Classroom Locks Reviewed

Author: John Honovich, Published on Dec 18, 2012

Access control hardware cannot defeat a gunmen; but it can slow them down and buy precious minutes for responders to arrive. Locking classroom doors is one way to do this, but traditional hardware presents life safety issues. In the past decade, a newer style of lock - the 'Classroom/Intruder' Lock - has emerged as a key tool to slow down an attacker, yet stay code compliant. In this note, we examine this hardware and an example where it saved lives.

Traditional Locks

***** **** ********* ***** ** *** ** *** **** ** lock, **** ** ********* ************ ** *** *** ** *** day ** **** *** ********* ** *******. *** ******* ** room ******* ******* *** **** **** ******* *** ********* (** the ****) ****** *******. ** ** ********* *********, *** ******* needs ** ********** **** *** ********* ** ***** ** **** the **** - ******** *** ******* *** ******** ***** ** a *********** ****** *********.

******** ******** ***** *** *** **** ** ******* **** *************: because ** *** ********* ****** ** * *********, *** '***********' thumbturned ******** ******* ** *********** ***** ** *** ********* ** code. ** ** ********* ****** *********, *** ********* **** ** first **** ** ******* *** ******** ****** *** **** *** be ******, *********** **** *** '********* ******' ****** ***** **** require **** * ****** ****** ** **** * **** (**: turning * ***** ******).

******* ** *** *********** ** *********** ***** ** ** ********* situation, ***** **** ** ******** *** ********** ******** **** ******* - *** '********* ********' ****:

Classroom ****

********** ********** ** ** **** *** ** *** "*********" ******** locks, **** ************* **** ***** ***** ***** "********", "********* ********" ********, ** "********* *****" ************ ***** ***** *** ****** **** **** ****** ********* where ***** *** ***** **** **** *** ******** **** ******** classrooms.

**** **** ******** ********** ************ ** ********** *** **** ** be ****** **** *** ******. **** ** **** ** ****** key ********* ** **** ***** ****** *********** ***** **** **** have ** *** *******. ************, * ****** ******* ** ****, even **** ******, ****** ***** *** ***** ****** *** *** instantly ***** *** **** ** ******.

Operational ******

**** **** ********** ***** ******** *** "********/******" ********. *******, *** ******** ********** ** **** * "*********" ********************** * *** ** ** ******, ******** ** "********/****** *****" that *** ****** ** ****** **** *** ****** ** ******** a ****** ** ******* * ***** ****.

********* * *** ******* **** **** ********** ***** (*.*., ******** or ****** *****) *** **** *** ****. ** ******* ******* to *** ***** ***** ** ******-******* ********, ******** *** **** to *********** (** ************) **** ********** *** ******* ******* * knob ******. ****-**** ***** ** **** ****** *** ***********.

*********, *** **** ** **** ****** **** * ******* ******* a ******* - ********, *******, ***. **** *** ** * vulnerability, ***** *** ******* **** **** * *** *** ****** presence ** **** ** ****** *** ****. ****, *** ***** classroom ** ** ******** *** *** **** ****** **** ** lock *** ****. *************, **** *** **** *** **** ****** at *** ***** ****** *****. *******, **** ******* *********** ******** like ******* ****** ** *** *** ****, *** ********* **** the ********, ***. ** ****, **** ** ****** ** **** done.

**********

*********, *** ********** ********** ********** *** ***** ******* ******** ** the "*********" ******* ******* ** * **** ********** ** $** - $*** *** ****.

**** *** ******* ** *** **** ******* ** ****** ******** below:

  • *** **** ** ~$****** "********" ******** ****, *****
  • *** **** ** ~$****** "*********" ******* ** **** *******

*** **** ********/****** ******* *** ********* *** **** *********, *** the **** ******** *******, ******, *** ******** *** ********* *** either ****.

*** **** **** ******** ** **** ****** *** ******* **** existing ******* *****, ********* *** ****** ** ******* ********* ** working *****. ********, **-******* ***** ******* ***** ** ********* ** unlikely ** ******* *********** *****.

*******, ***** *** **** ** ************ ********** ****** ******* **** typically **** ******* ** $**** *** ****, ******** "*********" ******** hardware ** *** ** *** ***** ****** ***** ** ********** protecting ****** ***** ******* ********* *******.

Are **** *********?

**** ********* ******* ***** *** **** *********** ******* ****** *******, any ***** ********* ** ******** ************ **** ** ****** *** value.

** ****, *** *** ***** ****** ******** ***** ******* $***,*** ******** *** ********* ***** ** *** ******** **** *** **** F84 "********* ********" ****. *** **** ** *** ********, ***** involved *** *****, **** **** **** $*** *** ****, ********* installation ****.

** ****, * ****** ** **** **** ******** *** ***** measures ****** **** * ******* ********** ****-***** *** ***** **** knives ******* *** **** ****** **** *** ******* *** ** kill *** **** ** ******. ******* ******** ****** ***** ***** during **** *****, ********** *** ****** ****** **** ******** ********** and ********** ***** ***** ******** **** ******* ********. ****** ******* ********* *** *****:

"******* **** ******* *** ***** ***** **** ****** ******** ************** Scott ********'* ******** ** ******* ***** ** ********* ***** *** preventing [********] **** ******* ** *** ** *** ********.

"** ***** ** ****** ****** *** **** ** **** **** tough ********* *** ** **** **** ** *** ****** *********," Gilbert *****. "******** *** **** *** ***** *** ****** **** the ******. ****'* ********* ** ***** **. **** * *** to *** ******* *********, ****** ****, *** *** *** ***** in *** ******* **** *** **********, * *** *** ******** reach ***, ***** *** **** **** *** ******* *** **** it **** *** ****** **. ** *** ***** ******. *** teachers ****** *** ********** ****** ***."

** **** *********, *** ********** ** ******** (*** ******** ********** accordingly) *** ******** ******** ** ********** * *******.

**********

*** ********* **** ** *** ** *** ***** ********* *** simplest ************ ******* *** ****. ****** ******** ******** ** ********* for *** **** ****** ** ***** *******, ********* ***** *** a *** ***** **** *** **** ****** ***** ** ***** and ****** ***** ********* *******.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

IPVM First Dean's List W2017 - Thomas Atkinson, Matt Hurly and Fredrik Lundqvist on Apr 24, 2017
IPVM is happy to congratulate and celebrate our first "Dean's List", the top students in our courses. For the Winter 2017 IP Networking course...
Lenel President Is Out on Apr 20, 2017
Lenel's challenges continue. Now, Lenel's President is out, suddenly. This follows increasing challenges for the company who has broadly upset...
Access Control Course Spring 2017 on Apr 14, 2017
IPVM offers the most comprehensive access control course in the industry. Unlike manufacturer training that focuses only on a small part of the...
Bosch B-Series Intrusion Tested on Apr 10, 2017
Bosch is one of the biggest names in intrusion but their B-Series panels, targeted at smaller site installs and available through distribution, are...
Milestone / Lenel Resell Partnership on Apr 03, 2017
Lenel has never found success in video management. Nearly a decade ago Lenel OEMed an OEM of Milestone. Now, in an equally uncommon move,...
ConvergenceTP (CTP) Claims VMS Integrations Simplified on Mar 30, 2017
Developing integrations with 3rd party systems can be expensive and time consuming, especially in the physical security market with hundreds of...
2Gig Intrusion Megatest (GC2 & GC3 Panels Tested) on Mar 28, 2017
2Gig is one of the most widely used intrusion systems, with two product lines that are the main offering of many alarm companies, huge national...
Lock Keyways For Access Control Guide on Mar 23, 2017
Lock keyways can be the difference between a lock working or not. Understanding keyways is important for access control. Indeed, a member recently...
Unikey Smart Phone Access Control Platform Profile on Mar 21, 2017
More and more people carry smart phones. Many think this could replace the conventional key or card for access control. However, using a phone...
Brivo Opens Up, Adds Mercury Support on Mar 16, 2017
Brivo's cloud-based access control was built around the companies proprietary hardware controllers, and was often seen as a limitation by...

Most Recent Industry Reports

IP Networking Course May 2017 on Apr 26, 2017
NOTE: Registration ends tomorrow, Thursday the 27th. This is the only networking course designed specifically for video surveillance professionals...
Tri-Ed Favorability Results on Apr 25, 2017
Tri-Ed, owned by Anixter, far outranked Anixter, the lowest ranked company in our distributor favorability series. Still, Anixter's ownership did...
Chinese 'Attacking Us From Every Direction', Says US FBI on Apr 25, 2017
"Chinese eating our lunch. Attacking us from every direction" said the US FBI's Deputy Director Andrew McCabe at the ASIS 2017 CSO Summit. .@FBI...
Eagle Eye Exec On Mountain Of Servers - VSaaS Growth Analysis on Apr 25, 2017
Eagle Eye VP of Operations, Hans Kahler, posted a picture of himself sitting on top of a shipment of new servers, as a testament to the companies...
Axis Posts Strong Q1 2017 Financial Results on Apr 24, 2017
Axis posted strong numbers for Q1 2017, after having some challenges in 2016 (Q1 2016, Q3 2016). Inventory levels and overall spending show...
Axis Lowest Cost Outdoor IR Camera M2025-LE Tested on Apr 24, 2017
Axis has lagged offering low cost IR cameras while their Asian competitors have made IR standard even in their most entry level cameras. Recently,...
IPVM First Dean's List W2017 - Thomas Atkinson, Matt Hurly and Fredrik Lundqvist on Apr 24, 2017
IPVM is happy to congratulate and celebrate our first "Dean's List", the top students in our courses. For the Winter 2017 IP Networking course...
Splicing Alarm Circuits Guide on Apr 24, 2017
Alarm installers commonly connect multiple sensors to a single zone. They do this by splicing the wires together. In this report, we will explain...
PureTech Video Analytics Examined on Apr 21, 2017
PureTech's analytics were chosen for a US border protection system (see related post), which the company claims no other analytics vendor was able...
US Border RVSS / Video Analytics System Examined on Apr 21, 2017
US Customs and Border Protection has been rolling out a video analytics-based detection system along the US/Mexico border, with detection ranges...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact