Lots of Unanswered Questions When Discussing School Security Issues

Lots of Unanswered Questions When Discussing School Security Issues

It seems that America is on high-alert when it comes to school and campus security with many schools, colleges and universities taking drastic measures to improve the safety and security for students, faculty and staff. I’m bombarded daily with article after article of what a certain school has done to increase their security measures, which I believe is the perfect response to all the school tragedies that American schools have endured over the recent years. However, when I receive news like I am about to share with you, I get extremely frustrated as I ponder about one unanswered question, “How?”

Early Friday morning, around 1:45am, three men and two guns not only got past the on-duty security official but managed to somehow breach the key card system that is required to enter into Kutztown University’s dormitory. (Hence, my question, “How?”)

Once inside the men knocked on one of the resident’s doors, and when the student opened the door to his dorm room, the assailants, dressed head-to-toe in black, forced their way inside. The men proceeded to search the room, strike one of the students and flee, without taking a single item.

Matt Santos, a Kutztown University spokesman told NBC, “These individuals bullied their way in and made their way to this particular room. It was definitely a breach of security.”

To which I immediately reply with, “Duh!? Now, what is the university going to do to enhance the security and safety of its campus, students, faculty and staff? How did the men get past not one but two layers of security? Who were the men that participated in this incident? Why did this happen in the first place? What is the university’s plan moving forward?”

(Of course, no answer is given as I am shouting at my computer screen.)

Fortunately, this incident did not result in any fatalities or major injuries, but if three men could stroll past a security guard and somehow alter the key card system, allowing them entrance, there’s no telling what could happen next. 

In the meantime, officials are left to put the pieces of this incident together to solve yet another campus security breach.

(Source: http://usnews.nbcnews.com/_news/2013/03/11/17274682-armed-intruders-break-into-college-dorm-in-pennsylvania?lite)

About the Author

Ginger Hill is Group Social Media Manager.

Featured

  • Smarter Access Starts with Flexibility

    Today’s workplaces are undergoing a rapid evolution, driven by hybrid work models, emerging smart technologies, and flexible work schedules. To keep pace with growing workplace demands, buildings are becoming more dynamic – capable of adapting to how people move, work, and interact in real-time. Read Now

  • Trends Keeping an Eye on Business Decisions

    Today, AI continues to transform the way data is used to make important business decisions. AI and the cloud together are redefining how video surveillance systems are being used to simulate human intelligence by combining data analysis, prediction, and process automation with minimal human intervention. Many organizations are upgrading their surveillance systems to reap the benefits of technologies like AI and cloud applications. Read Now

  • The Future is Happening Outside the Cloud

    For years, the cloud has captivated the physical security industry. And for good reason. Remote access, elastic scalability and simplified maintenance reshaped how we think about deploying and managing systems. But as the number of cameras grows and resolutions push from HD to 4K and beyond, the cloud’s limits are becoming unavoidable. Bandwidth bottlenecks. Latency lags. Rising storage costs. These are not abstract concerns. Read Now

  • Right-Wing Activist Charlie Kirk Dies After Utah Valley University Shooting

    Charlie Kirk, a popular conservative activist and founder of Turning Point USA, died Wednesday after being shot during an on-campus event at Utah Valley University in Orem, Utah Read Now

  • The Impact of Convergence Between IT and Physical Security

    For years, the worlds of physical security and information technology (IT) remained separate. While they shared common goals and interests, they often worked in silos. Read Now

New Products

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening.