SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Hikvision attains ISO 37301 Certification for Compliance Management System
    • SentriGuard's role in sustainable security solutions
    • Axis joins CISA Secure by design for cybersecurity
    • Xtract One's SmartGateway enhances Nova Scotia security
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

    Enhancing physical access control using a self-service model

    Enhancing physical access control using a self-service model

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Video surveillance
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check out our special report on casino security

Get it now!

Efficacious K-12 solutions in a challenging, fluid world

Efficacious K-12 solutions in a challenging, fluid world
Ron Baer
Ron Baer
Contact company
Contact ASSA ABLOY Door Security Solutions
icon Add as a preferred source Download PDF version
Quick Read
⌵
Summary is AI-generated, newsdesk-reviewed
  • MAPS report highlights rare but significant campus attacks requiring robust K-12 security measures.
  • Texas strengthens school safety laws with new training and procedures after Uvalde tragedy.
  • Efforts focus on low-cost security upgrades and comprehensive staff training in K-12 schools.

Mass attacks continue to lead the news far too often. All are horrific and disturbing, but the heartbreaking tragedies that have unfolded on school campuses touch us the deepest and have the most profound effects on our communities.

NTAC statistics

According to a January 2023 report from the United States Secret Service National Threat Assessment Center (NTAC), K-12 events accounted for 6% of all mass attacks in public and semi-public spaces between 2016 and 2020.

6% may strike some as being a small number, given all the coverage.

Safeguarding schools and campuses

By no means does the statistic diminish the pressing need for K-12 stakeholders to better safeguard their schools

While the finding indicates campus attacks are relatively rare, that doesn’t mean they are any less significant.

And, by no means does the statistic diminish the pressing need for K-12 stakeholders to better safeguard their schools with the most appropriate strategies, technological solutions, training, and other available resources to address vulnerabilities and thwart violence in K-12 schools.

What we are learning about mass attacks 

Questions come up about how mass attacks are evolving and what we’re learning about perpetrators and their tactics. It’s more accurate to describe the circumstances and behaviours as fluid.

There’s no obvious straight line that’s simple to track. However, there is reliable research that shows progress is being made in assessing how a range of observable concerning behaviors may play a factor.

MAPS report

The most comprehensive resource for insights into warning signs is the latest U.S. Secret Service NTAC report cited above that was released early in 2023 titled “Mass Attacks in Public Spaces: 2016 – 2020”.

Called MAPS for short, the report details the extensive research and data behind identifying and recognising behaviours that may (but not always) escalate into attacks.

Help, and guide communities

Sometimes budgeting for higher cost measures but more often, it’s the simpler, lower-cost options

It’s valuable content that has the potential to significantly help professionals with interventions and guide communities that are in the process of improving their safety and security protocols, technology decisions, and training to protect schools and other public spaces.

Research like this is critical and a worthy investment. So is the need to wisely fund physical security solutions. Sometimes that means budgeting for higher cost measures but more often, it’s the simpler, lower-cost options that are the most appropriate, effective, and necessary. 

Taking action 

Parents, faculty, administrators, students, and the public in general rightfully are putting more pressure on school districts, other local education agencies (LEAs), state educational agencies (SEAs), and legislatures.

Stakeholders want to make sure earnest efforts are being taken to assess the status of their schools’ safety and security vulnerabilities, enact remedial measures, and provide much-needed funding. Fortunately, more action is being taken at the local, state, and federal levels.

Minimum safety levels

For example, after Uvalde, Governor Greg Abbott quickly charged the Texas Education Agency (TEA) with assessing public school safety across the state and creating rules to ensure a minimum level of safety on all K-12 campuses.

The Texas legislature also took swift action to strengthen programmes and funding and created an investigatory committee to learn how the perpetrator gained access and to identify points of failure in the response.

School emergency plan standards

Senate Bill 11 proposes creating a new Office of Safety and Security at TEA to work with TxSCC)

November 2022, the TEA proposed updated standards with a strong focus on access control relating to exterior perimeter doors and exterior classroom doors, which must operate as fully intended and remain closed, latched, and locked to prevent unauthorised entry.

Senate Bill 11 proposes creating a new Office of Safety and Security at TEA to work with the Texas School Safety Center (TxSCC) to develop greater requirements and guidance for establishing school emergency plan standards and provides for a conservator to be assigned to districts that fail to meet those standards.

Annual intruder detection audit

The bill also calls for the TxSCC to conduct at least one intruder detection audit annually and another every four years that would include a more detailed vulnerability assessment of campus emergency procedures and access control measures.

In addition, the bill proposes tightening Texas truancy laws; truancy is considered a red flag for school officials that a student might need a school counselor.

Safety and security requirements

House Bill 3, which Governor Abbott signed into law on June 14, also creates new safety and security requirements. Among its provisions, the legislation requires district employees who regularly interact with students to complete evidenced-based mental health first aid training programmes.

And it creates new requirements for security officers at school campuses as well, including the completion of active shooter response training programmes at least every four years that are approved by the Texas Commission on Law. 

Improving public schools

ESSER III dollars are quickly being put to good use under the Elementary and Secondary School Emergency Relief Fund

All these efforts are a step in the right direction. While extra time and dollars would have been beneficial for conducting more comprehensive surveys and research, what states like Texas are accomplishing is significant.

Other good news is that the remaining ESSER III dollars are quickly being put to good use under the Elementary and Secondary School Emergency Relief Fund. The acceleration came on the heels of clarification about how those allocations could be applied to safety and security programmes when part of improving the condition of public school buildings and property.

Fundings for schools

Ideally, any future funding programmes will clarify how the funds can be used for safety and security improvements much earlier in the process so school districts can apply for that funding sooner.

It’s all in the interest of using resources wisely.

Staying efficacious 

Urgent action to create new rules and bills for improving best practices is a good thing.

However, there have been instances, where moving too fast has resulted in ideas or decisions that need more information regarding the practicality, costs, or effectiveness of a solution, even though the intention was good.

Identifying the problem

It’s critical to take the time to clearly identify and define the problem that needs to be solved

That’s why it’s critical to take the time to clearly identify and define the problem that needs to be solved. What’s the intended outcome? What latitude is there for funding?

What alternatives exist? What do the experts advise? What successes have other school districts had in similar situations and deploying similar solution choices? 

Budget allocations

Let’s say there’s a mandate to harden every window and glass door on the first floor of every school with ballistic glass. The budget allocation is $10 million and needs to cover 2,000 campuses across the state.

Given the average cost of ballistic glass, that would only be enough to retrofit about four or five openings per school, which would be a major shortfall when considering all the windows and glass doors that are typically on the first floor of most schools.

Due diligence

The point is that while expediency is important, it shouldn’t come at the expense of due diligence.

It takes earnest consultation with stakeholders and experts as well as evidence-based rationale when it comes to recommending the most effective solutions and protocols for improving school safety and security.

Doing the simple things well 

Plan when the timing and funding will make it realistic and appropriate to move on to the next tier

Often the best solutions are relatively simple and low-cost to procure, install, and maintain, like retrofitting classrooms with door hardware that can be readily locked from either side, lock status indicators to immediately tell if the room is secured, and silent panic buttons that teachers can activate in an emergency.

In short, do the simple things first and do them well. Then plan when the timing and funding will make it realistic and appropriate to move on to the next tier of physical security solutions.

Attack-resistant safety/security film treatments

Many schools are hardening glass with attack-resistant safety/security film treatments, which helps delay and deter intrusions to buy extra time for first responders to arrive.

Some campuses are designing hardened vestibules with ballistic-resistant glass inside main entries to ensure staff safety when screening visitors and contractors.

Access control and video surveillance

Taking extra measures to strengthen auto and pedestrian traffic routing, tightening access control, installing additional video surveillance cameras, and other new technologies are also part of school security strategies.

To find out what security solutions schools across the country have been investing in, see the latest report from the US. Department of Education.

Advanced physical security technology

We keep moving forward producing better and better options that help us fulfill our responsibility

These investments are good signs. At the same time, we know one size doesn’t fit all. We also realise that even though there are plenty of excellent and reasonable solutions available and advanced physical security technology being developed, there is no cure-all.

But the industry is determined never to let our guard down. We keep moving forward producing better and better options that help us fulfill our responsibility as security professionals. 

Programmes start with the right team and tools 

Careful planning requires a collaborative and broad team of school and district stakeholders. It also needs to include input from security solutions providers who offer consultative expertise.

Successful implementation of safety protocols, procedures, and security technology also depends on a commitment to comprehensive staff training that’s followed up with regular updates and refresher sessions. Districts must be ready and able to support and fund such an important commitment. 

PASS Safety and Security Guidelines

Clearways for schools to determine the right solutions based on budget availability, timing, and the issues

Whether a school and/or district/LEA is in the earlier stages of developing a programme or already has one fully in place, it can also always benefit from the free resources, information, and advice available from the Partner Alliance for Safer Schools and its 6th Edition of PASS Safety and Security Guidelines for K-12 Schools. 

Dedicated PASS volunteer advisors have years of valuable school security experience and a rich history of success. Their tiered approach outlines clear ways for schools to determine the right solutions based on budget availability, timing, and the issues they face.

School safety and security

School safety and security will always be a work in progress. It’s an effort that will continue to require further insight into what motivates perpetrators and what mental health professionals can do to intervene.

And there will always be an ongoing need to invest in shoring up physical security and vigilance in ways that won’t detract from a comfortable, positive, and safe learning environment.

From facial recognition to LiDAR, explore the innovations redefining gaming surveillance

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Biometrics
  • Remote surveillance
  • Remote video surveillance
  • IP video surveillance
  • Campus security systems
  • Application security
  • Physical security
  • Industrial security
  • Remote security
  • Commercial security
  • Private sector security
  • Public sector security
  • Security management
  • Security policy
  • Security devices
  • Security tagging
  • Security cameras
  • Covert cameras
  • Security camera systems
  • Security monitoring system
  • Security access systems
  • Facial recognition systems
  • Network monitoring
  • Video analytics
  • Remote video monitoring
  • Electronic access control
  • Identity management
  • Security training
  • School security
  • Public security
  • Industrial security systems
  • Door access control
  • Security software
  • IP Surveillance
  • Security service
  • Industrial surveillance
  • Mobile surveillance
  • Near Field Communication
  • Visitor management systems
  • Indoor surveillance
  • IP security solutions
  • Covert Surveillance
  • Security communication
  • Testing & Approvals
  • Integration software
  • Crime prevention
  • Mobile communications
  • Video Management System
  • Crowd Management
  • Corporate Security
  • Outdoor Security
  • Indoor Security
  • Central Monitoring
  • Network Video Recorders
  • Warning Devices
  • IP transmission
  • Incident Management
  • Mobile access
  • Video surveillance
  • Mergers & Acquisitions
  • Related links
  • Articles by Ron Baer
  • 2023 security trends
  • Related categories
  • Access control software
  • CCTV cameras
  • Digital video recorders (DVRs)
  • CCTV software
  • Electronic locking devices
  • Access control readers
  • Electronic keypads
  • Network video recorders (NVRs)
  • Access control cards/ tags/ fobs
  • Video motion detectors
  • Video signal devices & accessories
Related white papers
Aligning physical and cyber defence for total protection

Aligning physical and cyber defence for total protection

Download
Understanding AI-powered video analytics

Understanding AI-powered video analytics

Download
Combining security and networking technologies for a unified solution

Combining security and networking technologies for a unified solution

Download
Related articles
Axis joins CISA Secure by design for cybersecurity

Axis joins CISA Secure by design for cybersecurity

HiveWatch boosts board with James Segil appointment

HiveWatch boosts board with James Segil appointment

AI security solutions by Artificial Intelligence Technology

AI security solutions by Artificial Intelligence Technology

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Video surveillance
  4. News
  5. Expert commentary
See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec