility covers/manholes 

can be tack-welded as an inexpensive alternative to locking 
tamper-resistant covers. 
Key HVAC System Considerations. The following HVAC design measures should be 
considered to mitigate the risk of CBR threats against school buildings. A more 
detailed discussion of HVAC design considerations is contained in FEMA 426 Reference 
Manual to Mitigate Potential Terrorist Attacks Against Buildings and FEMA 427 Primer for 
Design of Commercial Buildings to Mitigate Terrorist Attacks. HVAC protective actions are 
discussed in Chapter 5. 
_	 Place intakes at the highest practical level on the school building. For protection 
against malicious acts, the intakes should also be covered by screens so that objects 
cannot be tossed into the intakes or into air wells from the ground (see Figures 3-7, 
3-8, and 3-9). Such screens should be sloped to allow thrown objects to roll or slide 
off the screen, away from the intake. Many existing school buildings have air 
intakes that are located at or below ground level. For those that have wall-mounted 
or below-grade intakes close to the building, the intakes can be elevated by 
constructing a plenum or external shaft over the intake (see Figure 3-10). 
Figure 3-7 Example of protecting outdoor air intakes 
SOURCE: CDC/NIOSH, PUBLICATION NO. 2002-139, GUIDANCE FOR PROTECTING BUILDING ENVIRONMENTS FROM 
AIRBORNE CHEMICAL, BIOLOGICAL, OR RADIOLOGICAL ATTACKS, MAY 2002. 
Fig u r e 3-8 A n o t h e r e x a m ple o f p r o t e c t i n g a i r i n t a k e s 
S O U R C E : C D C / NIO S H , P U B LIC ATIO N N O . 2 0 0 2-1 3 9 , GUIDANCE FOR PROTECTING BUILDING 
ENVIRONMENTS FROM AIRBORNE
CHEMICAL, BIOLOGICAL, OR RADIOLOGICAL ATTACKS, M AY 2 0 0 2 .

Figure 3-9 
Example of elevated air intake

S O U R C E : C D C / NIO S H , P U B LIC ATIO N N O . 2 0 0 2-1 3 9 ,
GUIDANCE FOR PROTECTING BUILDING ENVIRONMENTS
FROM AIRBORNE CHEMICAL, BIOLOGICAL, OR
RADIOLOGICAL ATTACKS, M AY 2 0 0 2 .

Figure 3-10 Example of enclosing an existing vulnerable air Ground-level Outdoor Air Intake intake 
SOURCE: CDC/NIOSH, PUBLICATION NO. 2002-139, GUIDANCE FOR 
PROTECTING BUILDING ENVIRONMENTS FROM AIRBORNE CHEMICAL, 
BIOLOGICAL, OR RADIOLOGICAL ATTACKS, MAY 2002. 
Raised-level Outdoor Air Intake 
_	 Provide protection for existing school buildings with air intakes below grade, at 
ground level, or wall-mounted outside secure areas, with physical security measures 
(e.g., placing fencing, surveillance cameras, and motion detectors around the 
intakes to facilitate monitoring by security personnel). These measures can help 
prevent malicious acts, but are less effective than elevating the intakes, because 
ground level releases under certain conditions can enter the intakes from points 
outside the area fenced or under surveillance. 
. _	 Maintain physical security on mechanical rooms to prevent the direct 
introduction of hazardous materials into the system of ducts that distributes air to the 
school building. This includes locking and controlling the access to all mechanical 
rooms containing HVAC equipment. 
. _	 Restrict access to school building operation systems by outside 
personnel. To deter tampering by outside maintenance personnel, a school staff 
member should escort these individuals throughout their service visit and should 
visually inspect their work before final acceptance of the service. Alternatively, schools 
can ensure the reliability of pre-screened service personnel from a trusted contractor. 
. _	 Restrict access to school building data. Information on building 
operations (including mechanical, electrical, vertical transport, fire and life safety, 
security system plans and schematics, and emergency operations procedures) should 
be controlled. 
. _	 Isolate school lobbies, mailrooms, loading docks, and storage areas. 
Lobbies, mailrooms (includes various mail processing areas), loading docks, and other 
entry and storage areas should be physically isolated from the rest of the building. 
These are areas where bulk quantities of CBR agents are likely to enter a school 
building. 
. _	 Consider "shelter-in-place" rooms or areas in schools, where people can 
stay in the event of an outdoor release. The goal is to create areas where outdoor air 
infiltration is very low. Usually such rooms will be in the inner part of the school in an 
area with no exterior windows if possible. The rooms should have doors that are fairly 
effective at preventing airflow and should contain staging supplies such as duct tape 
and plastic to help further seal the areas from the hallways. Typically, restrooms are a 
bad choice, because they have exhaust ducts that lead directly to the outside. Opening 
and closing a conventional hinged door can pump large amounts of air into the room; 
if practical, replace the door with a code 

compliant sliding door to reduce this effect. Additionally, it may be possible to 
provide purified air to the safe area through modifications to the HVAC 
system. For more information, see Chapters 5 and 6. 
_	 Ducted returns offer limited access points to introduce a CBR agent. The return 
vents can be placed in conspicuous locations throughout a school, reducing the 
risk of an agent being secretly introduced into the return system. Non-ducted 
return air systems commonly use hallways or spaces above suspended ceilings as a 
return-air path or plenum. CBR agents introduced at any location above the 
suspended ceiling in a ceiling plenum return system will probably migrate back to 
the HVAC unit and be redistributed to occupied areas. Schools should be designed 
to minimize mixing between air-handling zones, which can be partially 
accomplished by limiting shared returns.


3.5 ELECTRICAL SYSTEMS 
The major security functions of the electrical system are to maintain power to 
essential school services, especially those required for life safety and evacuation. 
When designing a school building, architects and engineers should consider 
providing lighting and surveillance to deter criminal activities, and provide 
emergency communications. They should also consider the following 
recommendations: 
. _	 Emergency and normal electric panels, conduits, and switchgear 
should be installed separately, at different locations, and as far apart as possible. 
Electric distribution should also run at separate locations. 
. _	 Emergency generators should be located away from loading docks, 
entrances, and parking. More secure locations include the roof, protected grade level, 
and protected interior areas. 
. _	 Main fuel storage for generators should be located away from loading 
docks, entrances, and parking. Access should be restricted and protected (e.g., locks 
on caps and seals). 

. _	 Fuel tanks should be mounted near the generator, given the same 
protection as the generator, and sized to store an appropriate amount of fuel. A 
battery and/or UPS could be a viable alternative for a smaller school. 
. _	 Conduits and lines should be installed outside to allow a trailer-
mounted generator to connect to the school's electrical system. If tertiary power is 
required, other methods include generators and feeders from alternative substations. 
. _	 Emergency power should be provided for emergency lighting in school 
restrooms, egress routes, and any meeting room without windows. 
. _	 School building access points should be illuminated to aid in threat 
detection. 
. _	 Self-contained battery lighting should be provided in stairwells and for 
exit signs. 
. _	 Suspending electrical conduits from the ceiling should be avoided. 
. _	 Adequate lighting of perimeters and parking areas should be provided 
to aid in visual surveillance and to support the use of CCTV. 


3.6 FIRE PROTECTION SYSTEMS 
The fire protection system inside the school building should maintain life safety 
protection after an incident and allow for safe evacuation of the building when 
appropriate. Although fire protection systems are designed to perform well during 
fires, they are not traditionally designed to survive bomb blasts. Fire protection system 
considerations include the following: 
_	 A school's fire protection water system should be protected from single-point failure 
in case of a blast event. The incoming line should be encased, buried, or located 50 
feet away from high-risk areas. The interior mains should be looped and 
sectionalized. 
. _	 To increase the reliability of the fire protection system, a dual pump 
arrangement should be considered, with one electric pump and one diesel pump. The 
pumps should be located away from each other. 
. _	 All school security locking arrangements on doors used for egress must 
comply with requirements of NFPA 101, Life Safety Code. 


3.7 COMMUNICATIONS SYSTEMS 
Designers should consider the following: 
. _	 Redundant communications. The school should have a second 
telephone service to maintain communications in case of an incident. A base radio 
communications system with antenna should be installed in the stairwell, and portable 
sets distributed on floors. This is the preferred alternative. 
. _	 Radio telemetry. Distributed antennas could be located throughout the 
school facility if required for emergency communications through wireless 
transmission of data. 
. _	 Alarm and information systems. Alarm and information systems should 
not be collected and mounted in a single conduit, or even collocated. Circuits to 
various parts of the school building should be installed in at least two directions 
and/or risers. Low voltage signal and control copper conductors should not share 
conduits with high voltage power conductors. Fiber-optic conductors are generally 
preferred over copper. 
. _	 Empty conduits. Empty conduits and power outlets can be provided for 
possible future installation of security control equipment. 
. _	 Mass notification. All inhabited school buildings should have a timely 
means to notify occupants of threats and instruct them what to do in response to those 
threats. School buildings should have a capability to provide real-time notification of 
building occupants and people in the immediate vicinity of the building during 
emergency situations. The information 

relayed should be specific enough to determine the 
appropriate response actions.


3.8 PHYSICAL SECURITY SYSTEMS 
Physical security is defined as that part of security concerned with physical measures 
designed to safeguard people and to prevent unauthorized access to equipment, 
certain areas of the school building, and key documents. These days, all security 
operations face new and complex physical security challenges across the full spectrum 
of operations. 
Although security technologies are not the answer to all school security problems, if 
applied appropriately, they can enhance security, free up administrators for more 
appropriate work, and sometimes can save money. At a non-educational building, a 
typical approach to physical security is: 
For example, if someone is breaking into a school facility, it is necessary to have a 
means of detection so that information can be provided to appropriate authorities. 
Next, the intruder must be delayed as long as possible so that the response force may 
arrive. Finally, someone, such as the police, must respond to the incident to catch the 
intruder. For a school, the National Institute for Justice2 has recommended expanding 
this model as shown below: 
2 National Institute of Justice Research Report NCJ 178265, The Appropriate and Effective Use of Security Technologies in U.S. Schools, September 
1999. 
This educational approach emphasizes deterrence by instituting measures both before 
and after an event to convince perpetrators not to do whatever they are considering. 
Although, the efficacy of deterrence for high-risk terrorist tactics is questionable, 
schools have a broad spectrum of threats to consider with any physical security system. 
Schools are also unique in that they generally have the authority and opportunity to 
establish consequences for incidents that involve students and occur on school 
grounds. Figure 3-11 depicts some considerations for the design of a school security 
system and Figure 3-12 shows examples of physical security devices. 
For schools requiring greater security, some general measures are contained in the 
National Institute of Justice Research Report NCJ 178265, The Appropriate and Effective 
Use of Security Technologies in 
U.S. Schools, September 1999. 
Figure 3-11 Considerations for the design of a new security system 
SOURCE: NATIONAL INSTITUTE OF JUSTICE RESEARCH REPORT NCJ 178265, THE APPROPRIATE AND EFFECTIVE USE OF 
SECURITY TECHNOLOGIES IN U.S. SCHOOLS, SEPTEMBER 1999. 
Figure 3-12 Physical security devices 
Obviously, when considering any physical security measure for a school, it is important 
to balance its use with the risk of creating a "bunker" or "prison" atmosphere that is 
not conducive to learning. The measures recommended in this chapter should be 
applied judiciously and in concert with the threat assessment depicted in Chapter 1, 
and also with any risk perceived by school administrators.


3.9 	SUMMARY OF BUILDING ENVELOPE MITIGATION 
MEASURES 
A general spectrum of building envelope mitigation measures ranging from the least 
protection, cost, and effort going to the greatest protection, cost, and effort is 
provided below. Detailed discussions of individual measures can be found earlier in 
this chapter. Please note this is a nominal ranking of mitigation measures. In practice, 
the effectiveness and cost of individual mitigation measures may deviate from this 
example based on specific applications. 
Ensure that all school exterior doors into inhabited areas open outward. Ensure emergency exit doors
only facilitate exiting.
Secure school roof access hatches from the interior. Prevent public access to building roofs.
Restrict access to school building operation systems.
Conduct periodic training of school HVAC maintenance and operation staff.

Evaluate HVAC control options.
Install empty conduits for future school security control equipment during initial construction or major
renovation.

Do not mount plumbing, electrical fixtures, or utility lines on the inside of exterior walls.
Minimize interior glazing near high-risk a reas.
Establish school emergency plans, policies, and procedures.
Establish written plans for school evacuation and sheltering in place.
Illuminate school access points.
Restrict access to school building information.
Secure HVAC intakes and mechanical rooms.
Limit the number of doors used for normal entry/egress.
Lock all utility access openings.
Provide emergency power for emergency lighting in school restrooms, egress routes, and any meeting

room without windows.
Install an internal public address system.
Stagger interior doors and offset interior and exterior doors.
Eliminate hiding places.
Install a second and separate telephone service.
Install radio telemetry distributed antennas throughout the facility.
Use a badge identification system for school access.
Install a CCTV surveillance system in areas where needed.
Install an electronic security alarm system in areas where needed.
Install rapid response and isolation features into school HVAC systems.
Use interior barriers to differentiate levels of security.
Avoid eaves and overhangs or harden to withstand blast effects.
Locate utility systems away from likely areas of potential attack.
Install call buttons at key public contact areas.
Install emergency and normal electric equipment at different locations.
Avoid exposed structural elements.

. � Reinforce foyer walls. 
. � Use architectural features to deny contact with exposed primary vertical load members. 
. � Isolate school lobbies, mailrooms, loading docks, and storage areas. 
. � Locate stairwells remotely. Do not discharge stairs into lobbies, parking, or loading areas. 
. � Elevate school HVAC fresh-air intakes. 
. � Create "shelter-in-place" rooms or areas. 
. � Separate HVAC zones. Eliminate leaks and increase school building air tightness. 
. � Install blast-resistant doors or steel doors with steel frames. 
. � Physically separate unsecured areas from the main school building. 
. � Install HVAC exhausting and purging systems. 
. � Connect interior non-load bearing walls to structure with non-rigid connections. 
. � Use structural design techniques to resist progressive collapse of school buildings. 
. � Treat exterior shear walls as primary structures. 
. � Orient glazing perpendicular to the primary fa�ade facing uncontrolled vehicle approaches. 
. � Use reinforced concrete wall systems in lieu of masonry or curtain walls. 
. � Ensure active fire system is protected from single-point failure in case of a blast event. 
. � Establish school's ground floor elevation 4 feet above grade. 
. � Avoid re-entrant corners on the school building exterior. 
. � Issue CBR personal protective equipment. 
. � Design exterior walls to resist blast. 
. � Design school facilities with a sacrificial sloping roof above a protected ceiling. 
. � Upgrade glazing -laminated glass, safety laminates, FRF, etc. 
. � Install a 24-hour on-site monitoring center. 
. � Install HVAC filtering and pressurization. 
. � Install HVAC CBR real-time monitoring detectors. 


3.10	RECOMMENDATIONS BASED ON 
THE HOMELAND SECURITY 
ADVISORY SYSTEM 
Table 3-3 presents recommendations for safety/security 
measures linked to the DHS Threat Advisory Level. 
Chapter 6 of the U.S. Department of Education (DOE) 
Practical Information on Crisis Planning: A Guide for Schools and 
Communities contains similar recommendations. 
Table 3-3: Safety/Security Recommendations 
Table 3-3: Safety/Security Recommendations (continued)

Orange -High 
Red -Severe 
. _		Complete recommended actions at lower level 
. _		Consider canceling outside activities 
. _		Prepare to handle inquiries from anxious parents and media 
 ._		Review and implement increased security measures 
. � Limit parking near school buildings 
. � Restrict visitor access 
. _		Discuss children's fears concerning possible terrorist attacks 
. _		Review sporting event and extracurricular activity decisions 
. _		Place school and district crisis response teams on standby alert status 
. _		Complete recommended actions at lower level 
. _		Follow local and/or Federal Government instructions 
. _		Coordinate with local and state officials to consider school openings and 
closings 
. _		Listen to radio/TV for current information/instructions 
 ._		Review and implement increased security measures 
. � Further limiting parking to increase stand-off 
. � Posting/increasing security staff 
. _		Activate command and support centers if appropriate 
. _		Continue staff, parent, and community communications 
. _		Coordinate parent-child reunification process, if necessary 
. _		Ensure mental health counselors are available for students, faculty, and staff 



3.11 	SCHOOL SAFETY EMERGENCY MANAGEMENT 
PLAN 
The DHS has designated the DOE as the lead agency for security related to schools. 
The DOE has published a guide, Practical Information on Crisis Planning: A Guide for 
Schools and Communities, May 2003, that is intended to give schools, districts, and 
communities the critical concepts and components of good crisis planning, stimulate 
thinking about crisis preparedness process, and provide examples of promising 
practices. Additional information is also available from the National Advisory 
Committee on Children and Terrorism (NACCT). 
The DOE recommends each school crisis plan address four major areas: 
mitigation/prevention, preparedness, response, and recovery. 
 ._	 Mitigation/Prevention: 
. � Conduct an assessment of each school building. Identify those factors that 
put the building, students, faculty, and staff at greater risk, such as proximity to rail 
tracks that regularly transport hazardous materials or facilities that produce highly 
toxic material or propane gas tanks, and develop a plan for reducing the risk. This can 
include plans to evacuate students away from these areas in times of crisis and to 
reposition propane tanks or other hazardous materials away from school buildings. 
. � Work with businesses and factories in close proximity to the school to ensure 
that the school's crisis plan is coordinated with their crisis plans. 
. � Ensure that a process is in place for controlling access and egress to the 
school. Require all persons who do not have authority to be in the school to sign in. 
. � Review traffic patterns, and where possible, keep cars, buses, and trucks away 
from school buildings. 
. � Review landscaping, and ensure that buildings are not obscured by 
overgrowth of bushes or shrubs where contraband can be placed or persons can hide. 
 ._	 Preparedness: 
. � Have site plans for each school building readily available and ensure they are 
shared with first responders and agencies responsible for emergency preparedness. 
. � Ensure there are multiple evacuation routes and rallying points. First or 
second evacuation site options may be blocked or unavailable at the time of the crisis. 
. � Practice responding to crisis on a regular basis. 

. � Ensure a process is established for communicating during a crisis. 
. � Inspect equipment to ensure it operates during crisis situations. 
. � Have a plan for discharging students. Remember that, during a crisis, many 
parents and guardians may not be able to get to the school to pick up their child. 
Make sure every student has a secondary contact person and contact information 
readily available. 
. � Have a plan for communicating information to parents and for quelling 
rumors. Cultivate relationships with the media ahead of time, and identify a Public 
Information Officer (PIO) to communicate with the media and the community 
during a crisis. 
. � Work with law enforcement officials and emergency preparedness agencies 
on a strategy for sharing key parts of the school crisis plans. 

 ._	 Response: 
. � Identify the type of crisis that is occurring and determine the appropriate 
response. 
. � Develop a command structure for responding to a crisis. The roles and 
responsibilities for educators, law enforcement and fire officials, and other first 
responders in responding to different types of crisis need to be developed, 
coordinated, reviewed, and approved. 
. � Maintain communications among all relevant staff. 
 ._	 Recovery: 
. � Return to the business of teaching and learning as soon as possible. 
. � Identify and approve a team of credentialed mental health workers to 
provide mental health services to faculty and students after a crisis. Understand that 
recovery takes place over time and that the services of this team may be needed over 
an extended time period. 

. � Ensure that the team is adequately trained. 
. � The plan needs to include notification of parents on actions that the school 
intends to take to help students recover from the crisis. 

3.12 EMERGENCY PLANS AND TRAINING 
Every school should have a school safety emergency management plan developed in 
partnership with public safety agencies, including law enforcement, fire, public 
health, mental health and local emergency preparedness agencies. The plan should 
address fire, and natural and manmade disasters. A school's plan should be tailored 
to address the unique circumstances and needs of the individual school, and should 
be coordinated and integrated with community plans and the plans of local 
emergency preparedness agencies. 
These plans should also consider CBR attack scenarios and the associated procedures 
for communicating instructions to building occupants, identifying suitable shelter-in-
place areas (if they exist), identifying appropriate use and selection of personal protec-
tive equipment (i.e., clothing, gloves, respirators) and directing emergency 
evacuations. Individuals developing emergency plans and procedures should 
recognize that there are fundamental differences between chemical, biological, and 
radiological agents. In general, chemical agents will show a rapid onset of symptoms, 
while the response to biological and radiological agents will be delayed. Issues such as 
designated areas and procedures for chemical storage, HVAC control or shutdown, 
and communications with school occupants and emergency responders, should all be 
addressed. The plans should be as comprehensive as possible, but, as described 
earlier, protected by limited and controlled access. When appropriately developed, 
these plans, policies, and procedures can have a major impact upon school occupant 
survivability in the event of a CBR release. 
Staff training, particularly for those with specific responsibilities during an event, is 
essential and should cover both internal and external events. Holding regularly 
scheduled practice drills, similar to the common fire drill, allows for plan testing, as 
well as student and key staff rehearsal of the plan, and increases the likelihood for 
success in an actual event. School officials should ensure that training is provided to 
staff that operate and maintain the school's HVAC system. This training should 
include the procedures to be followed in the event of a suspected CBR agent release. 
Development of current, accurate HVAC diagrams and HVAC system labeling 
protocols should be addressed. These documents can be of great value in the event of 
a CBR release. 
EXPLOSIVE BLAST 

his chapter discusses blast effects, potential school damage, injuries, levels of 
protection, stand-off distance, and predicting blast effects. Specific blast design 
concerns and 
mitigation measures are discussed in Chapters 2 and 
3. Explosive events have historically been a favorite tactic of terrorists for a variety of 
reasons and this is likely to continue into the future. The DoD, GSA, and DOS have 
considerable experience with blast effects and blast mitigation. However, many 
architects and building designers do not have such experience. For additional 
information on explosive blast, see FEMA 426, 
Reference Manual to Mitigate Potential Terrorist Attacks Against Buildings, and FEMA 427, 
Primer for Design of Commercial Buildings to Mitigate Terrorist Attacks. See sidebar for im-
portant reference material on explosive blast. 
4.1 BLAST EFFECTS 
An explosion is an extremely rapid release of energy in the form of light, heat, sound, 
and a shock wave. A shock wave consists of highly compressed air traveling radially 
outward from the source at supersonic velocities. As the shock wave expands, pressures 
decrease rapidly (with the cube of the distance) and, when it meets a surface that is in 
line-of-sight of the explosion, it is reflected and amplified by a factor of up to thirteen. 
Pressures also decay rap-idly over time (i.e., exponentially) and have a very brief span 
of existence, measured typically in thousandths of a second, or milliseconds. 
Diffraction effects, caused by corners of a building, may act to confine the air-blast, 
prolonging its duration. Late in the explosive event, the shock wave becomes negative, 
creating suction. Behind the shock wave, where a vacuum has been created, air rushes 
in, creating a powerful wind or drag pressure on all surfaces of the building. This wind 
picks up and carries flying debris in the vicinity of the detonation. In an external 
explosion, a portion of the energy is also imparted to the ground, creating a crater and 
generating a ground shock wave analogous to a high-intensity, short-duration 
earthquake. 
In the context of other hazards (e.g., earthquakes, winds, or floods), an explosive 
attack has the following distinguishing features: 
. _	The intensity of the pressures acting on a targeted building can be 
several orders of magnitude greater than these other hazards. It is not uncommon for 
the peak pressure to be in excess of 100 pounds per square inch (psi) on a building in 
an urban setting for a vehicle weapon parked along the curb. At these pressure levels, 
major damages and failure are expected. 
. _	Explosive pressures decay extremely rapidly with distance from the 
source. Therefore, the damages on the side of the building facing the explosion may 
be significantly more severe than on the opposite side. As a consequence, direct air-
blast damages tend to cause more localized damage. 
. _	The duration of the event is very short, measured in thousandths of a 
second, or milliseconds. This differs from earthquakes and wind gusts, which are 
measured in seconds, or sustained wind or flood situations, which may be measured in 
hours. Because of this, the mass of the structure has a strong mitigating effect on the 
response because it takes time to mobilize the mass of the structure. By the time the 
mass is mobilized, the loading is gone, thus mitigating the response. This is the 
opposite of earthquakes, whose imparted forces are roughly in the same timeframe as 
the response of the building mass, causing a resonance effect that can worsen the 
damage. 

4.1.1 Building Damage 
The extent and severity of damage and injuries in an explosive event cannot be 
predicted with perfect certainty. Past events show that the unique specifics of the 
failure sequence for a building significantly affect the level of damage. Despite these 
uncertainties, it is possible to give some general indications of the overall level of 
damage and injuries to be expected in an explosive event, based on the size of the 
explosion, distance from the event, and assumptions about the construction of the 
building. 
Damage due to the air-blast shock wave may be divided into direct air-blast effects and 
progressive collapse. Direct air-blast effects are damage caused by the high-intensity 
pressures of the air-blast close in to the explosion and may induce the localized failure 
of exterior walls, windows, floor systems, columns, and girders. Progressive collapse is 
discussed in Section 3.2. 
The air-blast shock wave is the primary damage mechanism in an explosion. The 
pressures it exerts on building surfaces may be several orders of magnitude greater 
than the loads for which the building is designed. The shock wave also acts in 
directions that the building may not have been designed for, such as upward on the 
floor system. In terms of sequence of response, the air-blast first impinges on the 
weakest point in the vicinity of the device closest to the explosion, typically the 
exterior envelope of the building. The explosion pushes on the exterior walls at the 
lower stories and may cause wall failure and window breakage. As the shock wave 
continues to expand, it enters the structure, pushing both upward and downward on 
the floors (see Figure 4-1). 
Floor failure is common in large-scale vehicle-delivered explosive attacks, because 
floor slabs typically have a large surface area for the pressure to act on and a 
comparably small thickness. In terms of the timing of events, the building is engulfed 
by the shockwave and direct air-blast damage occurs within tens to hundreds of mil-
liseconds from the time of detonation. If progressive collapse is initiated, it typically 
occurs within seconds. 
Figure 4-1 Blast pressure effects on a structure 
Glass is often the weakest part of a building, breaking at low pressures compared to 
other components such as the floors, walls, or columns. Past incidents have shown that 
glass breakage may extend for miles in large external explosions. High-velocity glass 
fragments have been shown to be a major contributor to injuries in such incidents. For 
incidents within downtown city areas, falling glass poses a major hazard to passersby on 
the sidewalks below and prolongs post-incident rescue and cleanup efforts by leaving 
tons of glass debris on the street. Specific glazing design considerations are discussed 
in Chapter 3. 
4.1.2 Casualties and Injuries 
Blast can cause significant casualties. During the bombing of the Murrah Federal 
Building, 168 people were killed. Severity and type of injury patterns incurred in 
explosive events may be related to the level of structural damage. The high pressure of 
the air-blast that enters through broken windows can cause eardrum damage and lung 
collapse. As the air-blast damages the building components in its path, missiles are 
generated that cause impact injuries. Airborne glass fragments typically cause 
penetration or laceration-type injuries. Larger fragments may cause non-pen-etrating, 
or blunt trauma, injuries. Finally, the air-blast pressures can cause occupants to be 
bodily thrown against objects or to fall. Lacerations due to high-velocity flying glass 
fragments have been responsible for a significant portion of the injuries received in 
explosion incidents. In the bombing of the Murrah Federal Building in Oklahoma 
City, for instance, 40 percent of the survivors in the building cited glass as contributing 
to their injuries. Within nearby buildings, laceration estimates ranged from 25 percent 
to 30 percent. 
4.1.3 Levels of Protection 
The amount of explosive and the resulting blast dictate the level of protection 
required to prevent a building from collapsing or minimize injuries and deaths. 
Table 4-1 shows how the DoD correlates levels of protection with potential damage 
and expected injuries. The GSA and the Interagency Security Committee (ISC) also 
use the level of protection concept. However, wherein DoD has five levels, they have 
established four levels of protection. The GSA and ISC levels of protection can be 
found in GSA PBS-P100, Facilities Standards for the Public Buildings Service, November 
2000, Section 8.6. 
Table 4-1: DoD Minimum Antiterrorism (AT) Standards for New Buildings

SOURCE: THE DoD UNIFIED FACILITIES CRITERIA (UFC), DoDMINIMUMANTITERRORISMSTANDARDSFORBUILDINGS, UFC 
4-010-01, 31 JULY 2002 
The levels of protection above can roughly be correlated 
for conventional construction without any blast hardening 
to the following incident pressures as shown in Table 4-2. 
Table 4-2: Correlation of DoD Level of Protection to Incident 
Pressure 
Figure 4-2 shows an example of a range-to-effect chart that indicates the distance or 
stand-off to which a given size bomb will produce a given effect (see Section 4.2). This 
type of chart can be used to display the blast response of a building component or 
window at different levels of protection. It can also be used to consolidate all building 
response information to assess needed actions if the threat weapon-yield changes. For 
example, an amount of explosives are stolen and indications are that they may be used 
against a specific building. A building-specific range-to-effect chart will allow quick 
determination of the needed stand-off for the amount of explosives in question, once 
the explosive weight is converted to trinitrotoluene (TNT) equivalence. Given an ex
nated in the school's parking lot, respectively. A computer-based GIS was used to 
analyze the school's vehicular access and circulation pattern to determine a 
reasonable detonation point for a vehicle bomb. Structural blast analysis was then 
performed using nominal explosive weights and a nominal school structure. The 
results are shown in Figures 4-3 and 4-4. The red ring indicates the area in which 
structural damage is predicted. The orange and yellow rings indicate predictions for 
lethal injuries and severe injuries from glass, respectively. Please note that nominal 
inputs were used in this analysis and they are not a predictive examination. 
Figure 4-2 Explosives environments -blast range to effects

Figure 4-3 Blast analysis of a high school for a typical car bomb detonated in the school's parking lot

Figure 4-4 Blast analysis of a high school for a typical large truck bomb detonated in the school's 
parking lot 
In the case of a stationary vehicle bomb, knowing the size of the bomb (TNT 
equivalent in weight), its distance from the structure, how the structure is put together, 
and the materials used for walls, framing, and glazing allows the designer to 
determine the level of damage that will occur and the level of protection achieved. 
Whether an existing building or a new construction, the designer can then select 
mitigation measures as presented in this chapter and Chapters 2 and 3 to achieve the 
level of protection desired. 
4.2 	STAND-OFF DISTANCE AND THE EFFECTS OF BLAST 
Energy from a blast decreases rapidly over distance. In general, the cost to provide 
asset protection will decrease as the distance between an asset and a threat increases, 
as shown in Figure 4-5. However, increasing stand-off also requires more land and 
more perimeter to secure with barriers, resulting in an increased cost not reflected in 
Figure 4-5. As stand-off increases, blast loads generated by an explosion decrease and 
the amount of hardening necessary to provide the required level of protection 
decreases. 
Figure 4-5 Relationship of cost to stand-off distance 
SOURCE: U.S. AIR FORCE, INSTALLATION FORCE PROTECTION GUIDE 
The critical location of the weapon is a function of the site, the building layout, and 
the security measures in place. For vehicle bombs, the critical locations are 
considered to be at the closest point that a vehicle can approach on each side, 
assuming that all security measures are in place. Typically this is a vehicle parked 
along the curb directly outside the building, or at the entry control point where 
inspection takes place. For internal weapons, location is dictated by the areas of the 
building that are publicly accessible (e.g., lobbies, corridors, auditoriums, cafeterias, 
or gymnasiums). Range or stand-off is measured from the center of gravity of the 
charge located in the vehicle or other container to the building component under 
consideration. 
Defining appropriate stand-off distance for a given building component to resist 
explosive blast effects is difficult. Often in urban settings, it is either not possible or 
practical to obtain appropriate stand-off distance. Adding to the difficulty is the fact 
that defining appropriate stand-off distance requires a prediction of the explosive 
weight of the weapon. In the case of terrorism, this is tenuous at best. 
The DoD prescribes minimum stand-off distances based on the required level of 
protection. Where minimum stand-off distances are met, conventional construction 
techniques can be used with some modifications. In cases where the minimum stand-
off cannot be achieved, the building must be hardened to achieve the required level 
of protection (see the DoD UFC - DoD Minimum Antiterrorism Standards for Buildings, 
UFC 4-010-01, 31 July 2002). 
The first step in predicting blast effects on a building is to predict blast loads on the 
structure. Because blast pressure pulse varies based on stand-off distance, angle of 
incidence, and reflected pressure over the exterior of the building, the blast load 
predictions can be very complex. Consultants may use sophisticated methods such as 
Computational Fluid Dynamics (CFD) computer programs to predict blast loads. 
These complex programs require special equipment and training to run. 
In most cases, especially for design purposes, more simplified methods may be used by 
blast consultants to predict blast loads. Tables of pre-determined values (see GSA 
Security Reference Manual: Part 3-Blast Design & Assessment Guidelines, July 31, 2001) or 
computer programs may be used such as: 1 
. _	ATBLAST (GSA) 
. _	CONWEP (U.S. Army Engineer Research and Development Center) 

Figure 4-6 provides a quick method for predicting the expected overpressure 
(expressed in pounds per square inch or psi) on a building for a specific explosive 
weight and stand-off distance. Enter the x-axis with the estimated explosive weight a 
terrorist might use and the y-axis with a known stand-off distance from a building. By 
correlating the resultant effects of overpressure with other data, the degree of 
damage that the various components of a building might receive can be estimated. 
The vehicle icons in Figure 4-6 indicate the relative size of the vehicles that might be 
used to transport various quantities of explosives. 
The analysis of structures subjected to the effects of an explosion is very complex and 
requires an understanding of structural engineering, dynamics, strengths of materials, 
and specialized training in explosive effects. Such analysis should be performed by 
engineers who can conduct a complex analysis that is both time-dependent and 
accounts for non-linear behavior. In the absence of such an analysis of a specific 
structure, it is possible to provide rough approximations of building damages to be 
expected in an explosive event. Table 4-3 provides basic estimates of incident 
pressures at which different types of damage generally occur to buildings based on the 
incident pressures determined in Figure 4-6. 
1For security reasons, the distribution of these computer programs is limited. 
Figure 4-6	Incident overpressure measured in pounds per square inch, as a function of stand-off 
distance and net explosive weight (pounds-TNT) 
Table 4-3: Damage Approximations 
SOURCES: EXPLOSIVESHOCKSINAIR, KINNEY & GRAHM, 1985; 
FACILITYDAMAGEANDPERSONNELINJURYFROMEXPLOSIVEBLAST, MONTGOMERY & WARD, 1993; AND 
THEEFFECTSOFNUCLEARWEAPONS, 3RD EDITION, GLASSTONE & DOLAN, 1977. 
CHEMICAL, BIOLOGICAL, AND RADIOLOGICAL MEASURES 
his chapter is based on guidance from the Centers for 
Disease Control and Protection (CDC)/National Institute 
for Occupational Safety and Health (NIOSH) and the 
DoD and presents protective measures and actions to 
safeguard the occupants of a school building from CBR 
threats. Evacuation, sheltering in place, personal 
protective equipment, air filtration and pressurization, 
and exhausting and purging will be discussed, as well as 
CBR detection.1 Additionally, CBR design mitigation 
measures are discussed in Chapters 3 and 6, and 
Appendix C contains information on chemical and 
biological agent characteristics. FEMA 426 Reference 
Manual to Mitigate Potential Terrorist Attacks Against Buildings 
contains detailed information on CBR threats. 
Although the likelihood of a direct attack against a school 
is very low, recent terrorist events have increased interest 
in the vulnerability of all types of buildings to CBR threats. 
Of particular concern are building HVAC systems, because 
they can become an entry point and distribution system 
for airborne hazardous contaminants. Even without special 
protective systems, buildings can provide protection in 
varying degrees against airborne hazards that originate 
outdoors. Conversely, the hazards produced by a release 
inside a building can be much more severe than a similar 
release outdoors. Because buildings allow only a limited 
exchange of air between indoors and outdoors, not only 
can 
1 This chapter includes a number of protective measures that are included for informational purposes only. It is not the intention of FEMA to endorse 
any particular product or protective measure. 
After the presence of an airborne hazard is detected, there are five possible protective 
actions for a building and its occupants. In increasing order of complexity and cost, 
these actions are: 
1. 1. Evacuation 
2. 2. Sheltering in Place 
3. 3. Personal Protective Equipment 
4. 4. Filtering and Pressurization 
5. 5. Exhausting and Purging 

These actions are implemented, singly or in combination, when a hazard is present 
or known to be imminent. To ensure these actions will be effective, a school safety 
emergency plan specific to each school, as well as training and familiarization for 
occupants, is required (see Sections 3.11 and 3.12). Exhausting and purging is listed 
last because it is usually the final action after any airborne hazard incident. 
5.1 EVACUATION 
Evacuation is the most common protective action taken when an airborne hazard, 
such as smoke or an unusual odor, is perceived in a building. In most cases, existing 
plans for fire evacuation apply. Orderly evacuation is the simplest and most reliable 
action for an internal airborne hazard, but may not be the best action in all situations, 
especially in the case of an external CBR release or plume, particularly one that is 
widespread. If the area covered by the plume is too large to rapidly and safely exit, 
sheltering in place should be considered. If a CBR agent has infiltrated the building 
and evacuation is deemed not to be safe, the use of protective hoods may be 
appropriate. Two considerations in non-fire evacuation are: 1) to determine if the 
source of the airborne hazard is internal or external to the building; and 2) to 
determine if evacuation may lead to other risks. Also, evacuation and assembly of 
occupants should be on the upwind side of the building and at least 100 feet away, 
because any airborne hazard escaping the structure will be carried downwind. 
5.2 SHELTERING IN PLACE 
Typically, buildings offer little protection to occupants from airborne hazards outside 
the structure because outdoor air must be continuously introduced to provide a 
comfortable, healthy indoor environment. However, a school can provide substantial 
protection against agents released outdoors if the flow of fresh air is filtered/cleaned, 
or temporarily interrupted or reduced. Interrupting the flow of fresh air is the 
principle applied in the protective action known as sheltering in place. Additional 
information can be found in Section 3.4 and Chapter 6 of this primer. 
The need for schools to consider sheltering in place is demonstrated in Figure 5-1, 
which depicts the results of modeling a chemical dispersion from a rail line assuming 
local prevailing winds. Note that the chemical plume travels directly over a nominal 
elementary school. 
Figure 5-1 Example of chemical dispersion 
The advantage of sheltering in place is that it can be implemented rapidly. The 
disadvantage is that its protection is variable and diminishes with the duration of the 
hazard. Sheltering requires that two distinct actions be taken without delay to 
maximize the passive protection a school building provides: 
. _	 First, reduce the indoor-outdoor air exchange rate before the 
hazardous plume arrives. This is achieved by closing all windows and doors, and 
turning off all fans, air conditioners, and combustion heaters. 
. _	 Second, increase the indoor-outdoor air exchange rate as soon as the 
hazardous plume has passed. This is achieved by opening all windows and doors, and 
turning on all fans to ventilate the building. 

The level of protection that can be attained by sheltering in place is substantial, but it 
is less than can be provided by high-effi-ciency filtration of the fresh air introduced 
into the building. The amount of protection varies with: 
. _	 The building's air exchange rate. The tighter the school building (i.e., 
the lower the air exchange rate), the greater the protection it provides. In most cases, 
air conditioners and combustion heaters cannot be operated while sheltering in place 
because operating them increases the indoor-outdoor exchange of air. 
. _	 The duration of exposure. Protection varies with time, diminishing as 
the time of exposure increases. Sheltering in place is, therefore, suitable only for 
exposures of short duration, roughly 2 hours or less, depending on conditions. 
. _	 Purging or period of occupancy. How long students, faculty, and staff 
remain in the building after the hazardous plume has passed also affects the level of 
protection. Because the school building slowly purges contaminants that have entered 
it, at some point during plume passage, the concentration 

inside exceeds the concentration outside. Maximum protection is attained by 
increasing the air exchange rate after plume passage or by exiting into clean air. 
_	 Natural filtering. Some filtering occurs when the agent is deposited in the school 
shell or upon interior surfaces as air passes into and out of the building. The tighter 
the school building, the greater the effect of this natural filtering. 
In a home, taking the actions required for sheltering (i.e., closing windows and 
doors, and turning off all air conditioners, fans, and combustion heaters) is relatively 
simple. Doing so in a school may require more time and planning. All air handling 
units must be turned off and any dampers for outside air must be closed. Procedures 
for a protective action plan, therefore, should include: 
. _	 Identifying all air handling units, fans, and the switches needed to 
deactivate them. 
. _	 Identifying cracks, seams, joints, and pores in the building shell to be 
temporarily sealed to further reduce outside air infiltration. Keeping emergency 
supplies, such as duct tape and polyethylene sheeting, on hand. 
. _	 Identifying procedures for purging after an internal release (i.e., 
opening windows and doors, turning on smoke fans, air handlers, and fans that were 
turned off) to exhaust and purge the building. 
 ._	 Identifying school safe rooms (i.e., interior rooms having a lower air exchange 
rate - see Chapter 6) that may provide a higher level of passive protection. It may be 
desirable to go to a predetermined sheltering room (or rooms) and: 
. � Shut and lock all windows and doors 
. � Seal any windows and vents with plastic sheeting and duct tape 

. � Seal the door(s) with duct tape around the top, bottom, and sides 
. � Firmly pack dampened towels along the bottom of each door 
. � Turn on a TV or radio that can be heard within the shelter and listen for 
further instructions 
. � When the "all clear" is announced, open windows and doors 

Although sheltering is for protection against an external release, it is possible, but 
more complex, to shelter in place on one or more floors of a multi-story school 
building after an internal release has occurred on a single floor. Important 
considerations for use of sheltering in place are that stairwells must be isolated by 
closed fire doors, elevators must not be used, and clear evacuation routes must remain 
open if evacuation is required. Escape hoods may be needed if the only evacuation 
routes are through contaminated areas. 
One final consideration for sheltering in place is that students, faculty, and staff 
cannot be forced to participate. During an event, some building emergency plans call 
for making a concise information announcement, and then giving occupants 3 to 5 
minutes to proceed to the sheltering area or evacuate the building before it is sealed. 
It is important to develop a plan in cooperation with likely participants and awareness 
training programs that include discussions of sheltering in place and events (CBR 
attacks, hazardous material releases, or natural disasters) that might make sheltering 
preferable to evacuation. Training programs and information announcements during 
an event should be tailored to help students, faculty, and staff to make informed 
decisions. 
5.3 PERSONAL PROTECTIVE EQUIPMENT 
A wide range of individual protection equipment is available, including respirators, 
protective hoods, protective suits, CBR detectors, and decontamination equipment. 
Of particular note, new models of universal-fit escape hoods have been developed for 
short-duration "escape-only" wear to protect against chemical agents, aerosols 
(including biological agents), and some toxic industrial chemicals. These hoods are 
compact enough to be stored in desks or to be carried on the belt. They should be 
stored in their sealed pouches and opened only when needed. Most of these hoods 
form protective seals at the neck and do not require special fitting techniques or 
multiple sizes to fit a large portion of the population. Training is required to use the 
hoods properly. Depending on hood design, the wearer must bite on and breathe 
through a mouth bit or use straps to tighten a nose cup around the nose and mouth 
(see Figure 5-2). Escape hoods should be considered, but may not be an effective or 
efficient proposed solution for use in schools, under current threats. 
There are no government standards for hoods intended for protection against the 
malicious use of chemical or biological agents. In selecting an escape hood, a 
purchaser should, therefore, require information on laboratory verification testing. 
Figure 5-2 Universal-fit escape hood Plans should be made for training, fitting, storing, and 
maintaining records relative to storage life, and there should be procedures for 
instructing building occupants about when to put on the hoods. Wearing a hood can 
cause physiological strain and may cause panic or stress that could lead to respiratory 
problems in some people. Finally, it should be recognized that no single selection of 
personal protective equipment is effective against every possible threat. Selection must 
be tied to specific threat/hazard characteristics. 
SOURCE: MSA INTERNATIONAL 
5.4 AIR FILTRATION AND PRESSURIZATION 
Among the various protective measures for school buildings, high-efficiency air 
filtration/cleaning provides the highest level of protection against an outdoor release 
of hazardous materials. It can also provide continuous protection, unlike other 
approaches for which protective measures are initiated upon detecting an airborne 
hazard. Chapter 6 and FEMA 426 Reference Manual to Mitigate Potential Terrorist Attacks 
Against Buildings discuss air filtration in detail. 
Two basic methods of applying air filtration to buildings are external filtration and 
internal filtration. External filtration involves drawing air from outside, filtering 
and/or cleaning it, and discharging the air inside the building or protected zone. 
This provides a higher level of protection, but involves substantially higher costs. 
Internal filtration involves drawing air from inside the building, filtering and/or 
cleaning it, and discharging the air back inside the building. 
The relative levels of protection of the two methods can be illustrated in terms of 
protection factor, and the ratio of external dose and internal dose (concentration 
integrated over time). External filtration systems with high-efficiency filters can yield 
protection factors greater than 100,000. For internal filtration, the protection factors 
are likely to be less and are highly variable. The protection of internal filtration varies 
with a number of factors, including those listed in Section 5.2, the efficiency of the 
filter, flow rate of the filter unit, and size of the room or building in which the filter 
unit operates. 
5.5 EXHAUSTING AND PURGING 
Turning on building ventilation fans and smoke-purge fans is a protective action for 
purging airborne hazards from the building and reducing the hazard to which school 
occupants are exposed, but it is mainly useful when the source of the hazard is 
indoors. 
Purging must be carefully applied with regard to the location of the source and the 
time of the release. It must be clear that the source of the hazard is inside the school 
building and, if not, purging should not be attempted. If the hazardous material has 
been identified before release or immediately upon release, purging should not be 
employed, because it may spread the hazardous material throughout the school 
building or HVAC zone. In this case, all air handling units should be turned off to 
isolate the hazard while evacuating or temporarily sheltering in place. 
Additionally, the ventilation system and smoke purge fans can be used to purge the 
building following an external release after the hazard outdoors has dissipated, and it 
has been confirmed that the agent is no longer present near the school building. 
5.6 CBR DETECTION 
Most strategies for protecting students, faculty, staff, and visitors from airborne hazards 
will require a means of detection (i.e., determining that a hazard exists). Although 
effective and inexpensive devices are widely available to detect, for example, smoke 
and carbon monoxide, there are no detectors that can rapidly alert occupants to a 
broad range of chemical and biological hazards. 
Chemical detection technology has improved vastly since Operation Desert Storm, 
where many military detection systems experienced high false alarm rates, but 
biological detection technology has not matured as fast. Biological signatures are not 
as distinctive as chemical signatures and can take 30 minutes or more to detect. 
Biological detection systems are expensive and generally require trained specialists to 
operate. Current chemical detectors work in approximately 10 seconds; furthermore, 
wide varieties of efficient radiological detectors have been developed for the nuclear 
industry and are commercially available. 
Chemical Detectors. Driven largely by a desire to protect workers from toxic vapors in 
industrial environments, considerable information is known on the toxicity of 
chemical warfare agents, which often have dual uses in industry. A variety of detection 
tech-nologies exist, ranging from inexpensive manual point detection devices (e.g., 
paper strips and calorimetric tubes) utilizing basic chemical reactions to trigger color 
changes, to sophisticated detection systems utilizing advanced technologies. 
Chemical agents do not possess universal properties that 
permit detection by any single method. Therefore, most 
chemical detectors are designed to detect specific agents 
or a group of related agents. Most broad range detection 
systems actually combine several different sensors utilizing 
different technologies and can be very expensive and 
complex. Nevertheless, today there are numerous 
commercially available chemical detectors. The most 
capable detectors utilize ion mobility spectrometry (IMS), 
surface acoustic wave (SAW), or gas chromatograph/mass 
spectrometer (GC/MS) technologies to detect chemical 
agents and toxic industrial materials (TIMs). 
Today, there are commercially available IMS detection systems that will detect most 
chemical agents and many TIMs (see Figure 5-3). They are suitable for integration 
into a building ventilation system, can interface with HVAC control systems, have 
reasonable maintenance requirements (every 3 months), low false alarm rates, and 
can be programmed to detect specific chemical agents. An IMS chemical detector designed for Biological 
Detectors. The current state of
installation in HVAC systems biological detection technology is very dif-

SOURCE: SMITHS DETECTION 
ferent from that of chemical agent 
detection technology. In general, most biological detection 
systems are currently in the research and early 
development stages. There are some commercially 
available devices that have limited utility (responding only 
to a small number of agents) and are generally high cost 
items. Because commercially available biological warfare 
(BW) detection systems and/or components exhibit 
limited utility in detecting and identifying BW agents and 
are also costly, it is strongly recommended that purchasers 
be very careful when considering any device that claims to 
detect BW agents. 
5.7 INDICATIONS OF CBR CONTAMINATION 
Most hazardous chemicals have warning properties that provide a practical means for 
detecting a hazard and initiating protective actions. Such warning properties make 
chemicals perceptible; for example, vapors or gases can be perceived by the human 
senses (i.e., smell, sight, taste, or irritation of the eyes, skin, or respiratory tract) 
before serious effects occur. The distinction between perceptible and imperceptible 
agents is not an exact one. The concentrations at which a person can detect an odor 
vary from person to person, and these thresholds also vary relative to the 
concentration that can produce immediate, injurious effects. 
Most of the industrial chemicals and chemical-warfare agents are readily detectable by 
smell. Soldiers in World Wars I and II were taught to identify, by smell, such agents as 
mustard, phosgene, and chlorine, and this detection method proved effective for 
determining when to put on and take off a gas mask. An exception is the chemical-
warfare agent Sarin, which is odorless and colorless in its pure form and, therefore, 
imperceptible. Among the most common toxic industrial chemicals, carbon 
monoxide is one of the few that is imperceptible. Because it is odorless and colorless, 
it causes many deaths in buildings each year (see Section 6.2.1). 
Biological agents are also imperceptible and there are no detection devices that can 
determine their presence in the air in real time. Current methods for detecting 
bacterial spores, such as anthrax, require a trained operator and expensive 
equipment. It is not currently possible to base protective responses to biological 
agents on detection. 
Researchers are working on a prototype device to automatically and continuously 
monitor the air for the presence of bacterial spores. The device would continuously 
sample the air and use microwaves to trigger a chemical reaction, the intensity of 
which would correspond to the concentration of bacterial spores in the sample. If an 
increase in spore concentration is detected, an alarm similar to a smoke detector 
would sound and a technician would respond and use traditional sampling and 
analysis to confirm the presence of anthrax spores. Researchers hope the device 
response time will be fast enough to help prevent widespread contamination. 
In the absence of a warning property, people can be alerted to some airborne hazards 
by observing symptoms or effects in others. This provides a practical means for 
initiating emergency plans, because the susceptibility to hazardous materials varies 
from person to person. The concentrations of airborne materials may also vary 
substantially within a given building or room, producing a hazard that may be greater 
to some occupants than to others. 
Other warning signs of a hazard may involve seeing and hearing something out of the 
ordinary, such as the hiss of a rapid release from a pressurized cylinder. Awareness of 
warning properties, signs, and symptoms in other people is the basis of an emergency 
plan (see Sections 3.11 and 3.12). Such a plan should apply four possible protective 
actions: evacuating, sheltering in place, using protective masks, and exhausting and 
purging, as already discussed in this chapter. 
For protection against imperceptible agents, the only practical protective measures 
are those that are continuously in place, such as filtering all air brought into the 
building on a continuous basis and using automatic, real-time sensors that are 
capable of detecting the imperceptible agents. 
CBR materials, as well as industrial agents, may travel in the air as a gas or on 
surfaces we physically contact. Dispersion (e.g., colored residue, dead foliage, 
pungent odor, and dead animals, birds, fish, or insects; see Table 5-1 and Figure 
5-4). 
In the case of a biological incident, the onset of symptoms takes days to weeks and, 
typically, there will be no characteristic indicators (see Table 5-2 and Figure 5-5). 
Because of the delayed onset of symptoms in a biological incident, the area affected 
may be greater due to the migration of infected individuals. 
In the case of a radiological incident, the onset of symptoms also takes days to weeks 
to occur and typically there will be no characteristic indicators (see Table 5-3 and 
Figure 5-6). Radiological materials are not recognizable by the senses because they 
are colorless and odorless. 
Specialized equipment is required to determine the size of the affected area and if the 
level of radioactivity presents an immediate or long-term health hazard. Because of 
the delayed onset of symptoms in a radiological incident, the affected area may be 
greater due to the migration of contaminated individuals. 
Table 5-1: Indicators of a Possible Chemical Incident 
Dead animals, birds, fish 
Not just an occasional roadkill, but numerous animals (wild and 
domestic, small and large), birds, and fish in the same area. 
Lack of insect life 
If normal insect activity (ground, air, and/or water) is missing, check 
the ground/water surface/ shore line for dead insects. If near water, 
check for dead fish/aquatic birds. 
Physical symptoms 
Numerous individuals experiencing unexplained water-like blisters, 
wheals (like bee stings), pinpointed pupils, choking, respiratory 
ailments and/or rashes. 
Mass casualties 
Numerous individuals exhibiting unexplained serious health problems 
ranging from nausea to disorientation to difficulty in breathing to 
convulsions to death. 
Definite pattern of 
casualties 
Casualties distributed in a pattern that may be associated with possible 
agent dissemination methods. 
Illness associated with 
confined geographic area 
Lower attack rates for people working indoors than those working 
outdoors, and vice versa. 

Table 5-2: Indicators of a Possible Biological Incident

Unusual numbers of sick 
or dying people or animals 
Any number of symptoms may occur. As a first responder, strong 
consideration should be given to calling local hospitals to see if 
additional causalities with similar symptoms have been observed. 
Casualties may occur hours to days or weeks after an incident has 
occurred. The time required before symptoms are observed is dependent 
on the biological agent used and the dose received. Additional 
symptoms likely to occur include unexplained gastrointestinal illnesses 
and upper respiratory problems similar to flu/colds. 
Unscheduled and unusual 
spray being disseminated 
Especially if outdoors during periods of darkness. 
Abandoned spray devices 
Devices will have no distinct odors. 

Figure 5-5 Placards associated with biological incidents 
Table 5-3 Indicators of a Possible Radiological Incident 
Unusual numbers of sick 
or dying people or animals 
As a first responder, strong consideration should be given to calling 
local hospitals to see if additional casualties with similar symptoms 
have been observed. Casualties may occur hours to days or weeks after 
an incident has occurred. The time required before symptoms are 
observed is dependent on the radioactive material used and the dose 
received. Additional symptoms likely to occur include skin reddening 
and, in severe cases, vomiting. 
Unusual metal debris 
Unexplained bomb/munitionslike material. 
Radiation symbols 
Containers may display a radiation symbol. 
Heat emitting material 
Material that seems to emit heat without any sign of an external 
heating source. 
Glowing material/particles 
If the material is strongly radioactive, it may emit a radioluminescence. 

Figure 5-6 Placards associated with radiological incidents

SAFE ROOMS WITHIN SCHOOLS 

his chapter is a work in progress and will be superceded by a future FEMA 
publication (FEMA 442) that will have expanded guidance on the subject of safe 
rooms. It is intended as a standalone description of the concept of safe rooms within 
schools that will resist CBR and blast threats and to provide school board members 
and decision-makers with the basic components of a protective system. 
It is important to note that the probability of either a CBR or terrorist explosive event 
occurring in the United States is small. This is evidenced by the relatively few domestic 
buildings that have been targeted by intentional CBR or explosive events compared to 
the vast number of buildings that might be considered vulnerable. To date, two 
incidents of biological terrorism have been recorded and acknowledged to have had 
significant impacts on coincident populations in the United States: the 2001 anthrax 
mailings and the 1984 contamination of restaurants with Salmonella bacteria. If a 
localized CBR event were to occur, the potential for contamination to spread and 
cause collateral illnesses and fatalities up to 4 or more kilometers (approximately 21�2 
miles) from the target site would be likely. Unpredictable meteorological conditions 
would play a key role in the spread of such CBR contamination. Similarly, if an 
explosive event were to occur, there would be a significant potential for injuries 
resulting from debris impact and structural collapse. Therefore, in consideration of 
the proximity of some schools with respect to higher profile potential targets in the 
United States, school board members and administrators may determine that their 
select facilities require the design and construction of safe rooms. Because there are 
so many different types of school buildings, with so many different types of 
construction and materials, it is not possible to relate all the following issues to specific 
building types; nevertheless, an attempt was made to relate the relevant threats and 
the general principles of protective design to the development of safe rooms within 
schools. 
This chapter discusses: 
. _		 The different types of hazards 
. _		 The general means by which these hazards might be addressed 
. _		 The protective methods that may be effective 
. _		 The level of effectiveness that may be achieved 
. _		 The information from which decision-makers can estimate the 
cost for providing different levels of protection 

6.1 TYPES OF CBR HAZARDS 
Chemical contaminants of concern are the chemical warfare agents (CWAs) and 
toxic industrial chemicals (TICs). Key attributes of CWAs and TICs are their toxicity, 
volatility, and availability. The most toxic CWAs are the nerve agent liquids, which 
include VX with high toxicity and low volatility, and Sarin with high toxicity and 
moderate volatility. The measured volatility of a chemical represents the ease with 
which the quantity of liquid chemical leaves the liquid state and becomes a gas in 
equilibrium with its volumetric surroundings. So, an occupant of a room where Sarin 
liquid is naturally evaporating is at much greater 
risk than the same individual being in the same room with the same or (to a degree 
greater) quantity of a naturally evaporating VX agent (see Appendix C). The lethality 
of VX exceeds the lethality of Sarin by dose, but Sarin is much more volatile than VX. 
6.1.1 Toxic Industrial Chemicals 
Though of lower toxicity than nerve agents, TICs are widely available, and some can 
be easily obtained or produced without sophisticated equipment. Among the 
hundreds of TICs produced worldwide are several that have been used as CWAs (e.g., 
arsine, chlorine, hydrogen cyanide, phosgene, hydrogen sulfide, acrolein, and 
cyanogen chloride). Those that have been used in warfare are considered second-rate 
CWAs because their toxicity and vapor pressure make them less effective than other 
agents for open-air battlefield use. 
6.1.2 	Incapacitating and Tear-producing Agents 
Although incapacitating and tear-producing agents are considered non-lethal, indoor 
releases can, under certain conditions, produce lethal concentrations. In addition to 
the tear-producing agents, there are commercially available agents containing 
oleoresin capsicum (OC), the natural oil of chili peppers. The malicious or accidental 
release of pepper spray has caused many disruptive incidents in recent years. In 
contact with the eyes, nose, or mouth, OC causes immediate 
pain and inflammation. Inhaled, its aerosol causes choking and gasping for breath. 
Of low vapor pressure, OC is easily filtered. 
6.1.3 	Biological Agents 
Biological agents include bacteria, viruses, and rickettsia. Toxins, which are poisons of 
biological origin and not living organisms, are sometimes grouped with biological 
agents and sometimes with chemical agents. Although there are hundreds of 
microorganisms that could be used as biological agents, the likely number is much 
smaller when the agents' effectiveness, reliability, availability, ease of manufacture, and 
stability in storage and dissemination are considered. When disseminated as aerosols, 
biological agents are most effective in the size range of 1 to 5 microns, because they 
can remain suspended for long periods. Smaller particles are less likely to survive as 
aerosols, and larger particles settle rapidly, making them less likely to enter the lungs. 
The settling time in still air for an anthrax spore (1 micron by 0.7 micron in size) is 
approximately 1�2 foot per hour. Particles of this size are readily filtered from an air 
stream with high-ef-ficiency particulate air (HEPA) filters. Toxins, which may be in 
crystalline or liquid form, are also filterable with HEPA when disseminated as aerosols. 
6.1.4 Radiological Agents 
Radiological agents are radioactive materials. Explosive release is the most likely 
means of disseminating such agents in a terrorist attack (e.g., a "dirty bomb" consisting 
of radioactive material packaged with a conventional explosive). The likely radioactive 
ingredients are those used for industrial and medical purposes (e.g., isotopes of 
cesium, cobalt, and iridium). They are commonly found in hospitals and labs, often 
with few safeguards. Given the availability of nuclear reactors for research or energy 
production by universities, research facilities, or private industries, the threat 
associated with radiological materials is significant. Radiological contaminants are very 
persistent, in that their decay rate is extremely slow. Unlike chemical or biological 
agents, decontamination involves only removal, not neutralization. Radiological 
aerosols present a health hazard if ingested or inhaled, but are easily filtered from an 
air stream with HEPA filters. 
6.2 MOST LIKELY DELIVERY METHODS FOR CBR AGENTS 
For purpose of vulnerability assessments, delivery methods are divided into four types 
of releases: internal, external proximate, remote, and remote with forewarning. 
6.2.1 Internal Release 
This involves transporting a container of agent into a building and releasing the 
contents manually, automatically, or remotely. Such a device may rely simply upon 
natural evaporation (as in the Tokyo subway Sarin attack), with the rate of evaporation 
proportional to the surface area that develops as liquid agent spills from its container. 
Aerosolization may occur with movement of an open package or letter containing a 
biological agent. A sprayer powered by batteries or compressed air can produce an 
effective dose of an agent quite rapidly. An agent can be released in any area served by 
return ducts/plenums or in a mechanical room, with dissemination through an air-
handling unit. Biological agents can also be placed into certain types of humidifier 
systems. 
6.2.2 External Proximate Release 
This involves introducing an agent or a dissemination device from outside the 
building directly through a penetration in the building shell, such as a fresh-air 
intake. Vulnerability to this type of release is highest when air intakes are at 
accessible, unsecured locations at ground level. Agents can also be delivered through 
other penetrations, but potential effectiveness is less in the absence of a driving force 
(a fan) to introduce and distribute air within the building. A documented example of 
an attack through a ground-level penetration is the release of a toxic industrial gas 
from a pressurized cylinder through a dryer vent. External proximate release also 
includes forcing open or breaking windows and doors to introduce agents from 
pressurized cylinders or tossing a grenade or container of an agent into the building. 
6.2.3 Remote Release 
If directed at a specific facility, this type of attack involves a plume, puff, or line source 
generated so that the wind carries the agent to the target building; the facility may be 
the target or collaterally in the direction of the attack. The most efficient type of 
remote attack is a directed-plume attack with a ground-level source placed upwind of a 
building's fresh-air intakes or open windows. A ground-level, directed-plume attack 
was conducted with the nerve agent Sarin from a distance of 60 yards in Matsumoto, 
Japan, in 1994, killing 7 and injuring 264 in a zone 500 yards deep and 100 yards wide. 
A remote attack can also involve an aerial release. Release from an aircraft is much less 
likely to affect a specific, targeted building, however, because the vertical rate of 
transport, governed by settling time and atmospheric stability, is extremely difficult to 
judge. 
6.2.4 Remote Release with Forewarning 
This type of attack differs from other remote releases because protective actions other 
than those for no-warning attacks can be applied. This type involves warning in the 
form of an explosion or an event such as an accidental or intentional release of an 
agent from a chemical transport or storage tank. Scenarios involving forewarning 
include sabotage of toxic industrial storage tanks/ trucks, transport accidents, fires, or 
the impending release of a chemical agent from a point upwind of the building. 
Quantities of agent that could be released from a single 3,000-gallon tanker truck are 
approximately 34,000 pounds for phosgene, 35,000 pounds for chlorine, and 17,000 
pounds for hydrogen cyanide. 
6.3	VULNERABILITY TO REMOTE CBR RELEASE 
In the absence of a secure perimeter around the building (see Section 2.4) and a real-
time detection system, vulnerability to a remote release is determined by: 1) the 
efficiency of the school building's filtration system in removing aerosols and gases, 2) 
the unfiltered component of air exchange, and 3) the configuration of the school 
building and elevation of air intakes. These vulnerabilities can be characterized as 
follows. 
_		 Efficiency of gas filtration. Generally, if adsorbers are found in buildings, they 
are for the purpose of improving indoor air quality by removing both outdoor and 
indoor air pollutants, particularly corrosive gases such as sulfur dioxide, nitrogen 
dioxide, and ozone, and are used where appropriate for protecting against the 
deleterious effects of these gases. Although not intended for protecting people 
from toxic chemical agents, these gas adsorbers do reduce the vulnerability to an 
attack with certain chemical agents. 
With a 1-inch bed thickness of coarse (4x6 mesh) sorbent 
granules and a short residence time of these indoor air 
quality filters, the efficiency is about 99 percent initially, 
and it diminishes with time in service, typically to about 25 
percent in a year. There is also an initial bypass of roughly 1 
percent through the bed and additional bypasses among filter 
modules' holding frames. The bypasses may increase with 
time in service, dropping the net efficiency below the initial 
level. This compares with an efficiency of greater than 99.999 
percent for gas adsorbers designed for protection of people in 
military applications. Removal efficiency for these indoor air 
quality adsorbers is relatively low and uncertain for some of 
the threat agents (the capacity for arsine is low, for example). 
Thus, the efficiency and capacity are highly variable. 
Manufacturers provide surveillance testing to determine when 
to change filters and recommend that they be changed when 
reactive capacity has dropped to 25 percent of the initial 
value. The typical service life for single stage, 1-inch beds is 
approximately 1 year.

_		 Particulate filtration. Significant particulate filtration can be accomplished by 
using a 35-percent pre-filter and a 95percent filter in series. The efficiency of this 
filter train is in the range of 95 to 99 percent for 1-micron particles in the new 
condition, and this efficiency increases as the filters load. 
_	 Unfiltered air exchange. Typical of schools, a substantial portion of the air 
exchanged between indoors and outdoors may not pass through the filters of any 
air-handling units. When this occurs, the level of protection the building structure 
provides is, therefore, governed not by the efficiency of the filters but rather by 
that portion of makeup air bypassing the filters. There are several paths by which 
air exchange is driven by fans, buoyancy, and/or wind pressures. They include 
operable windows; doorways with flows driven by buoyancy, particularly in summer 
and winter when indoor-outdoor temperature differentials are highest; and 
unintentional openings in the building shell. When internal resistance is minimal, 
less dense (buoyant) warm air rises and flows out of a school building near its top 
in winter, drawing in cool air at the lower levels. Conversely, in summer, cool air 
falls and flows out of the building's base. The buoyancy effect tends to be less 
pronounced in spring and fall because of smaller indoor and outdoor temperature 
differences. With the standard draw-through configuration of the air-handling 
units, leakage paths at the access doors and panels are subject to inward pressure; 
these leakage paths increase as the gaskets age. Typically, access doors also fail to 
seal well with filter frames, allowing bypass that increases with age. 
_		 Typical protection factors achievable. In terms of protection factor, protection 
against aerosols (biological/radiological agents and others such as tear gas) 
provided by the best (standard) filtration systems available in air-handling units is 
substantial, but relatively low (in the range of approximately 5 to 50). Protection 
factor is a ratio of dose (concentration integrated over time) of an agent outside 
divided by the resulting dose of agent inside a building). This level of protection is 
comparable to that achievable with sheltering in place or an active detection-
based system that responds by de-energizing fans and closing dampers. The 
higher value in this range is estimated by taking the inverse of the penetration 
factor for 1-micron particles through the filters, including an initial bypass of 
approximately 1 percent. The lower value in the protection-factor range is 
estimated for both particulate and gas filters by using 20 percent as an estimate of 
the unfiltered air exchange; the inverse of the penetration factor (0.2) is 5. 
With an indoor air quality filter unit having a gas adsorber, the protection factor for 
gases can be as high as 50, but only when filters are new and only with gas adsorbers. 
The protection drops to a low value as the filter efficiency decreases with time in 
service. This may be less than 2 if the efficiency drops below 50 percent after 1 year in 
service. The protection factor against gases is also reduced by the portion of outside 
air (which could be at least 80 percent) that does not flow through gas adsorbers. With 
a penetration of 80 percent, the protection factor for gases for the whole building is 
less than 2. 
6.4 	VULNERABILITY TO REMOTE CBR RELEASE WITH 
FOREWARNING  
This type of attack involves release of agent by explosion or rapid release from a 
tanker truck, rail car, or fixed storage tank. The potential for this type of attack is 
higher when the facility is near rail lines, public roads with truck traffic, or storage 
tanks of toxic chemicals. This type of attack may also involve an explosive release of a 
radiological agent (i.e., a "dirty bomb" attack at a distance from the building great 
enough to allow for protective actions to be taken before wind carries the agent to the 
building). 
The criterion for this aspect of vulnerability is the ability to rapidly assume a 
sheltering-in-place posture (see Section 5.2). The main requirements are 
plans/procedures for sheltering, controls to rapidly turn off all fans, and a 
communications or public address system to facilitate closing of doors and keeping 
them closed while an outdoor hazard is present or imminent. Protection factors vary, 
diminishing with time of exposure; however, scenarios of explosive release under most 
conditions would present a relatively short exposure to the school building. 
6.5 	VULNERABILITY TO INTERNAL CBR RELEASE 
This is a remote possibility owing to the nature and likelihood of other vandalism and 
that actual targeting of a school has no historical precedence. Nevertheless, internal 
releases involve covert entry or covert introduction of agents in containers. 
Vulnerability to internal release is, therefore, determined principally by physical 
security measures in place. Containers of agents may be hand-car-ried or delivered in 
mail, supplies, or equipment. Other factors affecting this vulnerability are internal 
(recirculation) filtration and how well entry zones where any screening takes place are 
isolated architecturally and mechanically. 
The basis for preventing covert introduction of agents is access control and entry 
screening. Use of the X-ray machine for hand-carried items facilitates the detection 
of containers large enough to hold hazardous quantities of chemical agents; however, 
it requires specific operating procedures for doing so, and it may not be effective in 
detecting containers of hazardous quantities of biological agents. Obviously, such 
procedures are not recommended for schools without provocation (i.e., an actual 
threat) because of cost. 
6.6 	VULNERABILITY TO EXTERNAL PROXIMATE CBR 
RELEASE 
Vulnerability to external proximate release is determined mainly by the accessibility 
of outside air intakes to covert introduction of agent or agent-dissemination device. 
Unless air intakes are relocated at a higher elevation, this vulnerability would remain 
high. 
The three strategies for protecting a school building from airborne hazards 
originating outdoors are air filtration, controlling air exchange, and exclusion by 
physical security. Options presented in this chapter focus on air filtration; however, 
enhanced filtration techniques discussed earlier would be applied most 
economically in schools to a selected safe room, such as a school gymnasium or 
auditorium. Without a secure exclusion zone around the school building, physical 
security measures are limited to those described above for external proximate 
release and internal release. 
Controlling air exchange is most commonly employed with human detection and 
warning (i.e., sheltering in place). It can also be applied with automatic, real-time 
detection equipment, but with very limited effectiveness. Few agents among the full 
spectrum of threat agents can be detected with accuracy in real time. Protection 
factors vary with response time and, even with instantaneous response, protection 
factors are no greater than the maximum protection factors achievable with sheltering 
in place. As the response time increases, protection factors diminish. With current 
technology, response times are longest for biological agent detection. The response 
time for presumptive identification by a detector such as the Joint Biological Point 
Detection System is approximately 30 minutes and far exceeds the response time 
needed for effective use of sheltering in place. A biological detection system would 
not, therefore, prevent the contamination of a particular building. 
_		 Criteria for protective performance. All of the following discussion represents 
extreme measures applied to high-risk, high-security assets or, in general, to lesser 
degrees, safe rooms, and perhaps to would-be safe rooms for schools. There is no 
standard requirement for protection factors. U.S. military systems are designed to 
achieve protection factors greater than 10,000. The criterion applied to military 
masks and collective protection 
shelters is 6,667, which is based upon specific levels for chemical agents on the 
battlefield and for threshold effects of the chemical agents on soldiers. There is no 
criterion for biological or radiological agents based upon concentrations and doses 
likely to be developed in an attack on a school building; however, it would be 10,000 or 
greater. 
The selection of a CBR safe room in a school building requires an assessment of 
factors contributing to infiltration (or wind penetration from the outside). To prevent 
infiltration through the protected envelope requires an internal pressure of 
approximately 50 Pascals [0.2 inch, water gauge (iwg)]. This pressure does not prevent 
infiltration driven by buoyancy and wind pressures under all possible conditions, but it 
does so under wind conditions most conducive to a (stand-off) plume attack (see 
Table 6-1). The level of safe room pressurization should exceed 95-99 percent of the 
meteorological conditions for the given school location. Note that wind does not exert 
a uniform pressure on a building face; the pressure varies by location on the building 
face and the angle of incidence. A 20 mile-per-hour (mph) wind velocity is not un-
common in the United States and, thus, a safe room pressurized to 50 Pascals would 
prevent infiltration from time averaged 20 mph winds. 
Table 6-1: Pressures Exerted on a School Building Face by Wind 
*Time Averaged and Normal (90%) Incidence to School Building Face 
There are several options for improving protection factors with filtration; they involve 
both the type/configuration of the filter system and the extent of the protective 
envelope. 
_		 Options for type of filter system. Four options for a dedicated type of filtration 
system for a safe room include: 
. � Improving mixed-air particulate filtration of air-handling units. Particulate 
filters may be upgraded to 95-percent filters, providing the potential for substantial 
improvement in protection against biological agent aerosols. The limit of protection 
factor against 1-micron particles, however, is approximately 100 with pressurization of 
the protective envelope and reduction of bypass at the filter frames. Reduction of 
bypass requires sealing and gasketing existing retainers, slide-in tracks, and access 
doors, and adding gaskets between filter frames in slide-in tracks. Pressurization can 
be achieved by rebalancing the air-handling units and controlling the flows through 
open doorways and windows. Among the options for improvement are to upgrade the 
filters to HEPA with leak-tight holding frames; with pressurization, this would increase 
the potential protection factor to about 10,000 for biological agents, but not for 
chemical agents. This option requires special holding fixtures for the filters and may 
require replacement of supply fans to accommodate higher pressure drop. 
. �	Improving mixed-air gas filtration of the air-handling units. An option to 
increase protection factors of a school building for chemical agents is to install gas 
adsorbers in air-handling units. This would involve adding the indoor air quality (IAQ) 
type adsorbers to existing air-handling units, at a cost of $0.50 per cfm. With a 1-year 
service life, the filter replacement costs would be $0.25 per cfm. Additional energy 
related operating costs would be incurred due to the pressure drop of the adsorbers 
(0.75 iwg). This option does not provide high efficiency against all chemical agents. 
. � Installing makeup-air units with HEGA and HEPA filters. A makeup air unit 
for both gases and aerosols includes the following components in series: pre-filter, fan, 
HEPA filter, HEGA filter, and heating and cooling coils. The makeup-air unit provides 
filtered outside air to pressurize the protective 

envelope. It eliminates recirculation and the internally induced infiltration 
associated with applying a single fan for both makeup air and recirculated air. The 
most cost-effective HEGA filter units currently available for protection from 
chemical agents employ the military-standard 200-cfm radial-flow filters per MIL-
PRF-51527A, "Filter Set, Gas-particulate, 200 cfm," Type II. These contain ASZM-
TEDA carbon of 12x30 mesh size in 2-inch-deep beds, which removes all chemical 
warfare agents and a substantial number of toxic industrial chemicals. These provide 
removal efficiency greater than 99.999 percent throughout their service life 
(estimated at 3 years). HEPA filters are standard components with HEGA systems. 
These military adsorbers cost approximately $4.50 per cfm, and their expected 
service life is 3 years, although service life varies with the air quality of the region and 
the moisture to which the filters are exposed over time. Maintenance costs run 
approximately $2 per year per cfm. Maintenance also includes changing HEPA 
filters annually and pre-filters every 90 days. With total pressure drop of 6 iwg across 
the adsorber and HEPA filter, energy costs for the high-efficiency filtration run 
approximately $0.50 per cfm per year. 
� Installing makeup-air units with HEPA only. Use of only HEPA in a makeup-air unit 
would provide a high level of protection from biological agents, radiological agents, 
solid aerosols such as tear gas, and liquid aerosols of low vapor pressure. High-level 
protection against biological aerosols is particularly beneficial because there is no 
capability for real-time detection of biological agents (all strategies that require 
biological detection are mitigation strategies involving decontamination and 
medical treatment). Use of HEPA only in a makeup-air unit would substantially 
reduce hardware costs, maintenance costs, and electrical costs of ventilation as well 
as the space requirements for the units. Protection at a lower level would still be 
provided by filtration of recirculated air with gas adsorbers in air-handling units. 
6.7 	RECOMMENDATIONS FOR CBR PROTECTION 
The following actions are recommended for CBR protection: 
. _		 To provide a substantial level of protection against an external 
release of CBR agents, apply any one of the filtration options summarized above to a 
renovated school gymnasium or auditorium safe room. 
. _		 To protect against a remote attack with a chemical or 
radiological agent, plans, procedures, and training for sheltering in place should be 
developed. To support this protective measure, a rapid notification system (public 
address system) and controls for rapid deactivation of fans and closing of dampers 
should be defined. A guide for developing protective action plans is available in the 
Army Corps of Engineers draft Technical Instruction TI 853-01 Protecting Buildings and 
Their Occupants from Airborne Hazards, dated October 2001. 
. _		 To reduce vulnerability to internal release, implement security 
procedures specific to entry screening for containers of unknown liquids or gases 
being carried into the secure area. Provide training to employees on awareness of the 
CBR threat and the protective action plan. 

6.8 	SAFE ROOMS IN RESPONSE TO THE DOMESTIC 
EXPLOSIVE THREAT 
The concept of safe rooms has been around for quite some time. Bomb shelters were 
used in the United Kingdom (U.K.) during World War II to protect the civilian 
populations against aerial attack and fall-out shelters were established in cities in the 
United States during the Cold War to protect against the lingering effects of a feared 
nuclear attack. More recently, the Israeli Defense Force (IDF) requires apartment 
protected spaces (APSs) or floor protected spaces (FPSs) to be constructed in every 
new building or to be added to existing buildings according to engineering specifica-
tions. In buildings in which no shelters exist, interior rooms may be converted to 
shelters by following IDF instructions. In all cases, the shelters must be accessible 
within 2 minutes of a warning siren. The protected spaces are intended to serve as a 
refuge when an attack is suspected, either through early warning or remote detection; 
however, the protected space is much less effective when the event takes place without 
warning. Two minutes and eleven seconds elapsed between the time the Ryder truck 
stopped in front of the Murrah Federal Building in Oklahoma City and the detonation 
of its explosives, but no one was alerted to the danger until the explosion occurred.1 At 
Khobar Towers in Dhahran, Saudi Arabia, U.S. Air Force Security Police observers on 
the roof of the building overlooking the perimeter identified the attack in progress 
and alerted many occupants to the threat; however, evacuation was incomplete and 
500 people were wounded and 19 people were killed by the explosion.2 
The effectiveness of the safe room in protecting occupants from the effects of an 
explosive detonation is, therefore. highly dependent on early detection and warning. 
Unless the attacker notifies authorities of a bomb threat, as often occurred in the 
terrorist activities in Northern Ireland, the safe room can best be used after an 
explosion occurs in anticipation of a second attack. The 1998 bombing of the U.S. 
Embassy in Kenya was preceded by a small explosion that drew curious embassy 
employees to the windows; such a tactic, if repeated in the United States, would justify 
the relocation of school occupants to a safe room until school officials are able to 
determined that it is safe to disperse the students. To these limited objectives, the 
establishment of a safe room in schools may serve a useful purpose. Given the nature 
of the explosive threat, however, it may be more effective to provide debris mitigating 
protective measures for all exterior fa�ade elements. 
It is important to understand the nature of the domestic explosive threat in order to 
effectively plan for the protection of different 
1 The structural features of the building, including the transfer girders that spanned over the main entrances, along with the relatively short distance 
from the curb to the face of the building, were the most significant contributing factors to the collapse. 
2 Although the precast structure was subjected to overwhelming blast loads, which blew the front fa�ade into the occupied spaces, the building 
was designed to the U.K. regulations, which have provisions for structural robustness that require precast components to be tied together. 
types of facilities and particularly for the establishment of safe rooms in schools. 
Although the patterns of past events may not predict the future, they give valuable 
insight to the protection against a very low probability, but potentially high 
consequence event. As previously discussed, despite a wide range of terrorist events, 
such as CBR contamination, an explosion remains the most insidious threat, requiring 
the least sophisticated materials and expertise. The principal components of an 
explosive device can be obtained at a variety of retail outlets, without arousing 
suspicion. Every year, over 1,000 intentional explosive detonations are reported by the 
FBI Bomb Data Center. In 1998, the last year for which the compiled data were 
published, there were 1,225 actual incidents of unauthorized explosions in the United 
States.3 The majority of these explosives were targeted against residential properties 
and vehicles; however, 76 explosive events were detonated at educational facilities, 
causing a total of $28,500 in property damage.4 In addition to these actual events, 63 
incidents involving hoax devices were investigated. By contrast, only one explosive 
device was detonated at a Federal Government facility, causing $1.5 million in 
property damage, and eight were 
detonated at local/state government facilities, causing $316,000 in property damage. 
Over 70 percent of the people involved in bombing incidents were "young offenders" 
and less than 1�2 percent were members of terrorist groups. Vandalism was the 
motivation in 40 percent of the intentional and accidental bombing incidents. Al-
though two out of three attacks were perpetrated between 6 p.m. and 6 a.m., the 
incidents against educational facilities were more uniformly distributed throughout 
the day. Although each successive major domestic terrorist event exceeded the 
intensity of 
3 U.S. Department of Justice, Federal Bureau of Investigation, General Information Bulletin 98-1. 
4 The Bomb Data Center information does not indicate whether any of these events were preceded by a warning nor does it indicate the average weight 
of explosives used. 
the predecessor, this is not particularly relevant to the threats to which a school 
structure might be subjected; if an explosive were to be detonated in or around a 
school building, it would most likely be a small improvised device assembled by a 
youth and vandalism is most likely to be the motive. 
The size of the explosive that might be considered for a protective design is limited by 
the maximum weight that might be transported either by hand or by vehicle (for 
additional information, see Section 4.2). Despite the large weight of explosives that 
might be transported by vehicle, there have been relatively few large-scale explosive 
events within the United States. The 1995 explosion that collapsed portions of the 
Murrah Federal Building in Oklahoma City contained 4,800 pounds of ammonium 
nitrate and fuel oil (ANFO) and the 1993 explosion within the parking garage be-
neath the World Trade Center complex contained 1,200 pounds of urea nitrate. As 
implied by the FBI statistics, the majority of the domestic events contain significantly 
smaller weights of low energy explosives. The explosive that was used in the 1996 pipe 
bomb attack at the Olympics in Atlanta consisted of smokeless powder and was 
preceded by a warning that was called in 23 minutes before the detonation. 
Nevertheless, the protective design of structures focuses on the effects of high energy 
explosives and relates the different mixtures to an equivalent weight of trinitrotoluene 
(TNT). 
As discussed in Chapter 4, the distance of the protected structure from the point of 
explosive detonation is commonly referred to as the stand-off distance. As the front of 
the shock-wave propagates away from the source of the detonation at supersonic 
speed, it expands into increasingly larger volumes of air, the peak incident pressure at 
the shock front decreases, and the duration of the pressure pulse increases. The shock 
front first impinges on the leading surfaces of a structure located within its path and 
then engulfs the entire structure. Both the intensity of peak pressure and the impulse, 
which considers the effect of both pressure intensity and pulse duration, affect the 
hazard potential of the blast loading. Other issues, such as the geometry of the waves 
impacting the protected structure and the reflectivity of the surroundings, will either 
amplify or reduce the intensity of the blast loading. 
6.9 	LOCATING SAFE ROOMS TO MITIGATE THREATS 
The building's fa�ade is its first real defense against the effects of a bomb and typically 
the weakest component that would be subjected to blast pressures. Although the 
response of specific glazed components5 is a function of the dimensions, make-up, and 
construction techniques, the conventionally glazed portions of the fa�ade would 
shatter and inflict severe wounds when subjected to a 50-pound explosive detonation 
at a stand-off distance on the order of 200 feet. If the glazed elements are upgraded 
with a fragment retention film (FRF), the same fa�ade element may be able to 
withstand a 50-pound explosive detonation at a stand-off distance on the order of 70 
feet. Unreinforced masonry block walls are similarly vulnerable to collapse when 
subjected to a 50-pound threat at a stand-off distance of 50 feet; however, if these same 
walls are upgraded with a debris catching system, they may be able to sustain this same 
intensity explosive detonation at a stand-off distance on the order of 20 feet. If the 
weight of explosives were increased from 50 pounds to 500 pounds, the required 
stand-off distances to prevent severe wounds increases to 500 feet for conventional 
window glazing, 200 feet for window glazing treated with a FRF, 250 feet for 
unreinforced masonry block walls, and 60 feet for masonry walls upgraded with a 
debris catching system. Based on these dimensions, it is apparent that substantial 
standoff distances are required for the unprotected structure and these distances may 
be significantly reduced through the use of debris mitigating retrofit systems. 
Furthermore, because blast loads diminish with distance and geometry of wave 
propagation relative to the loaded surface of the building, the larger threats at larger 
stand-off distances are likely to damage a larger percentage of fa�ade elements than 
the more localized effects of smaller threats at shorter stand-off distances. Safe rooms 
that may be located within the school should, therefore, be located in windowless 
spaces or spaces in which the window glazing was upgraded with a FRF. 
5 Glazing refers to the glass make-up, either single pane or insulated double pane, that is used in a window system. 
Although small weights of explosives are not likely to produce significant blast loads 
on the roof, low-rise structures may be vulnerable to blast loadings resulting from large 
weights of explosives at large stand-off distances that may sweep over the top of the 
building. The blast pressures that may be applied to these roofs are likely to far exceed 
the conventional design loads and, unless the roof is a concrete deck or concrete slab 
structure, it may be expected to fail. There is little that can be done to increase the 
roof's resistance to blast loading that doesn't require extensive renovation of the 
building structure. Therefore, safe rooms should be located at lower floors, away from 
the roof debris that may rain down in response to blast loading. 
The building's lateral load resisting system, the structural frame or shear walls that 
resist wind and seismic loads, will be required to receive the blast loads that are 
applied to the exterior fa�ade and transfer them to the building's foundation. This 
load path is typically through the floor slabs that act as diaphragms and interconnect 
the different lateral resisting elements. The lateral load resisting system for a school 
building depends, to a great extent, on the type of construction and region. In many 
cases, low-rise buildings do not receive substantial wind and seismic forces and, 
therefore, do not require substantial lateral load resisting systems. Because blast loads 
diminish with distance, a package sized explosive threat is likely to locally overwhelm 
the fa�ade, thereby limiting the force that may be transferred to the lateral load re-
sisting system. However, the intensity of the blast loads that may be applied to the 
building could exceed the design limits for most conventional school construction. As 
a result, the building is likely to be subjected to large inelastic deformations that may 
produce severe cracks to the structural and nonstructural partitions. There is little that 
can be done to upgrade the existing school structure to make it more flexible in 
response to a blast loading that doesn't require extensive renovation of the building. 
Safe rooms should, therefore, be located close to the interior shear walls or reinforced 
masonry walls in order to provide maximum structural support in response to these 
uncharacteristically large lateral loads. 
In addition to the hazard of impact by fa�ade debris propelled into the building or 
roof damage that may rain down, the occupants may also be vulnerable to much 
heavier debris resulting from structural damage. Progressive collapse occurs when an 
initiating localized failure causes adjoining members to be overloaded and fail, 
resulting in an extent of damage that is disproportionate to the originating region of 
localized failure. The initiating localized failure may result from a sufficiently sized 
parcel bomb that is in contact with a critical structural element or from a vehicle sized 
bomb that is located at a short distance from the structure. However, a large explosive 
device at a large stand-off distance is not likely to selectively cause a single structural 
member to fail; any damage that results from this scenario is more likely to be 
widespread and the ensuing collapse cannot be considered progressive. Although 
progressive collapse is not typically an issue for buildings three stories or shorter, 
transfer girders or precast construction may produce structural systems that are not 
tolerant of localized damage conditions. The columns that support transfer girders 
and the transfer girders themselves may be critical to the stability of a large area of 
floor space. Similarly, precast construction that relies on individual structural panels 
may not be sufficiently tied together to resist the localized damage or large structural 
deformations that may result from an explosive detonation. As a result, safe rooms 
should not be located on a structure that is either supported by or underneath a 
structure that is supported by transfer girders unless the building is evaluated by a 
licensed professional engineer. The connection details for multi-story precast 
structures should also be evaluated before the building is used to house a safe room. 
Nonstructural building components (e.g., piping, ducts, lighting units, and conduits) 
that are located within safe rooms must be 
sufficiently tied back to a competent structure to prevent failure of the services and 
the hazard of falling debris. To mitigate the effects of in-structure shock that may 
result from the infilling of blast pressures through damaged windows, the 
nonstructural systems should be located below the raised floors or tied to the ceiling 
slabs with seismic restraints. 
6.10 FRAGMENT MITIGATING UPGRADES 
The conversion of existing construction to provide blast-resis-tant protection requires 
upgrades to the most fragile or brittle elements enclosing the safe room. Failure of the 
glazed portion of the fa�ade represents the greatest hazard to the occupants. 
Therefore, the exterior glazed elements of the school fa�ade and, in particular, the 
glazed elements of the designated safe rooms, should be protected with a FRF, also 
commonly known as anti-shatter film (ASF), "shatter-resistant window film" (SRWF), 
or "security film." These materials consist of a laminate that will improve post-damage 
performance of existing windows. Applied to the interior face of glass, ASF holds the 
fragments of broken glass together in one sheet, thus reducing the projectile hazard 
of flying glass fragments. See FEMA 426 Reference Manual to Mitigate Potential Terrorist 
Attacks Against Buildings for more information. 
Most ASFs are made from polyester-based materials and coated with adhesives. They 
are available as clear, with minimal effects to the optical characteristics of the glass, 
and tinted, which provide a variety of aesthetic and optical enhancements and can 
increase the effectiveness of existing heating/cooling systems. Most films are designed 
with solar inhibitors to screen out ultraviolet (UV) rays and are available treated with 
an abrasion resistant coating that can prolong the life of tempered glass.6 However, 
over time, the UV absorption damages the film and degrades its effectiveness. 
According to published reports, testing has shown that a 7-mil thick film, or specially 
manufactured 4-mil thick film, is the minimum thickness that is required to provide 
hazard mitigation from blast. Therefore, a 4-mil thick ASF should be utilized only if it 
has demonstrated, through explosive testing, that it is capable of providing the desired 
hazard level response. 
The application of security film must, at a minimum, cover the clear area of the 
window. The clear area is defined as the portion of the glass unobstructed by the 
frame. This minimum applica
6 Abrasions on the faces of tempered glass reduce the glass strength. 
tion, termed daylight installation, is commonly used for retrofitting windows. By this 
method, the film is applied to the exposed glass without any means of attachment or 
capture within the frame. Application of the film to the edge of the glass panel, 
thereby extending the film to cover the glass within the bite, is called an edge to edge 
installation and is often used in dry glazing installations. Other methods of retrofit 
application may improve the film performance, thereby reducing the hazard; 
however, these are typically more expensive to install, especially in a retrofit situation. 
Although a film may be effective in keeping glass fragments together, it may not be 
particularly effective in retaining the glass in the frame. ASF is most effective when it is 
used with a blast tested anchorage system. Such a system prevents the failed glass from 
exiting the frame. 
The wet glazed installation, a system where the film is positively attached to the frame, 
offers more protection than the daylight installation. This system of attaching the film 
to the frame reduces glass fragmentation entering the building. The wet glazing 
system utilizes a high strength liquid sealant, such as silicone, to attach the glazing 
system to the frame. This method is more costly than the daylight installation. 
Securing the film to the frame with a mechanically connected anchorage system 
further reduces the likelihood of the glazing system exiting the frame. Mechanical 
attachment includes anchoring methods that employ screws and/or batten strips that 
anchor the film to the frame along two or four sides. The mechanical attachment 
method can be less aesthetically pleasing when compared to wet glazing because 
additional framework is necessary and is more expensive than the wet glazed 
installation. 
Window framing systems and their anchorage must be capable of transferring the 
blast loads to the surrounding walls. Unless the frames and anchorages are competent, 
the effectiveness of the attached films will be limited. Similarly, the walls must be able 
to withstand the blast loads that are directly applied to them and accept the blast loads 
that are transferred by the windows. The strength of these walls may limit the 
effectiveness of the glazing upgrades. 
If a major rehabilitation of the fa�ade is required to improve the mechanical 
characteristics of the building envelope, a laminated glazing replacement is 
recommended. Laminated glass consists of two or more pieces of glass permanently 
bonded together by a tough plastic interlayer made of polyvinyl butyral (PVB) resin. 
After being sealed together, the glass "sandwich" behaves as a single unit. Annealed, 
heat strengthened, tempered glass, or polycarbonate glazing can be mixed and 
matched between layers of laminated glass in order to design the most effective lite 
for a given application. When fractured, fragments of laminated glass tend to adhere 
to the PVB interlayer, rather than falling free and potentially causing injury. 
Laminated glass can be expected to last as long as ordinary glass provided it is not 
broken or damaged in any way. It is very important that laminated glass is correctly 
installed in order to ensure long life. Regardless of the degree of protection required 
from the window, laminated glass needs to be installed with adequate sealant to 
prevent water from coming in contact with the edges of the glass. A structural sealant 
will adhere the glazing to the frame and allow the PVB interlayer to develop its full 
membrane capacity. Similar to attached film upgrades, the window frames and 
anchorages must be capable of transferring the blast loads to the surrounding walls. 
Blast curtains are made from a variety of materials, including a warp knit fabric or a 
polyethylene fiber. The fiber can be woven into a panel as thin as 0.029 inch that 
weighs less than 1.5 ounces per square foot. This fact dispels the myth that blast 
curtains are heavy sheets of lead that completely obstruct a window opening and 
eliminate all natural light from the interior of a protected building. The blast curtains 
are affixed to the interior frame of a window opening and essentially catch the glass 
fragments produced by a blast wave. The debris is then deposited on the floor at the 
base of the window. Therefore, the use of these curtains does not eliminate the 
possibility of glass fragments penetrating the interior of the occupied space, but 
instead limits the travel distance of the airborne debris. Overall, the hazard level to 
occupants is significantly reduced by the implementation of the blast curtains. 
However, a person sitting directly adjacent to a window outfitted with a blast curtain 
may still be injured by shards of glass in the event of an explosion. 
The main components of any blast curtain system are the curtain itself, the 
attachment mechanism by which the curtain is affixed to the window frame, and 
either a trough or other retaining mechanism at the base of the window to hold the 
excess curtain material. The blast curtain with curtain rod attachment and sill trough 
differ largely from one manufacturer to the next. The curtain fabric, material 
properties, method of attachment, and manner in which they operate all vary, thereby 
providing many options within the overall classification of blast curtains. This fact 
makes blast curtains applicable in many situations. 
Blast curtains differ from standard curtains in that they do not open and close in the 
typical manner. Although blast curtains are intended to remain in a closed position at 
all times, they may be pulled away from the window to allow for cleaning, blind or 
shade operation, or occupant egress in the case of fire. However, the curtains can be 
rendered ineffective if installed such that easy access would provide opportunity for 
occupants to defeat their operation. The color and openness factor of the fabric 
contributes to the amount of light that is transmitted through the curtains and the see-
through visibility of the curtains. Although the color and weave of these curtains may 
be varied to suit the aesthetics of the interior d�cor, the appearance of the windows is 
altered by the presence of the curtains. 
The curtains may either be anchored at the top and bottom of the window frame or 
anchored at the top only and outfitted with a weighted hem. The curtain needs to be 
extra long with the surplus either wound around a dynamic tension retainer or 
stored in a reservoir housing. When an explosion occurs, the curtain feeds out of the 
receptacle to absorb the force of the flying glass fragments. The effectiveness of the 
blast curtains relies on their use and no protection is provided when these curtains 
are pulled away from the glazing. 
Rigid catch bar systems have been designed and tested as a means of increasing the 
effectiveness of laminated window upgrades. Laminated glazing is designed to hold 
the glass shards together as the window is damaged; however, unless the window 
frames and attachments are upgraded as well to withstand the capacity of the glazing, 
this retrofit will not prevent the entire sheet from flying free of the window frames. 
The rigid catch bars intercept the laminated glass and disrupt their flight; however, 
they are limited in their effectiveness, tending to break the dislodged fa�ade materials 
into smaller projectiles. 
Rigid catch bar systems collect huge forces upon impact and require substantial 
anchorage into a very substantial structure to prevent failure. If either the 
attachments or the supporting structure are incapable of restraining the forces, the 
catch system will be dislodged and become part of the debris. Alternatively, the de-
bris may be sliced by the rigid impact and the effectiveness of the catch bar will be 
severely reduced. 
Flexible catch bars can be designed to absorb a significant amount of the energy upon 
impact, thereby keeping the debris intact and impeding their flight. These systems 
may be designed to effectively repel the debris and inhibit their flight into the 
occupied spaces. These systems may be designed to repel the debris from the failed 
glazing as well as the walls in which the windows are mounted. The design of the 
debris restraint system must be strong enough to withstand the momentum 
transferred upon impact and the connections must be capable of transferring the 
forces to the supporting slabs and spandrel beams. However, under no circumstances 
can the design of the restraint system add significant amounts of mass to the structure 
that may be dislodged and present an even greater risk to the occupants of the 
building. 
Cables are extensively used to absorb significant amounts of energy upon impact and 
their flexibility makes them easily adaptable to many situations. The diameter of the 
cable, the spacing of the strands, and the means of attachment are all critical in 
designing an effective catch system. These catch cable concepts have been used by 
protective design window manufacturers as restraints for laminated lites. The use of 
cable systems has long been recognized as an effective means of stopping massive 
objects moving at high velocity. To confirm the adequacy of the cable catch system to 
restrain the debris resulting from an explosive event, an analytical simulation or a 
physical test is required. 
High performance energy absorbing cable catcher systems retain glass and frame 
fragments and limit the force transmitted to the supporting structure. These 
commercially available retrofit products consist of a series of 1�4-inch diameter 
stainless steel cables connected with a shock-absorbing device to an aluminum box 
section, which is attached to the jambs, the underside of the header, and the topside 
of the sill. The energy absorbing characteristics allow the catch systems to be 
attached to relatively weakly constructed walls without the need for additional costly 
structural reinforcement. To reduce the possibility of slicing the laminated glass, the 
cable may either be sheathed in a tube or an aluminum strip may be affixed to the 
glass directly behind the cable. 
Unreinforced CMU walls provide limited protection against air-blast due to 
explosions. When subjected to overload from air-blast, brittle unreinforced CMU walls 
will fail and the debris will be propelled into the interior of the structure, possibly 
causing severe injury or death to the occupants. This wall type has been prohibited for 
new construction where protection against explosive threats is required. Existing 
unreinforced CMU walls may be retrofitted with a sprayed-on polymer coating to 
improve their air-blast resistance. This innovative retrofit technique takes advantage of 
the toughness and resiliency of modern polymer materials to effectively deform and 
dissipate the blast energy while containing the shattered wall fragments. Although the 
sprayed walls may shatter in a blast event, the elastomer material remains intact and 
contains the debris. 
The blast mitigation retrofit for unreinforced CMU walls consists of an interior and 
optional exterior layer of polyurea applied to exterior walls and ceilings. The polyurea 
provides a ductile and resilient membrane that catches and retains secondary 
fragmentation from the existing concrete block as it breaks apart in response to an air-
blast wave. These fragments, if allowed to enter the occupied space, are capable of 
producing serious injury and death to occupants of the structure. 
In lieu of the elastomer, an aramid (Geotextile) debris catching system may be 
attached to the structure by means of plates bolted through the floor and ceiling 
slabs. Similar to the elastomer retrofit, the aramid layer does not strengthen the wall; 
instead, it restrains the debris that would otherwise be hurled into the occupied 
spaces. 
6.11 STRUCTURAL UPGRADES 
It may not be possible for existing construction to be retrofitted to limit the extent of 
collapse to one floor on either side of the failed column. If the members are 
retrofitted to develop catenary behavior, the adjoining bays must be upgraded to 
resist the large lateral forces associated with this mode of response. This may require 
more extensive retrofit than is either feasible or desirable. In such a situation, it may 
be desirable to isolate the collapsed region rather than risk propagating the collapse 
to adjoining bays. The retrofit of existing structures to protect against a potential 
progressive collapse resulting from the detonation of a terrorist explosive threat may, 
therefore, best be achieved through the localized hardening of vulnerable columns. 
These columns need only be upgraded to a level of resistance that balances the 
capacities of all adjacent structural elements. At greater blast intensities, the resulting 
damage would be extensive and termed global collapse rather than progressive 
collapse. Attempts to upgrade the structure to conform to the alternate path 
approach will be invasive and potentially counterproductive. Care must be taken not 
to weaken a structure in the attempt to make it more robust. 
Conventionally designed columns may be vulnerable to the effects of explosives, 
particularly when placed in contact with their surface. Stand-off elements, in the form 
of partitions and enclosures, may be designed to guarantee a minimum stand-off 
distance; however, this alone may not be sufficient. Additional resistance may be 
provided to reinforced concrete structures by means of a steel jacket or a carbon fiber 
wrap that effectively confines the concrete core, thereby increasing the confined 
strength and shear capacity of the column, and holds the rubble together to permit it 
to continue carrying the axial loads. The capacity of steel flanged columns may be 
increased with a reinforced concrete encasement that adds mass to the steel section 
and protects the relatively thin flange sections. The details for these retrofits must be 
designed to resist the specific weight of explosives and stand-off distance. 
The floor slabs are typically designed to resist downward gravity loading and have 
limited capacity to resist uplift pressures or the upward deformations experienced 
during a load reversal. Therefore, floor slabs that may be subjected to significant uplift 
pressures, such that they overcome the gravity loads and subject the slabs to reversals 
in curvature, require additional reinforcement. If the slab does not contain this 
tension reinforcement, it must be supplemented with a lightweight carbon fiber 
application that may be bonded to the surface at the critical locations. Carbon fiber 
reinforcing mats bonded to the top surface of slabs would strengthen the floors for 
upward loading and reduce the likelihood of slab collapse from blast infill uplift 
pressures as well as internal explosions in mailrooms or other susceptible regions. This 
lightweight high tensile strength material will supplement the limited capacity of the 
concrete to resist these unnatural loading conditions. An alternative approach may be 
to notch grooves in the top of concrete slabs and epoxy carbon fiber rods into grooves; 
although this approach may offer a greater capacity, it is much more invasive and has 
not been evaluated with explosive testing. 
ACRONYMS A

A

ADAAG Americans with Disabilities Act Accessibility Guidelines 
AED automated external defibrillator ANFO 
ammonium nitrate and fuel oil APS apartment 
protected space ASF anti-shatter film ASZM-TEDA 
copper-silver-zinc-molybdenum-
triethylenediamine AT antiterrorism ATF Bureau 
of Alcohol, Tobacco, and Firearms 
B

BPL bound with pitch-low BW biological warfare 
CBR chemical, biological, or radiological CCTV closed circuit television CDC Centers 
for Disease Control and Prevention CFD Computational Fluid Dynamics cfm cubic 
feet per minute CMU concrete masonry unit 
CPR 
cardiopulmonary resuscitation 
CPTED 
Crime Prevention Through Environmental 
Design 
CWA 
chemical warfare agent 
D 

DHS 
Department of Homeland Security 
DOC 
Department of Commerce 
DoD 
Department of Defense 
DOE 
Department of Education 
DOJ 
Department of Justice 
DOS 
Department of State 
E 

EP&R 
Directorate of Emergency Preparedness and 

Response (DHS) 
F 

FBI 
Federal Bureau of Investigation 
FEMA 
Federal Emergency Management Agency 
FPS 
floor protected space 
FRF 
fragment retention film 

G

GC/MS gas chromatograph/mass spectrometer 
GIS Geographic Information System 
GSA General Services Administration 
H 
HazMat hazardous materials HEGA high-efficiency gas adsorber HEPA high-efficiency 
particulate air HSO Homeland Security Office HVAC heating, ventilation, and air 
conditioning 
IAQ indoor air quality ID identification IDF Israeli Defense Fund 
IMS ion mobility spectrometry ISC Interagency Security Committee IT information 
technology iwg inch water gauge 
M 
mph miles per hour 
N 

NACCT 
National Advisory Committee on Children 
and 

Terrorism 
NAVFAC 
Naval Facilities Command 
NFPA 
National Fire Protection Association 
NFPC 
National Fire Protection Code 
NIOSH 
National Institute for Occupational Safety 
and 

Health 
O 

OC 
oleoresin capsicum 
P 

PIO 
Public Information Officer 
psi 
pounds per square inch 
pvb 
polyvinyl butyral 
S 

SAW 
surface acoustic wave 
SRWF 
shatter-resistant window film 

T

TEDA triethylenediamine TIC toxic industrial chemical TIM toxic industrial material 
TNT trinitrotoluene 
U

UFAS Uniform Federal Accessibility Standards UFC Unified Facilities Criteria 
U.K. United Kingdom UPS uninterrupted power supply 
U.S. United States USACE U.S. Army Corps of Engineers UV ultraviolet 
V 
VA Department of Veterans Affairs 
GENERAL GLOSSARY     B

This appendix contains some terms that do not actually appear in this manual. 
They have been included to present a comprehensive list that pertains to this 
series of publications. 
A

Access control. Any combination of barriers, gates, electronic security equipment, 
and/or guards that can deny entry to unauthorized personnel or vehicles. 
Access control point. A station at an entrance to a building or a portion of a building 
where identification is checked and people and hand-carried items are searched. 
Access controls. Procedures and controls that limit or detect access to minimum 
essential infrastructure resource elements (e.g., people, technology, applications, 
data, and/or facilities), thereby protecting these resources against loss of integrity, 
confidentiality, accountability, and/or availability. 
Accountability. The explicit assignment of responsibilities for oversight of areas of 
control to executives, managers, staff, owners, providers, and users of minimum 
essential infrastructure resource elements. 
Active vehicle barrier. An impediment placed at an access control point that may be 
manually or automatically deployed in response to detection of a threat. 
Aerosol. Fine liquid or solid particles suspended in a gas (e.g., fog or smoke). 
Aggressor. Any person seeking to compromise a function or structure. 
Airborne contamination. Chemical or biological agents introduced into and fouling 
the source of supply of breathing or conditioning air. 
Antiterrorism (AT). Defensive measures used to reduce the vulnerability of 
individuals, forces, and property to terrorist acts. 
Area lighting. Lighting that illuminates a large exterior area. 
Assessment. The evaluation and interpretation of measurements and other 
information to provide a basis for decision-making. 
Asset. A resource of value requiring protection. An asset can be tangible (e.g., 
people, buildings, facilities, equipment, activities, operations, and information) or 
intangible (e.g., processes or a company's information and reputation). 
Asset protection. Security program designed to protect personnel, facilities, and 
equipment, in all locations and situations, accomplished through planned and 
integrated application of combating terrorism, physical security, operations security, 
and personal protective services, and supported by intelligence, counterintelligence, 
and other security programs. 
Asset value. The degree of debilitating impact that would be caused by the 
incapacity or destruction of an asset. 
Attack. A hostile action resulting in the destruction, injury, or death to the civilian 
population, or damage or destruction to public and private property. 
B

Balanced magnetic switch. A door position switch utilizing a reed switch held in a 
balanced or center position by interacting magnetic fields when not in alarm 
condition. 
Ballistics attack. An attack in which small arms (e.g., pistols, submachine guns, 
shotguns, and rifles) are fired from a distance and rely on the flight of the projectile 
to damage the target. 
Barbed tape or concertina. A coiled tape or coil of wires with wire barbs or blades 
deployed as an obstacle to human trespass or entry into an area. 
Barbed wire. A double strand of wire with four-point barbs equally spaced along the 
wire deployed as an obstacle to human trespass or entry into an area. 
Barcode. A black bar printed on white paper or tape that can be easily read with an 
optical scanner. 
Biological agents. Living organisms or the materials derived from them that cause 
disease in or harm to humans, animals, or plants or cause deterioration of material. 
Biological agents may be used as liquid droplets, aerosols, or dry powders. 
Blast curtains. Heavy curtains made of blast-resistant materials that could protect 
the occupants of a room from flying debris. 
Blast-resistant glazing. Window opening glazing that is resistant to blast effects because 
of the interrelated function of the frame and glazing material properties frequently 
dependent upon tempered glass, polycarbonate, or laminated glazing. 
Blast vulnerability envelope. The geographical area in which an explosive device will 
cause damage to assets. 
Bollard. A vehicle barrier consisting of a cylinder, usually made of steel and 
sometimes filled with concrete, placed on end in the ground and spaced about 3 feet 
apart to prevent vehicles from passing, but allowing entrance of pedestrians and 
bicycles. 
Building hardening. Enhanced construction that reduces vulnerability to 
external blast and ballistic attacks. 
Building separation. The distance between closest points on the exterior walls of 
adjacent buildings or structures. 
Cable barrier. Cable or wire rope anchored to and suspended off the ground or 
attached to chain-link fence to act as a barrier to moving vehicles. 
Chemical agent. A chemical substance that is intended to kill, seriously injure, or 
incapacitate people through physiological effects. Generally separated by severity of 
effect (e.g., lethal, blister, and incapacitating). 
Clear zone. An area that is clear of visual obstructions and landscape materials that 
could conceal a threat or perpetrator. 
Closed circuit television (CCTV). An electronic system of cameras, control 
equipment, recorders, and related apparatus used for surveillance or alarm 
assessment. 
Collateral damage. Injury or damage to assets that are not the primary target of an 
attack. 
Combating terrorism. The full range of federal programs and activities applied 
against terrorism, domestically and abroad, regardless of the source or motive. 
Community. A political entity that has the authority to adopt and enforce laws and 
ordinances for the area under its jurisdiction. In most cases, the community is an 
incorporated town, city, township, village, or unincorporated area of a county; 
however, each state defines its own political subdivisions and forms of government. 
Components and cladding. Elements of the building envelope that do not qualify as 
part of the main wind-force resisting system. 
Confidentiality. The protection of sensitive information against unauthorized 
disclosure and sensitive facilities from physical, technical, or electronic penetration 
or exploitation. 
Consequence Management. Measures to protect public health and safety, restore 
essential government services, and provide emergency relief to governments, 
businesses, and individuals affected by the consequences of terrorism. State and 
local governments exercise the primary authority to respond to the consequences 
of terrorism. 
Contamination. The undesirable deposition of a chemical, biological, or 
radiological material on the surface of structures, areas, objects, or people. 
Control center. A centrally located room or facility staffed by personnel charged with 
the oversight of specific situations and/ or equipment. 
Controlled area. An area into which access is controlled or limited. It is that 
portion of a restricted area usually near or surrounding a limited or exclusion 
area. Correlates with exclusion zone. 
Controlled lighting. Illumination of specific areas or sections. 
Controlled perimeter. A physical boundary at which vehicle and personnel access is 
controlled at the perimeter of a site. Access control at a controlled perimeter should 
demonstrate the capability to search individuals and vehicles. 
Conventional construction. Building construction that is not specifically designed 
to resist weapons, explosives, or chemical, biological, and radiological effects. 
Conventional construction is designed only to resist common loadings and 
environmental effects such as wind, seismic, and snow loads. 
Coordinate. To advance systematically an exchange of information among 
principals who have or may have a need to know certain information in order to 
carry out their roles in a response. 
Counterintelligence. Information gathered and activities conducted to protect 
against: espionage, other intelligence activities, sabotage, or assassinations conducted 
for or on behalf of foreign powers, organizations, or persons; or international 
terrorist activities, excluding personnel, physical, document, and communications 
security programs. 
Counterterrorism (CT). Offensive measures taken to prevent, deter, and respond 
to terrorism. 
Covert entry. Attempts to enter a facility by using false credentials or stealth. 
Crash bar. A mechanical egress device located on the interior side of a door that 
unlocks the door when pressure is applied in the direction of egress. 
Crime Prevention Through Environmental Design (CPTED). A crime prevention 
strategy based on evidence that the design and form of the built environment can 
influence human behavior. CPTED usually involves the use of three principles: 
natural surveillance (by placing physical features, activities, and people to maximize 
visibility); natural access control (through the judicial placement of entrances, exits, 
fencing, landscaping, and lighting); and territorial reinforcement (using buildings, 
fences, pavement, signs, and landscaping to express ownership). 
Crisis Management (CM). The measures taken to identify, acquire, and plan the 
use of resources needed to anticipate, prevent, and/or resolve a threat or act of 
terrorism. 
Critical assets. Those assets essential to the minimum operations of the organization, 
and to ensure the health and safety of the general public. 
Critical infrastructure. Primary infrastructure systems (e.g., utilities, 
telecommunications, transportation, etc.) whose incapacity would have a debilitating 
impact on the school's ability to function. 
D

Damage assessment. The process used to appraise or determine the number of injuries 
and deaths, damage to public and private property, and the status of key facilities and 
services (e.g., schools, hospitals and other health care facilities, fire and police stations, 
communications networks, water and sanitation systems, utilities, and transportation 
networks) resulting from a manmade or natural disaster. 
Data gathering panel. A local processing unit that retrieves, processes, stores, 
and/or acts on information in the field. 
Debris-catching system. Blast wallpaper, fragmentation blankets, or any similar 
system applied to the inside of a building's exterior walls. Debris-catching systems 
are often made of Kevlar or geotextile material and are designed to collect wall 
material debris in the event of an external explosion and to shield occupants from 
injuries. 
Decontamination. The reduction or removal of a chemical, biological, or 
radiological material from the surface of a structure, area, object, or person. 
Defense layer. Building design or exterior perimeter barriers intended to delay 
attempted forced entry. 
Defensive measures. Protective measures that delay or prevent attack on an asset or 
that shield the asset from weapons, explosives, and CBR effects. Defensive measures 
include site work and building design. 
Design Basis Threat (DBT). The threat (e.g., tactics and associated weapons, tools, or 
explosives) against which assets within a building must be protected and upon which 
the security engineering design of the school is based. 
Design constraint. Anything that restricts the design options for a protective system or 
that creates additional problems for which the design must compensate. 
Design opportunity. Anything that enhances protection, reduces requirements for 
protective measures, or solves a design problem. 
Design team. A group of individuals from various engineering and architectural 
disciplines responsible for the protective system design. 
Disaster. An occurrence of a natural catastrophe, technological accident, or human-
caused event that has resulted in severe property damage, deaths, and/or multiple 
injuries. 
Domestic terrorism. The unlawful use, or threatened use, of force or violence by a 
group or individual based and operating entirely within the United States or Puerto 
Rico without foreign direction committed against persons or property to intimidate or 
coerce a government, the civilian population, or any segment thereof in furtherance 
of political or social objectives. 
Dose rate (radiation). A general term indicating the quantity (total or accumulated) 
of ionizing radiation or energy absorbed by a person or animal, per unit of time. 
Dosimeter. An instrument for measuring and registering total accumulated 
exposure to ionizing radiation. 
Duress alarm devices. Also known as panic buttons, these devices are designated 
specifically to initiate a panic alarm. 
E

Effective stand-off distance. A stand-off distance at which the required level of 
protection can be shown to be achieved through analysis or can be achieved through 
building hardening or other mitigating construction or retrofit. 
Electronic Entry Control Systems (EECS). Electronic devices that automatically verify 
authorization for a person to enter or exit a controlled area. 
Electronic Security System (ESS). An integrated system that encompasses interior and 
exterior sensors, closed circuit television systems for assessment of alarm conditions, 
Electronic Entry Control Systems, data transmission media, and alarm reporting 
systems for monitoring, control, and display of various alarm and system information. 
Emergency. Any natural or human-caused situation that results in or may result in 
substantial injury or harm to the population or substantial damage to or loss of 
property. 
Emergency Environmental Health Services. Services required to correct or improve 
damaging environmental health effects on humans, including inspection for food 
contamination, inspection for water contamination, and vector control; providing for 
sewage and solid waste inspection and disposal; cleanup and disposal of hazardous 
materials; and sanitation inspection for emergency shelter facilities. 
Emergency Medical Services (EMS). Services including personnel, facilities, and 
equipment required to ensure proper medical care for the sick and injured from the 
time of injury to the time of final disposition, including medical disposition within a 
hospital, temporary medical facility, or special care facility; release from the site; or 
declared dead. Further, Emergency Medical Services specifically include those 
services immediately required to ensure proper medical care and specialized 
treatment for patients in a hospital and coordination of related hospital services. 
Emergency Operations Center (EOC). The protected site from which state and local 
civil government officials coordinate, monitor, and direct emergency response 
activities during an emergency. 
Emergency Operations Plan (EOP). A document that describes how people and 
property will be protected in disaster and disaster threat situations; details who is 
responsible for carrying out specific actions; identifies the personnel, equipment, 
facilities, supplies, and other resources available for use in the disaster; and outlines 
how all actions will be coordinated. 
Emergency Public Information (EPI). Information that is disseminated primarily in 
anticipation of an emergency or at the actual time of an emergency and, in addition 
to providing information, frequently directs actions, instructs, and transmits direct 
orders. 
Entry control point. A continuously or intermittently manned station at which entry to 
sensitive or restricted areas is controlled. 
Equipment closet. A room where field control equipment such as data gathering 
panels and power supplies are typically located. 
Evacuation. Organized, phased, and supervised dispersal of people from 
dangerous or potentially dangerous areas. 
Evacuation, mandatory or directed. This is a warning to persons within the 
designated area that an imminent threat to life and property exists and individuals 
MUST evacuate in accordance with the instructions of local officials. 
Evacuation, spontaneous. Residents or citizens in the threatened areas observe an 
emergency event or receive unofficial word of an actual or perceived threat and, 
without receiving instructions to do so, elect to evacuate the area. Their movement, 
means, and direction of travel are unorganized and unsupervised. 
Evacuation, voluntary. This is a warning to persons within a designated area that a 
threat to life and property exists or is likely to exist in the immediate future. 
Individuals issued this type of warning or order are NOT required to evacuate; 
however, it would be to their advantage to do so. 
Evacuees. All persons removed or moving from areas threatened or struck by a 
disaster. 
Exclusion area. A restricted area containing a security interest. Uncontrolled 
movement permits direct access to the item. See controlled area and limited area. 
Exclusion zone. An area around an asset that has controlled entry with highly 
restrictive access. See controlled area. 
F

Federal Coordinating Officer (FCO). The person appointed by the FEMA 
Director to coordinate federal assistance in a Presidentially declared emergency 
or major disaster. 
Federal Response Plan (FRP). The FRP establishes a process and structure for the 
systematic, coordinated, and effective delivery of federal assistance to address the 
consequences of any major disaster or emergency. 
Fence protection. An intrusion detection technology that detects a person crossing a 
fence by various methods such as climbing, crawling, cutting, etc. 
Fence sensor. An exterior intrusion detection sensor that detects aggressors as they 
attempt to climb over, cut through, or otherwise disturb a fence. 
Field of view. The visible area in a video picture. 
First responder. Local police, fire, and emergency medical personnel who first arrive 
on the scene of an incident and take action to save lives, protect property, and meet 
basic human needs. 
Forced entry. Entry to a denied area achieved through force to create an opening in 
fence, walls, doors, etc., or to overpower guards. 
Fragment retention film (FRF). A thin, optically clear film applied to glass to minimize 
the spread of glass fragments when the glass is shattered. 
Frangible construction. Building components that are designed to fail to vent blast 
pressures from an enclosure in a controlled manner and direction. 
G

Glare security lighting. Illumination projected from a secure perimeter into the 
surrounding area, making it possible to see potential intruders at a considerable 
distance while making it difficult to observe activities within the secure perimeter. 
Glazing. A material installed in a sash, ventilator, or panes (e.g., glass, plastic, etc., 
including material such as thin granite installed in a curtain wall). 
Governor's Authorized Representative (GAR). The person empowered by the 
Governor to execute, on behalf of the State, all necessary documents for disaster 
assistance. 
H 
Hazard. A source of potential danger or adverse condition. 
Hazard mitigation. Any action taken to reduce or eliminate the long-term risk to 
human life and property from hazards. The term is sometimes used in a stricter 
sense to mean cost-effective measures to reduce the potential for damage to a 
facility or facilities from a disaster event. 
Hazardous material (HazMat). Any substance or material that, when involved in an 
accident and released in sufficient quantities, poses a risk to people's health, safety, 
and/or property. These substances and materials include explosives, radioactive 
materials, flammable liquids or solids, combustible liquids or solids, poisons, 
oxidizers, toxins, and corrosive materials. 
High-hazard areas. Geographic locations that, for planning purposes, have been 
determined through historical experience and vulnerability analysis to be likely to 
experience the effects of a specific hazard (e.g., hurricane, earthquake, hazardous 
materials accident, etc.), resulting in vast property damage and loss of life. 
High-risk target. Any material resource or facility that, because of mission sensitivity, 
ease of access, isolation, and symbolic value, may be an especially attractive or 
accessible terrorist target. 
Human-caused hazard. Human-caused hazards are technological hazards and 
terrorism. They are distinct from natural hazards primarily in that they originate from 
human activity. Within the military services, the term threat is typically used for 
human-caused hazard. See definitions of technological hazards and terrorism for 
further information. 
I

International terrorism. Violent acts or acts dangerous to human life that are a 
violation of the criminal laws of the United States or any state, or that would be a 
criminal violation if committed within the jurisdiction of the United States or any 
state. These acts appear to be intended to intimidate or coerce a civilian population, 
influence the policy of a government by intimidation or coercion, or affect the 
conduct of a government by assassination or kidnapping. International terrorist acts 
occur outside the United States, or transcend national boundaries in terms of the 
means by which they are accomplished, the persons they appear intended to coerce 
or intimidate, or the locale in which their perpetrators operate or seek asylum. 
Intrusion Detection System (IDS). The combination of components, including 
sensors, control units, transmission lines, and monitor units, integrated to operate in 
a specified manner. 
J

Jersey barrier. A protective concrete barrier initially and still used as a highway divider 
that now also functions as an expedient method for traffic speed control at entrance 
gates and to keep vehicles away from buildings. 
Laminated glass. A flat lite of uniform thickness consisting of two monolithic glass 
plies bonded together with an interlayer material as defined in Specification 
C1172. Many different interlayer materials are used in laminated glass. 
Landscaping. The use of plantings (shrubs and trees), with or without landforms 
and/or large boulders, to act as a perimeter barrier against defined threats. 
Layers of protection. A traditional approach in security engineering using concentric 
circles extending out from an area to be protected as demarcation points for different 
security strategies. 
Level of protection (LOP). The degree to which an asset is protected against 
injury or damage from an attack. 
Liaison. An agency official sent to another agency to facilitate interagency 
communications and coordination. 
Limited area. A restricted area within close proximity of a security interest. 
Uncontrolled movement may permit access to the item. Escorts and other internal 
restrictions may prevent access to the item. See controlled area and exclusion area. 
Line of sight (LOS). Direct observation between two points with the naked eye or 
hand-held optics. 
Line-of-sight sensor. A pair of devices used as an intrusion detection sensor that 
monitor any movement through the field between the sensors. 
Local government. Any county, city, village, town, district, or political subdivision of 
any state, and Indian tribe or authorized tribal organization, or Alaska Native village or 
organization, including any rural community or unincorporated town or village or any 
other public entity. 
M

Mail-bomb delivery. Bombs or incendiary devices delivered to the target in letters or 
packages. 
Minimum measures. Protective measures that can be applied to all buildings 
regardless of the identified threat. These measures offer defense or detection 
opportunities for minimal cost, facilitate future upgrades, and may deter acts of 
aggression. 
Mitigation. Those actions taken to reduce the exposure to and impact of an attack 
or disaster. 
Motion detector. An intrusion detection sensor that changes state based on movement 
in the sensor's field of view. 
Moving vehicle bomb. An explosive-laden car or truck driven into or near a building 
and detonated. 
Mutual Aid Agreement. A pre-arranged agreement developed between two or more 
entities to render assistance to the parties of the agreement. 
N

Natural hazard. Naturally-occurring events such as floods, earthquakes, tornadoes, 
tsunami, coastal storms, landslides, and wildfires that strike populated areas. A 
natural event is a hazard when it has the potential to harm people or property (FEMA 
386- 2 Understanding Your Risks). The risks of natural hazards may be increased or 
decreased as a result of human activity; however, they are not inherently human-
induced. 
Natural protective barriers. Natural protective barriers are mountains and 
deserts, cliffs and ditches, water obstacles, or other terrain features that are 
difficult to traverse. 
Non-exclusive zone. An area around an asset that has controlled entry, but shared or 
less restrictive access than an exclusive zone. 
Non-persistent agent. An agent that, upon release, loses its ability to cause 
casualties after 10 to 15 minutes. It has a high evaporation rate, is lighter than air, 
and will disperse rapidly. It is considered to be a short-term hazard; however, in 
small, unventilated areas, the agent will be more persistent. 
Nuclear, biological, or chemical weapons. Also called Weapons of Mass Destruction 
(WMD). Weapons that are characterized by their capability to produce mass 
casualties. 
P

Passive vehicle barrier. A vehicle barrier that is permanently deployed and does 
not require response to be effective. 
Perimeter barrier. A fence, wall, vehicle barrier, landform, or line of vegetation 
applied along an exterior perimeter used to obscure vision, hinder personnel access, 
or hinder or prevent vehicle access. 
Persistent agent. An agent that, upon release, retains its casualty producing effects for 
an extended period of time, usually anywhere from 30 minutes to several days. A 
persistent agent usually has a low evaporation rate and its vapor is heavier thanair; 
therefore, its vapor cloud tends to hug the ground. It is considered to be a long-term 
hazard. Although inhalation hazards are still a concern, extreme caution should be 
taken to avoid skin contact as well. 
Physical security. The part of security concerned with measures/ concepts designed 
to safeguard personnel; to prevent unauthorized access to equipment, installations, 
materiel, and documents; and to safeguard them against espionage, sabotage, 
damage, and theft. 
Planter barrier. A passive vehicle barrier, usually constructed of concrete and filled 
with dirt (and flowers for aesthetics). Planters, along with bollards, are the usual street 
furniture used to keep vehicles away from existing buildings. Overall size and the 
depth of installation below grade determine the vehicle stopping capability of the 
individual planter. 
Plume. Airborne material spreading from a particular source; the dispersal of 
particles, gases, vapors, and aerosols into the atmosphere. 
Polycarbonate glazing. A plastic glazing material with enhanced resistance to 
ballistics or blast effects. 
Preliminary Damage Assessment (PDA). A mechanism used to determine the impact 
and magnitude of damage and the resulting unmet needs of individuals, businesses, 
the public sector, and the community as a whole. Information collected is used by the 
state as a basis for the Governor's request for a Presidential declaration, and by FEMA 
to document the recommendation made to the President in response to the 
Governor's request. PDAs are made by at least one state and one federal 
representative. A local government representative familiar with the extent and 
location of damage in the community often participates; other state and federal 
agencies and voluntary relief organizations also may be asked to participate, as 
needed. 
Preparedness. Establishing the plans, training, exercises, and resources necessary 
to enhance mitigation of and achieve readiness for response to, and recovery 
from all hazards, disasters, and emergencies, including WMD incidents. 
Primary asset. An asset that is the ultimate target for compromise by an aggressor. 
Primary gathering building. Inhabited buildings routinely occupied by 50 or more 
personnel. This designation applies to the entire portion of a building that meets the 
population density requirements for an inhabited building. 
Probability of detection (POD). A measure of an intrusion detection sensor's 
performance in detecting an intruder within its detection zone. 
Probability of intercept. The probability that an act of aggression will be detected and 
that a response force will intercept the aggressor before the asset can be 
compromised. 
Progressive collapse. A chain reaction failure of building members to an extent 
disproportionate to the original localized damage. Such damage may result in upper 
floors of a building collapsing onto lower floors. 
Protective barriers. Define the physical limits of a site, activity, or area by restricting, 
channeling, or impeding access and forming a continuous obstacle around the object. 
Protective measures. Elements of a protective system that protect an asset against a 
threat. Protective measures are divided into defensive and detection measures. 
Protective system. An integration of all of the protective measures required to protect 
an asset against the range of threats applicable to the asset. 
R

Radiation. High-energy particles or gamma rays that are emitted by an atom as the 
substance undergoes radioactive decay. Particles can be either charged alpha or beta 
particles or neutral neutron or gamma rays. 
Radiation sickness. The symptoms characterizing the sickness known as radiation 
injury, resulting from excessive exposure of the whole body to ionizing radiation. 
Radiological monitoring. The process of locating and measuring radiation by means 
of survey instruments that can detect and measure (as exposure rates) ionizing 
radiation. 
Recovery. The long-term activities beyond the initial crisis period and emergency 
response phase of disaster operations that focus on returning all systems in the 
community to a normal status or to reconstitute these systems to a new condition that 
is less vulnerable. 
Response. Executing the plan and resources identified to perform those duties and 
services to preserve and protect life and property as well as provide services to the 
surviving population. 
Restricted area. Any area with access controls that is subject to these special 
restrictions or controls for security reasons. See controlled area, limited area, 
exclusion area, and exclusion zone. 
Risk. The potential for loss of, or damage to, an asset. It is measured based upon 
the value of the asset in relation to the threats and vulnerabilities associated with 
it. 
Rotating drum or rotating plate vehicle barrier. An active vehicle barrier used at 
vehicle entrances to controlled areas based on a drum or plate rotating into the path 
of the vehicle when signaled. 
S

Sacrificial roof or wall. Roofs or walls that can be lost in a blast without damage to 
the primary asset. 
Safe haven. Secure areas within the interior of the facility. A safe haven should be 
designed such that it requires more time to penetrate by aggressors than it takes for 
the response force to reach the protected area to rescue the occupants. It may be a 
haven from a physical attack or an air-isolated haven from CBR contamination. 
Secondary asset. An asset that supports a primary asset and whose compromise would 
indirectly affect the operation of the primary asset. 
Secondary hazard. A threat whose potential would be realized as the result of a 
triggering event that of itself would constitute an emergency (e.g., dam failure 
might be a secondary hazard associated with earthquakes). 
Situational crime prevention. A crime prevention strategy based on reducing the 
opportunities for crime by increasing the effort required to commit a crime, 
increasing the risks associated with committing the crime, and reducing the target 
appeal or vulnerability (whether property or person). This opportunity reduction is 
achieved by management and use policies such as procedures and training, as well as 
physical approaches such as alteration of the built environment. 
Specific threat. Known or postulated aggressor activity focused on targeting a 
particular asset. 
Stand-off distance. A distance maintained between a building or portion thereof 
and the potential location for an explosive detonation or other threat. 
Stand-off weapons. Weapons such as anti-tank weapons and mortars that are 
launched from a distance at a target. 
State Coordinating Officer (SCO). The person appointed by the Governor to 
coordinate state, commonwealth, or territorial response and recovery activities with 
FRP-related activities of the Federal Government, in cooperation with the FCO. 
State Liaison. A FEMA official assigned to a particular state, who handles initial 
coordination with the state in the early stages of an emergency. 
Stationary vehicle bomb. An explosive-laden car or truck stopped or parked near a 
building. 
Structural protective barriers. Manmade devices (e.g., fences, walls, floors, roofs, 
grills, bars, roadblocks, signs, or other construction) used to restrict, channel, or 
impede access. 
Superstructure. The supporting elements of a building above the foundation. 
Supplies-bomb delivery. Bombs or incendiary devices concealed and delivered to 
supply or material handling points such as loading docks. 
T

Tactics. The specific methods of achieving the aggressor's goals to injure 
personnel, destroy assets, or steal materiel or information. 
Tangle-foot wire. Barbed wire or tape suspended on short metal or wooden pickets 
outside a perimeter fence to create an obstacle to approach. 
Taut wire sensor. An intrusion detection sensor utilizing a column of uniformly spaced 
horizontal wires, securely anchored at each end and stretched taut. Each wire is 
attached to a sensor to indicate movement of the wire. 
Technological hazards. Incidents that can arise from human activities such as 
manufacture, transportation, storage, and use of hazardous materials. For the sake 
of simplicity, it is assumed that technological emergencies are accidental and that 
their consequences are unintended. 
Terrorism. The unlawful use of force and violence against persons or property to 
intimidate or coerce a government, the civilian population, or any segment thereof, 
in furtherance of political or social objectives. 
Thermally tempered glass (TTG). Glass that is heat-treated to have a higher tensile 
strength and resistance to blast pressures, although with a greater susceptibility to 
airborne debris. 
Threat. Any indication, circumstance, or event with the potential to cause loss of, or 
damage to an asset. 
Threat analysis. A continual process of compiling and examining all available 
information concerning potential threats and human-caused hazards. A common 
method to evaluate terrorist groups is to review the factors of existence, capability, 
intentions, history, and targeting. 
TNT equivalent weight. The weight of TNT (trinitrotoluene) that has an equivalent 
energetic output to that of a different weight of another explosive compound. 
Tornado. A local atmospheric storm, generally of short duration, formed by winds 
rotating at very high speeds, usually in a counter-clockwise direction. The vortex, up to 
several hundred yards wide, is visible to the observer as a whirlpool-like column of 
winds rotating about a hollow cavity or funnel. Winds may reach 300 miles per hour or 
higher. 
Toxic-free area. An area within a facility in which the air supply is free of toxic 
chemical or biological agents. 
Toxicity. A measure of the harmful effects produced by a given amount of a toxin 
on a living organism. 
Triple-standard concertina (TSC) wire. This type of fence uses three rolls of stacked 
concertina. One roll will be stacked on top of two other rolls that run parallel to each 
other while resting on the ground, forming a pyramid. 
U

Unobstructed space. Space around an inhabited building without obstruction large 
enough to conceal explosive devices 150 mm (6 inches) or greater in height. 
V

Video motion detection. Motion detection technology that looks for changes in the 
pixels of a video image. 
Visual surveillance. The aggressor uses ocular and photographic devices (such as 
binoculars and cameras with telephoto lenses) to monitor facility or installation 
operations or to see assets. 
Volumetric motion sensor. An interior intrusion detection sensor that is designed to 
sense aggressor motion within a protected space. 
Vulnerability. Any weakness in an asset or mitigation measure than can be exploited 
by an aggressor (potential threat element), adversary, or competitor. It refers to the 
organization's susceptibility to injury. 
W

Warning. The alerting of emergency response personnel and the public to the 
threat of extraordinary danger and the related effects that specific hazards may 
cause. 
Watch. Indication in a defined area that conditions are favorable for the specified type 
of severe weather (e.g., flash flood watch, severe thunderstorm watch, tornado watch, 
tropical storm watch). 
Waterborne contamination. Chemical, biological, or radiological agent introduced 
into and fouling a water supply. 
Weapons of Mass Destruction (WMD). Any device, material, or substance used in a 
manner, in a quantity or type, or under circumstances showing an intent to cause 
death or serious injury to persons, or significant damage to property. An explosive, 
incendiary, or poison gas, bomb, grenade, rocket having a propellant charge of more 
than 4 ounces, or a missile having an explosive incendiary charge of more than 0.25 
ounce, or mine or device similar to the above; poison gas; weapon involving a disease 
organism; or weapon that is designed to release radiation or radioactivity at a level 
dangerous to human life. 
CHEMICAL WARFARE AGENT CHARACTERISICS

SELECTED BIOLOGICAL AGENT CHARACTERISICS

This appendix contains some CBR terms that do not actually appear in this manual. 
They have been included to present a comprehensive list that pertains to this series of 
publications. 
CHEMICAL TERMS 
A 
Acetylcholinesterase. An enzyme that hydrolyzes the neurotransmitter 
acetylcholine. The action of this enzyme is inhibited by nerve agents. 
Aerosol. Fine liquid or solid particles suspended in a gas (e.g., fog or smoke). 
Atropine. A compound used as an antidote for nerve agents. 
C 
Casualty (toxic) agents. Produce incapacitation, serious injury, or death, and can be 
used to incapacitate or kill victims. They are the blister, blood, choking, and nerve 
agents. 
Blister agents. Substances that cause blistering of the skin. Exposure is through 
liquid or vapor contact with any exposed tissue (eyes, skin, lungs). Examples 
are distilled mustard (HD), nitrogen mustard (HN), lewisite (L), 
mustard/lewisite (HL), and phenodichloroarsine (PD). 
Blood agents. Substances that injure a person by interfering with cell 
respiration (the exchange of oxygen and carbon dioxide between blood and 
tissues). Examples are arsine (SA), cyanogens chloride (CK), hydrogen 
chloride (HCl), and hydrogen cyanide (AC). 
Choking/lung/pulmonary agents. Substances that cause physical injury to 
the lungs. Exposure is through inhalation. In extreme cases, membranes 
swell and 
BIBLIOGRAPHY D

American Association of State Highway and Transportation Officials 
A Guide to Highway Vulnerability Assessment for Critical Asset Identification and Protection, 
May 2002 , The American Association of State Highway and Transportation Officials' 
Security Task Force, Washington, DC 
http://security.transportation.org/community/security/guides.html 
The American Institute of Architects 
Building Security Through Design: A Primer for Architects, Design Professionals, and their 
Clients, November 2001, The American Institute of Architects (book) 
http://www.aia.org/security 
American Institute of Chemical Engineers 
Pub No: G-79, Guidelines for Analyzing and Managing the Security Vulnerabilities at 
Fixed Chemical Sites, 2002, Center for Chemical Process Safety, ISBN No: 0-8169-
0877-X 
http://www.aiche.org/ccpssecurity 
American Medical Association 
Physical injuries and fatalities resulting from the Oklahoma City bombing, August 7, 1996, S. 
Mallonee, S. Shariat, G. Stennies, R. Waxweiler, 
D. Hogan, and F. Jordan., The Journal of the American Medical Association, Vol. 
276 No. 5., pp 382-387 Abstract at URL: 
http://jama.ama-assn.org/cgi/content/abstract/276/5/382 
American Society of Civil Engineers 
Architectural Engineering Institute of American Society of Civil Engineers, AEI 
Newsletter, The Team, Special Terrorism Issue, Fall 2001, Volume 4, Issue 3 
http://www.asce.org/pdf/aei_11_1.pdf 

Blast Effects on Buildings: Design of Buildings to Optimize Resistance to Blast Loading, 1995, 
G.C. Mays and P.D. Smith, London: Thomas Telford, Ltd., American Society of Civil 
Engineers, ISBN: 0-7277-2030-9 
http://www.pubs.asce.org/BOOKdisplay.cgi?9990338 
Blast Resistant Design of Commercial Buildings, 1996, M. Ettouney, R. Smilowitz, and T. 
Rittenhouse, Practice Periodical on Structural Design and Construction, Vol. 1, No. 
1, February 1996, American Society of Civil Engineers 
http://ojps.aip.org/dbt/dbt.jsp?KEY=PPSCFX&Volume=1&Issue=1 
A preprint of the final article is available at 
http://www.wai.com/AppliedScience/Blast/blast-struct-design.html 
Design of Blast Resistant Buildings in Petrochemical Facilities, 1997, American Society 
of Civil Engineers, ISBN: 0-7844-0265-5 
http://www.pubs.asce.org/BOOKdisplay.cgi?9704510 
Glass-Related Injuries in Oklahoma City Bombing, Journal of Performance of Constructed 
Facilities, May 1999, 13, No. 2, H. Scott Norville, Natalie Harville, Edward J. Conrath, 
Sheryll Shariat, and Sue Mallonee 
http://www.pubs.asce.org/WWWdisplay.cgi?9902006 
Lessons from the Oklahoma City Bombing: Defensive Design Techniques, January 1997, Eve 
E. Hinman and David J. Hammond, January 1997, American Society of Civil 
Engineers (ASCE Press), Reston, VA, ISBN: 0784402175 
http://www.asce.org/publications/booksdisplay.cfm?type=9702295 
Minimum Design Loads for Buildings and Other Structures, ASCE 7-02,2002, American 
Society of Civil Engineers, ISBN: 0-7844-0624-3 [Note revision of 7-98, does not 
include building security or antiterrorism, but covers all natural hazards] 
http://www.pubs.asce.org/ASCE7.html?9991330 
Structural Engineering Institute of American Society of Civil Engineers, Structural 
Design for Physical Security: State of the Practice, 1999, Edward Conrath, et al., 
Reston, VA, Structural Engineering Institute of American Society of Civil Engineers 
http://www.pubs.asce.org/BOOKdisplay.cgi?9990571 
Vulnerability and Protection of Infrastructure Systems: The State of the Art, An ASCE Journals 
Special Publication compiling articles from 2002 and earlier available online 
https://ascestore.aip.org/OA_HTML/aipCCtpItmDspRte.jsp?a=b & item=39885 
American Society of Heating, Refrigerating, and Air-Conditioning Engineers 
Defensive Filtration, ASHRAE Journal, December 2002, James D. Miller 
http://resourcecenter.ashrae.org/store/ashrae/newstore.cgi?itemid = 
9346&view=item&categoryid=409&page=1&loginid=29483 
Report of Presidential Ad Hoc Committee for Building Health and Safety under Extraordinary 
Incidents on Risk Management Guidance for Health, Safety and Environmental Security under 
Extraordinary Incidents, Washington, DC, January 26, 2003 
http://xp20.ashrae.org/about/extraordinary.pdf 
Risk Management Guidance for Health and Safety under Extraordinary Incidents, ASHRAE 
2002 Winter Meeting Report, January 12, 2002 
http://atfp.nfesc.navy.mil/pdf/ASHRAE%20CBR%20Guidance.pdf 
or 
http://engineering.tamu.edu/safety/guidelines/faclab/ASHRAE_ 
Security_Rpt_12Jan02.pdf 
Standard 62-2001, Ventilation for Acceptable Indoor Air Quality (ANSI Approved), ISSN 
1041-2336, addenda to basic ANSI/ASHRAE Standard 62 basic (1989) 
http://resourcecenter.ashrae.org/store/ashrae/newstore.cgi?itemid= 
6852&view=item&categoryid=311&page=1&loginid=29483 
Building Owners and Managers Association International 
How to Design and Manage Your Preventive Maintenance Program, 1996 
http://www.boma.org/pubs/bomapmp.htm 
Centers for Disease Control and Prevention/ National Institute for Occupational 
Safety and Health 
Publication No. 2002-139, Guidance for Protecting Building Environments from Airborne 
Chemical, Biological, or Radiological Attacks, May 2002, Cincinnati, OH 
http://www.cdc.gov/niosh/bldvent/2002-139.html 
Publication No. 2003-136, Guidance for Filtration and Air Cleaning Systems to Protect 
Building Environments from Airborne Chemical, Biological, or Radiological Attacks, April 
2003, Cincinnati, OH 
http://www.cdc.gov/niosh/docs/2003-136/2003-136.html 
Central Intelligence Agency 
Chemical, Biological, Radiological Incident Handbook, October 1998 
http://www.cia.gov/cia/publications/cbr_handbook/cbrbook.htm 
Council on Tall Buildings and Urban Habitat 
Building Safety Enhancement Guidebook, 2002 
http://www.ctbuh.org 
Task Force on Tall Buildings: "The Future," October 15, 2001 
http://www.lehigh.edu/ctbuh/htmlfiles/hot_links/report.pdf or 
http://www.ctbuh.org/htmlfiles/hot_links/report.pdf 
Federal Aviation Administration 
DOT/FAA/AR-00/52, Recommended Security Guidelines for Airport Planning, 
Design and Construction, Revised June 2001, Associate Administrator for Civil 
Aviation Security Office of Civil Aviation Security, Policy and Planning, Federal 
Aviation Administration, Washington, DC 20591 (not available on Internet) FAA 
Order 1600.69A, FAA Facility Security Management Program, updated FAA Order 
1600.69B to be published shortly - The Federal Aviation Administration's criteria 
for the protection of its facilities. [For Official Use Only] (not available on 
Internet) 
Federal Emergency Management Agency 
FEMA 152, Seismic Considerations: Apartment Buildings, Earthquake Hazards Reduction Series 
37, November 1988, Washington, DC (not available on Internet) Contact FEMA 
Distribution Center, P.O. Box 2012, 8231 Stayton Drive, Jessup, MD 20794-2012, 
Telephone: 1-800-480-2520, Fax: 301-362-5335 
FEMA 153, Seismic Considerations: Office Buildings, Earthquake Hazards Reduction Series 38, 
November 1988, Washington, DC (not available on Internet) Contact FEMA 
Distribution Center, P.O. Box 2012, 8231 Stayton Drive, Jessup, MD 20794-2012, 
Telephone: 1-800-480-2520, Fax: 301-362-5335 
FEMA 154, Rapid Visual Screening of Buildings for Seismic Hazards: A Handbook (2nd 
Edition), 2002, 1988, Washington, DC (not available on Internet) Contact FEMA 
Distribution Center, P.O. Box 2012, 8231 Stayton Drive, Jessup, MD 20794-2012, 
Telephone: 1-800-480-2520, Fax: 301-362-5335 
FEMA 277, The Oklahoma City Bombing: Improving Building Performance through 
Multi-Hazard Mitigation, August 1, 1996, Washington, DC 
http://www.fema.gov/mit/bpat/bpat009.htm 
FEMA 372, Mitigation Resources for Success (CD-ROM), October 2001, Washington, DC 
http://www.fema.gov/pdf/library/poster_fnl2.pdf 
FEMA 386-2, Understanding Your Risks, Identifying Hazards and Estimating Losses, 
August 2001 
http://www.fema.gov/fima/planning_toc3.shtm 
FEMA 386-7, Integrating Human-Caused Hazards Into Mitigation Planning, 
September 2002 
http://www.fema.gov/fima/antiterrorism/resources.shtm 
FEMA 403, World Trade Center Building Performance Study: Data Collection, Preliminary 
Observations, and Recommendations, May 2002, Washington, DC 
http://www.fema.gov/library/wtcstudy.shtm 
State and Local Guide 101, Guide for All-Hazard Emergency Operations Planning, Chapter 6, 
Attachment G, Terrorism, April 2001 
http://www.fema.gov/rrr/allhzpln.shtm 
General Services Administration 
Balancing Security and Openness: A Thematic Summary of a Symposium on Security and the 
Design of Public Buildings, November 30, 1999 
http://hydra.gsa.gov/pbs/pc/gd_files/SecurityOpenness.pdf 
Cost Impact of ISC Security Criteria, GSA & Applied Research Associates, Inc., L. Bryant 
and J. Smith, Vicksburg, MS [Restricted Access] 
http://www.oca.gsa.gov/specialphp/References.php 
Facility Standards for the Public Building Service (PBS-P100); Chapter 8, Security Design, 
Revised November 2000 
http://hydra.gsa.gov/pbs/pc/facilitiesstandards/ 
Mail Center Manager's Security Guide-Second Edition, October 22, 2002 
http://www.gsa.gov//attachments/GSA_PUBLICATIONS/ 
extpub/MailCenterManagersSecurityGuideV2.pdf 
Progressive Collapse Analysis and Design Guidelines for New Federal Office Buildings and 
Major Modernization Projects, November 2000 
[Restricted Access] 
http://www.oca.gsa.gov/specialphp/References.php 
Security Reference Manual, Part 3: Blast Design and Assessment Guidelines, July 31, 
2001 [For Official Use Only] [Restricted Access] 
http://www.oca.gsa.gov/specialphp/References.php 
Healthy Building International, Inc. 
Vulnerability Assessments and Counter Terrorist Protocols 
http://www.healthybuildings.com/s2/vacbt.pdf 
Interagency Security Committee (executive agent 
- GSA)
ISC Security Design Criteria for New Federal Office Buildings and Major Modernization 
Projects, May 28, 2001, [For Official Use Only] [Restricted Access] 
http://www.oca.gsa.gov/specialphp/References.php 
Institute of Transportation Engineers 
The Influence of Traffic Calming Devices upon Fire Vehicle Travel Times, Michael A. 
Coleman, 1997, ITE Annual Meeting Compendium, 1997 pp. 838-845 
http://webservices.camsys.com/fhwa/cmn/cmn33.htm 
Split Speed Bump, 1998, Kathy Mulder, Washington, DC, TE International 
Conference, 1998 http://www.ite.org/traffic/documents/CCA98A33.pdf 
Lawrence Berkeley National Lab 
Protecting Buildings From a Biological or Chemical Attack: actions to take before or during a 
release. LBNL/PUB-51959, January 10, 2003 
http://securebuildings.lbl.gov/images/bldgadvice.pdf 
National Academy of Sciences 
Combating Terrorism: Prioritizing Vulnerabilities and Developing Mitigation Strategies, 
Project Identification Number: NAEP-R-02-01-A, National Academy of Engineering 
on-going project - results to be published. 
http://www4.nationalacademies.org/webcr.nsf/ProjectScopeDisplay/ NAEP-R-02-01-
A?OpenDocument 
National Capital Planning Commission 
Designing for Security in the Nation's Capital, October 2001 
http://www.ncpc.gov/planning_init/security/DesigningSec.pdf 
The National Capital Planning Urban Design and Security Plan, October 2002 
http://www.ncpc.gov/publications/udsp/Final%20UDSP.pdf 
National Institute of Building Sciences 
Whole Building Design Guide: Provide Security for Building Occupants and Assets 
http://www.wbdg.org/design/index.php?cn=2.7.4&cx=0 
National Research Council 
Protecting Buildings and People from Terrorism: Technology Transfer for Blast-effects 
Mitigation, 2001, National Academy Press, Washington, DC, ISBN 0-309-08286-2 
http://books.nap.edu/books/0309082862/html/index.html 
Protecting Buildings From Bomb Blast, Transfer of Blast-Effects Mitigation Technologies from 
Military to Civilian Applications, 1995, National Academy Press, Washington, DC, ISBN 0-
309-05375-7 
http://books.nap.edu/books/0309053757/html/index.html 
Protection of Federal Office Buildings Against Terrorism, 1988, Committee on the 
Protection of Federal Facilities Against Terrorism, Building Research Board, National 
Academy Press, Washington, DC, ISBN 0-309-07691-9 
http://books.nap.edu/books/0309076463/html/index.html 
Society of American Military Engineers 
National Symposium of Comprehensive Force Protection, October 2001, Charleston, 
SC, Lindbergh & Associates. For a list of participants, access 
http://www.same.org/forceprot/force.htm 
Technical Support Working Group (TSWG) 
Terrorist Bomb Threat Stand-Off Card with Explanation of Use 
http://www.tswg.gov/tswg/prods_pubs/newBTSCPress.htm 
The House National Security Committee 
Statement of Chairman Floyd D. Spence on the Report of the Bombing of Khobar 
Towers, August 1996, Washington, DC 
http://www.house.gov/hasc/Publications/104thCongress/ Reports/saudi.pdf 
U.S. Air Force
ESL-TR-87-57, Protective Construction Design Manual, November 1989; Contact 
Airbase Technologies Division (AFRL/MLQ) at Tyndall Air Force Base, FL, via e-
mail to techinfo@afrl.af.mil. [Superceded by Army Technical Manual TM 5-855-1 
(Air Force 
Pamphlet AFPAM 32-1147(I), Navy Manual NAVFAC P-1080, DSWA Manual 
DAHSCWEMAN-97), December 1997] 
Expedient Hardening Methods for Structures Subjected to the Effect of Nonnuclear 
Munitions, October 1990, Wright Laboratory Report (not available on Internet) 
Installation Entry Control Facilities Design Guide, October 2002, Air Force Center for 
Environmental Excellence 
http://www.afcee.brooks.af.mil/dc/dcd/gate/index.html 
Installation Force Protection Guide, 1997, Air Force Center for Environmental 
Excellence 
http://www.afcee.brooks.af.mil/dc/dcd/arch/force.pdf 
Vehicle Bomb Mitigation Guide, July 1, 1999, Force Protection Battlelab [For Official Use 
Only] Contact the USAF Force Protection Battlelab, Lackland Air Force Base, TX, 
Telephone: (210)671-0058 
U.S. Army 
Field Manuals (FM) 
FM 3-19.30, Physical Security, January 8, 2001, Washington, DC 
http://www.adtdl.army.mil/cgi-bin/atdl.dll/fm/3-19.30/fm3-19.30.pdf 
or 
http://www.wood.army.mil/mpdoctrine/PDF_Files/FM_3-19.30.pdf 
FM 5-114, Engineer Operations Short of War, July 13, 1992 
http://155.217.58.58/cgi-bin/atdl.dll/fm/5-114/toc.htm 
Technical Instruction 853-01 (Draft), Protecting Buildings and Their Occupants from 
Airborne Hazards, October 2001 
http://buildingprotection.sbccom.army.mil/basic/airborne_hazards 
U.S. Army Corps of Engineers 
Engineer Technical Letters (ETL) 
ETL 1110-3-494, Airblast Protection Retrofit for Unreinforced Concrete Masonry Walls, July 
14, 1999 [Restricted Access] 
http://www.usace.army.mil/inet/usace-docs/eng-tech-ltrs 
ETL 1110-3-495, Estimating Damage to Structures from Terrorist Bombs Field Operations 
Guide, July 14, 1999 [Restricted Access] 
http://www.usace.army.mil/inet/usace-docs/eng-tech-ltrs 
ETL 1110-3-498, Design of Collective Protection Shelters to Resist Chemical, Biological, and 
Radiological (CBR) Agents, February 24, 1999 
http://www.usace.army.mil/inet/usace-docs/eng-tech-ltrs 
ETL 1110-3-501, Window Retrofit Using Fragment Retention Film with Catcher Bar System, 
July 14, 1999 [Restricted Access] 
http://www.usace.army.mil/inet/usace-docs/eng-tech-ltrs 
Protective Design - Mandatory Center of Expertise - Technical Reports 
PDC-TR-91-6, Blast Analysis Manual, Part 1-Level of Protection Assessment Guide, July 1991 
[For Official Use Only] Contact U.S. Army Corps of Engineers Protective Design Center, 
ATTN: CENWO-ED-ST, 215 N. 17th Street, Omaha, NE 68102-4978, Telephone: 
(402)221-4918 
Technical Manuals (TM) 
TM 5-853-1, Security Engineering Project Development, May 12, 1994, also Air Force 
Manual 32-1071, Volume 1 [For Official Use Only] 
http://www.usace.army.mil/inet/usace-docs/armytm 
TM 5-853-2, Security Engineering Concept Design, May 12, 1994, also Air Force Manual 
32-1071, Volume 2 [For Official Use Only] 
http://www.usace.army.mil/inet/usace-docs/armytm 
TM 5-853-3, Security Engineering Final Design, May 12, 1994, also Air Force Manual 32-
1071, Volume 3 [For Official Use Only] 
http://www.usace.army.mil/inet/usace-docs/armytm 
TM 5-853-4, Security Engineering Electronic Security Systems, May 12, 1994 
http://www.usace.army.mil/inet/usace-docs/armytm 
TM 5-855-4, Heating, Ventilation, and Air Conditioning of Hardened 
Installations, November 28, 1986 
http://www.usace.army.mil/inet/usace-docs/armytm/tm5-855-4/ toc.htm 
TM 5-1300, Structures to Resist Accidental Explosions, November 19, 1990, (also Navy 
NAVFAC (Naval Facilities) P-397, Air Force Regulation 88-2); Contact David Hyde, 
U.S. Army Engineer Research and Development Center, 3909 Halls Ferry Road, 
Vicksburg, MS 39180 or via e-mail to hyded@ex1.wes.army.mil 
U.S. Department of Commerce 
Administrative Orders (DAO) 
DAO 206-5, Occasional Use of Public Areas in Public Buildings, December 9, 1986 
http://www.osec.doc.gov/bmi/daos/206-5.htm 
DAO 207-1, Security Programs, June 24, 1991, Amended September 6, 1991 
http://www.osec.doc.gov/bmi/daos/207-1.htm 
Critical Infrastructure Assurance Office 
Vulnerability Assessment Framework 1.1, October 1998 
http://www.ciao.gov/resource/vulassessframework.pdf 
Practices For Securing Critical Information Assets, January 2000 
http://www.ciao.gov/resource/Practices_For_Securing_Critical_ 
Information_Assets.pdf 
U.S. Department of Defense 
DoD Security Engineering Manual [Expected to have a major portion for public 
distribution once published as Unified Facilities Criteria and a smaller portion For 
Official Use Only similar to the UFC for AT Standards for Buildings listed below. This 
publication will replace Army Technical Manual 5-853 (Air Force Joint Manual 32-
1071), Volumes 1, 2, and 3 and Navy Military Handbook 1013/1A] DoD O-2000.12-H, 
Protection of DoD Personnel and Activities Against Acts of Terrorism and Political Turbulence: 
Mandatory Standards and Implementing Guidance, with Changes 1 and 2, February 1993, 
Change 1 
-May 21, 1993, Change 2-October 3, 1997 [For Official Use Only] 
http://www.dtic.mil/whs/directives/corres/pub1.html 
Force Protection Equipment Demonstration IV, 6-8 May 2003 
http://www.fped4.org 
Interim Antiterrorism/Force Protection Construction Standards, December 16, 1999 [For 
Official Use Only] Contact U.S. Army Engineer 
District, ATTN: CENWO-ED-ST, 215 North 17th Street, Omaha, NE 68102-4978, 
Telephone: (402)221-4918. 
Interim Antiterrorism/Force Protection Construction Standards 
-Progressive Collapse Guidance, April 4, 2000 (not available on Internet) Contact U.S. 
Army Corps of Engineers Protective Design Center, ATTN: CENWO-ED-ST, 215 N. 
17th Street, Omaha, NE 68102-4978, Telephone: (402)221-4918 
Unified Facilities Criteria (UFC) 
UFC 3-340-01, Design and Analysis of Hardened Structures to Conventional Weapons Effects, 
June 30, 2002 [For Official Use Only] [Formerly Army TM 5-855-1] 
http://www.hnd.usace.army.mil/techinfo/ufc/UFC3-340-01 WEB.PDF 
UFC 4-010-01, DoD Minimum Antiterrorism Standards for Buildings, July 31, 2002 
http://www.wbdg.org/ccbref/ccbdoc.php?category=ufc&docid=10 6&ref=1 
Unified Facilities Guide Specifications (UFGS) 
UFGS-02821A, Fencing, February 2002 
http://www.ccb.org/ufgs/pdf/02821A.pdf 
UFGS-02840A, Active Vehicle Barriers, February 2002 
http://www.ccb.org/ufgs/pdf/02840A.pdf 
UFGS-02841N, Traffic Barriers, August 2001 
http://www.ccb.org/ufgs/pdf/02841N.pdf 
UFGS-08390A, Blast Resistant Doors, April 2001 
http://www.ccb.org/ufgs/pdf/08390.pdf 
UFGS-08581, Blast Resistant Tempered Glass Windows, August 2001 
http://www.ccb.org/ufgs/pdf/08581.pdf 
UFGS-08840A, Plastic Glazing, July 1995 
https://www.ccb.org/ufgs/pdf/08840A.pdf 
UFGS-08850, Fragment Retention Film for Glass, July 1992 
https://www.ccb.org/ufgs/pdf/08850.pdf 
UFGS-11020, Security Vault Door, August 2002 
http://www.ccb.org/ufgs/pdf/11020.pdf 
UFGS-11025, Forced Entry Resistant Components, August 2001 
http://www.ccb.org/ufgs/pdf/11025.pdf 
UFGS-11035, Bullet-Resistant Components, April 2000 
http://www.ccb.org/ufgs/pdf/11035.pdf 
UFGS-13095A, Electromagnetic (EM) Shielding, July 2001 
http://www.ccb.org/ufgs/pdf/13095A.pdf 
UFGS-13420A, Self-Acting Blast Valves, November 1997 
http://www.ccb.org/ufgs/pdf/13420A.pdf 
U.S. Department of Education 
Practical Information on Crisis Planning: A Guide for Schools and Communities, May 
2003 
http://www.ed.gov/emergencyplan 
U.S. Department of Energy 
DOE/TIC 11268, A Manual for the Prediction of Blast and Fragment Loadings on Structures, 
February 1992, Albuquerque, NM, Southwest Research Institute [not available on 
Internet] 
U.S. Department of Homeland Security 
National Strategy for Homeland Security, July 2002 
http://www.dhs.gov/interweb/assetlibrary/nat_strat_hls.p
df 
The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets, 
February 2003 
http://www.dhs.gov/interweb/assetlibrary/Physical_Strategy.pdf 
National Strategy to Secure Cyberspace, February 2003 
http://www.dhs.gov/interweb/assetlibrary/National_Cyberspace_ Strategy.pdf 
President's Homeland Security Advisory Council-Statewide Template Initiative, March 
2003 
http://www.dhs.gov/interweb/assetlibrary/Statewide_Template_ Initiative.pdf 
State and Local Actions for Homeland Security, July 2002 
http://www.whitehouse.gov/homeland/stateandlocal/State_and_ 
Local_Actions_for_Homeland_Security.pdf 
U.S. Department of Housing and Urban Development 
The Avoidance of Progressive Collapse, Regulatory approaches to the problem, PB-248 781, 
October 1975, Division of Energy, Building Technology and Standards, Office of 
Policy Development and Research, Washington, DC 20410 (not available on Internet) 
Creating Defensible Space, April 1996, Oscar Newman, Washington, DC 
http://www.huduser.org 
U.S. Department of Justice 
Federal Bureau of Investigation (FBI) 
Terrorism in the United States, 1999, Washington, DC Counterterrorism 
Division 
http://www.fbi.gov/publications.htm 
Office of Domestic Preparedness (ODP) 
Fiscal Year 1999 State Domestic Preparedness Equipment Program, Assessment and Strategy 
Development Tool Kit, NCJ181200, May 15, 2000, [For Official Use Only] 
http://www.ojp.usdoj.gov/odp/docs/assessment.txt 
National Institute of Justice (NIJ) 
The Appropriate and Effective Use of Security Technologies in U.S. Schools: A Guide for Schools 
and Law Enforcement Agencies, September 1999, with U.S. Department of Education, 
Safe and Drug-Free Schools Program; and U.S. Department of Energy, Sandia 
National Laboratories 
http://www.ncjrs.org/school/home.html 
NIJ Guide 100-00, Guide for the Selection of Chemical Agent and Toxic Industrial Material 
Detection Equipment for Emergency First Responders, June 2000 
http://www.ncjrs.org/pdffiles1/nij/184449.pdf 
NIJ Guide 101-00, An Introduction to Biological Agent Detection Equipment for 
Emergency First Responders, December 2001 
http://www.ncjrs.org/pdffiles1/nij/190747.pdf 
NIJ Guide 102-00, Guide for the Selection of Personal Protective Equipment for Emergency First 
Responders, Volumes I-IV, November 2002 
http://www.ncjrs.org/pdffiles1/nij/191518.pdf 
NIJ Guide 602-00, Guide to the Technologies of Concealed Weapon and Contraband Imaging 
and Detection, February 2001 
http://www.ncjrs.org/pdffiles1/nij/184432.pdf 
NIJ Standard 0108.01, Blast Resistant Protective Materials, September 1985 [Subscription 
Required] 
http://www.ccb.org 
Crime Prevention Through Environmental Design and Community Policing, August 
1996, Dan Fleissner and Fred Heinzelmann, Washington, DC 
http://www.ncjrs.org/pdffiles/crimepre.pdf 
Crime Prevention Through Environmental Design in Parking Facilities, April 1996, Mary S. 
Smith, Washington, DC 
http://www.ncjrs.org/pdffiles/cptedpkg.pdf 
"Designing Out" Gang Homicides and Street Assaults, November 1998, James Lasley, 
Washington, DC 
http://www.ncjrs.org/pdffiles/173398.pdf 
The Expanding Role of Crime Prevention Through Environmental Design in Premises Liability, 
April 1996, Corey L. Gordon and William Brill, Washington, DC 
http://www.ncjrs.org/pdffiles/cptedlia.pdf 
Physical Environment and Crime, January 1996, Ralph B. Taylor and Adele V. Harrell, 
Washington, DC 
http://www.ncjrs.org/pdffiles/physenv.pdf 
Visibility and Vigilance: Metro's Situational Approach to Preventing Subway Crime, November 
1997, Nancy G. La Vigne, Washington, DC 
http://www.ncjrs.org/pdffiles/166372.pdf 
U.S. Marshals Service Vulnerability Assessment of Federal Facilities, June 28, 1995 
[Restricted Access] 
http://www.oca.gsa.gov 
U.S. Department of State, Bureau of Diplomatic Security 
Architectural Engineering Design Guidelines (5 Volumes), March 1998 [For Official Use 
Only] (not available on Internet) 
Certification Standard SD-STD-01.01, Revision G (Amended), Forced Entry and 
Ballistic Resistance of Structural Systems, Amended April 30, 1993 [Subscription 
Required] 
http://www.ccb.org 
Patterns of Global Terrorism, 2002, April 2002, Washington, DC 
http://www.state.gov/s/ct/rls/pgtrpt/2002/pdf/ 
Physical Security Standards Handbook, January 7, 1998 [For Official Use Only] (not available 
on Internet) 
Structural Engineering Guidelines for New Embassy Office Buildings, August 1995 [For 
Official Use Only] (not available on Internet) 
The Report of the Accountability Review Board on the Embassy Bombings in Nairobi and Dar es 
Salaam on August 7, 1998, January 1999, Washington, DC 
http://www.state.gov/www/regions/africa/accountability_ report.html 
U.S. Department of the Treasury/Bureau of Alcohol, Tobacco, and Firearms 
Vehicle Bomb Explosion Hazard And Evacuation Distance Tables, 1999, request in writing, 
address information available at 
http://www.atf.treas.gov/pub/fire-explo_pub/i54001.htm 
U.S. Department of Veterans Affairs 
Physical Security Assessment of Veterans Affairs Facilities, Recommendations of the 
National Institute of Building Sciences Task Group to the Department of Veterans 
Affairs, 6 September 2002 
http://www.va.gov/facmgt/standard/etc/vaphysicalsecurityreport.pdf 
U.S. Fire Administration (USFA of FEMA) 
The Critical Infrastructure Protection Process Job Aid, May 1, 2002 
http://www.usfa.fema.gov/dhtml/fire-service/cipc-jobaid.cfm 
U.S. Navy
Design Manuals (DM) NAVFAC (Naval Facilities Command) 
NAVFAC DM 2.08, Blast Resistant Structures, December 1986 
http://www.wbdg.org/ccbref/ccbdoc.php?category=nav&docid=4 6&ref=1 
NAVFAC DM 13.02, Commercial Intrusion Detection Systems (IDS), September 1986 
http://www.wbdg.org/ccbref/ccbdoc.php?category=nav&docid=4 7&ref=1 
Interim Technical Guidance (ITG) 03-03, Entry Control Facilities, 20 February 2003 
http://www.lantdiv.navfac.navy.mil/servlet page?pageid=8609,8611 &_dad= 
lantdiv&_schema=LANTDIV&11435_ACTIVE_1777132.p_ subid= 
60007&11435_ACTIVE_1777132.p_sub_siteid=51 &11435_ ACTIVE_1777132.p_edit=0 
Military Handbooks (MIL-HDBK) 
MIL-HDBK-1002/1, Structural Engineering General Requirements, November 30, 1987 
http://www.wbdg.org/ccbref/ccbdoc.php?category=nav&docid=4 8&ref=1 
MIL-HDBK-1004/4, Electrical Utilization Systems, October 13, 1987 
http://www.wbdg.org/ccbref/ccbdoc.php?category=nav&docid=4 9&ref=1 
MIL-HDBK-1012/3, Telecommunications Premises Distribution Planning, Design, 
and Estimating, May 31, 1996 
http://www.wbdg.org/ccbref/ccbdoc.php?category=nav&docid=5 0&ref=1 
MIL-HDBK-1013/1A, Design Guidelines for Physical Security of Fixed Land-Based 
Facilities, December 15, 1993. For copies, contact Defense Printing Service, Building 
40, 700 Robbins Avenue, Philadelphia, PA 19111-5094, Telephone: (215)697-2179, 
Fax: (215)697-1462 or available on the National Institute of Building Sciences' 
Construction Criteria Base 
MIL-HDBK-1013/10, Design Guidelines for Security Fencing, Gates, Barriers, and 
Guard Facilities, May 14, 1993. For copies, contact Defense Printing Service, 
Building 40, 700 Robbins Avenue, Philadelphia, PA 19111-5094, Telephone: 
(215)697-2179, Fax: (215) 697-1462 or available on the National Institute of Building 
Sciences' Construction Criteria Base MIL-HDBK-1013/12, Evaluation of Security 
Glazing for Ballistic, Bomb, and Forced Entry Tactics, March 10, 1997. For copies, 
contact Defense Printing Service, Building 40, 700 Robbins Avenue, Philadelphia, 
PA 19111-5094, Telephone: (215)697-2179, Fax: (215) 697-1462 or available on the 
National Institute of Building Sciences' Construction Criteria Base 
MIL-HDBK-1013/14, Selection and Application of Vehicle Barriers, February 1, 1999. For 
copies, contact Defense Printing Service, Building 40, 700 Robbins Avenue, 
Philadelphia, PA 19111-5094, Telephone: (215)697-2179, Fax: (215)697-1462 or 
available on the National Institute of Building Sciences' Construction Criteria Base 
TechData Sheets - Naval Facilities Engineering Service Center (NFESC) 
TDS-2062-SHR, Estimating Damage to Structures from Terrorist Bombs, September 1998 [For 
Official Use Only] Requests for publication can be made to Naval Facilities Engineering 
Service Center, Security Engineering Division (ESC66), 1100 23rd Ave, Port Hueneme, 
CA 93043-4370, Telephone (805)982-1582 (Primary), (805)982-4817 (Alternate); Fax: 
(805)982-1253 
TDS-2063-SHR, Blast Shielding Walls, September 1998 [For Official Use Only] Requests 
for publication can be made to Naval Facilities Engineering Service Center, Security 
Engineering Division (ESC66), 1100 23rd Ave., Port Hueneme, CA 93043-4370, 
Telephone: (805)982-1582 (Primary), (805)982-4817 (Alternate); Fax: (805)982-1253 
TDS-2079-SHR, Planning and Design Considerations for Incorporating Blast Mitigation 
in Mailrooms, May 2000. For copies, contact Defense Printing Service, Building 40, 700 
Robbins Avenue, Philadelphia, PA 19111-5094, Telephone: (215)697-2179, Fax: (215) 
697-1462 TDS-2090-SHR, Design Parameters for a Controlled Entry Point. For copies, 
contact Defense Printing Service, Building 40, 700 Robbins Avenue, Philadelphia, PA 
19111-5094, Telephone: (215)697-2179, Fax: (215)697-1462 
User Guides - Naval Facilities Engineering Service Center (NFESC) 
UG-2030-SHR, Security Glazing Applications, May 1998, distributed June 25, 1998. [For 
Official Use Only] Requests for publication can be made to Naval Facilities Engineering 
Service Center, Security Engineering Division (ESC66), 1100 23rd Ave., Port 
Hueneme, CA 93043-4370, Telephone: (805)982-1582 (Primary), (805) 982-4817 
(Alternate); Fax: (805)982-1253 
UG-2031-SHR, Protection Against Terrorist Vehicle Bombs, May 1998, distributed June 
25, 1998. [For Official Use Only] Requests for publication can be made to Naval 
Facilities Engineering Service Center, Security Engineering Division (ESC66), 
1100 23rd Ave, Port Hueneme, CA 93043-4370, Telephone: (805)982-15.82 
(Primary), (805) 982-4817 (Alternate); Fax: (805)982-1253 
Other Books, Magazines, Magazine Articles, and Newspaper Articles 
Archibald, Rae W., et al., 2002, Security and Safety in Los Angeles High-Rise Buildings after 
9/11. RAND, Santa Monica, CA, ISBN: 0-8330-3184-8 
http://www.rand.org/publications/DB/DB381 
Atlas, Randall I., June 1998, Designing for Crime and Terrorism, Security and Technology 
Design, Security Technology and Design Magazine Reprint Services, Jim Benesh, 
Telephone: (800)547-7377 x324, Fax: (920)568-2244, e-mail: 
jim.benesh@cygnuspub.com 
Bartlett, Sarah and Petrarca, John, The Schools of Ground Zero: Early Lessons 
Learned in Children's Environmental Health, American Public Health Association, 
September 2002, ISBN: 0875530281 Broder, James F., December 15, 1999, Risk 
Analysis and the Security Survey, 2nd Edition, Butterworth-Heinemann, Stoneham, 
MA, ISBN: 0750670894 
Craighead, Geoff, December 2002, High-Rise Security and Fire Life Safety, 2nd Edition, 
Academic Press, ISBN: 0750674555 
Crowe, Timothy D., 2000, Crime Prevention Through Environmental Design: Applications 
Of Architectural Design And Space Management Concepts (2nd Edition), Stoneham, MA, 
Butterworth-Heinemann, ISBN: 075067198X 
Fehr, Stephen C., July 1996, Parking Under Siege in D.C.: U.S. Anti-Terrorism Plan 
Threatens 360 Spaces, TheWashington Post, July 13, 1996 
http://www.washingtonpost.com/wp-adv/archives/advanced.htm 
Fenelly, Lawrence J, June 1997, Effective Physical Security, 2nd Edition, Stoneham, MA, 
Butterworth-Heinemann, ISBN: 0-75-069873-X 
Garcia, Mary Lynn, February 23, 2001, The Design and Evaluation of Physical Protection 
Systems, Stoneham, MA, Butterworth-Heinemann, ISBN: 0750673672 
Gonchar, Joann, March 2002, Building for a Secure Future: Government 
Facilities under way incorporate already tough standards, Engineering News-
Record, March 25, 2002 
http://www.construction.com/NewsCenter/Headlines/ENR/ 20020325e.asp 
Greene, R.W., October 2002, Confronting Catastrophe: A GIS Handbook, 
ESRI Press, ISBN: 1589480406 Hart, Sara, March 2002, In the aftermath of 
September 11, the urban landscape appears vulnerable and random: 
Architects and consultants focus on risk assessment and security through 
design, Architectural Record, March 2002 
http://archrecord.construction.com/CONTEDUC/ARTICLES/ 03_02_1.asp 
Kowalski, Wladyslaw Jan, P.E., Ph.D., September 26, 2002, Immune Building Systems 
Technology, McGraw-Hill Professional, ISBN: 0-07-140246-2 
Nadel, Barbara A, March 1998, Designing for Security, Architectural Record, March 
1998 
http://www.archrecord.com/CONTEDUC/ARTICLES/3_98_1.asp 
Owen, David D. and R.S. Means Engineering Staff, Building Security: Strategies and Costs, 
Construction Publishers & Consultants, ISBN: 0-87629-698-3, 2003 
Pearson, Robert, September 1997, Security through Environmental Design, Security and 
Technology Design, Security Technology and Design Magazine Reprint Services, Jim 
Benesh, Telephone: (800) 547-7377 x324; Fax: (920) 568-2244; e-mail: 
jim.benesh@cygnuspub.com 
Rochon, Donald M., June 1998, Architectural Design for Security, Security and Technology 
Design, Security Technology and Design Magazine Reprint Services, Jim Benesh, 
Telephone: (800)547-7377 x324; Fax: (920)568-2244; e-mail: 
jim.benesh@cygnuspub.com 
Security Magazine [on-line magazine] 
http://www.securitymagazine.com 
Security Solutions Online: Access Control and Security Systems [on-line 
magazine] http://securitysolutions.com/ 
Security Technology and Design [on-line and print magazine] 
http://www.st-and-d.com 
Sidell, Frederick R., et al, 1998, Jane's Chem-Bio Handbook, Jane's
Information Group, Alexandria, VA, ISBN 0-7106 2568-5

http://www.janes.com/company/catalog/chem_bio_hand.shtml 
Smith, Keith, November 2000, Environmental Hazards: Assessing Risk and Reducing 
Disaster, Routledge, New York, NY, ISBN 0415224632 
http://www.routledge-
ny.com/books.cfm?isbn=0415224632 
ASSOCIATIONS AND ORGANIZATIONS     E

 ._	 American Lifelines Alliance 
 .http://www.americanlifelinesalliance.org 
 ._	 Applied Technology Council 
 .http://www.atcouncil.org 
 ._	 Battelle Memorial Institute, National Security Program 
 .http://www.battelle.org/natsecurity/default.stm 
 ._	 Center for Strategic and International Studies (CSIS) 
 .http://www.csis.org 
 ._	 Centers for Disease Control and Prevention (CDC)/National Institute for 
Occupational Safety and Health (NIOSH) 
 .http://www.cdc.gov/niosh 
 ._	 Central Intelligence Agency (CIA) 
 .http://www.cia.gov 
 ._	 Council on Tall Buildings and Urban Habitat (CTBUH) 
 .http://www.ctbuh.org 
 ._	 Federal Aviation Administration (FAA) 
 .http://www.faa.gov 
 ._	 Healthy Buildings International, Inc.	 
 .http://www.healthybuildings.com 
 ._	 Institute of Transportation Engineers 
 .http://www.ite.org 
 ._	 Interagency Security Committee (ISC) led by the U.S.	 General Services 
Administration [Restricted Access] 
 .http://www.oca.gsa.gov 
 ._	 International CPTED [Crime Prevention Through Environmental Design] 
Association (ICA) 
 .http://new.cpted.net/home.amt 
. _	 Lawrence Berkeley National Laboratory (LBNL) 

http://securebuildings.lbl.gov 
_	 National Academy of Sciences 
http://www4.nationalacademies.org/nas/nashome.nsf 
�	Federal Facilities Council (FFC) Standing Committee on Physical Security and 
Hazard Mitigation 
http://www7.nationalacademies.org/ffc/Physical_ 
Security_ Hazard_Mitigation.html 
�	National Research Council 
http://www.nationalacademies.org/nrc 
 ._	 National Defense Industrial Association (NDIA) 
 .http://www.ndia.org 
 ._	 Public Entity Risk Institute 
 .http://www.riskinstitute.org 
 ._	 Security Design Coalition 
 .http://www.designingforsecurity.org 
 ._	 Security Industry Association (SIA) 
 .http://www.siaonline.org/ 
 ._	 Technical Support Working Group (Departments of Defense and State) 
 .http://www.tswg.gov 
 ._	 U.S.	Air Force Electronic System Center (ESC), Hanscom Air Force Base 
 .http://eschq.hanscom.af.mil/ 
 ._	 U.S. Army Soldiers and Biological Chemical Command (SBCCOM): Basic 
Information on Building Protection 
 .http://buildingprotection.sbccom.army.mil 
. _	 U.S. Department of Justice 

http://www.usdoj.gov 
 �	Federal Bureau of Investigation: Terrorism in the United States reports 
 http://www.fbi.gov/publications/terror/terroris.htm 
. �	National Institute of Justice (NIJ) 

http://www.ojp.usdoj.gov/nij 
 � Office of Domestic Preparedness (ODP) 
 http://www.ojp.usdoj.gov/odp 
. � U.S.	Marshals Service (USMS) 

http://www.usdoj.gov/marshals 
The Infrastructure Security Partnership (TISP) 
http://www.tisp.org 
Founding Organizations 
 _	 American Council of Engineering Companies (ACEC) 
 http://www.acec.org 
. _	 American Society of Civil Engineers (ASCE) 

http://www.asce.org 
 .� Architectural Engineering Institute (AEI) of ASCE 
 .http://www.asce.org/instfound/aei.cfm 
 .� Civil Engineering Research Foundation (CERF) of ASCE 
 .http://www.cerf.org 
. � Structural Engineering Institute (SEI) of ASCE 

http://www.seinstitute.org 
 ._	 Associated General Contractors of America 
 .http://www.agc.org 
 ._	 Construction Industry Institute 
 .http://construction-institute.org 
. _	 Federal Emergency Management Agency (FEMA) 

http://www.fema.gov 
 .� Building Performance Assessment Team 
 .http://www.fema.gov/mit/bpat 
 .� Human Caused Hazards 
 .http://www.fema.gov/hazards 
. � Mitigation Planning 

http://www.fema.gov/fima/planning.shtm 
. _	 Federal Facilities Council - See National Academy of Sciences 
 _	 National Institute of Standards and Technology (NIST), Building and 
Fire Research Laboratory 
 http://www.bfrl.nist.gov 
. _	 Naval Facilities Engineering Command 

http://www.navfac.navy.mil 
�	Naval Facilities Engineering Service Center (NFESC), Security 
Engineering Center of Expertise ESC66 
http://atfp.nfesc.navy.mil 
 ._	 Society of American Military Engineers (SAME) 
 .http://www.same.org 
 ._	 The American Institute of Architects (AIA), Security Resource Center 
 .http://www.aia.org/security 
 ._	 U.S.Army Corps of Engineers http://www.usace.army.mil 
 .�	Blast Mitigation Action Group, U.S.	Army Corps of Engineers Center of 
Expertise for Protective Design 
 .http://bmag.nwo.usace.army.mil 
 .�	U.S.	Army Corps of Engineers, Electronic Security Center 
 .http://www.hnd.usace.army.mil/esc 
. � U.S.	Army Corps of Engineers, Protective Design Center 

http://pdc.nwo.usace.army.mil 
Selected Member Organizations 
 ._	 Air-Conditioning and Refrigeration Institute, Inc.	 
 .http://www.ari.org 
 ._	 Air Conditioning Contractors of America 
 .http://www.acca.org 
. _	 Airport Consultants Council 

http://www.acconline.org 
 ._	 Alliance for Fire & Smoke Containment & Control 
 .http://www.afscconline.org 
 ._	 American Association of State Highway and Transportation Officials 
(AASHTO) 
 .http://www.transportation.org 
 ._	 American Institute of Chemical Engineers, Center for Chemical Process Safety 
 .http://www.aiche.org/ccps 
 ._	 American Planning Association 
 .http://www.planning.org 
 ._	 American Portland Cement Alliance 
 .http://www.portcement.org/apca 
 ._	 American Public Works Association 
 .http://www.apwa.net 
 ._	 American Railway Engineering & Maintenance of Way Association 
 .http://www.arema.org 
 ._	 American Society for Industrial Security International (ASIS) 
 .http://www.asisonline.org 
 ._	 American Society of Heating, Refrigerating, and Air-Conditioning Engineers 
(ASHRAE) 
 .http://www.ashrae.org 
 ._	 American Society of Interior Designers 
 .http://www.asid.org 
 ._	 American Society of Landscape Architects (ASLA) 
 .http://www.asla.org 
 ._	 American Society of Mechanical Engineers (ASME) 
 .http://www.asme.org 
 ._	 American Underground Construction Association (AUA) 
 .http://www.auca.org or http://www.auaonline.org 
. _	 American Water Resources Association (AWRA) 

http://www.awra.org 
 ._	 Associated Locksmiths of America 
 .http://www.aloa.org 
 ._	 Association of Metropolitan Water Agencies 
 .http://www.amwa.net 
 ._	 Association of State Dam Safety Officials 
 .http://www.damsafety.org 
 ._	 Building Futures Council 
 .http://www.thebfc.com 
 ._	 Building Owners and Managers Association International (BOMA), 
Emergency Resource Center 
 .http://www.boma.org/emergency 
 ._	 California Department of Health Services, Division of Drinking Water & 
Environmental Management 
 .http://www.dhs.cahwnet.gov/ps/ddwem 
 ._	 Construction Industry Roundtable 
 .http://www.cirt.org 
 ._	 Construction Innovation Forum 
 .http://www.cif.org 
 ._	 Construction Specifications Institute 
 .http://www.csinet.org 
 ._	 Construction Users Roundtable 
 .http://www.curt.org 
 ._	 Defense Threat Reduction Agency (DTRA) 
 .http://www.dtra.mil 
 ._	 Design-Build Institute of America 
 .http://www.dbia.org 
 ._	 Drexel (University) Intelligent Infrastructure & Transportation Safety Institute 
 .http://www.di3.drexel.edu 
. _	 Federal Highway Administration 

http://www.fhwa.dot.gov 
_	 Florida Department of Transportation, Emergency Management Office 
http://www11.myflorida.com/safety/Emp/emp.htm 
or Florida Department of Community Affairs, Division of Emergency Management 
http://www.floridadisaster.org/bpr/EMTOOLS/Severe/ terrorism.htm 
or 
http://www.dca.state.fl.us/bpr/EMTOOLS/CIP/critical_ 
infrastructure_protecti.htm 
_	 George Washington University, Institute for Crisis, Disaster, and Risk 
Management 
http://www.cee.seas.gwu.edu 
or 
http://www.seas.gwu.edu/~icdm 
 ._	 Homeland Protection Institute, Ltd.	 
 .http://www.hpi-tech.org 
 ._	 Inland Rivers Ports and Terminals 
 .http://www.irpt.net 
 ._	 Institute of Electrical and Electronics Engineers, Inc.	-USA 
 .http://www.ieeeusa.org or http://www.ieee.org/portal/ index.jsp 
 ._	 International Association of Foundation Drilling 
 .http://www.adsc-iafd.com 
. _	 International Code Council (ICC) 

http://www.intlcode.org 
Consolidates services, products, and operations of BOCA (Building Officials and 
Code Administrators), ICBO (International Conference of Building Officials) 
and SBCCI Southern Building Code Congress International) into one member 
service organization - the International Code Council (ICC) in January 2003. 
_	 International Facility Management Association (IFMA) 
http://www.ifma.org 
 ._	 Market Development Alliance of the FRP Composites Industry 
 .http://www.mdacomposites.org 
 ._	 Multidisciplinary Center for Earthquake Engineering Research 
 .http://mceer.buffalo.edu 
 ._	 National Aeronautics and Space Administration 
 .http://www.nasa.gov 
. _	 National Capital Planning Commission (NCPC) 

http://www.ncpc.gov 
�	Security and Urban Design 
http://www.ncpc.gov/planning_init/security.html 
 ._	 National Center for Manufacturing Sciences 
 .http://www.ncms.org 
 ._	 National Concrete Masonry Association 
 .http://www.ncma.org 
 ._	 National Conference of States on Building Codes and Standards 
 .http://www.ncsbcs.org 
 ._	 National Council of Structural Engineers Associations (NCSEA) 
 .http://www.ncsea.com or http://dwp.bigplanet.com/
engineers/homepage

 ._	 National Crime Prevention Institute 
 .http://www.louisville.edu/a-s/ja/ncpi/courses.htm 
 ._	 National Fire Protection Association 
 .http://www.nfpa.org 
 ._	 National Institute of Building Sciences (NIBS) 
 .http://www.nibs.org and http://www.wbdg.org 
 ._	 National Park Service, Denver Service Center 
 .http://www.nps.gov/dsc 
. _	 National Precast Concrete Association 

http://www.precast.org 
 ._	 National Wilderness Training Center, Inc.	 
 .http://www.wildernesstraining.net 
 ._	 New York City Office of Emergency Preparedness 
 .http://www.nyc.gov/html/oem 
 ._	 Ohio State University 
 .http://www.osu.edu/homelandsecurity 
 ._	 Pentagon Renovation Program 
 .http://renovation.pentagon.mil 
 ._	 Portland Cement Association (PCA) 
 .http://www.portcement.org 
 ._	 Primary Glass Manufacturers Council 
 .http://www.primaryglass.org 
 ._	 Protective Glazing Council 
 .http://www.protectiveglazing.org 
 ._	 Protective Technology Center at Penn State University 
 .http://www.ptc.psu.edu 
 ._	 SAVE International 
 .http://www.value-eng.org 
 ._	 Society of Fire Protection Engineers 
 .http://www.sfpe.org 
 ._	 Southern Building Code Congress, International 
 .http://www.sbcci.org 
 ._	 Sustainable Buildings Industry Council 
 .http://www.sbicouncil.org 
 ._	 Transit Standards Consortium 
 .http://www.tsconsortium.org 
 ._	 Transportation Research Board/Marine Board 
 .http://www.trb.org 
. _	 Transportation Security Administration -Maritime and Land 

http://www.tsa.dot.gov 
 ._	 University of Missouri, Department of Civil & Environmental Engineering, 
National Center for Explosion Resistant Design 
 .http://www.engineering.missouri.edu/explosion.htm 
 ._	 U.S.	Air Force Civil Engineer Support Agency 
 .http://www.afcesa.af.mil 
 ._	 U.S.	Coast Guard 
 .http://www.uscg.mil 
. _	 U.S.	Department of Energy 

http://www.energy.gov 
 .�	Sandia National Laboratories (SNL) 
 .http://www.sandia.gov 
 .�	Architectural Surety Program 
 .http://www.sandia.gov/archsur 
. �	Critical Infrastructure Protection Initiative 

http://www.sandia.gov/LabNews/LN02-11-00/steam_ story.html 
 ._	 U.S.	Department of Health and Human Services 
 .http://www.hhs.gov 
 ._	 U.S.	Department of Veterans Affairs (VA) 
 .http://www.va.gov/facmgt 
 ._	 U.S.	Environmental Protection Agency (EPA), Chemical Emergency 
Preparedness and Prevention Office (CEPPO)- Counter-terrorism 
 .http://www.epa.gov/swercepp/cntr-ter.html 
. _	 U.S.	General Services Administration (GSA) 

http://www.gsa.gov 
 �	Office of Federal Protective Service (FPS) of GSA 
 http://www.gsa.gov/Portal/content/orgs_content.jsp?cont 
entOID=117945&contentType=1005&P=1&S=1 
. �	Office of Public Building Service (PBS) of GSA 

http://www.gsa.gov/Portal/content/orgs_content.jsp?cont 
entOID=22883&contentType=1005&PPzz=1&S=1 
�	Office of the Chief Architect of GSA 
http://www.gsa.gov/Portal/content/orgs_content.jsp?cont 
entOID=22899&contentType=1005 
and 
http://www.oca.gsa.gov 
 ._	 U.S.	Green Building Council 
 .http://www.usgbc.org 
 ._	 U.S.	Marine Corps Headquarters 
 .http://www.usmc.mil 
 ._	 U.S.	Society on Dams 
 .http://www.ussdams.org 
 ._	 Virginia Polytechnic Institute and State University 
 .http://www.ce.vt.edu 
. _	 Water and Wastewater Equipment Manufacturers Association 

http://www.wwema.org 
The Partnership for Critical Infrastructure (PCIS) 
http://www.pcis.org 
Note: Involved mainly with information systems and not building real property. 
Government 
 ._	 Department of Commerce Critical Infrastructure Assurance Office (CIAO) 
 .http://www.ciao.gov 
 ._	 Department of Energy (DOE) 
 .http://www.energy.gov 
 ._	 Department of Homeland Security 
 .http://www.whitehouse.gov/deptofhomeland 
. _	 National Infrastructure Protection Center (NIPC) 

http://www.nipc.gov 
Private Sector 
 ._	 Anser Institute for Homeland Security (ANSER) 
 .http://www.homelandsecurity.org 
 ._	 CERT(r) Coordination Center (CERT/CC) 
 .http://www.cert.org 
 ._	 Electronic Warfare Associates (EWA) 
 .http://www.ewa.com 
 ._	 Information Technology Association of America (ITAA) 
 .http://www.itaa.org 
 ._	 National Cyber Security Alliance (Alliance) 
 .http://www.staysafeonline.info 
 ._	 North American Electric Reliability Council (NERC) 
 .http://www.nerc.com 
 ._	 SANS Institute (SANS -SysAdmin, Audit, Network, Security) 
 .http://www.sans.org 
 ._	 The Financial Services Roundtable Technology Group (BITS) 
 .http://www.bitsinfo.org 
 ._	 The Institute for Internal Auditors (IIA) 
 .http://www.theiia.org 
. _	 The U.S.	Chamber of Commerce, Center for Corporate 
Citizenship (CCC) 

http://www.uschamber.com/ccc 
Selected States and Local Organizations 
 ._	 Association of Metropolitan Water Agencies 
 .http://www.amwa.net 
 ._	 International Association of Emergency Managers (IAEM) 
 .http://www.iaem.com 
. _	 National Association of State CIOs (NASCIO) 

http://www.nascio.org 
 ._	 National Emergency Managers Association (NEMA) 
 .http://www.nemaweb.org 
 ._	 National Governor's Association (NGA) 
 .http://www.csg.org 
 ._	 The Council of State Governments (CSG) 
 .http://www.csg.org 
. _	 The National League of Cities (NLC) 

http://www.nlc.org 
BUILDING VULNERABILITY ASSESSMENT CHECKLIST F 
he Building Vulnerability Assessment Checklist is based on 
the checklist developed by the Department of Veterans 
Affairs (VA) and compiles many best practices based on 
technologies and scientific research to consider during the 
design of a new school building or renovation of an 
existing building. It allows a consistent security evaluation 
of designs at various levels. The checklist can be used as a 
screening tool for preliminary design vulnerability 
assessment or be used by subject matter experts for a 
comprehensive vulnerability assessment of existing 
buildings. In addition to examining design issues that 
affect vulnerability, the checklist includes questions that 
determine if critical systems continue to function in order 
to enhance deterrence, detection, denial, and damage 
limitation, and to ensure that emergency systems function 
during a threat or hazard situation. 
The checklist is organized into the 13 sections listed below. To conduct a vulnerability 
assessment of a school building or preliminary design, each section of the checklist 
should be assigned to an engineer, architect, or subject matter expert who is 
knowledgeable and qualified to perform an assessment of the assigned area. Each 
assessor should consider the questions and guidance provided to help identify 
vulnerabilities and document results in the observations column. If assessing an 
existing building, vulnerabilities can also be documented with photographs, if 
possible. The results of the 13 assessments should be integrated into a master 
vulnerability assessment and provide a basis for determining vulnerability ratings 
during the assessment process. 
1. 1. Site 
2. 2. Architectural 
3. 3. Structural Systems 
4. 4. Building Envelope 
5. 5. Utility Systems 
6. 6. Mechanical Systems (heating, ventilation, and air conditioning (HVAC) and CBR) 
7. 7. Plumbing and Gas Systems 
8. 8. Electrical Systems 
9. 9. Fire Alarm Systems 
10. 10. Communications and Information Technology (IT) Systems 
11. 11. Equipment Operations and Maintenance 
12. 12. Security Systems 
13. 13. Security Master Plan 

Building Vulnerablilty Assessment Checklist


Sectio
n
Vulnerability 
Question
Guidanc
e
Observation
s


1         Sit

1.


What major structures surround the facility (site or building(s))?
What critical infrastructure, government, military, or recreation facilities are in the local area 
that impact transportation, utilities, and collateral damage (attack at this facility impacting the 
other major structures or attack on the major structures impacting this facility)?
What are the adjacent land uses immediately outside the perimeter of this facility (site or 
building(s))?
Do future development plans change these land uses outside the facility (site or building (s)) 
perimeter? 
Although this question bridges threat and vulnerability, the threat is the manmade hazard that can 
occur (likelihood and impact) and the vulnerability is the proximity of the hazard to the building(s) 
being assessed. Thus, a chemical plant release may be a threat/hazard, but vulnerability changes if 
the plant is 1 mile upwind for the prevailing winds versus 10 miles away and downwind. Similarly, a 
terrorist attack upon an adjacent building may impact the building(s) being assessed. The Murrah 
Federal Building in Oklahoma City was not the only building to have severe damage caused by the 
explosion of the Ryder rental truck bomb


Critical infrastructure to consider includes:
Telecommunications infrastructure
Facilities for broadcast TV, cable TV; cellular networks; newspaper offices, production, and distribution; radio 
stations; satellite base stations; telephone trunking and switching stations, including critical cable routes and major 
rights-of-way
Electric power systems
Power plants, especially nuclear facilities; transmission and distribution system components; fuel distribution, 
delivery, and storage
Gas and oil facilities
Hazardous material facilities, oil/gas pipelines, and storage facilitie


Banking and finance institutions
Financial institutions (banks, credit unions) and the business district; note schedule business/financial 
district may follow; armored car services
Transportation networks
Airports: carriers, flight paths, and airport layout; location of air traffic control towers, runways, passenger 
terminals, and parking areas
Bus Stations
Pipelines: oil; gas
Trains/Subways: rails and lines, railheads/rail yards, interchanges, tunnels, and cargo/passenger terminals; 
note hazardous material transported
Traffic: interstate highways/roads/tunnels/bridges carrying large volumes; points of congestion; note time 
of day and day of week
Trucking: hazardous materials cargo loading/unloading facilities; truck terminals, weigh stations, and rest 
areas
Waterways: dams; levees; berths and ports for cruise ships, ferries, roll-on/roll-off cargo vessels, and 
container ships; international (foreign) flagged vessels (and cargo)
Water supply systems
Pipelines and process/treatment facilities, dams for water collection; wastewater treatment 
Government services
Federal/state/local government offices - post offices, law enforcement stations, fire/rescue, town/city hall, 
local mayor's/governor's residences, judicial offices and courts, military installations (include type-Active, 
Reserves, National Guard)
Emergency services
Backup facilities, communications centers, Emergency Operations Centers (EOCs), fire/Emergency Medical 
Service (EMS) facilities, Emergency Medical Center (EMCs), law enforcement facilities
The following are not critical infrastructure, but have potential collateral damage to 
consider: 
Agricultural facilities: chemical distribution, storage, and application sites; crop spraying services; farms and 
ranches; food processing, storage, and distribution facilities
Commercial/manufacturing/industrial facilities: apartment buildings; business/corporate 
centers; chemical plants (especially those with Section 302 Extremely Hazardous Substances); factories; fuel 
production, distribution, and storage facilities; hotels and convention centers; industrial plants; raw material 
production, distribution, and storage facilities; research facilities and laboratories; shipping, warehousing, 
transfer, and logistical centers
Events and attractions: festivals and celebrations; open-air markets; parades; rallies, demonstrations, 
and marches; religious services; scenic tours; theme parks
Health care system components: family planning clinics; health department offices; hospitals; 
radiological material and medical waste transportation, storage, and disposal; research facilities and 
laboratories, walk-in clinics
Political or symbolically significant sites: embassies, consulates, landmarks, monuments, 
political party and special interest groups offices, religious sites
Public/private institutions: academic institutions, cultural centers, libraries, museums, research 
facilities and laboratories, schools
Recreation facilities: auditoriums, casinos, concert halls and pavilions, parks, restaurants and clubs 
(frequented by potential target populations), sports arenas, stadiums, theaters, malls, and special interest 
group facilities; note congestion dates and times for shopping centers
References: FEMA 386-7, FEMA SLG 101, DOJ NCJ181200



1.2
Does the terrain place the building in a depression or low area?

Depressions or low areas can trap heavy vapors, inhibit natural decontamination by prevailing winds, and 
reduce the effectiveness of in-place sheltering.
Reference: USAF Installation Force Protection Guid



1.3

In dense, urban areas, does curb lane parking allow uncontrolled vehicles to park 
unacceptably close to a building in public rights-of-way


Where distance from the building to the nearest curb provides insufficient setback, restrict parking in the curb 
lane. For typical city streets, this may require negotiating to close the curb lane. Setback is common 
terminology for the distance between a building and its associated roadway or parking. It is analogous to stand-
off between a vehicle bomb and the building. The benefit per foot of increased stand-off between a potential 
vehicle bomb and a building is very high when close to a building and decreases rapidly as the distance 
increases. Note that the July 1, 1994, Americans with Disabilities Act Standards for Accessible Design states 
that required handicapped parking shall be located on the shortest accessible route of travel from adjacent 
parking to an accessible entrance.
Reference: GSA PBS-P100

1.4

Is a perimeter fence or other types of barrier controls in place?
The intent is to channel pedestrian traffic onto a site with multiple buildings through known access control 
points. For a single building, the intent is to have a single visitor entrance.
Reference: GSA PBS-P100 
1.5

What are the site access points to the site or building?

The goal is to have at least two access points - one for passenger vehicles and one for delivery trucks due to the 
different procedures needed for each. Having two access points also helps if one of the access points becomes 
unusable, then traffic can be routed through the other access point.
Reference: USAF Installation Force Protection Guide

1.6

Is vehicle traffic separated from pedestrian traffic on the site?
Pedestrian access should not be endangered by car traffic. Pedestrian access, especially from public 
transportation, should not cross vehicle traffic if possible.
References: GSA PBS-P100 and FEMA 386-7

1.7
Is there vehicle and pedestrian access control at the perimeter of the site



Vehicle and pedestrian access control and inspection should occur as far from facilities as possible (preferably 
at the site perimeter) with the ability to regulate the flow of people and vehicles one at a time.
Control on-site parking with identification checks, security personnel, and access control systems.
Reference: FEMA 386-7
1.8
Is there space for inspection at the curb line or outside the protected perimeter?
What is the minimum distance from the inspection location to the building



Design features for the vehicular inspection point include: vehicle arrest devices that prevent vehicles from 
leaving the vehicular inspection area and prevent tailgating.
If screening space cannot be provided, consider other design features such as: hardening and alternative location 
for vehicle search/inspection.
Reference: GSA PBS-P100   

1.9
Is there any potential access to the site or building through utility paths or water runoff




Eliminate potential site access through utility tunnels, corridors, manholes, stormwater runoff culverts, etc. 
Ensure covers to these access points are secured.
Reference: USAF Installation Force Protection Guide

1.10
What are the existing types of vehicle anti-ram devices for the site or building?
Are these devices at the property boundary or at the building



Passive barriers include bollards, walls, hardened fences (steel cable interlaced), trenches, ponds/basins, 
concrete planters, street furniture, plantings, trees, sculptures, and fountains. Active barriers include pop-up 
bollards, swing arm gates, and rotating plates and drums, etc.
Reference: GSA PBS-P100

1.11
What is the anti-ram buffer zone stand-off distance from the building to unscreened vehicles or 
parking



If the recommended distance for the postulated threat is not available, consider reducing the stand-off required 
through structural hardening or manufacturing additional stand-off through barriers and parking restrictions. 
Also, consider relocation of vulnerable functions within the building, or to a more hazard-resistant building. 
More stand-off should be used for unscreened vehicles than for screened vehicles that have been searched.
Reference: GSA PBS-P100
1.12
Are perimeter barriers capable of stopping vehicles?
Will the vehicle barriers at the perimeter and building maintain access for emergency 
responders, including large fire apparatus


Anti-ram protection may be provided by adequately designed: bollards, street furniture, sculpture, landscaping, 
walls, and fences. The anti-ram protection must be able to stop the threat vehicle size (weight) at the speed 
attainable by that vehicle at impact. If the anti-ram protection cannot absorb the desired kinetic energy, 
consider adding speed controls (serpentines or speed bumps) to limit the speed at impact. If the resultant speed 
is still too great, the anti-ram protection should be improved.
References: Military Handbook 1013/14 and GSA PBS P-100



1.13
Does site circulation prevent high-speed approaches by vehicles



The intent is to use site circulation to minimize vehicle speeds and eliminate direct approaches to structures.
Reference: GSA PBS-P100



1.14
Are there offsetting vehicle entrances from the direction of a vehicle's approach to force a 
reduction of speed



Single or double 90-degree turns effectively reduce vehicle approach speed.
Reference: GSA PBS-P100
1.1


Is there a minimum setback distance between the building and parked vehicles

Adjacent public parking should be directed to more distant or better-protected areas, segregated from employee 
parking and away from the building. Some publications use the term setback in lieu of the term stand-off.
Reference: GSA PBS-P100

1.1


Does adjacent surface parking on site maintain a minimum stand-off distance





The specific stand-off distance needed is based upon the design basis threat bomb size and the building 
construction. For initial screening, consider using 25 meters (82 feet) as a minimum, with more distance needed 
for unreinforced masonry or wooden walls.
Reference: GSA PBS-P100

1.1


Do standalone, aboveground parking garages provide adequate visibility across as well as into 
and out of the parking garage


Pedestrian paths should be planned to concentrate activity to the extent possible.
Limiting vehicular entry/exits to a minimum number of locations is beneficial.
Stair tower and elevator lobby design should be as open as code permits. Stair and/or elevator waiting areas 
should be as open to the exterior and/or the parking areas as possible and well lighted. Impact-resistant, 
laminated glass for stair towers and elevators is a way to provide visual openness.
Potential hiding places below stairs should be closed off; nooks and crannies should be avoided, and dead-end 
parking areas should be eliminated.
Reference: GSA PBS-P100

1.1


Are garage or service area entrances for employee-permitted vehicles protected by suitable 
anti-ram devices?
Coordinate this protection with other anti-ram devices, such as on the perimeter or property 
boundary to avoid duplication of arresting capability


Control internal building parking, underground parking garages, and access to service areas and loading docks 
in this manner with proper access control, or eliminate the parking altogether.
The anti-ram device must be capable of arresting a vehicle of the designated threat size at the speed attainable at 
the location.
Reference: GSA PBS-P100

1.1


Do site landscaping and street furniture provide hiding places



Minimize concealment opportunities by keeping landscape plantings (hedges, shrubbery, and large plants with 
heavy ground cover) and street furniture (bus shelters, benches, trash receptacles, mailboxes, newspaper 
vending machines) away from the building to permit observation of intruders and prevent hiding of packages.
If mail or express boxes are used, the size of the openings should be restricted to prohibit the insertion of 
packages.
Reference: GSA PBS-P100
1.2


Is the site lighting adequate from a security perspective in roadway access and parking areas


Security protection can be successfully addressed through adequate lighting. The type and design of lighting, 
including illumination levels, is critical. Illuminating Engineering Society of North America (IESNA) 
guidelines can be used. The site lighting should be coordinated with the CCTV system.
Reference: GSA PBS-P100
1.2


Are line-of-sight perspectives from outside the secured boundary to the building and on the 
property along pedestrian and vehicle routes integrated with landscaping and green space


The goal is to prevent the observation of critical assets by persons outside the secure boundary of the site. For 
individual buildings in an urban environment, this could mean appropriate window treatments or no windows 
for portions of the building.
Once on the site, the concern is to ensure observation by a general workforce aware of any pedestrians or 
vehicles outside normal circulation routes or attempting to approach the building unobserved.
Reference: USAF Installation Force Protection Guide
1.22
Do signs provide control of vehicles and people



The signage should be simple and have the necessary level of clarity. However, signs that identify sensitive 
areas should generally not be provided.
Reference: GSA PBS-P100

1.23
Are all existing fire hydrants on the site accessible


Just as vehicle access points to the site must be able to transit emergency vehicles, so too must the emergency 
vehicles have access to the buildings and, in the case of fire trucks, the fire hydrants. Thus, security 
considerations must accommodate emergency response requirements.
Reference: GSA PBS-P100












2         Architectural


2.1

Does the site and architectural design incorporate strategies from a Crime Prevention 
Through Environmental Design (CPTED) perspective




The focus of CPTED is on creating defensible space by employing:
1. Natural access controls:
-  Design streets, sidewalks, and building entrances to clearly indicate public routes and direct people away from 
private/restricted areas
-  Discourage access to private areas with structural elements and limit access (no cut-through streets)
-  Loading zones should be separate from public parking
2. Natural surveillance:
-  Design that maximizes visibility of people, parking areas, and building entrances; doors and windows that 
look out on to streets and parking areas
-  Shrubbery under 2 feet in height for visibility
-  Lower branches of existing trees kept at least 10 feet off the ground
-  Pedestrian-friendly sidewalks and streets to control pedestrian and vehicle circulation
-  Adequate nighttime lighting, especially at exterior doorways
3. Territorial reinforcement:
-  Design that defines property lines
-  Design that distinguishes private/restricted spaces from public spaces using separation, landscape plantings; 
pavement designs (pathway and roadway placement); gateway treatments at lobbies, corridors, and door 
placement; walls, barriers, signage, lighting, and "CPTED" fences
-  "Traffic-calming" devices for vehicle speed control
4. Target hardening:
-  Prohibit entry or access: window locks, deadbolts for doors, interior door hinges
-  Access control (building and employee/visitor parking) and intrusion detection systems
5. Closed circuit television cameras:
-  Prevent crime and influence positive behavior, while enhancing the intended uses of space. In other words, 
design that eliminates or reduces criminal behavior and at the same time encourages people to "keep an eye 
out" for each other.
References: GSA PBS-P100 and FEMA 386-7

2.


Is it a mixed-tenant building


Separate high-risk tenants from low-risk tenants and from publicly accessible areas. Mixed uses may be 
accommodated through such means as separating entryways, controlling access, and hardening shared 
partitions, as well as through special security operational countermeasures.
Reference: GSA PBS-P100

2.


Are pedestrian paths planned to concentrate activity to aid in detectio


Site planning and landscape design can provide natural surveillance by concentrating pedestrian activity, 
limiting entrances/exits, and eliminating concealment opportunities. Also, prevent pedestrian access to 
parking areas other than via established entrances.
Reference: GSA PBS-P100
2.


Are there trash receptacles and mailboxes in close proximity to the building that can be used 
to hide explosive devices


The size of the trash receptacles and mailbox openings should be restricted to prohibit insertion of packages. 
Street furniture, such as newspaper vending machines, should be kept sufficient distance (10 meters or 33 feet) 
from the building, or brought inside to a secure area.
References: USAF Installation Force Protection Guide and DoD UCF 4-010-01

2.


Do entrances avoid significant queuing



If queuing will occur within the building footprint, the area should be enclosed in blast-resistant construction. If 
queuing is expected outside the building, a rain cover should be provided. For manpower and equipment 
requirements, collocate or combine staff and visitor entrances.
Reference: GSA PBS-P100

2.


Does security screening cover all public and private areas?
Are public and private activities separated?
Are public toilets, service spaces, or access to stairs or elevators located in any non-secure 
areas, including the queuing area before screening at the public entrance


Retail activities should be prohibited in non-secured areas. However, the Public Building Cooperative Use Act 
of 1976 encourages retail and mixed uses to create open and inviting buildings. Consider separating entryways, 
controlling access, hardening shared partitions, and special security operational countermeasures.
References: GSA PBS-P100 and FEMA 386-7


2.


Is access control provided through main entrance points for employees and visitors?
(lobby receptionist, sign-in, staff escorts, issue of visitor badges, checking forms of personal identification, electronic 
access control systems


Reference: Physical Security Assessment for the Department of Veterans Affairs Facilities


2.


Is access to private and public space or restricted area space clearly defined through the 
design of the space, signage, use of electronic security devices, etc.



Finishes and signage should be designed for visual simplicity.
Reference: Physical Security Assessment for the Department of Veterans Affairs Facilities
2.


Is access to elevators distinguished as to those that are designated only for employees and 
visitors



Reference: Physical Security Assessment for the Department of Veterans Affairs Facilities

2.1


Do public and employee entrances include space for possible future installation of access 
control and screening equipment


These include walk-through metal detectors and x-ray devices, identification check, electronic access card, 
search stations, and turnstiles.
Reference: GSA PBS-P100

2.1


Do foyers have reinforced concrete walls and offset interior and exterior doors from each 
other


Consider for exterior entrances to the building or to access critical areas within the building if explosive blast 
hazard must be mitigated.
Reference: U.S. Army TM 5-853 
2.1


Do doors and walls along the line of security screening meet requirements of UL752 "Standard 
for Safety: Bullet-Resisting Equipment"



If the postulated threat in designing entrance access control includes rifles, pistols, or shotguns, then the screening area 
should have bullet-resistance to protect security personnel and uninvolved bystanders. Glass, if present, should also be 
bullet-resistant.
Reference: GSA PBS-P100

2.1


Do circulation routes have unobstructed views of people approaching controlled access points



This applies to building entrances and to critical areas within the building.
References: USAF Installation Force Protection Guide and DoD UFC 4-010-01
2.1


Is roof access limited to authorized personnel by means of locking mechanisms



References: GSA PBS-P100 and CDC/NIOSH, Pub 2002-139
2.1


Are critical assets (people, activities, building systems and components) located close to any 
main entrance, vehicle circulation, parking, maintenance area, loading dock, or interior 
parking?
Are the critical building systems and components hardened


Critical building components include: Emergency generator including fuel systems, day tank, fire sprinkler, and 
water supply; Normal fuel storage; Main switchgear; Telephone distribution and main switchgear; Fire pumps; 
Building control centers; Uninterruptible Power Supply (UPS) systems controlling critical functions; Main 
refrigeration and ventilation systems if critical to building operation; Elevator machinery and controls; Shafts 
for stairs, elevators, and utilities; Critical distribution feeders for emergency power. Evacuation and rescue 
require emergency systems to remain operational during a disaster and they should be located away from 
potential attack locations. Primary and backup systems should be separated to reduce the risk of both being 
impacted by a single incident if collocated. Utility systems should be located at least 50 feet from loading 
docks, front entrances, and parking areas.
One way to harden critical building systems and components is to enclose them within hardened walls, floors, 
and ceilings. Do not place them near high-risk areas where they can receive collateral damage.
Reference: GSA PBS-P100

2.1


Are high-value or critical assets located as far into the interior of the building as possible and 
separated from the public areas of the building



Critical assets, such as people and activities, are more vulnerable to hazards when on an exterior building wall 
or adjacent to uncontrolled public areas inside the building.
Reference: GSA PBS-P100
2.1


Is high visitor activity away from critical assets



High-risk activities should also be separated from low-risk activities. Also, visitor activities should be 
separated from daily activities.
Reference: USAF Installation Force Protection Guide
2.1


Are critical assets located in spaces that are occupied 24 hours per day?
Are assets located in areas where they are visible to more than one person


Reference: USAF Installation Force Protection Guide


2.1


Are loading docks and receiving and shipping areas separated in any direction from utility 
rooms, utility mains, and service entrances, including electrical, telephone/data, fire 
detection/alarm systems, fire suppression water mains, cooling and heating mains, etc.



Loading docks should be designed to keep vehicles from driving into or parking under the building. If loading 
docks are in close proximity to critical equipment, consider hardening the equipment and service against 
explosive blast. Consider a 50-foot separation distance in all directions.
Reference: GSA PBS-P100
2.20
Are mailrooms located away from building main entrances, areas containing critical services, 
utilities, distribution systems, and important assets?
Is the mailroom located near the loading dock?

The mailroom should be located at the perimeter of the building with an outside wall or window designed for 
pressure relief.
By separating the mailroom and the loading dock, the collateral damage of an incident at one has less impact 
upon the other. However, this may be the preferred mailroom location.
Off-site screening stations or a separate delivery processing building on site may be cost-effective, particularly 
if several buildings may share one mailroom. A separate delivery processing building reduces risk and 
simplifies protection measures.
Reference: GSA PBS-P100


2.21
Does the mailroom have adequate space available for equipment to examine incoming 
packages and for an explosive disposal container





Screening of all deliveries to the building, including U.S. mail, commercial package delivery services, delivery 
of office supplies, etc.
Reference: GSA PBS-P100
2.2


Are areas of refuge identified, with special consideration given to egress


Areas of refuge can be safe havens, shelters, or protected spaces for use during specified hazards.
Reference: FEMA 386-7


2.23
Are stairwells required for emergency egress located as remotely as possible from high-risk 
areas where blast events might occur?
Are stairways maintained with positive pressure or are there other smoke control systems



Consider designing stairs so that they discharge into areas other than lobbies, parking, or loading docks.
Maintaining positive pressure from a clean source of air (may require special filtering) aids in egress by keeping 
smoke, heat, toxic fumes, etc,. out of the stairway. Pressurize exit stairways in accordance with the National 
Model Building Code.
References: GSA PBS-P100 and CDC/NIOSH, Pub 2002-139


2.2


Are enclosures for emergency egress hardened to limit the extent of debris that might 
otherwise impede safe passage and reduce the flow of evacuees?


Egress pathways should be hardened and discharge into safe areas.
Reference: FEMA 386-7
2.2


Do interior barriers differentiate level of security within a building


Reference: USAF Installation Force Protection Guide

2.2


Are emergency systems located away from high-risk areas



The intent is to keep the emergency systems out of harm's way, such that one incident does not take out all 
capability - both the regular systems and their backups.
Reference: FEMA 386-7

2.2

Is interior glazing near high-risk areas minimized?
Is interior glazing in other areas shatter-resistant



Interior glazing should be minimized where a threat exists and should be avoided in enclosures of critical 
functions next to high-risk areas.
Reference: GSA PBS-P100

2.2


Are ceiling and lighting systems designed to remain in place during hazard events?

When an explosive blast shatters a window, the blast wave enters the interior space, putting structural and non-
structural building components under loads not considered in standard building codes. It has been shown that 
connection criteria for these systems in high seismic activity areas resulted in much less falling debris that 
could injure building occupants.
Mount all overhead utilities and other fixtures weighing 14 kilograms (31 pounds) or more to minimize the 
likelihood that they will fall and injure building occupants. Design all equipment mountings to resist forces of 
0.5 times the equipment weight in any direction and 1.5 times the equipment weight in the downward direction. 
This standard does not preclude the need to design equipment mountings for forces required by other criteria, 
such as seismic standards.
Reference: DoD UCF 4-101-0




3         Structural Systems


3.


What type of construction?
What type of concrete and reinforcing steel?
What type of steel?
What type of foundation?


The type of construction provides an indication of the robustness to abnormal loading and load reversals. A 
reinforced concrete moment-resisting frame provides greater ductility and redundancy than a flat-slab or flat-
plate construction. The ductility of steel frame with metal deck depends on the connection details and pre-
tensioned or post-tensioned construction provides little capacity for abnormal loading patterns and load 
reversals. The resistance of load-bearing wall structures varies to a great extent, depending on whether the walls 
are reinforced or un-reinforced. A rapid screening process developed by FEMA for assessing structural hazards 
identifies the following types of construction with a structural score ranging from 1.0 to 8.5. A higher score 
indicates a greater capacity to sustain load reversals.
Wood buildings of all types - 4.5 to 8.5
Steel moment-resisting frames - 3.5 to 4.5
Braced steel frames - 2.5 to 3.0
Light metal buildings - 5.5 to 6.5
Steel frames with cast-in-place concrete shear walls - 3.5 to 4.5
Steel frames with unreinforced masonry infill walls - 1.5 to 3.0
Concrete moment-resisting frames - 2.0 to 4.0
Concrete shear wall buildings - 3.0 to 4.0
Concrete frames with unreinforced masonry infill walls - 1.5 to 3.0
Tilt-up buildings - 2.0 to 3.5
Precast concrete frame buildings - 1.5 to 2.5
Reinforced masonry - 3.0 to 4.0
Unreinforced masonry - 1.0 to 2.5
References: FEMA 154 and Physical Security Assessment for the Department of Veterans Affairs Facilities
3.2
Do the reinforced concrete structures contain symmetric steel reinforcement (positive and 
negative faces) in all floor slabs, roof slabs, walls, beams, and girders that may be subjected to 
rebound, uplift, and suction pressures?
Do the lap splices fully develop the capacity of the reinforcement?
Are lap splices and other discontinuities staggered?
Do the connections possess ductile details?
Is special shear reinforcement, including ties and stirrups, available to allow large post-elastic behavior?

Reference: GSA PBS-P100

3.3
Are the steel frame connections moment connections?
Is the column spacing minimized so that reasonably sized members will resist the design loads 
and increase the redundancy of the system?
What are the floor-to-floor heights?

A practical upper level for column spacing is generally 30 feet. Unless there is an overriding architectural 
requirement, a practical limit for floor-to-floor heights is generally less than or equal to 16 feet.
Reference: GSA PBS-P100
3.4
Are critical elements vulnerable to failure?
The priority for upgrades should be based on the relative importance of structural or non-structural elements that 
are essential to mitigating the extent of collapse and minimizing injury and damage.
Primary Structural Elements provide the essential parts of the building's resistance to catastrophic blast loads 
and progressive collapse. These include columns, girders, roof beams, and the main lateral resistance system.
Secondary Structural Elements consist of all other load-bearing members, such as floor beams, slabs, etc.
Primary Non-Structural Elements consist of elements (including their attachments) that are essential for life 
safety systems or elements that can cause substantial injury if failure occurs, including ceilings or heavy 
suspended mechanical units.
Secondary Non-Structural Elements consist of all elements not covered in primary non-structural elements, such 
as partitions, furniture, and light fixtures.
Reference: GSA PBS-P100

3.5
Will the structure suffer an unacceptable level of damage resulting from the postulated threat 
(blast loading or weapon impact)?  

The extent of damage to the structure and exterior wall systems from the bomb threat may be related to a 
protection level. The following is for new buildings: 
Level of Protection Below Antiterrorism Standards - Severe damage. Frame collapse/massive 
destruction. Little left standing. Doors and windows fail and result in lethal hazards. Majority of personnel 
suffer fatalities.
Very Low Level Protection - Heavy damage. Onset of structural collapse. Major deformation of primary 
and secondary structural members, but progressive collapse is unlikely. Collapse of non-structural elements. 
Glazing will break and is likely to be propelled into the building, resulting in serious glazing fragment injuries, 
but fragments will be reduced. Doors may be propelled into rooms, presenting serious hazards. Majority of 
personnel suffer serious injuries. There are likely to be a limited number (10 percent to 25 percent) of fatalities.
Low Level of Protection - Moderate damage, unrepairable. Major deformation of non-structural elements 
and secondary structural members and minor deformation of primary structural members, but progressive 
collapse is unlikely. Glazing will break, but fall within 1 meter of the wall or otherwise not present a 
significant fragment hazard. Doors may fail, but they will rebound out of their frames, presenting minimal 
hazards. Majority of personnel suffer significant injuries. There may be a few (<10 percent) fatalities.
Medium Level Protection - Minor damage, repairable. Minor deformations of non-structural elements and 
secondary structural members and no permanent deformation in primary structural members. Glazing will break, 
but will remain in the window frame. Doors will stay in frames, but will not be reusable. Some minor injuries, 
but fatalities are unlikely.
High Level Protection - Minimal damage, repairable. No permanent deformation of primary and 
secondary structural members or non-structural elements. Glazing will not break. Doors will be reusable. Only 
superficial injuries are likely.
Reference: DoD UFC 4-010-01

3.6
Is the structure vulnerable to progressive collapse?
Is the building capable of sustaining the removal of a column for one floor above grade at the 
building perimeter without progressive collapse?
In the event of an internal explosion in an uncontrolled public ground floor area, does the 
design prevent progressive collapse due to the loss of one primary column?
Do architectural or structural features provide a minimum 6-inch stand-off to the internal 
columns (primary vertical load carrying members)?
Are the columns in the unscreened internal spaces designed for an unbraced length equal to two floors, 
or three floors where there are two levels of parking?
Design to mitigate progressive collapse is an independent analysis to determine a system's ability to resist 
structural collapse upon the loss of a major structural element or the system's ability to resist the loss of a major 
structural element. Design to mitigate progressive collapse may be based on the methods outlined in ASCE 7-98 
(now 7-02). Designers may apply static and/or dynamic methods of analysis to meet this requirement and ultimate 
load capacities may be assumed in the analyses. Combine structural upgrades for retrofits to existing buildings, 
such as seismic and progressive collapse, into a single project due to the economic synergies and other cross 
benefits. Existing facilities may be retrofitted to withstand the design level threat or to accept the loss of a 
column for one floor above grade at the building perimeter without progressive collapse. Note that collapse of 
floors or roof must not be permitted.
Reference: GSA PBS-P100


3.7
Are there adequate redundant load paths in the structure?

Special consideration should be given to materials that have inherent ductility and that are better able to 
respond to load reversals, such as cast in place reinforced concrete, reinforced masonry, and steel construction.
Careful detailing is required for material such as pre-stressed concrete, pre-cast concrete, and masonry to 
adequately respond to the design loads. Primary vertical load carrying members should be protected where 
parking is inside a facility and the building superstructure is supported by the parking structure.
Reference: GSA PBS-P100

3.8
Are there transfer girders supported by columns within unscreened public spaces or at the 
exterior of the building?

Transfer girders allow discontinuities in columns between the roof and foundation. This design has inherent 
difficulty in transferring load to redundant paths upon loss of a column or the girder. Transfer beams and girders 
that, if lost, may cause progressive collapse are highly discouraged.
Reference: GSA PBS-P100

3.9
What is the grouting and reinforcement of masonry (brick and/or concrete masonry unit 
(CMU)) exterior walls?

Avoid unreinforced masonry exterior walls. Reinforcement can run the range of light to heavy, depending upon 
the stand-off distance available and postulated design threat.
Reference: GSA PBS-P100 recommends fully grouted and reinforced CMU construction where CMU is selected.
Reference: DoD Minimum Antiterrorism Standards for Buildings states "Unreinforced masonry walls are 
prohibited for the exterior walls of new buildings. A minimum of 0.05 percent vertical reinforcement with a 
maximum spacing of 1200 mm (48 in) will be provided. For existing buildings, implement mitigating measures 
to provide an equivalent level of protection." [This is light reinforcement and based upon the recommended 
stand-off distance for the situation.] 

3.10
Will the loading dock design limit damage to adjacent areas and vent explosive force to the 
exterior of the building?
Design the floor of the loading dock for blast resistance if the area below is occupied or contains critical utilities.
Reference: GSA PBS-P100

3.11
Are mailrooms, where packages are received and opened for inspection, and unscreened 
retail spaces designed to mitigate the effects of a blast on primary vertical or lateral bracing 
members


Where mailrooms and unscreened retail spaces are located in occupied areas or adjacent to critical utilities, 
walls, ceilings, and floors, they should be blast- and fragment- resistant.
Methods to facilitate the venting of explosive forces and gases from the interior spaces to the outside of the 
structure may include blow-out panels and window system designs that provide protection from blast pressure 
applied to the outside, but that readily fail and vent if exposed to blast pressure on the inside.
Reference: GSA PBS-P10




4         Building Envelope


4.1

What is the designed or estimated protection level of the exterior walls against the postulated 
explosive threat?


The performance of the fa�ade varies to a great extent on the materials. Different construction includes brick or 
stone with block backup, steel stud walls, precast panels, or curtain wall with glass, stone, or metal panel 
elements.
Shear walls that are essential to the lateral and vertical load bearing system and that also function as exterior 
walls should be considered primary structures and should resist the actual blast loads predicted from the threats 
specified. Where exterior walls are not designed for the full design loads, special consideration should be given 
to construction types that reduce the potential for injury.
Reference: GSA PBS-P100


4.2
Is there less than a 40 percent fenestration opening per structural bay?
Is the window system design on the exterior fa�ade balanced to mitigate the hazardous effects 
of flying glazing following an explosive event? (glazing, frames, anchorage to supporting walls, 
etc.)
Do the glazing systems with a 1�2-inch (3�4-inch is better) bite contain an application of 
structural silicone?
Is the glazing laminated or is it protected with an anti-shatter (fragment retention) film?
If an anti-shatter film is used, is it a minimum of a 7-mil thick film, or specially manufactured 
4-mil thick film?

The performance of the glass will similarly depend on the materials. Glazing may be single pane or double 
pane, monolithic or laminated, annealed, heat strengthened or fully tempered.
The percent fenestration is a balance between protection level, cost, the architectural look of the building 
within its surroundings, and building codes. One goal is to keep fenestration to below 40 percent of the 
building envelope vertical surface area, but the process must balance differing requirements. A blast engineer 
may prefer no windows; an architect may favor window curtain walls; building codes require so much 
fenestration per square footage of floor area; fire codes require a prescribed window opening area if the window is 
a designated escape route; and the building owner has cost concerns.
Ideally, an owner would want 100 percent of the glazed area to provide the design protection level against the 
postulated explosive threat (design basis threat- weapon size at the expected stand-off distance). However, 
economics and geometry may allow 80 percent to 90 percent due to the statistical differences in the 
manufacturing process for glass or the angle of incidence of the blast wave upon upper story windows (4th floor 
and higher).
Reference: GSA PBS-P100



4.3
Do the walls, anchorage, and window framing fully develop the capacity of the glazing material 
selected?
Are the walls capable of withstanding the dynamic reactions from the windows?
Will the anchorage remain attached to the walls of the building during an explosive event 
without failure?
Is the fa�ade connected to backup block or to the structural frame?
Are non-bearing masonry walls reinforced?

Government produced and sponsored computer programs coupled with test data and recognized dynamic 
structural analysis techniques may be used to determine whether the glazing either survives the specified threats 
or the post damage performance of the glazing protects the occupants. A breakage probability no higher than 
750 breaks per 1,000 may be used when calculating loads to frames and anchorage.
The intent is to ensure the building envelope provides relatively equal protection against the postulated 
explosive threat for the walls and window systems for the safety of the occupants, especially in rooms with 
exterior walls.
Reference: GSA PBS-P100 

4.4
Does the building contain ballistic glazing?
Does the ballistic glazing meet the requirements of UL 752 Bullet-Resistant Glazing?
Does the building contain security-glazing?
Does the security-glazing meet the requirements of ASTM F1233 or UL 972, Burglary 
Resistant Glazing Material?
Do the window assemblies containing forced entry resistant glazing (excluding the glazing) 
meet the requirements of ASTM F 588?

Glass-clad polycarbonate or laminated polycarbonate are two types of acceptable glazing material.
If windows are upgraded to bullet-resistant, burglar-resistant, or forced entry-resistant, ensure that doors, 
ceilings, and floors, as applicable, can resist the same for the areas of concern.
Reference: GSA PBS-P100

4.5
Do non-window openings, such as mechanical vents and exposed plenums, provide the same 
level of protection required for the exterior wall


In-filling of blast over-pressures must be considered through non-window openings such that structural 
members and all mechanical system mountings and attachments should resist these interior fill pressures.
These non-window openings should also be as secure as the rest of the building envelope against forced entry.
Reference: GSA PBS-P10




5         Utility Systems

5.


What is the source of domestic water? (utility, municipal, wells, lake, river, storage tank)
Is there a secure alternate drinking water supply?


Domestic water is critical for continued building operation. Although bottled water can satisfy requirements for 
drinking water and minimal sanitation, domestic water meets many other needs - flushing toilets, building 
heating and cooling system operation, cooling of emergency generators, humidification, etc.
Reference: FEMA 386-7

5.2
Are there multiple entry points for the water supply?

If the building or site has only one source of water entering at one location, the entry point should be secure.
Reference: GSA PBS-P100

5.3
Is the incoming water supply in a secure location?

Ensure that only authorized personnel have access to the water supply and its components.
Reference: FEMA 386-7

5.4
Does the building or site have storage capacity for domestic water?
How many gallons of storage capacity are available and how long will it allow operations to 
continue?


Operational facilities will require reliance on adequate domestic water supply. Storage capacity can meet short-
term needs and use water trucks to replenish for extended outages.
Reference: Physical Security Assessment for the Department of Veterans Affairs Facilities.

5.5
What is the source of water for the fire suppression system? (local utility company lines, 
storage tanks with utility company backup, lake, or river)
Are there alternate water supplies for fire suppression?

The fire suppression system water may be supplied from the domestic water or it may have a separate source, 
separate storage, or nonpotable alternate sources.
For a site with multiple buildings, the concern is that the supply should be adequate to fight the worst case 
situation according to the fire codes. Recent major construction may change that requirement.
Reference: FEMA 386-7

5.6
Is the fire suppression system adequate, code-compliant, and protected (secure location)?

Standpipes, water supply control valves, and other system components should be secure or supervised.
Reference: FEMA 386-7

5.7
Do the sprinkler/standpipe interior controls (risers) have fire- and blast-resistant separation?
Are the sprinkler and standpipe connections adequate and redundant?
Are there fire hydrant and water supply connections near the sprinkler/standpipe 
connections?
The incoming fire protection water line should be encased, buried, or located 50 feet from high-risk areas. The 
interior mains should be looped and sectionalized.
Reference: GSA PBS-P100

5.8
Are there redundant fire water pumps (e.g., one electric, one diesel)?
Are the pumps located apart from each other?



Collocating fire water pumps puts them at risk for a single incident to disable the fire suppression system.
References: GSA PBS-P100 and FEMA 386-7

5.9
Are sewer systems accessible?
Are they protected or secured?

Sanitary and stormwater sewers should be protected from unauthorized access. The main concerns are backup or 
flooding into the building, causing a health risk, shorting out electrical equipment, and loss of building use.
Reference: Physical Security Assessment for the Department of Veterans Affairs Facilities

5.10
What fuel supplies do the building rely upon for critical operation?
Typically, natural gas, propane, or fuel oil are required for continued operation.
Reference: Physical Security Assessment for the Department of Veterans Affairs Facilities

5.11
How much fuel is stored on the site or at the building and how long can this quantity support 
critical operations?
How is it stored?
How is it secured?

Fuel storage protection is essential for continued operation.
Main fuel storage should be located away from loading docks, entrances, and parking. Access should be 
restricted and protected (e.g., locks on caps and seals).
References: GSA PBS-P100 and Physical Security Assessment for the Department of Veterans Affairs Facilities

5.12
Where is the fuel supply obtained?
How is it delivered?

The supply of fuel is dependent on the reliability of the supplier.
Reference: Physical Security Assessment for the Department of Veterans Affairs Facilities

5.12
Are there alternate sources of fuel?
Can alternate fuels be used?

Critical functions may be served by alternate methods if normal fuel supply is interrupted.
Reference: Physical Security Assessment for the Department of Veterans Affairs Facilities

5.14
What is the normal source of electrical service for the site or building?

Utilities are the general source unless co-generation or a private energy provider is available.
Reference: Physical Security Assessment for the Department of Veterans Affairs Facilities

5.15
Is there a redundant electrical service source?
Can the site or buildings be fed from more than one utility substation?
The utility may have only one source of power from a single substation. There may be only single feeders from 
the main substation.
Reference: Physical Security Assessment for the Department of Veterans Affairs Facilities

5.16
How many service entry points does the site or building have for electricity?


Electrical supply at one location creates a vulnerable situation unless an alternate source is available.
Ensure disconnecting requirements according to NFPA 70 (National Fire Protection Association, National 
Electric Code) are met for multiple service entrances.
Reference: Physical Security Assessment for the Department of Veterans Affairs Facilities

5.17
Is the incoming electric service to the building secure?

 Typically, the service entrance is a locked room, inaccessible to the public.
Reference: Physical Security Assessment for the Department of Veterans Affairs Facilities

5.18
What provisions for emergency power exist? What systems receive emergency power and 
have capacity requirements been tested? 

Is the emergency power collocated with the commercial electric service?
Is there an exterior connection for emergency power?

Besides installed generators to supply emergency power, portable generators or rental generators available 
under emergency contract can be quickly connected to a building with an exterior quick disconnect already 
installed.
Testing under actual loading and operational conditions ensures the critical systems requiring emergency power 
receive it with a high assurance of reliability.
Reference: GSA PBS-P100

5.19
By what means do the main telephone and data communications interface the site or building?
Typically, communication ducts or other conduits are available. Overhead service is more identifiable and 
vulnerable.
Reference: Physical Security Assessment for the Department of Veterans Affairs Facilities
5.20
Are there multiple or redundant locations for the telephone and communications service? 

Secure locations of communications wiring entry to the site or building are required.
Reference: Physical Security Assessment for the Department of Veterans Affairs Facilities
5.21
Does the fire alarm system require communication with external sources?
By what method is the alarm signal sent to the responding agency: telephone, radio, etc.?
Is there an intermediary alarm monitoring center?
Typically, the local fire department responds to an alarm that sounds at the station or is transmitted over phone 
lines by an auto dialer.
An intermediary control center for fire, security, and/or building system alarms may receive the initial 
notification at an on-site or off-site location. This center may then determine the necessary response and 
inform the responding agency.
Reference: Physical Security Assessment for the Department of Veterans Affairs Facilities

5.22
Are utility lifelines aboveground, underground, or direct buried?

Utility lifelines (water, power, communications, etc.) can be protected by concealing, burying, or encasing.
References: GSA PBS-P100 and FEMA 386-



6        Mechanical Systems (HVAC and CBR)


6.


6.1
Where are the air intakes and exhaust louvers for the building? (low, high, or midpoint of the 
building structure)
Are the intakes and exhausts accessible to the public?



Air intakes should be located on the roof or as high as possible. Otherwise secure within CPTED-compliant 
fencing or enclosure. The fencing or enclosure should have a sloped roof to prevent the throwing of anything 
into the enclosure near the intakes.
Reference: GSA PBS-P100 states that air intakes should be on the fourth floor or higher and, on buildings with 
three floors or less, they should be on the roof or as high as practical. Locating intakes high on a wall is 
preferred over a roof location.
Reference: DoD UFC 4-010-01 states that, for all new inhabited buildings covered by this document, all air 
intakes should be located at least 3 meters (10 feet) above the ground.
Reference: CDC/NIOSH, Pub 2002-139 states: "An extension height of 12 feet (3.7 m) will place the intake out 
of reach of individuals without some assistance. Also, the entrance to the intake should be covered with a sloped 
metal mesh to reduce the threat of objects being tossed into the intake. A minimum slope of 45� is generally 
adequate. Extension height should be increased where existing platforms or building features (i.e., loading 
docks, retaining walls) might provide access to the outdoor air intakes".
Reference: LBNL PUB-51959: Exhausts are also a concer n during an outdoor release, especially if exhaust fans 
are not in continuous operation, due to wind effects and chimney effects (air movement due to differential 
temperature). 

6.2
Is roof access limited to authorized personnel by means of locking mechanisms?
Is access to mechanical areas similarly controlled?

Roofs are like entrances to the building and are like mechanical rooms when HVAC is installed. Adjacent 
structures or landscaping should not allow access to the roof.
References: GSA PBS-P100, CDC/NIOSH Pub 2002-139, and LBNL Pub 51959

6.3
Are there multiple air intake locations?

Single air intakes may feed several air handling units. Indicate if the air intakes are localized or separated. 
Installing low-leakage dampers is one way to provide the system separation when necessary.
Reference: Physical Security Assessment for the Department of Veterans Affairs Facilities


6.4
What are the types of air filtration? Include the efficiency and number of filter modules for each of the 
main air handling systems?
Is there any collective protection for chemical, biological, and radiological contamination 
designed into the building?

MERV - Minimum Efficiency Reporting Value
HEPA - High Efficiency Particulate Air
Activated charcoal for gases
Ultraviolet C for biologicals
Consider mix of approaches for optimum protection and cost-effectiveness.
Reference: CDC/NIOSH Pub 2002-139

6.5
Is there space for larger filter assemblies on critical air handling systems?

Air handling units serving critical functions during continued operation may be retrofitted to provide enhanced 
protection during emergencies. However, upgraded filtration may have negative effects upon the overall air 
handling system operation, such as increased pressure drop.
Reference: CDC/NIOSH Pub 2002-139

6.6
Are there �provisions for air monitors or sensors for chemical or biological agents?


Duct mounted sensors are usuallly found in limited cases in laboratory areas. Sensors generally have a limited 
spectrum of high reliability and are costly. Many different technologies are undergoing research to provide 
capability. 
Reference: CDC/NIOSH Pub 2002-139

6.7
By what method are air intakes and exhausts closed when not operational?

Motorized (low-leakage, fast-acting) dampers are the preferred method for closure with fail-safe to the closed 
position so as to support in-place sheltering.
References: CDC/NIOSH Pub 2002-139 and LBNL Pub 51959

6.8
How are air handling systems zoned?
What areas and functions do each of the primary air handling systems serve?
Understanding the critical areas of the building that must continue functioning focuses security and hazard 
mitigation measures.
Applying HVAC zones that isolate lobbies, mailrooms, loading docks, and other entry and storage areas from 
the rest of the building HVAC zones and maintaining negative pressure within these areas will contain CBR 
releases. Identify common return systems that service more than one zone, effectively making a large single 
zone.
Conversely, emergency egress routes should receive positive pressurization to ensure contamination does not 
hinder egress. Consider filtering of the pressurization air.
References: CDC/NIOSH Pub 2002-139 and LBNL Pub 51959


6.9
Are there large central air handling units or are there multiple units serving separate zones?

Independent units can continue to operate if damage occurs to limited areas of the building.
Reference: Physical Security Assessment for the Department of Veterans Affairs Facilities

6.10
Are there any redundancies in the air handling system?
Can critical areas be served from other units if a major system is disabled?


Redundancy reduces the security measures required compared to a non-redundant situation.
Reference: Physical Security Assessment for the Department of Veterans Affairs Facilities

6.11
Is the air supply to critical areas compartmentalized?
Similarly, are the critical areas or the building as a whole, considered tight with little or no 
leakage?
During chemical, biological, and radiological situations, the intent is to either keep the contamination 
localized in the critical area or prevent its entry into other critical, non-critical, or public areas. Systems can be 
cross-connected through building openings (doorways, ceilings, partial wall), ductwork leakage, or pressure 
differences in air handling system. In standard practice, there is almost always some air carried between 
ventilation zones by pressure imbalances, due to elevator piston action, chimney effect, and wind effects.
Smoke testing of the air supply to critical areas may be necessary.
Reference: CDC/NIOSH Pub 2002-139 and LBNL Pub 51959




6.12
Are supply, return, and exhaust air systems for critical areas secure?
Are all supply and return ducts completely connected to their grilles and registers and 
secure?
Is the return air not ducted?

The air systems to critical areas should be inaccessible to the public, especially if the ductwork runs through the 
public areas of the building. It is also more secure to have a ducted air handling system versus sharing hallways 
and plenums above drop ceilings for return air. Non-ducted systems provide greater opportunity for introducing 
contaminants.
Reference: CDC/NIOSH Pub 2002-139 and LBNL Pub 51959

6.13
What is the method of temperature and humidity control?
Is it localized or centralized?
Central systems can range from monitoring only to full control. Local control may be available to override 
central operation.
Of greatest concern are systems needed before, during, and after an incident that may be unavailable due to 
temperature and humidity exceeding operational limits (e.g., main telephone switch room).
Reference: DOC CIAO Vulnerability Assessment Framework 1.1
6.14
Where are the building automation control centers and cabinets located?
Are they in secure areas?
How is the control wiring routed?


Access to any component of the building automation and control system could compromise the functioning of 
the system, increasing vulnerability to a hazard or precluding their proper operation during a hazard incident.
The HVAC and exhaust system controls should be in a secure area that allows rapid shutdown or other activation 
based upon location and type of attack.
References: FEMA 386-7, DOC CIAO Vulnerability Assessment Framework 1.1 and LBNL Pub 51959

6.15
Does the control of air handling systems support plans for sheltering in place or other 
protective approach?

The micro-meteorological effects of buildings and terrain can alter travel and duration of chemical agents and 
hazardous material releases. Shielding in the form of sheltering in place can protect people and property from 
harmful effects.
To support in-place sheltering, the air handling systems require the ability for authorized personnel to rapidly 
turn off all systems. However, if the system is properly filtered, then keeping the system operating will provide 
protection as long as the air handling system does not distribute an internal release to other portions of the 
building.
Reference: CDC/NIOSH Pub 2002-139
6.16
Are there any smoke evacuation systems installed?
Does it have purge capability?

For an internal blast, a smoke removal system may be essential, particularly in large, open spaces. The 
equipment should be located away from high-risk areas, the system controls and wiring should be protected, and 
it should be connected to emergency power. This exhaust capability can be built into areas with significant risk 
on internal events, such as lobbies, loading docks, and mailrooms. Consider filtering of the exhaust to capture 
CBR contaminants.
References: GSA PBS-P100, CDC/NIOSH Pub 2002-139, and LBNL Pub 51959
6.17
Where is roof-mounted equipment located on the roof? (near perimeter, at center of roof)

Roof-mounted equipment should be kept away from the building perimeter.
Reference: U.S. Army TM 5-853
6.18
Are fire dampers installed at all fire barriers?
Are all dampers functional and seal well when closed?

All dampers (fire, smoke, outdoor air, return air, bypass) must be functional for proper protection within the 
building during an incident.
Reference: CDC/NIOSH Pub 2002-139
6.19
Do fire walls and fire doors maintain their integrity?
The tightness of the building (both exterior, by weatherization to seal cracks around doors and windows, and 
internal, by zone ducting, fire walls, fire stops, and fire doors) provides energy conservation benefits and 
functional benefits during a CBR incident.
Reference: LBNL Pub 51959
6.20
Do elevators have recall capability and elevator emergency message capability?

Although a life-safety code and fire response requirement, the control of elevators also has benefit during a CBR 
incident. The elevators generate a piston effect, causing pressure differentials in the elevator shaft and 
associated floors that can force contamination to flow up or down. 
Reference: LBNL Pub 51959
6.21
Is access to building information restricted?

Information on building operations, schematics, procedures, plans, and specifications should be strictly 
controlled and available only to authorized personnel.
References: CDC/NIOSH Pub 2002-139 and LBNL Pub 51959
6.22
Does the HVAC maintenance staff have the proper training, procedures, and preventive maintenance 
schedule to ensure CBR equipment is functional?

Functional equipment must interface with operational procedures in an emergency plan to ensure the equipment 
is properly operated to provide the protection desired.
The HVAC system can be operated in different ways, depending upon an external or internal release and where in 
the building an internal release occurs. Thus maintenance and security staff must have the training to properly 
operate the HVAC system under different circumstances, even if the procedure is to turn off all air movement 
equipment. 
Reference: CDC/NIOSH Pub 2002-139 and LBNL Pub 5195



7        Plumbing and Gas System


7.


What is the method of water distribution?


Central shaft locations for piping are more vulnerable than multiple riser locations.
Reference: Physical Security Assessment for the Department of Veterans Affairs Facilities

7.2
What is the method of gas distribution? (heating, cooking, medical, process


Reference: Physical Security Assessment for the Department of Veterans Affairs Facilities

7.3
Is there redundancy to the main piping distribution?
Looping of piping and use of section valves provide redundancies in the event sections of the system are 
damaged.
Reference: Physical Security Assessment for the Department of Veterans Affairs Facilities

7.4
What is the method of heating domestic water?
What fuel(s) is used?

Single source of hot water with one fuel source is more vulnerable than multiple sources and multiple fuel types. 
Domestic hot water availability is an operational concern for many building occupancies.
Reference: Physical Security Assessment for the Department of Veterans Affairs Facilities

7.5
Where are gas storage tanks located? (heating, cooking, medical, process)
How are they piped to the distribution system? (above or below ground)


The concern is that the tanks and piping could be vulnerable to a moving vehicle or a bomb blast either directly 
or by collateral damage due to proximity to a higher-risk area.
Reference: Physical Security Assessment for the Department of Veterans Affairs Facilities

7.6
Are there reserve supplies of critical gases?

Localized gas cylinders could be available in the event of damage to the central tank system.
Reference: Physical Security Assessment for the Department of Veterans Affairs Facilitie




8        Electrical Systems
8.1
Are there any transformers or switchgears located outside the building or accessible from the 
building exterior?
Are they vulnerable to public access?
Are they secured?

Reference: Physical Security Assessment for the Department of Veterans Affairs Facilities


8.2
What is the extent of the external building lighting in utility and service areas and at normal 
entryways used by the building occupants?



Reference: Physical Security Assessment for the Department of Veterans Affairs Facilities

8.3
How are the electrical rooms secured and where are they located relative to other higher-risk 
areas, starting with the main electrical distribution room at the service entrance?
Reference: Physical Security Assessment for the Department of Veterans Affairs Facilities

8.4
Are critical electrical systems collocated with other building systems?
Are critical electrical systems located in areas outside of secured electrical areas?
Is security system wiring located separately from electrical and other service systems?

Collocation concerns include rooms, ceilings, raceways, conduits, panels, and risers.
Reference: Physical Security Assessment for the Department of Veterans Affairs Facilities


8.5
How are electrical distribution panels serving branch circuits secured or are they in secure 
locations?

Reference: Physical Security Assessment for the Department of Veterans Affairs Facilities

8.6
Does emergency backup power exist for all areas within the building or for critical areas only?
How is the emergency power distributed?
Is the emergency power system independent from the normal electrical service, particularly 
in critical areas?


There should be no single critical node that allows both the normal electrical service and the emergency backup 
power to be affected by a single incident. Automatic transfer switches and interconnecting switchgear are the 
initial concerns.
Emergency and normal electrical equipment should be installed separately, at different locations, and as far apart 
as possible.
Reference: GSA PBS-P100

8.7
How is the primary electrical system wiring distributed?
Is it collocated with other major utilities?
Is there redundancy of distribution to critical areas?

Central utility shafts may be subject to damage, especially if there is only one for the building.
Reference: Physical Security Assessment for the Department of Veterans Affairs Facilitie






9         Fire Alarm System


9.1
Is the building fire alarm system centralized or localized?

How are alarms made known, both locally and centrally?

Are critical documents and control systems located in a secure yet accessible location


Fire alarm systems must first warn building occupants to evacuate for life safety. Then they must inform the 
responding agency to dispatch fire equipment and personnel.
Reference: Physical Security Assessment for the Department of Veterans Affairs Facilities

9.2
Where are the fire alarm panels located?
Do they allow access to unauthorized personnel?

Reference: Physical Security Assessment for the Department of Veterans Affairs Facilities

9.3
Is the fire alarm system standalone or integrated with other functions such as security and 
environmental or building management systems?
What is the interface?

Reference: Physical Security Assessment for the Department of Veterans Affairs Facilities

9.4
Do key fire alarm system components have fire- and blast-resistant separation?




This is especially necessary for the fire command center or fire alarm control center. The concern is to similarly 
protect critical components as described in Items 2.19, 5.7, and 10.3.

9.5
Is there redundant off-premises fire alarm reporting?

Fire alarms can ring at a fire station, at an intermediary alarm monitoring center, or autodial someone else. See 
Items 5.21 and 10.5




10        Communications and IT Systems


10.1
Where is the main telephone distribution room and where is it in relation to higher-risk areas?
Is the main telephone distribution room secure?

One can expect to find voice, data, signal, and alarm systems to be routed through the main telephone 
distribution room.
Reference: FEMA 386-7

10.2
Does the telephone system have an uninterruptible power supply (UPS)?
What is its type, power rating, and operational duration under load, and location? (battery, on-line, 
filtered)


Many telephone systems are now computerized and need a UPS to ensure reliability during power fluctuations. 
The UPS is also needed to await any emergency power coming on line or allow orderly shutdown.
Reference: DOC CIAO Vulnerability Assessment Framework 1.1

10.3
Where are communication systems wiring closets located? (voice, data, signal, alarm)
Are they collocated with other utilities?
Are they in secure areas?
Concern is to have separation distance from other utilities and higher-risk areas to avoid collateral damage.
Security approaches on the closets include door alarms, closed circuit television, swipe cards, or other logging 
notifications to ensure only authorized personnel have access to these closets.
Reference: FEMA 386-7

10.4
How is the communications system wiring distributed? (secure chases and risers, accessible 
public areas)


The intent is to prevent tampering with the systems.
Reference: Physical Security Assessment for the Department of Veterans Affairs Facilities

10.5
Are there redundant communications systems available?


Critical areas should be supplied with multiple or redundant means of communications. Power outage phones 
can provide redundancy as they connect directly to the local commercial telephone switch off site and not 
through the building telephone switch in the main telephone distribution room.
A base radio communication system with antenna can be installed in stairwells, and portable sets distributed to 
floors.
References: GSA PBS-P100 and FEMA 386-7



10.6
Where are the main distribution facility, data centers, routers, firewalls, and servers located 
and are they secure?
Where are the secondary and/or intermediate distribution facilities and are they secure?

Concern is collateral damage from manmade hazards and redundancy of critical functions.
Reference: DOC CIAO Vulnerability Assessment Framework 1.1

10.7
What type and where are the Wide Area Network (WAN) connections?
Critical facilities should have two Minimum-Points-of-Presence( MPOPs) where the telephone company's 
outside cable terminates inside the building. It is functionally a service entrance connection that demarcates 
where the telephone company's property stops and the building owner's property begins. The MPOPs should 
not be collocated and they should connect to different telephone company central offices so that the loss of one 
cable or central office does not reduce capability.
Reference: Physical Security Assessment for the Department of Veterans Affairs Facilities

10.8
What are the type, power rating, and location of the uninterruptible power supply? (battery, 
on-line, filtered)
Are the UPS also connected to emergency power?


Consider that UPS should be found at all computerized points from the main distribution facility to individual 
data closets and at critical personal computers/terminals.
Critical LAN sections should also be on backup power.
Reference: DOC CIAO Vulnerability Assessment Framework 1.1

10.9
What type of Local Area Network (LAN) cabling and physical topology is used? (Category (Cat) 
5, Gigabit Ethernet, Ethernet, Token Ring) 

The physical topology of a network is the way in which the cables and computers are connected to each other. 
The main types of physical topologies are:
Bus (single radial where any damage on the bus affects the whole system, but especially all portions 
downstream)
Star (several computes are connected to a hub and many hubs can be in the network - the hubs can be critical 
nodes, but the other hubs continue to function if one fails)
Ring (a bus with a continuous connection - least used, but can tolerate some damage because if the ring fails at a 
single point it can be rerouted much like a looped electric or water system)
The configuration and the availability of surplus cable or spare capacity on individual cables can reduce 
vulnerability to hazard incidents.
Reference: Physical Security Assessment for the Department of Veterans Affairs Facilities
10.10
For installed radio/wireless systems, what are their types and where are they located?(radio 
frequency (RF), high frequency (HF), very high frequency (VHF), medium wave (MW))

Depending upon the function of the wireless system, it could be susceptible to accidental or intended jamming 
or collateral damage.
Reference: Physical Security Assessment for the Department of Veterans Affairs Facilities


10.11
Do the Information Technology (IT - computer) systems meet requirements of confidentiality, 
integrity, and availability?
Ensure access to terminals and equipment for authorized personnel only and ensure system up-time to meet 
operational needs.
Reference: DOC CIAO Vulnerability Assessment Framework 1.1

10.12
Where is the disaster recovery/mirroring site?


A site with suitable equipment that allows continuation of operations or that mirrors (operates in parallel to) 
the existing operation is beneficial if equipment is lost during a natural or manmade disaster. The need is based 
upon the criticality of the operation and how quickly replacement equipment can be put in place and operated.
Reference: DOC CIAO Vulnerability Assessment Framework 1.1
10.13
Where is the backup tape/file storage site and what is the type of safe environment?(safe, vault, 
underground)
Is there redundant refrigeration in the site?
If equipment is lost, data are most likely lost, too. Backups are needed to continue operations at the disaster 
recovery site or when equipment can be delivered and installed.
Reference: DOC CIAO Vulnerability Assessment Framework 1.1
10.14
Are there any satellite communications (SATCOM) links?(location, power, UPS, emergency 
power, spare capacity/capability)


SATCOM links can serve as redundant communications for voice and data if configured to support required 
capability after a hazard incident. 
Reference: DOC CIAO Vulnerability Assessment Framework 1.1
10.15
Is there a mass notification system that reaches all building occupants? (public address, pager, 
cell phone, computer override, etc.)
Will one or more of these systems be operational under hazard conditions? (UPS, emergency 
power) 

Depending upon building size, a mass notification system will provide warning and alert information, along 
with actions to take before and after an incident if there is redundancy and power.
Reference: DoD UFC 4-010-01

10.16
Do control centers and their designated alternate locations have equivalent or reduced 
capability for voice, data, mass notification, etc.?(emergency operations, security, fire alarms, 
building automation)
Do the alternate locations also have access to backup systems, including emergency power?


Reference: GSA PBS-P10





11        Equipment Operations and Maintenanc


11.


Are there composite drawings indicating location and capacities of major systems and are they 
current? (electrical, mechanical, and fire protection; and date of last update)
Do updated operations and maintenance (O&M) manuals exist?
Within critical infrastructure protection at the building level, the current configuration and capacity of all 
critical systems must be understood to ensure they meet emergency needs. Manuals must also be current to 
ensure operations and maintenance keeps these systems properly functioning. The system must function during 
an emergency unless directly affected by the hazard incident.
Reference: Physical Security Assessment for the Department of Veterans Affairs Facilities

11.2
Have critical air systems been rebalanced?
If so, when and how often?
Although the system may function, it must be tested periodically to ensure it is performing as designed. 
Balancing is also critical after initial construction to set equipment to proper performance per the design.
Rebalancing may only occur during renovation.
Reference: CDC/NIOSH Pub 2002-139

11.3
Is air pressurization monitored regularly?
Some areas require positive or negative pressure to function properly. Pressurization is critical in a hazardous 
environment or emergency situation.
Measuring pressure drop across filters is an indication when filters should be changed, but also may indicate 
that low pressures are developing downstream and could result in loss of expected protection.
Reference: CDC/NIOSH Pub 2002-139


11.4
Does the building have a policy or procedure for periodic recommissioning of major 
Mechanical/Electrical/Plumbing (M/E/P) systems?



Recommissioning involves testing and balancing of systems to ascertain their capability to perform as 
described.
Reference: Physical Security Assessment for the Department of Veterans Affairs Facilities

11.5
Is there an adequate O&M program, including training of facilities management staff?

If O&M of critical systems is done with in-house personnel, management must know what needs to be done and 
the workforce must have the necessary training to ensure systems reliability.
Reference: CDC/NIOSH Pub 2002-139

11.6
What maintenance and service agreements exist for M/E/P systems?
When an in-house facility maintenance work force does not exist or does not have the capability to perform the 
work, maintenance and service contracts are the alternative to ensure critical systems will work under all 
conditions. The facility management staff requires the same knowledge to oversee these contracts as if the work 
was being done by in-house personnel.
Reference: Physical Security Assessment for the Department of Veterans Affairs Facilities

11.7
Are backup power systems periodically tested under load?


Loading should be at or above maximum connected load to ensure available capacity and automatic sensors 
should be tested at least once per year.
Periodically (once a year as a minimum) check the duration of capacity of backup systems by running them for 
the expected emergency duration or estimating operational duration through fuel consumption, water 
consumption, or voltage loss.
Reference: FEMA 386-7


11.8
Is stairway and exit sign lighting operational?


The maintenance program for stairway and exit sign lighting (all egress lighting) should ensure functioning 
under normal and emergency power conditions.
Expect building codes to be updated as emergency egress lighting is moved from upper walls and over doorways 
to floor level as heat and smoke drive occupants to crawl along the floor to get out of the building. Signs and 
lights mounted high have limited or no benefit when obscured.
Reference: FEMA 386-




12        Security System


            Perimeter System

12.


Are black/white or color CCTV (closed circuit television) cameras used?
Are they monitored and recorded 24 hours/7 days a week? By whom?
Are they analog or digital by design?    
What are the number of fixed, wireless, and pan-tilt-zoom cameras used?        
Who are the manufacturers of the CCTV cameras?
What is the age of the CCTV cameras in use? 
Security technology is frequently considered to complement or supplement security personnel forces and to 
provide a wider area of coverage. Typically, these physical security elements provide the first line of defense in 
deterring, detecting, and responding to threats and reducing vulnerabilities. They must be viewed as an integral 
component of the overall security program. Their design, engineering, installation, operation, and 
management must be able to meet daily security challenges from a cost-effective and efficiency perspective. 
During and after an incident, the system, or its backups, should be functional per the planned design.
Consider color CCTV cameras to view and record activity at the perimeter of the building, particularly at 
primary entrances and exits. A mix of monochrome cameras should be considered for areas that lack adequate 
illumination for color cameras.
Reference: GSA PBS P-100

12.2
Are the cameras programmed to respond automatically to perimeter building alarm events?
Do they have built-in video motion capabilities?

 

The efficiency of monitoring multiple screens decreases as the number of screens increases. Tying the alarm 
system or motion sensors to a CCTV camera and a monitoring screen improves the man-machine interface by 
drawing attention to a specific screen and its associated camera. Adjustment may be required after installation 
due to initial false alarms, usually caused by wind or small animals.
Reference: Physical Security Assessment for the Department of Veterans Affairs Facilities

12.3
What type of camera housings are used and are they environmental in design to protect against 
exposure to heat and cold weather elements? 
Reference: Physical Security Assessment for the Department of Veterans Affairs Facilities

12.4
Are panic/duress alarm buttons or sensors used, where are they located, and are they 
hardwired or portable?
 


Call buttons should be provided at key public contact areas and as needed in offices of managers and directors, in 
garages and parking lots, and other high-risk locations by assessment.
Reference: GSA PBS P-100

12.5
Are intercom call boxes used in parking areas or along the building perimeter?

See Item 12.4.
12.6
What is the transmission media used to transmit camera video signals: fiber, wire line, 
telephone wire, coaxial, wireless? 
Reference: Physical Security Assessment for the Department of Veterans Affairs Facilities
12.7
Who monitors the CCTV system? 

Reference: DOC CIAO Vulnerability Assessment Framework 1.1
12.8
What is the quality of video images both during the day and hours of darkness?
Are infrared camera illuminators used?

Reference: Physical Security Assessment for the Department of Veterans Affairs Facilities
 
12.9
Are the perimeter cameras supported by an uninterruptible power supply, battery, or building 
emergency power?


Reference: Physical Security Assessment for the Department of Veterans Affairs Facilities

12.10
What type of exterior Intrusion Detection System (IDS) sensors are used? (electromagnetic; fiber 
optic; active infrared; bistatic microwave; seismic; photoelectric; ground; fence; glass break 
(vibration/shock); single, double, and roll-up door magnetic contacts or switches) 
Consider balanced magnetic contact switch sets for all exterior doors, including overhead/roll-up doors, and 
review roof intrusion detection.
Consider glass break sensors for windows up to scalable heights.
Reference: GSA PBS-P100
12.11
Is a global positioning system (GPS) used to monitor vehicles and asset movements? 

Reference: Physical Security Assessment for the Department of Veterans Affairs Facilities

Interior Security

12.12
Are black/white or color CCTV cameras used?
Are they monitored and recorded 24 hours/7 days a week? By whom?
Are they analog or digital by design?
What are the number of fixed, wireless, and pan-tilt-zoom cameras used?
Who are the manufacturers of the CCTV cameras?
What is the age of the CCTV cameras in use? 

See Item 12.1.
Reference: Physical Security Assessment for the Department of Veterans Affairs Facilities

12.13
Are the cameras programmed to respond automatically to interior building alarm events?
Do they have built-in video motion capabilities?
 
The efficiency of monitoring multiple screens decreases as the number of screens increases. Tying the alarm 
system or motion sensors to a CCTV camera and a monitoring screen improves the man-machine interface by 
drawing attention to a specific screen and its associated camera.
Reference: Physical Security Assessment for the Department of Veterans Affairs Facilities

12.14
What type of camera housings are used and are they designed to protect against exposure or 
tampering? 


Reference: Physical Security Assessment for the Department of Veterans Affairs Facilities

12.15
Do the camera lenses used have the proper specifications, especially distance viewing and 
clarity? 

Reference: Physical Security Assessment for the Department of Veterans Affairs Facilities

12.16
What is the transmission media used to transmit camera video signals: fiber, wire line, 
telephone wire, coaxial, wireless? 

Reference: Physical Security Assessment for the Department of Veterans Affairs Facilities

12.17
Are the interior camera video images of good visual and recording quality? 

Reference: Physical Security Assessment for the Department of Veterans Affairs Facilities
12.18
Are the interior cameras supported by an uninterruptible power supply source, battery, or 
building emergency power? 

Reference: Physical Security Assessment for the Department of Veterans Affairs Facilities
12.19
What are the first costs and maintenance costs associated with the interior cameras? 


Reference: Physical Security Assessment for the Department of Veterans Affairs Facilities
12.20
What type of security access control system is used?
Are the devices used for physical security also used (integrated) with security computer 
networks (e.g., in place of or in combination with user ID and system passwords)? 

Reference: Physical Security Assessment for the Department of Veterans Affairs Facilities
12.21
What type of access control transmission media is used to transmit access control system signals 
(same as defined for CCTV cameras)? 

Reference: Physical Security Assessment for the Department of Veterans Affairs Facilities

12.22
What is the backup power supply source for the access control systems? (battery, uninterruptible 
power supply) 

Reference: Physical Security Assessment for the Department of Veterans Affairs Facilities
12.23
What access control system equipment is used?

How old are the systems and what are the related first and maintenance service costs? 
Reference: Physical Security Assessment for the Department of Veterans Affairs Facilities

12.24
Are panic/duress alarm sensors used?
Where are they located?
Are they hardwired or portable? 

Call buttons should be provided at key public contact areas and as needed in offices of managers and directors, in 
garages and parking lots, and other high-risk locations by assessment.
Reference: GSA PBS P-100
12.25
Are intercom call-boxes or a building intercom system used throughout the building? 

See Item 12.24.
12.26
Are magnetometers (metal detectors) and x-ray equipment used? 
At what locations within the building? 

Reference: DOC CIAO Vulnerability Assessment Framework 1.1

12.27
What type of interior IDS sensors are used: electromagnetic; fiber optic; active infrared-motion 
detector; photoelectric; glass break (vibration/shock); single, double, and roll-up door magnetic 
contacts or switches? 


Consider magnetic reed switches for interior doors and openings.
Reference: GSA PBS-P100
12.28
Are mechanical, electrical, gas, power supply, radiological material storage, voice/data 
telecommunication system nodes, security system panels, elevator and critical system panels, and other 
sensitive rooms continuously locked, under electronic security, CCTV camera, and intrusion alarm 
systems surveillance? 

Reference: DOC CIAO Vulnerability Assessment Framework 1.1
12.29
What types of locking hardware are used throughout the building?
Are manual and electromagnetic cipher, keypad, pushbutton, panic bar, door strikes, and 
related hardware and software used?

As a minimum, electric utility closets, mechanical rooms, and telephone closets should be secured.
The mailroom should also be secured, allowing only authorized personnel into the area where mail is screened 
and sorted. Separate the public access area from the screening area for the postulated mailroom threats.
All security locking arrangements on doors used for egress must comply with NFPA 101, Life Safety Code.
Reference: GSA PBS-P100

12.30
Are any potentially hazardous chemicals, combustible, or toxic materials stored on site in non-
secure and non-monitored areas? 

The storage, use, and handling locations should also be kept away from other activities. 
The concern is that an intruder need not bring the material into the building if it is already there and accessible.
Reference: Physical Security Assessment for the Department of Veterans Affairs Facilities
12.31
What security controls are in place to handle the processing of mail and protect against 
potential biological, explosive, or other threatening exposures? 

Reference: Physical Security Assessment for the Department of Veterans Affairs Facilities
12.32
Is there a designated security control room and console in place to monitor security, fire 
alarm, and other building systems?
Is there a backup control center designated and equipped?
Is there off-site 24-hour monitoring of intrusion detection systems?
Monitoring can be done at an off-site facility, at an on-site monitoring center during normal duty hours, or at a 
24-hour on-site monitoring center.
Reference: GSA PBS-P100
12.33
Is the security console and control room adequate in size and does it provide room for 
expansion?
Does it have adequate environment controls (e.g., a/c, lighting, heating, air circulation, backup 
power)?
Is it ergonomically designed?

Reference: Physical Security Assessment for the Department of Veterans Affairs Facilities

12.34
Is the location of the security room in a secure area with limited, controlled, and restricted 
access controls in place?

Reference: Physical Security Assessment for the Department of Veterans Affairs Facilities
12.35
What are the means by which facility and security personnel can communicate with one 
another (e.g., portable radio, pager, cell phone, personal data assistants (PDAs))?
What problems have been experienced with these and other electronic security systems?


Reference: Physical Security Assessment for the Department of Veterans Affairs Facilities
12.36
Is there a computerized security incident reporting system used to prepare reports and track 
security incident trends and patterns? 

Reference: Physical Security Assessment for the Department of Veterans Affairs Facilities

12.37
Does the current security force have access to a computerized guard tour system? 

This system allows for the systematic performance of guard patrols with validation indicators built in. The 
system notes stations/locations checked or missed, dates and times of such patrols, and who conducted them on 
what shifts. Management reports can be produced for recordkeeping and manpower analysis purposes.
Reference: Physical Security Assessment for the Department of Veterans Affairs Facilities
12.38
Are vaults or safes in the building?
Where are they located?
Basic structural design requires an understanding of where heavy concentrations of floor loading may occur so as 
to strengthen the floor and structural framing to handle this downward load. Security design also needs this 
information to analyze how this concentrated load affects upward and downward loadings under blast conditions 
and its impact upon progressive collapse. Location is important because safes can be moved by blast so that 
they should be located away from people and away from exterior windows.
Vaults, on the other hand, require construction above the building requirements with thick masonry walls and 
steel reinforcement. A vault can provide protection in many instances due to its robust construction.
Safes and vaults may also require security sensors and equipment, depending upon the level of protection and 
defensive layers needed.
Reference: U.S. Army TM 5-85
Security System Documents
12.39
Have security system as-built drawings been generated and are they ready for review? 

Drawings are critical to the consideration and operation of security technologies, including its overall design 
and engineering processes. These historical reference documents outline system specifications and layout 
security devices used, as well as their application, location, and connectivity. They are a critical resource tool 
for troubleshooting system problems, and replacing and adding other security system hardware and software 
products. Such documents are an integral component to new and retrofit construction projects.
Reference: Physical Security Assessment for the Department of Veterans Affairs Facilities





12.40
Have security system design and drawing standards been developed? 


Reference: Physical Security Assessment for the Department of Veterans Affairs Facilities
12.41
Are security equipment selection criteria defined? 
Reference: Physical Security Assessment for the Department of Veterans Affairs Facilities

12.42
What contingency plans have been developed or are in place to deal with security control 
center redundancy and backup operations?

Reference: Physical Security Assessment for the Department of Veterans Affairs Facilities
12.43
Have security system construction specification documents been prepared and standardized?

Reference: Physical Security Assessment for the Department of Veterans Affairs Facilities
12.44
Do all security system documents include current as-built drawings? 

Reference: Physical Security Assessment for the Department of Veterans Affairs Facilities
12.45
Have qualifications been determined for security consultants, system designers/engineers, 
installation vendors, and contractors? 

Reference: Physical Security Assessment for the Department of Veterans Affairs Facilities

12.46
Are security systems decentralized, centralized, or integrated?
Do they operate over an existing IT network or are they a standalone method of operation? 

Reference: Physical Security Assessment for the Department of Veterans Affairs Facilities
12.47
What security systems manuals are available?

Reference: Physical Security Assessment for the Department of Veterans Affairs Facilities
12.48
What maintenance or service agreements exist for security systems?

Reference: Physical Security Assessment for the Department of Veterans Affairs Facilitie


13         Security Master Pla


13.

Does a written security plan exist for this site or building?
When was the initial security plan written and last revised?
Who is responsible for preparing and reviewing the security plan?
The development and implementation of a security master plan provides a roadmap that outlines the strategic 
direction and vision, operational, managerial, and technological mission, goals, and objectives of the 
organization's security program.
Reference: DOC CIAO Vulnerability Assessment Framework 1.1
13.2
Has the security plan been communicated and disseminated to key management personnel and 
departments?



The security plan should be part of the building design so that the construction or renovation of the structure 
integrates with the security procedures to be used during daily operations.
Reference: Physical Security Assessment for the Department of Veterans Affairs Facilities

13.3
Has the security plan been benchmarked or compared against related organizations and 
operational entities?

Reference: Physical Security Assessment for the Department of Veterans Affairs Facilities
13.4
Has the security plan ever been tested and evaluated from a benefit/cost and operational 
efficiency and effectiveness perspective?

Reference: Physical Security Assessment for the Department of Veterans Affairs Facilities

13.5
Does the security plan define mission, vision, and short- and long- term security program goals 
and objectives?

Reference: Physical Security Assessment for the Department of Veterans Affairs Facilities
13.6
Are threats/hazards, vulnerabilities, and risks adequately defined and security 
countermeasures addressed and prioritized relevant to their criticality and probability of 
occurrence?


Reference: DOC CIAO Vulnerability Assessment Framework 1.1
13.7
Has a security implementation schedule been established to address recommended security 
solutions?




Reference: Physical Security Assessment for the Department of Veterans Affairs Facilities
13.8
Have security operating and capital budgets been addressed, approved, and established to 
support the plan?

Reference: Physical Security Assessment for the Department of Veterans Affairs Facilities
13.9
What regulatory or industry guidelines/standards were followed in the preparation of the 
security plan?
Reference: Physical Security Assessment for the Department of Veterans Affairs Facilities

13.10
Does the security plan address existing security conditions from an administrative, operational, 
managerial, and technical security systems perspective?


Reference: Physical Security Assessment for the Department of Veterans Affairs Facilities

13.11
Does the security plan address the protection of people, property, assets, and information?
Reference: Physical Security Assessment for the Department of Veterans Affairs Facilities
13.12
Does the security plan address the following major components: access control, surveillance, 
response, building hardening, and protection against CBR and cyber-network attacks?

Reference: Physical Security Assessment for the Department of Veterans Affairs Facilities

13.13
Has the level of risk been identified and communicated in the security plan through the 
performance of a physical security assessment?

Reference: Physical Security Assessment for the Department of Veterans Affairs Facilities

13.14
When was the last security assessment performed?
Who performed the security risk assessment?



Reference: DOC CIAO Vulnerability Assessment Framework 1.1

13.15
Are the following areas of security analysis addressed in the security master plan? 
Asset Analysis: Does the security plan identify and prioritize the assets to be protected in accordance 
to their location, control, current value, and replacement value?
Threat Analysis: Does the security plan address potential threats; causes of potential harm in the 
form of death, injury, destruction, disclosure, interruption of operations, or denial of services?(possible 
criminal acts [documented and review of police/security incident reports] associated with forced 
entry, bombs, ballistic assault, biochemical and related terrorist tactics, attacks against utility 
systems infrastructure and buildings)
Vulnerability Analysis: Does the security plan address other areas associated with the site or 
building and its operations that can be taken advantage of to carry out a threat?(architectural design 
and construction of new and existing buildings, technological support systems [e.g., heating, air 
conditioning, power, lighting and security systems, etc.] and operational procedures, policies, and 
controls)
Risk Analysis: Does the security plan address the findings from the asset, threat/hazard, and 
vulnerability analyses in order to develop, recommend, and consider implementation of appropriate 
security countermeasures?
This process is the input to the building design and what mitigation measures will be included in the facility 
project to reduce risk and increase safety of the building and people.
Reference: USA TM 5-853, Security Engineerin




*Sources: 
Centers for Disease Control and Prevention/National Institute for Occupational Safety 
and Health (CDC/NIOSH)Publication No. 2002-139, Guidance for Protecting Building 
Environments from Airborne Chemical, Biological, or Radiological Attacks, May 2002
Federal Emergency Management Agency (FEMA)FEMA 154, Rapid Visual Screening of 
Buildings for Seismic Hazards: A Handbook, 1988 (also, Applied Technology Council (ATC-
21) by same name)
FEMA 386-7, Integrating Human-Caused Hazards Into Mitigation Planning, September 2002
SLG 101, Guide for All-Hazard Emergency Operations Planning, Chapter 6, Attachment G, 
Terrorism, April 2001
General Services Administration (GSA)PBS - P100, Facilities Standards for Public 
Buildings Service, November 2002
Lawrence Berkeley National Laboratory (LBNL)LBNL PUB-51959, Protecting Buildings 
from a Biological or Chemical Attack: Actions to Take Before or During a Release, January 
10, 2003
U.S. Air Force (USAF)Installation Force Protection Guide, 1997
U.S. Army (USA)Technical Manuals (TM) 5-853-1/-2/-3/-4, Security Engineering, May 12, 
1994
U.S. Department of Commerce, Critical Infrastructure Assurance Office (DOC 
CIAO)Vulnerability Assessment Framework 1.1, October 1998
U.S. Department of Defense (DoD)Unified Facilities Criteria (UFC), UFC 4-010-01, DoD 
Minimum Antiterrorism Standards for Buildings, July 31, 2002
U.S. Department of Justice (DOJ)National Criminal Justice (NCJ) NCJ181200, Fiscal Year 
1999 State Domestic Preparedness Equipment Program, Assessment and Strategy 
Development Tool Kit, May 15, 2000
U.S. Department of Veterans Affairs (VA)Physical Security Assessment for the Department 
of Veterans Affairs Facilities, Recommendations of the National Institute of Building Sciences 
Task Group to the Department of Veterans Affairs, 6 September 2002