North Carolina Elementary School Security Project Serves As Model for Campuses across the Country

North Carolina Elementary School Security Project Serves As Model for Campuses across the Country

Nearly a year after the Sandy Hook Elementary School tragedy, a rural North Carolina school has initiated a highly comprehensive pilot security program designed to tightly control entry onto its campus. Administrators of Duplin County Schools said they hope the project at North Carolina Elementary School Security Project Serves As Model for Campuses across the CountryWallace Elementary will prove to be a model for their other schools and for K-12 campuses across the nation.

While the district’s 16 campuses had reported no major security problems, the Sandy Hook shooting last Dec. 14 in Newtown, Conn. that left 26 people dead struck a nerve with district leaders.

“Our thought had been that elementary schools were off limits to armed gunman,” said Chuck Farrior, board of education chairman for Duplin County Schools, located about 75 miles south of the state capital of Raleigh. “Sandy Hook triggered an alarm and got us thinking about providing better security for our students. At Wallace, we had a building that wasn’t designed with security in mind. Now we have what we think is a good, safe and repeatable model for our district and others.”

Before making any changes in its security plan, the district asked nationally-recognized security consultant Patrick V. Fiel and his PVF Security Consulting firm to complete an extensive risk assessment of each campus. The Wallace campus was chosen for the pilot study. While addressing security issues across the entire campus, much of the effort focused on the main campus entry — historically, the most common access point for a shooter to enter a school.

Fiel used his industry connections to gain contributions from six leading security equipment and service providers. The donations included a video intercom, visitor management system, surveillance cameras, door locks, security screens and integration services.

Contributors to the project include:

  • Tyco Integrated Security (integration services);
  • Aiphone (video intercom);
  • Harmony Security Products (security screens);
  • SISCO Identification Solutions (visitor management system);
  • Axis Communications (cameras); and
  • ASSA ABLOY Group brands Corbin Russwin (door locks), Securitron (power supplies), HES (strikes) and Rockwood (latch guard).

Signs clearly direct visitors to the main entry at Wallace Elementary. There, they are instructed to push a button on the video intercom. Seated safely behind a locked door, the school receptionist confirms whether a visitor should enter and remotely unlocks the door. The glass entry doors are additionally protected with security screens that cannot be ripped or penetrated to allow a gunman to enter.

Inside the main office, the visitor must present a government-issued photo identification card that is swiped through the visitor management system. Within seconds, the system checks federal and state databases looking for registered sex offenders and local information such as fired employees and suspended or expelled students. Temporary restraining orders can be added to help prevent a non-custodial parent removing a child from a campus. Once cleared, he or she is given a temporary badge to wear while on campus. Only then is a second door unlocked, allowing access to other parts of the campus.

New door locks allow teachers to keep their rooms locked from the inside while classes are in session. Additional cameras monitor the campus both inside and out. Panic buttons with direct links to local police were installed in several campus locations accessible to the staff. Also, Wallace Elementary has a full-time school resource officer (SRO) on campus.

Farrior said that the changes have been transparent to the students. Parents have told him they feel reassured that their children are well protected. Faculty and staff have been supportive of the new project knowing that the improvements also help to protect them.

“Throughout this process, the board members and administration have been behind this effort 100 percent,” Farrior said. “Security for our students, faculty, staff and visitors is a top propriety for us all.”

Fiel said that in addition to noting equipment needs, the risk assessment also identified landscaping, fencing and lighting improvements so signage and other procedural steps to follow during an emergency were added. These items were quickly and inexpensively implemented to add to the school’s overall security.

“All schools can follow the Wallace Elementary school plan,” he said. “These solutions have been proven in real-life situations and are not prohibitively expensive. It’s time for all campus stakeholders to make security an ongoing process and give it a priority along with academics.”

Featured

  • Why Communication is Key in an Emergency

    During an emergency, communication with the outside world can be a critical component when it comes to response time and saving lives. Emergency communications typically consist of alerts and warnings; directives about evacuating the premises; information about response status, and other matters that can impact response and recovery. Read Now

  • Trust But Verify

    Today’s world is built on software—whether it is third-party applications, open-source libraries, in-house developed tools, operating systems, containers or firmware. Organizations worldwide depend on these diverse software components to power their operations, connect with customers, and drive innovation. However, this reliance on software comes with hidden dangers: the blind trust placed in these software products. Many companies assume that the software they purchase, and use is secure and free from vulnerabilities, but recent high-profile software supply chain breaches have proven otherwise. The reality is that every piece of software, no matter how reputable the source, increases the organization’s attack surface and poses new risks. Read Now

  • Impact on Digital Transformation

    A 2023 Statista report projects that by 2030 there will be 30 billion Internet of Things (IoT) devices in use. That is three times as many as there were in 2020. The numbers continue to grow because connecting sensors and systems, especially across a business, promises big efficiency gains and new insights. As such, the IoT and IIoT (Industrial Internet of Things) have become a launching pad for digital transformation -- not only for individual organizations but for entire industries. Read Now

  • Optimizing Security and Business Performance with Clarity and Control

    In recent years, the security sector has experienced a significant influx of innovative technologies that have fundamentally transformed how organizations design, implement, and oversee their security programs. The widespread adoption of cloud-based infrastructure, edge processing, and AI or machine learning (ML) driven analytics has brought about revolutionary changes in applications such as access control, video surveillance and emerging areas like threat detection and drone identification. Read Now

Featured Cybersecurity

Webinars

New Products

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file. 3