School Perimeter Security: The First Line of Defense

School Perimeter Security: The First Line of Defense

The key to having a successful perimeter and security strategy

A RASH OF ACTIVE SHOOTER AND OTHER SECURITY INCIDENTS AT SCHOOLS HAS PROMPTED PARENTS AND ADMINISTRATORS TO EXAMINE AND IMPROVE CAMPUS SECURITY. AMONG THE MANY OPTIONS FOR ENHANCING SECURITY, ONE OF THE FASTEST WAYS TO MITIGATE RISK IS TO IMPLEMENT POLICIES AND PROCEDURES THAT KEEP UNAUTHORIZED VISITORS FROM GETTING ON THE CAMPUS IN THE FIRST PLACE.

From a design standpoint, security should be thought of in concentric layers, and the perimeter is that first layer of defense. Schools need to prevent unwanted intruders from entering the secure space that has been defined for students and staff. Whether that’s a fence perimeter or the exterior of the building, it’s the primary line of defense in protecting students and faculty.

In recent years, we have seen more investments in physical security in the form of gates, fences, vehicle barriers and other perimeter protection systems to ensure that campuses are not easily accessible. At its core, perimeter security has more to do with understanding and controlling patterns, not just locking doors.

We have worked with many school districts across the country. Each faces their own set of challenges while solving their unique requirements. The State of Florida, for example, has the Jessica Lunsford Act, or Jessica’s Law, which requires that before stepping onto campus, new staff have to go through an extensive background check. In other words, you have to be approved to carry a badge before you can even think of walking onto campus. This is just one example of how schools in some areas have implemented policies and procedures to mitigate risk externally before potential offenders get on campus.

PHYSICAL BARRIERS

encing is often a starting point for establishing perimeter security. And in the higher education space, fencing often extends from the campus all the way through to other facilities like sororities and dorms. Arizona State University, for example, uses perimeter fencing systems around the outside of sororities to prevent unwanted trespassers from entering that space. Those gates and access points are controlled by a mix of mechanical and electromechanical locking devices. With many options to choose with varying levels of complexity, these devices simply control and limit who has access to secured areas.

Even within fencing, there are a variety of options. From the low end of the spectrum, using a mechanical key to control a padlock that secures a chain to a gate, to standalone keypad locks that function independent of the access control system at the school, all the way to wired and wireless integrated electromechanical locking solutions that can be tied into an access control system. One of the more common ways we have seen pedestrian gates with rim exit devices electronically controlled is using surface mounted electric strikes from HES. This allows for free egress from the space, but ties the entrance to the access control system.

It can often be prohibitive for a school to try to control and implement access control at every opening, so many schools start by identifying key entry points that can be used to limit and control pedestrian traffic. The next step is to mechanically lock down all other preceding points that were not identified. The objective is to maximize physical and electronic resources by reducing the number of entry points, thus limiting exposure.

Let’s take a step back and consider the fundamentals as it relates to hardware. Every aspect of your security hardware should be routinely inspected to ensure everything is working properly—all access control openings should have a door closer, locks should be functioning and latching correctly, and there should be no loose hinges. It’s very likely that adjustments or modifications will have to be made over the life of a door opening. Note, there shouldn’t be any instances where locks or exit devices are intentionally defeated—for example, if a door stop is placed under a normally locked door to keep it open for convenience.

PREVENTION THROUGH DESIGN

Schools are often faced with trying to mitigate risk and exposure with very little budget. CPTED (pronounced sep-ted) is the acronym for the crime fighting technique known as Crime Prevention Through Environmental Design. CPTED is based on the theory that the proper design and effective use of the built environment can lead to a reduction in the incidence of crime.

CPTED’s emphasis is on natural and environmental design. In this way, it deviates from the traditional target-hardening approach to crime prevention, but is complementary to all security efforts. The target-hardening approach traditionally focused on denying access to a crime target through physical or artificial barriers (such as locks, alarms, fences and gates). CPTED focuses on natural barriers, is very versatile, and can be applied anywhere.

There are many initial low-cost to no-cost strategies schools can implement to add layers of security or improvements to an existing security plan. This includes improving visibility by not planting bushes and shrubs in front of windows, improving lighting, and strictly limiting access to rooftops and basements.

CPTED offers a number of strategies, several of which directly enhance perimeter security:

  • Provide clear border definition of controlled space;
  • Provide clearly marked transitional zones that indicate movement from semi-public to private space;
  • Re-designate the use of space to provide natural barriers to conflicting activities;
  • Redesign space to increase the perception or reality of natural surveillance.

There is a good deal of CPTED guidance and information online. We encourage security professionals and school administrators alike to review the information and become familiar with the many simple-todeploy, common sense strategies for improved security.

TIPS FOR INITIATING A CAMPUS SECURITY PROJECT

When beginning the process of evaluating and upgrading a security plan, start by answering the following: Which departments will be affected? Which departments have a budget for this type of project? And be sure to involve those decision makers from the start.

Walk around the campus and do a quality check on your own before engaging an outsider. Pay special attention to older facilities; they often include additional complexity, especially when adding electronic security to existing doors. Note the condition of hinges, doors, and locks, which can wear out after many years of use by thousands of students.

It’s important to always take the time to speak with local security professionals. Many industry events provide opportunities to share best practices and lessons learned with other schools, which offers the opportunity to ask for references. Whether it’s a security consultant or systems integrator, an adept security professional’s experience and knowledge can be invaluable. Find someone in the industry who attends the annual security shows, collaborates with other professionals and manufacturers to keep up with industry trends, while staying current with codes and standards.

Basic cost estimates are easy to get from providers, but there’s so much more that goes into large-scale security projects. A certain amount of due diligence is required since there is no one-size-fits-all. Every security system is uniquely tailored to each situation. And it requires more legwork than most end users expect.

APPLY A CURB-TO-CORE APPROACH

The best way to approach perimeter and security design is to consider solutions starting from the street and working your way into the facility, all the way down to securing the pharmaceuticals in the nurse’s office.

As part of a perimeter security plan, a trend that’s happening more and more in K-12 schools is the creation of entry vestibule—a single, controlled access point that prevents a visitor from moving past that point without authorization.

This creates a control point where a visitor comes into the vestibule, speaks with someone at the front desk who greets and identifies the visitor, and then is either allowed or denied access into the controlled area, which is usually the main hallway of the campus.

Perimeter security isn’t always just about violent intruders. Good perimeter security greatly reduces opportunities for vandalism and theft during school hours as well as after. Schools today are full of valuable equipment, including computers, laptops, tablets, lab supplies and equipment, projectors, sound systems and more.

PLAN AND PREPARE

Don’t just depend on the physical security hardware alone to ensure occupant safety. Schools need trained people in place who know the procedures that can circumvent incidences from occurring or guide everyone to safety in an emergency.

An ongoing analysis of the habits of people flowing through the facility should be performed by administrators and security professionals to ensure the plan remains relevant and effective. Seek out potential gaps in your plan and look for any holes. Work with local law enforcement professionals—their knowledge and advice are essential. Always consult with your team of service providers that may include security consultants, systems integrators, IT professionals, manufacturers and other experts.

Having a successful perimeter and security strategy in place means making sure that the physical aspects of a security system – locks, exit devices, electronic access control systems and other hardware – are in place. And just as importantly, it means that security personnel, students, and administrators are as prepared and trained as possible. Within the concentric layers of a security plan, the total plan is only as strong as the weakest layer. Plan accordingly.

This article originally appeared in the July 2017 issue of Campus Security Today.

Featured

  • California School District Modernizes Surveillance System

    i-PRO Co., Ltd. (formerly Panasonic Security), a provider of professional security solutions for surveillance and public safety, recently announced that the Murietta Valley Unified School District (MVUSD) in Riverside County, CA, has undertaken a project to modernize its first-generation surveillance system to new high-resolution i-PRO network cameras, and the i-PRO Video Insight video management system (VMS). Read Now

  • RAD Makes History with First Robotic Dog Deployed to Taylor Police Department

    Robotic Assistance Devices, Inc. (RAD), a subsidiary of Artificial Intelligence Technology Solutions, Inc., recently announced that it has delivered a RADDOG LE to the Taylor, Michigan Police Department. The delivery of RADDOG LE to the Taylor Police Department marks a historic moment in the integration of technology within law enforcement. This milestone underscores RAD’s commitment to revolutionizing the landscape of security and public safety through cutting-edge AI-powered, robotic solutions. Read Now

  • Passing the Test

    The discussion about secured access and access control for higher education and K-12 is continuously expanding and evolving. That is a good thing. The more knowledge we gain and the more solutions that become available, linked and interoperable, the better and higher the level of security and safety. Read Now

  • Driving a Major Shift

    One of the driving forces for change has been the high demand for unified solutions. Users are asking their vendors for a way to manage all their security systems through a single interface, from a single pane. This has led to a flurry of software development to seamlessly integrate access control systems with video surveillance, intrusion detection, visitor management, health monitoring, analytics with artificial intelligence (AI), and more. Read Now

Webinars