School Security Brief – February 2026 – Issue 31

Bomb Threats – Schools

Nationwide, School Year-To-Date: 124
Nationwide, Past Month: 50
Tennessee, School Year-To-Date: 6
Tennessee, Past Month: 0

Intel Analyst Note: Bomb threats occur routinely at schools in the United States; school safety and security teams should be prepared for such events.
Source: Department of Homeland Security, TRIPWire Domestic IED Incident Database
_______________________________________________
Bomb Threat – Ascension Saint Thomas Hospital – West

Date: 02-09-2026 at 1100 hrs.
Intel Analyst Note: Unconfirmed by Ascension Saint Thomas Hospital at the time of this
report.
Source: Data.Nashville.gov, Metro Police Incident Reports
_______________________________________________
Smart Glasses – Privacy and Security Concerns for Schools

Summary: Smart glasses—wearable devices that integrate augmented reality (AR) and
artificial intelligence (AI)—are rapidly shifting from consumer gadgets to enterprise tools across critical sectors. These devices enable hands-free access to real-time data, video capture, and AI-driven analytics.

Authorities are concerned that malicious actors could use Smart Glasses to capture sensitive
data, creating privacy and compliance issues under HIPAA and other regulatory requirements.

Intel Analyst Note: Students or staff could use smart glasses to record video or audio that may
contain sensitive information, such as personal information or security-related access codes.

Source: Tennessee Fusion Center
_______________________________________________
Online Recruitment of Child Sex Trafficking Becoming Endemic

Summary: Human traffickers continue to use online extortion campaigns to coerce vulnerable
children into commercial sex work. In 2025, reports of online enticement toward children rose tonearly 520,000, roughly 80 percent higher than the year before. With 96 percent of US teens reportedly using the internet daily, traffickers exploit social media, video games, encrypted messaging apps, dating apps, and, increasingly, artificial intelligence (AI) to identify and manipulate victims.

Steps in the Recruitment Process:

1. Identify a vulnerable target.
2. Establish a relationship with the target through online means.
3. Convince the target to communicate privately.
4. Isolate the target from friends and family.
5. Grooming the target to send sexual content.
6. Establish control of the target through manipulation and blackmail.
7. Force the victim to engage in sex acts.

Intel Analyst Note: This is the same process Nihilistic Violent Extremist (NVE) and 764
networks use to coerce their targets to commit acts of violence. School administrators can better serve their students and parents by being familiar with these groups and their recruitment
strategies.

Source: Department of Homeland Security, Office of Intelligence and Analysis

Nihilistic Violent Extremist/764 Groups Publish Manual on How to Create Homemade Poisons

Summary: Nihilistic Violent Extremist (NVE) and 764 networks have published and distributed
manuals for creating homemade poisons, increasing the need to provide awareness of the
NVE/764 threat to the hospitality sector, law enforcement officers, paramedics, public health
officials, and poison control personnel.
These groups promote the use of homemade poison as an inconspicuous means of causing a
mass casualty event, particularly targeting minors.
NVE/764 networks promote the use of homemade poisons for low-risk, high-impact attacks to
instill fear in the public, target vulnerable populations, generate content, and increase their
notoriety.

Intel Analyst Note: A student under the influence of an NVE/764 Group might consider
poisoning food at their school’s cafeteria.

Source: Southern Nevada Counter-Terrorism Center
_______________________________________________
Cyber Hackers Breach HVAC Operating System

Summary: Hacker group “Infrastructure Destruction Squad” claimed responsibility for
breaching the operating system of a heating, ventilation, and air conditioning (HVAC) system
manufactured by an identified United States-based engineering firm.

Intel Analyst Note: Hacking an HVAC system may not seem serious; however, losing control of your heating and cooling system could disrupt school day operations.

Source: Department of Homeland Security, Office of Intelligence and Analysis

______________________________________

Serva|PRS – Protective Intelligence Center
U//FOUO: Unclassified//For Official Use Only

School Security Brief - Intel Report