Securing Today's Campus

While campus security is obviously a key concern, an integrated security solution can provide an educational institution with additional value

It's a fact: College and university campus crimes are on the rise in the United States. Studies pointing to links between increased enrollment and a rise in attacks, and recent violent events at U.S.-based institutions of higher learning, such as Virginia Tech in 2007, Yale in 2009 and the University of Alabama, Huntsville in 2010, are bringing campus security initiatives to the forefront of educational administrators' agendas.

However, violent crime isn't the only risk that institutions of higher education face when it comes to security. Campuses may be home to sensitive research projects requiring restricted access or contain facilities with valuable, significant artifacts. This article will discuss measures school administrators can implement to provide a more secure environment for students and how these initiatives align with the overall goals of higher education.

According to 2010's "Campus Attacks: Targeted Violence Affecting Institutions of Higher Education," violent attacks have risen on campuses in tandem with increased enrollment. What's surprising is that more than 60 percent of U.S. higher education crimes in the last century have occurred in the past two decades. Coupled with the challenges of having larger areas to secure and mandated government crime reporting, campus officials are faced with a huge challenge to protect students, faculty, guests and university assets.

The majority -- 70 percent -- of campus crimes reported during the past 108 years have occurred on-campus, while 19 percent were off campus and 11 percent were non-campus. “Off campus” is defined as entities that may be used by students or staff, yet are not associated with the school, while "non-campus" refers to buildings that are officially recognized by the college, including athletic stadiums and university-owned hospitals. Most campus crimes are isolated to a single building, and 90 percent of perpetrators are affiliated with the college or university where the attack took place.

When Incidents Occur, Everyone Knows
In the age of Facebook, Twitter, texting, instantaneous news, blogs and mass communication, physical barriers to rapid communication are virtually obsolete. In his book Socialnomics, Erik Qualman shares some statistics that could be unnerving from a negative publicity standpoint in the wake of a major security incident at a school: 96 percent of Generation Y has joined a social network. Even more daunting: 80 percent of Twitter users are on a mobile device. People can make updates anytime, anywhere.

Highly publicized crimes, such as the "lacrosse murder" at the University of Virginia and the faculty shootings at the University of Alabama, Huntsville in 2010, typically grab international headlines. These crimes may not have been as visible in the news environment that existed as little as 10 to 20 years ago, but as demonstrated in Qualman's book, today's up-to-the-moment communication and social media accelerate the reporting of such incidents in near real time, all over the world.

Additionally, today's parents, guardians and family members are able to stay in close contact with their college-aged loved ones with the likes of social media applications such as Facebook, Twitter, and Skype, and they can follow such sites that are specifically associated with the school. Needless to say, these family members can potentially have an unlimited number of instant sources of information about the safety and emergency preparedness of the college or university their loved one attends.

In this age of instant information, school officials are now more challenged than ever to keep students, faculty and property secure to maintain a positive public perception of their educational institution.

Addressing Campus Crime
A school's main mission is to provide a relevant education for tomorrow's workforce. One must draw a fine line between overprotection of students and staff and providing a safe learning environment. Along these lines, what are some options for reducing or ceasing crime altogether?

School leaders have many options to improve security measures and emergency preparedness, from metal detectors at building entrances to tracking suspicious behaviors or using texting for rapid, mass notification. With all of these ideas, ranging from a "big brother" mentality to possibly not putting enough security measures in place, how can university leaders provide the optimal balance of security and freedom on campus?

While finding the ideal solution can be very challenging, there are many measures that can address security on campus while not detracting from the main institutional goal of education. An optimal campus security plan has four main components: protect, secure, capture and act. By following this four-part strategy, university officials can ensure a comprehensive approach of multiple measures for optimal safety on campus.

Protect. Security officers gain value from integrated systems that include elements such as access control, fire safety, visitor management, intercom communications, video surveillance and biometric verification. All of these solutions converge to deliver enhanced security. By aggregating data from disparate systems, integrated security systems give security staffers a comprehensive view of everything going on. They gain a deeper understanding and far more control over security events. Real-time, actionable information enables more accurate situational analysis and faster response to events.

For example, Texas A&M University installed integrated access control and video surveillance to monitor and secure highly valuable animal medications at its top-ranked veterinary school. Such measures can deter theft, protect people and assets, and detect and provide evidence of security breaches if they do occur.

Secure. Safer environments are created when facilities are properly secured and security protocols are properly followed. A robust security infrastructure ensures all components work together to create effective layers of security. The concept is simple: Security countermeasures can be layered as one gets closer to mission-critical assets. An example of this could be secondary identity verification through the use of a PIN code or other biometrics in sensitive areas, such as research labs, data centers or housing student records.

If an event were to occur, what processes are in place to keep the incident isolated?

An intrusion detection application can alert officials of an incident, and an electronic access control system can initiate an automatic building lockdown to prevent entry or egress in an at-risk area. One of the top U.S. research universities, Georgia Tech, protects its students and facilities with a campus-wide security system that integrates access control with video surveillance, intrusion detection and centralized database management.

The system operates over the existing campus LAN, saving the university capital costs, and features a single personal ID card that can be used for access control, security and retail point-of-sale purposes. This solution also enables distributed administration for individual academic departments so that each department manager can grant appropriate levels of access and have complete control of his or her respective facilities.

Capture. We all know how important it is to document a security breach, which is why the third step of an optimal security plan, "capture," can be of utmost importance.

For example, the government has tied financial aid under Title IV to crime reporting. To qualify for financial aid, higher education institutions must disclose and report all campus crimes annually under the Clery Act/Crime Awareness and Campus Security Act of 1990. Non-compliance with the Clery Act could mean forfeiture of up to 80 percent of government funding; not only do campus officials have to worry about dealing with a public relations storm after a major event, but also they must have detailed reporting mechanisms for any incident on campus.

Taking into consideration mandated crime reporting such as the Clery Act, reporting capability not only serves to capture actions of suspicious individuals, but also it can record incidents for future investigation and prosecution. Brigham Young University, for example, added security systems to increase surveillance capabilities and streamline reporting. The solution included more than 600 cameras to protect people and assets, including the $400 million BYU Special Collections, which includes rare books, photographs and manuscript and archival collections.

Act. Systems in place are not complete without a well-devised action plan. From the same security management system discussed previously, mass notification can be used to alert students quickly to stay away from an at-risk area. In the event of an unthinkable emergency (security or otherwise), this messaging also can be used to alert emergency contacts to information about loved ones on campus.

In addition to being a tool for emergency communications, this type of system is proving to be of assistance as a communication channel to notify faculty and students when class is canceled because of inclement weather. Many schools are adopting this technology in the wake of the shootings at Virginia Tech in 2007.

The Bottom Line
While campus security is obviously a key concern of college administrators, an integrated security solution also can provide an educational institution with additional value. An integrated security system can exchange data with school IT departments so that access cards can be used for student IDs, computer and network access, campus transportation, meal services and library use. Visitor management applications can be integrated with access control systems and interface with local or federal watch lists -- terrorist or sex offender -- thus enhancing safety and streamlining operations.

Schools that integrate campus-wide security systems also can reap financial benefits of reduced capital and operating expenditures when integrating systems such as security with energy management in a practice known as "green security." When a university finds the right combination of security and building performance measures, it can leverage this convergence of technology to save money and energy, which can be reinvested back into essential university projects.

Campus-wide security systems and well-implemented action plans can deter, detect and delay crime while enabling quick response times. Universities also can leverage existing infrastructure and minimize capital and operational expenditures, as well as see value from streamlining operations. Lastly, schools can gain surveillance and reporting tools to comply with the Clery Act. The challenge is to develop the appropriate level of security and control that grows with campus needs so that administration, students, faculty and guests are provided with the safest possible environment, while enhancing the primary goal of the university: to educate its students.


  • Report: 15 Percent of All Emails Sent in 2023 Were Malicious

    VIPRE Security Group recently released its report titled “Email Security in 2024: An Expert Look at Email-Based Threats”. The 2024 predictions for email security in this report are based on an analysis of over 7 billion emails processed by VIPRE worldwide during 2023. This equates to almost one email for everyone on the planet. Of those, roughly 1 billion (or 15%) were malicious. Read Now

  • ASIS Announces ANSI-Approved Cannabis Security Standard

    ASIS International, a leading authority in security standards and guidelines, proudly announces the release of a pioneering American National Standards Institute (ANSI)-approved standard dedicated to cannabis security. This best-in-class standard, meticulously developed by industry experts, sets a new benchmark by providing comprehensive requirements and guidance for the design, implementation, monitoring, evaluation, and maintenance of a cannabis security program. Read Now

  • ISC West Announces Keynote Lineup

    ISC West, in collaboration with premier sponsor the Security Industry Association (SIA), announced this year’s dynamic trio of speakers that will headline the Keynote Series at ISC West 2024. Read Now

    • Industry Events
  • Government is Top Targeted Industry for DDoS Attacks in Q4 2023

    The government sector experienced a surge of DDoS attacks in Q4 according to Lumen Technologies (NYSE: LUMN), a global leader in integrated network and cybersecurity solutions. The Lumen Quarterly DDoS & Application Threat Report for Q4 2023 analyzes data from its DDoS mitigation platform and application protection partner, ThreatX, to provide an overview of the DDoS and application-layer attacks that targeted organizations in the last quarter of 2023. Read Now

Featured Cybersecurity


New Products

  • Hanwha QNO-7012R

    Hanwha QNO-7012R

    The Q Series cameras are equipped with an Open Platform chipset for easy and seamless integration with third-party systems and solutions, and analog video output (CVBS) support for easy camera positioning during installation. A suite of on-board intelligent video analytics covers tampering, directional/virtual line detection, defocus detection, enter/exit, and motion detection. 3

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles. 3

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3