Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementPhysicalSecurity NewswireTechnologies & SolutionsSecurity Enterprise ServicesSecurity Leadership and ManagementFire & Life SafetyPhysical Security

To bear arms or not to bear arms — That is not the question

By Mike Lahiff
security-strategy-fp1170v270.jpg

Image via Freepik

December 15, 2022

In the United States, there are more firearms than people. Conversations around how to make schools and public places safer often call for stricter gun laws, but it would be impossible to make nearly 400 million weapons disappear — either overnight or even within 30 years. So if we are serious about preventing gun-related violence, we need to focus on deterrence and protection. After all, the root cause of any mass shooting is a person’s desire and willingness to harm others.

 

Learning from History 

In 2018, Aaron Stark gave a powerful TED Talk in which he took the audience through the story of his vulnerable upbringing, and how pain and darkness during this time almost led him to commit a mass shooting. In the end, it was simply a friend treating him like a human and showing him kindness that prevented him from committing a heinous act. 

Aaron’s story personifies the deep-rooted challenges many perpetrators of mass shootings face. In 2018, journalist Alex Hannaford spoke with twelve currently incarcerated mass shooters about their motives, and many cited mental health issues and other life turmoil as a factor. 

 

Addressing the Factors

At the heart of all security planning should be the goal of stopping would-be shooters before the first shot is fired. More often than not, the perpetrator of a mass shooting will exhibit signs of deep turmoil and distress in the days, weeks or months leading up to an incident. It’s important not only for security personnel, but the general public to understand the warning signs that someone may be in need of help. 

As was the case with Aaron’s story, the act of intervening and connecting someone in need to the right services can be the first line of defense in preventing mass shootings. 

 

The Problem with “Gun Free” Zones

Gun free zones have emerged as a potential solution by establishing certain public areas, like schools and courthouses, where carrying a firearm is a crime. Similarly, the Federal Gun-Free School Zones Act of 1990 bans firearms within 1,000 feet of a school with exceptions for authorized personnel, like security guards.

While the assumption is that these areas are safer places, someone looking to cause harm will usually seek a vulnerable location to do so. As such, between 1950-2018, almost 98% of public mass shootings occurred in gun free zones.

 

Protecting the Public

Any area, gun-free or not, should be protected with multiple layers of security that not only detect  threats, but initiate proper emergency protocols to save lives. 

Physical security measures like automated door locks and communication systems should be deployed to protect those inside and enable critical information to be privately relayed if necessary. Proactive technology like security cameras with weapons detection capabilities can help detect threats and provide real-time information during an incident, ensuring a swift and effective response from law enforcement. Finally, schools and businesses must ensure that students and employees are trained on emergency protocols, so they know how to respond should a worst-case scenario ever occur.

The fear of mass shootings in the United States is very real — one third of adults say it prevents them from visiting certain places and attending events. But when discussing how to address the problem, we must be realistic: love them or hate them, guns are not going away any time soon.  As such, we must take a holistic approach to ensuring public safety — one that includes personal intervention and help for troubled individuals, as well as technologies to protect the public. 

KEYWORDS: active shooter physical security public safety risk management security operations

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Mike Lahiff is the Co-founder and CEO of ZeroEyes, with a decade in the U.S. Navy, including six years as a Navy SEAL. 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Logical Security
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Coding on screen

Research reveals mass scanning and exploitation campaigns

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • metrics-cyber-freepik1170.jpg

    To encrypt or not to encrypt — That is the question

    See More
  • quantum

    A call to arms: Preparing for the quantum apocalypse

    See More
  • SEC0121-cyber-Feat-slide1_900px

    The art of targeted phishing: How not to get hooked

    See More

Events

View AllSubmit An Event
  • September 25, 2024

    How to Incorporate Security Into Your Company Culture

    ON DEMAND: From this webinar, you will learn how to promote collaboration between IT and physical security teams to streamline corporate security initiatives.
  • April 16, 2025

    Modernizing GSOC Operations: Ensuring Full Control and Complete Situational Awareness

    ON DEMAND: For many organizations, physical security management can be a daunting task. Threats are on the rise and risks are becoming increasingly diverse. 
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing