Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementPhysicalSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingAccess ManagementFire & Life SafetyIdentity ManagementPhysical SecurityVideo Surveillance

Can technology alone enhance school security programs?

By Cody Dowd
school-building-freepik1170x658v8.jpg

Image by pvproductions via Freepik

June 17, 2022

What if I told you that the average age of K-12 schools in the United States is almost 50 years old? That means most of the population in the United States is younger than the average school building. 


Why is that important? Design and security concepts have drastically changed over the past half-century. What may have been adequate in the 1960s is no longer sufficient for today's education standards for safety. Not only has technology evolved, but so have the threats that face our country. 


Long overcrowded hallways, easily accessible rooms and open conditions have not only become an opportunity for assailants but also increasingly difficult to protect for school administrators and security personnel. With the total number of public schools decreased by nearly 60% in the last century, district consolidation is leading to overpopulation. The outdated designs, along with limited budgets for renovations, create an even more difficult task for first responders to gain control of a situation. So, the question is, how do we move forward from here?


Currently, the United States spends roughly $3 billion on school security systems. While this amount is staggering, it pales in comparison to the $700 billion spent by taxpayers pay on schools in general. The $3 billion often includes high-tech solutions such as video surveillance systems and facial recognition programs; however, it still does not include the amount spent on security personnel. With this massive security budget, the question arises, are these high-tech solutions providing the best solution to preventing crime within schools?  


Several new security principles have been introduced in the past 30 years that might provide a potential solution. For example, the principles of Crime Prevention Through Environmental Design (CPTED) offer a range of design solutions, often at a relatively low cost. CPTED focuses on reducing crime by designing the environment in such a way that it eliminates opportunities for threats to arise while simultaneously fostering a positive atmosphere. CPTED utilizes four basic strategies to accomplish this: natural surveillance, access control, territorial reinforcement, and maintenance.


If we can change the situation with concepts such as natural surveillance and access control and enhance schools' security posture with procedures such as exterior doors remaining locked during school hours, we would make these places of learning much harder to target. Ultimately, however, the responsibility of ensuring doors remain closed and locked during school hours falls upon the staff and the teachers. 


From a security design perspective, the current challenge facing schools is modernizing an outdated system to meet today's threats. Modifications such as adding a see-through perimeter fence around school property, not only act as territorial reinforcement but also provide controlled access onto the premises. This is a means to extend the perimeter to provide early warning. Such fences do not need to be prison-like. There are many creative ways to create boundaries that fit the aesthetics and feel of schools. Designing a layout so visitors must pass through an area controlled by the administration office to gain entrance will increase natural surveillance into the area. These measures can be enhanced via door alarm systems that notify school administration when there is an unsecured door. Additionally, the orientation of classrooms and their doors can also increase natural surveillance and can be fortified with protective glazing that is inexpensive and effective in protecting students and staff. 


While some schools around the country have increased funding, enhancing their security by adding shot and weapons detection systems, remote locking of interior doors, and virtual fences that use state-of-the-art video surveillance systems, these options may not be attainable by all schools. Technology alone will not solve school attacks and should be used as a tool to enhance schools' security programs.


Solutions such as enhanced communications, paired with design changes and improved procedures, can be more affordable than state-of-the-art technologies yet highly effective. Resources such as mass notification systems can alert school personnel of an evolving situation as well as provide early warning to authorities. These systems can be integrated into the schools existing PA system to provide an audible alarm or discretely to a personal cellphone. When supported by cameras, these systems afford security personnel real-time tracking along with the ability to pass pertinent information to authorities before their arrival, such as the location and description of the assailant. Lastly, well-rehearsed standard operating procedures guide school personnel and help alleviate confusion during a time of crisis. A combination of these procedures should be practiced regularly, and if possible, law enforcement should be involved. Funding every school with a trained SRO should be standard practice.


Security surveys and assessments are often relatively low in cost and provide the school with a list of threats and vulnerabilities along with potential solutions at varying costs. To assist in these costs, the Department of Homeland Security has begun introducing grant programs that offer schools funding around the country for security projects. Additionally, recent modifications to the American Rescue Plan's Elementary and Secondary School Emergency Relief (ARP ESSER) Plan have lifted restrictions on COVID spending. Not only has the modification extended the time in which schools must spend their money, but also has opened up what they may spend it on. The funding, which only sits at roughly 3% spent, is now authorized to be spent on school projects and upgrades. This will provide much-needed relief for schools that are limited by funding when it comes to security. 


Physical security solutions can range in complexity and effectiveness. The key takeaway is that modern problems need modern solutions that should be designed by professional security firms. Another set of eyes on the issue to assist with developing the right risk mitigation measures. Threats, whether to personnel or infrastructure, are evolving every day. 


Whether dealing with a renovation or a new design, physical security professionals strive for continuous improvement and seek ways to increase the safety of the known environment. Although we cannot simply rebuild every school in the United States, we can increase the safety of existing buildings and facilities, and drive change in the design of future schools to make them safer for our children.


This article originally ran in Security, a twice-monthly security-focused eNewsletter for security end users, brought to you by Security Magazine. Subscribe here.

KEYWORDS: risk assessment risk management school security security design security operations

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Cody Dowd, CPD, is a security services project manager for Calibre Engineering and a former U.S. Army Special Forces leader.  

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Coding on screen

Research reveals mass scanning and exploitation campaigns

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • gun

    How Active Shooter Technology can Enhance Emergency Response

    See More
  • security operations center

    5 ways AI & access control data can enhance security operations

    See More
  • airport

    Enhance security at mass transit hubs with radio frequency technology

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing