School Shootings and Security Systems

Author: John Honovich, Published on Dec 16, 2012

How do you stop your school from being the next tragedy? What improvements are needed for school security systems to deliver this? While national policy may change in the long term, schools must immediately determine what they need to do to make themselves as safe as possible. In this report, we examine the key options available and their advantages and disadvantages.

The Challenges

Dealing with this is incredibly difficult because:

  • School administrators are under immense pressure to make schools safe not only from parents and the community but literally for their own lives.
  • Many security sales people will see this as a gold rush and opportunity to push unrealistic or impractical solutions.
  • This threat places an incredibly dangerous adversary (a suicide shooter) in a historically lightly fortified facility (schools).

The Approach

When dealing with such threats, security solutions can be analyzed as such:

  • Deterrence: What can be done to convince the threat not to attack?
  • Detect: How soon and accurately can you detect that an active threat is present?
  • Delay: How long can you delay the intruder until response can arrive?
  • Response: How soon can you get responders on site to stop the attack?
  • Cost / Benefit: Can the projected reduction in risk / loss be cost justified?

Deterring School Shooters?

It is highly unlikely that any security system will deter a school shooter:

  • Since this is essentially a suicide attack, they do not care if they are ‘caught on tape’ or arrested. Indeed, you might argue that they want to be caught on tape to increase their notoriety (and the higher the resolution the better).
  • Since these shooters typically target a school they have an affiliation with, improving security at one school will not likely displace it (as a burglar might if one store had better security than another).

Whatever system one looks to deploy (access, intrusion, surveillance), justifying it as deterring an attack is likely wishful thinking.

Detecting an Attack

Since time in response is critical, one wants to detect the threat as soon as possible before someone gets shot. However, this is hard:

Get Video Surveillance News In Your Inbox
Get Video Surveillance News In Your Inbox

  • A traditional intrusion system is problematic as these attacks happen during the day when there are lots of activity and, therefore, lots of false alarms if the intrusion system was armed.
  • Video analytics is more magic than practical. Detecting the presence of a gun on a camera is theoretically possible but not available in commercial use. Alternatively, one could use facial recognition to alert against watch lists or anyone who is not enrolled but this is likely to suffer from very high false alerts.
  • The most practical solution is a checkpoint with a metal detector, preferably one that is a close to the perimeter and far from the main school buildings as possible.

Delaying an Attack / Access Controls

Stronger doors and locked entrances will likely not stop such an attack. However, they can be crucial in delaying the attacker and giving responders more time to stop the attacker before students and teachers are killed.

This is likely the most practical approach, given its relatively low cost. Many schools are fairly open and easy to enter. Schools may elect for more restrictive policies and hardened entrances.

[Update: Perhaps the most cost effective method is to add in 'classroom' locks.]

There are two main downsides to this:

  • Schools become like prisons, with students essentially locked in. Administrators and communities will need to determine how much of this is acceptable.
  • Hardening is typically done to the outside perimeter but once the attacker gets past that, unless each room or area is hardened and restricted inside, the attacker will have nearly unmitigated internal access. Do you defend against this? Doing so add considerably to the cost and operational complexity of such a system.

Responding to an Attack / Guards, Guns and Video

With such an attack, it will be critical to get an armed responder in the right place as soon as possible.

Overall, we think video surveillance has questionable value here but may help in getting responders to the right spot of the school quickly as well as directing those under attack away from the shooter's location.

To do this requires instant, simple mobile video access for teachers and the local police. While this is feasible, it does raise access/security risks. If access is only turned on when an incident occurs, this requires an authorized individual granting access which may not be possible or readily available if that person is under attack. To eliminate any delays in access, the most straightforward approach is allowing unlimited access. However, schools will have to accept or deal with potential misuse of the video during other times.

The other major question for responding is whether to wait for the police or to have an armed guard(s) on site. The huge advantage of the latter is cutting down response time, which could save many lives as the killings typically occur within minutes of the attacker being detected. The downside, of course, is the cost of having armed guards dedicated to the school.

Arming School Staff

In the comments, a number of readers have recommended arming school staff with guns. This has two major advantages - reduced response time and lower cost - but certainly a number of significant operational risks. See our review of arming school staff - pros and cons.

Cost / Benefit

Defending against such a deadly threat can be very expensive. In classical security system analysis, one would factor in the following:

  • Probability of attack: In the next N number of years, how likely is one’s school to being attacked? This is very hard to predict though typically historical trends are used (i.e., there are ~124,000 total schools in the US, 5-10 shootings per year, you could argue an average school has a 1 in 30,000 chance of an attack in the next 5 years, etc.)
  • Cost of attack: This is very hard to judge as it depends on valuing human life, especially children.

Multiply the probability and cost of attack to determine how much one should spend on measures that would stop this threat. For example, if the probability is 1 in 30,000 and the cost of an attack is $10 million, then you should spend up to $333 on security measures to stop this. Of course, you may estimate the probability and costs are higher (say 1 in 3,000 and a cost of $100 million) and then by such calculations you should spend up to $33,333.

This, of course, is what makes security spending decisions so difficult. The hard numbers typically justify spending far less than what is done and what people understandably feel needs to be done.

What Do You Think?

Undoubtedly, this is a very complex and charged discussion with lots of tradeoffs and challenges involved. Please share your thoughts on potential solutions in the comments.

Related Reports on Intrusion

Alarm.com Vs. Honeywell Total Connect Shootout on Aug 30, 2017
In the smarthome and intrusion market, Alarm.com and Honeywell are two of the biggest names. Both platforms offer remote management of alarms, home...
Honeywell Total Connect 2.0 Tested on Aug 22, 2017
Honeywell is one of the biggest brands in security, with Total Connect 2.0 being the company's remote security and smarthome platform. We bought...
Bosch G-Series Intrusion Tested on Jul 26, 2017
Bosch is one of the biggest names in intrusion, and the company's G-Series panels are their most advanced commercial and high-security panels. But...
Wireless Burglar Alarm Sensors Guide on Jul 21, 2017
Wireless sensors for burglar alarm sensors are an increasingly common option for the historical labor intensive wired alarm systems. However,...
Alarm.com Tested on Jul 13, 2017
Alarm.com has become the dominant force in smart home / remote service platform, with ~70% market share, combining their own traditional offering...
Batteries For Alarm Systems Tutorial on Jul 11, 2017
Alarm systems use backup batteries in order to continue working if an intruder attempts to disable the alarm by cutting power to the building. In...
Safes And Vaults Alarm Sensors on Jul 07, 2017
Vaults and safes are designed to protect valuables by enclosing them in steel or concrete boxes with thick doors and strong locks. However, any...
Smoke Detectors Guide on Jul 06, 2017
Smoke detectors and carbon monoxide detectors add a life-safety component to burglar alarm systems. As intrusion detection sensors are used to...
ESX 2017 Final Show Report on Jun 16, 2017
The ESX (Electronic Security Expo) day 3 / Thursday is done and the exhibits are over. IPVM was in Nashville covering it in-depth. Below covers...
RMR Integrator Importance Statistics on Jun 08, 2017
How do integrators feel about offering RMR / recurring revenue services? For many, their business revolves around RMR, while others see no...

Most Recent Industry Reports

Cisco Falling - Favorite Network Switches 2017 on Oct 20, 2017
1 major manufacturer fell and 1 outsider manufacturer gained as integrator favorites for network switches from more than 140 votes / explanations...
Uniview Recorder Backdoor Examined on Oct 20, 2017
A Chinese research group has identified a vulnerability in Uniview recorders that allows backdoor access in a method similar to the Dahua...
Hikvision Access Control Tested on Oct 19, 2017
Hikvision aggressive pricing and marketing combined with generally reliable hardware and free software has made them a major player in video...
Verkada, Silicon Valley VSaaS Startup, Targets Enterprise on Oct 19, 2017
Verkada says they are building an enterprise-class VSaaS offering, calling it "The new platform for video security". This is a departure from the...
Exacq Unbreaks Avigilon Integration on Oct 18, 2017
For nearly 4 years, Exacq had broken and effectively blocked use with Avigilon cameras, as IPVM reported in January 2014. Now, Exacq has...
Search More Important Than Live Monitoring - Statistics on Oct 18, 2017
Search is overall more important than live monitoring to integrators, according to new IPVM statistics.  The key themes found in integrator...
Axis 'Sold Out' P3707-PVE Multi-Imager Tested on Oct 18, 2017
Axis faced significant product shortages over the summer. Perhaps the most notorious and significantly sold out model was the Axis P3707-PE 8MP...
Dahua Removes Auto Rebooting on Oct 17, 2017
For years, Dahua has automatically programmed its IP cameras to reboot weekly, a highly atypical and questionable practice. Following IPVM...
Deep Learning Tutorial For Video Surveillance on Oct 17, 2017
Deep learning is a growing buzzword within physical security and video surveillance. But what is 'deep learning'? In this tutorial, we explain...
Multipoint Lock Access Control Tutorial on Oct 17, 2017
Doors are notoriously weak at stopping entry, and money can be misspent on wrong locks that leave doors quite vulnerable. While closed and locked...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact