School Shootings and Security Systems

Author: John Honovich, Published on Dec 16, 2012

How do you stop your school from being the next tragedy? What improvements are needed for school security systems to deliver this? While national policy may change in the long term, schools must immediately determine what they need to do to make themselves as safe as possible. In this report, we examine the key options available and their advantages and disadvantages.

The Challenges

Dealing with this is incredibly difficult because:

  • School administrators are under immense pressure to make schools safe not only from parents and the community but literally for their own lives.
  • Many security sales people will see this as a gold rush and opportunity to push unrealistic or impractical solutions.
  • This threat places an incredibly dangerous adversary (a suicide shooter) in a historically lightly fortified facility (schools).

The Approach

When dealing with such threats, security solutions can be analyzed as such:

  • Deterrence: What can be done to convince the threat not to attack?
  • Detect: How soon and accurately can you detect that an active threat is present?
  • Delay: How long can you delay the intruder until response can arrive?
  • Response: How soon can you get responders on site to stop the attack?
  • Cost / Benefit: Can the projected reduction in risk / loss be cost justified?

Deterring School Shooters?

It is highly unlikely that any security system will deter a school shooter:

  • Since this is essentially a suicide attack, they do not care if they are ‘caught on tape’ or arrested. Indeed, you might argue that they want to be caught on tape to increase their notoriety (and the higher the resolution the better).
  • Since these shooters typically target a school they have an affiliation with, improving security at one school will not likely displace it (as a burglar might if one store had better security than another).

Whatever system one looks to deploy (access, intrusion, surveillance), justifying it as deterring an attack is likely wishful thinking.

Detecting an Attack

Since time in response is critical, one wants to detect the threat as soon as possible before someone gets shot. However, this is hard:

Get Video Surveillance News In Your Inbox
Get Video Surveillance News In Your Inbox

  • A traditional intrusion system is problematic as these attacks happen during the day when there are lots of activity and, therefore, lots of false alarms if the intrusion system was armed.
  • Video analytics is more magic than practical. Detecting the presence of a gun on a camera is theoretically possible but not available in commercial use. Alternatively, one could use facial recognition to alert against watch lists or anyone who is not enrolled but this is likely to suffer from very high false alerts.
  • The most practical solution is a checkpoint with a metal detector, preferably one that is a close to the perimeter and far from the main school buildings as possible.

Delaying an Attack / Access Controls

Stronger doors and locked entrances will likely not stop such an attack. However, they can be crucial in delaying the attacker and giving responders more time to stop the attacker before students and teachers are killed.

This is likely the most practical approach, given its relatively low cost. Many schools are fairly open and easy to enter. Schools may elect for more restrictive policies and hardened entrances.

[Update: Perhaps the most cost effective method is to add in 'classroom' locks.]

There are two main downsides to this:

  • Schools become like prisons, with students essentially locked in. Administrators and communities will need to determine how much of this is acceptable.
  • Hardening is typically done to the outside perimeter but once the attacker gets past that, unless each room or area is hardened and restricted inside, the attacker will have nearly unmitigated internal access. Do you defend against this? Doing so add considerably to the cost and operational complexity of such a system.

Responding to an Attack / Guards, Guns and Video

With such an attack, it will be critical to get an armed responder in the right place as soon as possible.

Overall, we think video surveillance has questionable value here but may help in getting responders to the right spot of the school quickly as well as directing those under attack away from the shooter's location.

To do this requires instant, simple mobile video access for teachers and the local police. While this is feasible, it does raise access/security risks. If access is only turned on when an incident occurs, this requires an authorized individual granting access which may not be possible or readily available if that person is under attack. To eliminate any delays in access, the most straightforward approach is allowing unlimited access. However, schools will have to accept or deal with potential misuse of the video during other times.

The other major question for responding is whether to wait for the police or to have an armed guard(s) on site. The huge advantage of the latter is cutting down response time, which could save many lives as the killings typically occur within minutes of the attacker being detected. The downside, of course, is the cost of having armed guards dedicated to the school.

Arming School Staff

In the comments, a number of readers have recommended arming school staff with guns. This has two major advantages - reduced response time and lower cost - but certainly a number of significant operational risks. See our review of arming school staff - pros and cons.

Cost / Benefit

Defending against such a deadly threat can be very expensive. In classical security system analysis, one would factor in the following:

  • Probability of attack: In the next N number of years, how likely is one’s school to being attacked? This is very hard to predict though typically historical trends are used (i.e., there are ~124,000 total schools in the US, 5-10 shootings per year, you could argue an average school has a 1 in 30,000 chance of an attack in the next 5 years, etc.)
  • Cost of attack: This is very hard to judge as it depends on valuing human life, especially children.

Multiply the probability and cost of attack to determine how much one should spend on measures that would stop this threat. For example, if the probability is 1 in 30,000 and the cost of an attack is $10 million, then you should spend up to $333 on security measures to stop this. Of course, you may estimate the probability and costs are higher (say 1 in 3,000 and a cost of $100 million) and then by such calculations you should spend up to $33,333.

This, of course, is what makes security spending decisions so difficult. The hard numbers typically justify spending far less than what is done and what people understandably feel needs to be done.

What Do You Think?

Undoubtedly, this is a very complex and charged discussion with lots of tradeoffs and challenges involved. Please share your thoughts on potential solutions in the comments.

Related Reports on Intrusion

You Get Robbed, Canary Will Pay You Up To $1,000 on Sep 22, 2016
Canary is trying to break the status quo in DIY security, first by raising over $40 million, and now a revamp of their monthly services package...
Bosch Intrusion Detection Profile on Aug 10, 2016
This is a first in a new IPVM series profiling intrusion detection / alarm offerings. In this series, starting with Bosch, we examine: Key...
Intrusion Sensor Selection guide on Jul 21, 2016
When designing intrusion systems, a number of sensor types can be selected, including: Magnetic Acceleromteter Glass Break PE/PIR/Laser...
Hikvision Makes First Western Acquisition - Alarm Manufacturer on May 19, 2016
Hikvision has $1.5 billion, at least, to spend internationally. Now, they have done their first Western acquisition, acquiring UK alarm...
Software House Access Control Company Profile on May 02, 2016
In our 12th access company profile, we examine Software House's C-Cure access control platform: Comparing Software House to their...
Honeywell Acquires Videofied on Mar 01, 2016
Honeywell has acquired RSI Technologies, the company behind Videofied, for ~$123 million USD. Rationale The two key reasons Honeywell cites for...
Lenel Access Control Company Profile on Feb 23, 2016
In our 10th access company profile, we examine Lenel OnGuard access control platform: Comparing Lenel to their competition Examining their...
Honeywell Pro-Watch Access Control Profile on Feb 01, 2016
Inside we examine Honeywell Pro-Watch access control line: Comparing Honeywell to their competition Examining their management and client...
Videofield Launches Dealer / DIY Service Dragonfly on Jan 21, 2016
RSI Technologies, the company behind Videofied, has launched a new DIY offering called DragonFly. There are many DIY security / intrusion offerings...
RS2 Access Control Company Profile on Jan 13, 2016
Inside we examine RS2 Technologies Access It! line for best customer fit, key features, pricing, and main weaknesses. Profile RS2 is a US access...

Most Recent Industry Reports

Dahua USA CEO Tim Wang, Where Is Your Integrity? on Sep 29, 2016
Dahua USA CEO Tim Wang and Dahua Director of Marketing Tim Shen shared their IPVM passwords extensively, resulting in Dahua USA CEO's account...
Allegion NDE Wireless Lock Examined on Sep 29, 2016
While wireless locks are one of the hottest areas of access control, two of its biggest challenges are high cost and limited integration with...
The 'Last Chance to Save' On Hikvision Is Here on Sep 29, 2016
It is over. After at least 8 across the board price cuts in the past 10 months, including an unprecedented back to back 20% off, Hikvision has...
Camera Calculator Class and IPVM Member Orientation October 2016 on Sep 28, 2016
Members, learn how to better design video surveillance systems and get the most out of your IPVM memberships with 2 upcoming live classes. Both...
Axis 4MP Camera Tested (M3046-V) on Sep 28, 2016
Axis has brought 4MP to its camera line in the new M3046-V, the highest resolution model in their revamped M30 series. We bought and tested this...
Hiring Spree At Aimetis 6 Months After Being Acquired on Sep 28, 2016
Aimetis was acquired in April 2016, and is now expanding almost all of their departments, hiring employees from Axis and other industry...
Hikvision Chairman Tours With Chinese Government Boss on Sep 28, 2016
Two China Communist senior officials toured Europe this summer, one was Hikvision's Chairman and the other was his boss, SASAC Director. In this...
Camio Natural Language Processing Tested on Sep 27, 2016
The ex-Googler led team from Camio has advanced its video monitoring offering to include natural language processing. Camio ingests video,...
Access Door Controller Configuration Guide on Sep 27, 2016
Properly configuring access control door controllers is key to a professional system. These devices have fundamental settings that must be...
Hacked Dahua Cameras Drive Massive Cyber Attack on Sep 27, 2016
Cyber attacks are accelerating and IP cameras are behind many of them. Worse, last week, a 'massive' attack was carried out using numerous Dahua...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact