School Safety Budgets Are Growing. Are Outcomes Keeping Up?
Acre Security CEO Kumar Sokka challenges campus leaders to move past hardware checklists and start measuring real-world security outcomes.
Every Spring, school boards across the country finalize budgets for the fiscal year ahead. In nearly every state, school safety is now a standing line item. What rarely appears on any line is a definition of what that money is supposed to achieve.
The numbers are real. Texas doubled its school safety allotment this year, from $10 to $20 per student. Michigan committed $321 million in school safety grants after the Oxford High School shooting. These are significant commitments, and they are welcome. But for the campus security professionals tasked with turning those dollars into safer buildings, a familiar question remains: what does this money actually need to accomplish, and how do we know when it has?
The Gap Between Hardware and Readiness
Most school safety budgets are organized around visible, countable inputs: cameras, access control hardware, weapon detection systems and school resource officers. These are necessary components. But components alone do not produce outcomes.
A campus can install every piece of hardware available and still have fundamental vulnerabilities if no one has assessed whether those systems work together, whether staff know how to respond when they trigger, or whether the protocols they support match the threats they are designed to address.
Campus security directors see this gap every day. For example, it shows up in the access point that has a card reader but no protocol for when a visitor tailgates through. In the camera system that records but has no one monitoring it in real time. In the emergency plan that was written three years ago and has never been tested against the building’s current layout.
Where the Real Vulnerabilities Exist
The vulnerabilities that actually compromise campus safety rarely appear in a capital expenditure request. They are operational and behavioral. They accumulate quietly.
A door propped open during drop-off because the access system is too slow for the morning rush. A visitor sign-in process that collects names but never verifies them against any watchlist. A perimeter that is secured during school hours but unmonitored during after-school programs, weekend events and summer maintenance. An intercom system that staff do not use because the process for buzzing someone in takes longer than walking to the door.
These are not technological failures. They are integration failures: gaps between the hardware a district has purchased and the daily reality of how buildings operate. No amount of additional spending closes them if the spending is not guided by a thorough assessment of where the actual risks are.
