The nation is reeling today from the assassination of Charlie Kirk, who was targeted and killed during a campus speaking event in Utah, while seated on stage addressing the audience. Despite the presence of a security detail, the attacker was allegedly able to position roughly 200 yards away and fire on the gathering. This was not only a national shock but a stark reminder of ongoing security failures — the same systemic lapses that continue to leave schools, public events, and political figures vulnerable.
This was not simply a tragic event — it was a systemic collapse. Security didn’t just ‘fall short’; it failed at every level. And when security fails so completely, the tragedy of losing Charlie Kirk cannot be undone by words, condolences, or post-event rhetoric.
Yet, as with every mass tragedy involving a firearm, the national conversation will likely default to a single refrain: the problem is guns. Politicians will step to podiums. Media outlets will repeat the script. Advocacy groups will issue statements within hours. And the real issue—the failure of protective measures designed to stop the attack before it happened—will once again be ignored.
Firearms are tools, not actors. A gun by itself has no agency, no decision-making ability, and no capacity for action without a human behind it. But every time a shooting occurs, the blame falls not on the human failures of security but on the inanimate object.
That misplaced focus comes with a steep cost. It distracts from the underlying issue that connects nearly every one of these tragedies: security lapses.
While security failures are the clear culprit time after time, we can’t fully dismiss the possibility of Deep State involvement. To be clear, this is not the time or place to be speculative—as I’ve covered in detail in other articles like 9/11 Deep State Cover-Up: Honoring the Fallen at 24 Years—but it is worth acknowledging for readers who may not know what that term means. The “Deep State” generally refers to entrenched elements within government, intelligence, and bureaucracy that operate outside of public accountability, shaping or obstructing policy regardless of who is elected. In practice, it can include anyone in a position of institutional power who uses their influence behind the scenes—through obstruction, manipulation, quiet control over how security, intelligence, or enforcement decisions are carried out, or even sabotaging someone’s career.
In schools, we see cameras installed but left unmonitored, access points left unsecured, staff untrained in emergency procedures, and safety audits ignored.
In political events, we see security details stretched thin, rooftops left unchecked, surveillance systems without real-time human oversight, and threat assessments conducted only on paper.
In public spaces, from street festivals to college campuses, we see over-reliance on technology without the human redundancy needed to act when seconds matter.The assassination of Charlie Kirk is the most recent and devastating example, but it will not be the last unless these systemic failures are acknowledged. When those systems fail, it isn’t just a “shortfall.” It is a collapse—one that leaves people exposed and vulnerable. And until leaders are willing to admit that any lapse in security is failed security, the cycle will continue.
Security Detail Failures — Government and Private
When the public hears the phrase “security detail”, the mental image is almost always the same: highly trained professionals, suited or uniformed, equipped with radios and weapons, standing at the ready to neutralize threats. The assumption is that these individuals and systems form a nearly impenetrable barrier. But in practice, the failures of security details — both governmental and private — have repeatedly been exposed by determined attackers.
The Charlie Kirk Assassination – 200 Yards of Failure
The assassination of Charlie Kirk on a Utah college campus underscores one of the most glaring vulnerabilities in modern event security: perimeter control. While a security presence was in place, it clearly did not extend beyond the immediate venue. The shooter was able to establish a firing position 200 yards away — a distance well within the effective range of most rifles and even some handguns. [1]Proper protective detail planning accounts for more than the stage or the podium. It involves layered perimeters, surveillance of surrounding structures, control of elevated vantage points, and active coordination with local law enforcement to secure beyond-line-of-sight threats. The fact that Kirk was struck reveals a breakdown in every one of those elements. Security did not fail to act quickly; it failed to see the threat in the first place.
The Trump Assassination Attempts – Breaches at the Highest Level
Twice in recent years, sitting U.S. President Donald Trump was targeted by gunmen who successfully positioned themselves within striking distance.
- Butler, Pennsylvania (July 2024): The shooter fired from a rooftop with a clear line of sight during a campaign rally. After-action reviews documented multiple failures: rooftop positions were not cleared, agencies were on separate communication channels, and intelligence about a man with a rifle was shared by cell phone rather than secure radio. [2]
- West Palm Beach Golf Course (September 2024): The attacker concealed himself in perimeter bushes for nearly 12 hours with a scoped rifle, setting up just 300–500 yards away from Trump. Because Trump’s golf outing was not listed on his official schedule, agents did not sweep the wooded perimeter. The suspect was discovered only by chance, when a Secret Service agent noticed movement. [3]
For the Secret Service — arguably the most experienced protective agency in the world — such breaches are catastrophic. Protective intelligence, advance surveys, rooftop control, and counter-sniper overwatch are supposed to prevent exactly these scenarios. That the attackers succeeded in getting into position shows that the security detail either underestimated the threat environment or failed to control its perimeter effectively.
If lapses this severe can occur with the President of the United States, who operates under the tightest security in the nation, what does that say for governors, legislators, and private citizens who must rely on smaller, less-equipped teams?
Governor Shapiro’s Residence Breach – Security on Paper, Not in Practice
In April 2025, an intruder, while Gov. Josh Shapiro and his family slept, scaled a fence, broke windows, and threw Molotov cocktails at Pennsylvania’s governor’s mansion. This happened even though there were state police protection and monitored security systems. Retired FBI agent J. J. Klaver criticized the response as “avoidable,” noting that motion detectors, burglar alarms, and other electronic security should have detected the threat sooner. [4]
This is a case where layers of protection existed on paper—but failed in execution. Cameras, alarms, and access controls are only useful when human operators are alert, response protocols are clear, and vulnerabilities are regularly tested. The governor’s family was put at unnecessary risk.
The Manchester Arena Bombing Inquiry – Complacency in the Private Sector
In 2017, the bombing at the Ariana Grande concert in Manchester revealed profound lapses in event security. Security guards failed to challenge suspicious activity, CCTV coverage left gaps in the venue, and hostile reconnaissance by the attacker went unnoticed. The inquiry concluded that the attack could have been mitigated — or even prevented — had security personnel followed proper protocols and exercised vigilance. [5]
This highlights a common issue with private security firms: under-training, poor communication, and complacency. Guards may be physically present, but without a culture of proactive threat identification, they function as little more than a visual deterrent — not an active line of defense.
Lessons from These Failures
Across these examples, a clear pattern emerges:
- Perimeter Blindness – Security focuses too heavily on immediate surroundings while leaving distant or elevated threats uncontrolled.
- Technology Over-Reliance – Cameras and alarms are treated as fail-safes, but without constant testing and trained oversight, they offer false assurance.
- Under-Prepared Personnel – Whether government agents or private guards, inadequate training and complacency consistently undermine effectiveness.
- Reactive Instead of Proactive – Far too often, details are prepared to respond after a shot is fired, rather than preventing that shot from being taken at all.
The most dangerous assumption in protective work is that presence equals protection. As these cases show, an unmonitored camera, an unchecked rooftop, or a complacent guard leaves openings wide enough for tragedy to strike. And once a breach occurs, even the fastest response may already be too late.
The Mechanics of Failure — Why Security Falls Short
Security failures are rarely the result of a single oversight. Instead, they are the outcome of multiple weak points aligning — complacent personnel, poor communication systems, over-reliance on technology, shallow risk assessments, and inadequate training. Together, these weaknesses create what experts call a failure cascade: every layer of defense assumes the others are working, but when each is compromised, tragedy becomes inevitable.
Complacency on the Ground
One of the most insidious threats to effective security is complacency. Guards are often seen chatting with each other, scrolling through phones, or focused on crowd management instead of threat detection. This passive stance creates blind spots. A guard may be physically present, but functionally absent.
The danger is magnified when personnel lack clear instructions on how to respond. Many private security firms train guards only to “observe and report.” That might suffice in a retail setting, but in high-risk political or campus events, it is a liability. If a guard notices suspicious behavior but does not know who to call, what code to transmit, or whether they are authorized to act, those lost seconds can cost lives.
Complacency doesn’t just dull vigilance — it creates hesitation. And hesitation in the face of an armed adversary is a recipe for disaster.
Communication Breakdown: A Silent Killer
The strength of a protective detail is only as strong as its communication. Radios, surveillance teams, event organizers, and law enforcement must operate under a unified command structure. Without it, even the best-trained personnel are left waiting on each other.
The first assassination attempt on President Trump in Butler, Pennsylvania (July 2024) revealed this in stark detail. An after-action review documented:
- Failure to integrate agencies: Local police and Secret Service agents weren’t on the same radio channels.
- Critical intelligence gaps: A rooftop gunman with a rifle was spotted, but the information was shared through cell phones instead of broadcast over secure radios.
- Confusion over responsibility: There was no clarity on who was tasked with securing rooftops and adjacent buildings.
By the time the threat information moved up the chain, Trump was already in the shooter’s sights. The shooter was ultimately neutralized, but only after rounds were fired — a catastrophic failure of communication. [2]
The Second Attempt: Bushes at the Golf Course
Just two months later, on September 15, 2024, another attempt highlighted different but equally fatal weaknesses. The suspect, Ryan Wesley Routh, concealed himself in the bushes along the perimeter of Trump’s West Palm Beach golf course for nearly 12 hours. Armed with a scoped SKS-style rifle, he was positioned 300–500 yards from Trump while the former president played golf. [3]
Investigations revealed multiple lapses:
- Unsecured perimeters: The wooded edge of the course was not cleared or monitored.
- Failure to anticipate “off-schedule” vulnerabilities: Because Trump’s golf outing was not on his official schedule, agents did not conduct full perimeter sweeps or deploy counter-snipers.
- Detection by chance: The suspect was discovered only when a Secret Service agent noticed movement in the bushes.
Adversaries do not operate on official schedules. Treating unscheduled events as low-threat created the exact opening Routh exploited.
Over-Reliance on Technology
Technology is essential, but it cannot replace human vigilance.
- At 345 Park Avenue in New York (2025), AI-enabled cameras flagged a gunman more than a minute before he opened fire. But because no rapid-response protocol existed, the alert did not trigger action. [7]
- In schools, districts spend millions on cameras and smart locks, but when a side door is propped open or when no one actively monitors the feed, the systems provide only the illusion of security.
Technology without integration into fast, disciplined human response is expensive window dressing — not protection.
Flawed Risk Assessments
Attackers often exploit vulnerabilities that were entirely predictable.
- In Butler, the shooter used a rooftop vantage point that had not been secured.
- At the golf course, the attacker exploited wooded perimeters left unchecked.
- In schools, attackers have repeatedly used unlocked side doors or bypassed visitor systems designed more for convenience than security.
These were not unforeseeable threats. They were foreseeable vulnerabilities that were ignored or minimized.
Training: The Human Factor
Training is the difference between proactive protection and passive observation. Well-trained security personnel understand:
- The signs of hostile reconnaissance (loitering, oversized bags, photographing entry points).
- Exactly who to contact and how to escalate when they identify a threat.
- How to secure perimeter integrity and control elevated vantage points.
- How to use radio discipline to communicate concisely under stress.
Without training, personnel fall back on instinct, which too often means freezing or hesitating. In life-or-death scenarios, hesitation costs lives.
Key Takeaway
Security doesn’t fail because of one bad actor. It fails when multiple small weaknesses — complacency, poor communication, unchecked perimeters, untested technology, and untrained personnel — line up in a chain of failure. Both high-profile figures like Donald Trump and everyday schoolchildren have been endangered by these same patterns. And the lesson is inescapable: any lapse in security equals failed security.
Human Failures in School Security — Beyond the Tools
When schools experience a violent attack, the headline conversation usually centers on what the attacker used. The professional conversation—inside after-action reviews, civil litigation, and federal guidance—focuses on what the adults and systems did (or didn’t) do. In case after case, investigators find that failures in leadership, communication, training, access control, and maintenance—not a lack of gadgets—determine outcomes.
Culture and Leadership: Safety Is a Process, Not a Purchase
The U.S. Department of Justice’s critical-incident review of the Robb Elementary (Uvalde) response is unambiguous: leadership and policy failures, inadequate training, and poor coordination allowed children and teachers to remain trapped with the shooter for over an hour while law enforcement stayed outside. The report calls it a systemic failure—not a gear problem. [8]
A parallel lesson from K-12 safety practitioners is that schools cannot “buy” safety. Security is a continuous process of planning, drilling, refining, and auditing. The institutions that treat safety as culture—documented roles, rehearsed protocols, clear command and control—consistently perform better than those that accumulate equipment without integration. Federal and practitioner guidance reiterate a systems-based, layered approach, not one-off purchases. [6][10]
What that looks like in practice
- Written incident command roles for administrators, school resource officers (SROs), and staff.
- Pre-assigned responsibilities (who locks which doors, who calls which contacts, who runs reunification).
- Scheduled drills and after-action reviews that actually change procedures.
Access Control and the “Propped Door” Problem
Most school attacks don’t begin with a Hollywood breach; they begin with an unlocked or poorly controlled door. In Uvalde, failed door and key control compounded the tragedy [8].
Practical access control is deceptively simple: perimeter doors that auto-latch, strict visitor management, electronic logs, and staff accountability for keeping doors closed. Many districts own the hardware but not the habit. When convenience overrides policy—even once—the “hardening” vanishes at the exact moment it’s needed.
What to audit monthly
- Door latch/strike alignment and auto-close function.
- Electronic access logs (spot checks).
- Visitor management: ID checking, badges, escorts, and exit confirmation.
Surveillance: Coverage, Clarity, and Someone Watching
Cameras deter some misconduct and help reconstruct events—but they do not prevent attacks by themselves. They must be (1) positioned and focused for threat detection, (2) capable day and night, and (3) actively monitored with a protocol that triggers immediate human action.
Multiple inquiries across campuses and public venues show that when alerts don’t map to a rapid response, technology becomes “expensive evidence.” At 345 Park Avenue, AI cameras flagged a gunman more than a minute before shots, but without a rapid human response, the system failed. [7]
Separately, districts have spent over $100M nationwide on “bulletproof” window film under misleading claims. Manufacturers such as 3M have clarified these films do not stop bullets; demonstrations often used unrealistic conditions. Films can delay entry, but they are not ballistic protection and must be represented honestly within a layered strategy. [11]
Minimum viable surveillance program
- Annual camera map with fields of view documented, day/night test images saved.
- Spot checks to confirm someone is watching during high-risk periods (arrival, lunch, dismissal, events).
- Written playbooks: which alert triggers which action, who calls lockdown, who calls 911, which radio channels are used.
Communication and Unified Command: Radios > Cell Phones
When seconds matter, the best hardware fails if people can’t talk. The DOJ’s Uvalde review cites late command post establishment, radio failures, and poor multi-agency coordination—classic communication collapse. [8]
Recent state-level audits echo similar gaps: police lacked finalized agreements for access to campus security systems and communications during emergencies, despite millions invested in gear. Hardware without shared procedures and interoperable access leaves responders blind.
School essentials
- Interoperable radios with local police/fire.
- A simple, printed comms tree: front office, SRO, principals, district, 911.
- Quarterly comms drills (no-notice) with time-stamped logs.
Training and Drills: Move from “Observe and Report” to “Recognize and Act”
Private security on campuses (and even some in-house teams) are too often trained to observe and report. That’s not enough in targeted violence. Training must cover hostile reconnaissance indicators, immediate lockdown authority, radio brevity codes, casualty collection points, and reunification.
Federal research shows targeted school violence is often preventable when schools identify concerning behaviors early, share information, and intervene. The U.S. Secret Service’s National Threat Assessment Center (NTAC) has repeatedly found pre-attack “leakage” and observable behaviors that, if acted upon, can disrupt plots before they turn into attacks. [9]
Program elements that change outcomes
- Multidisciplinary threat assessment team (admin, counselor, SRO, teacher, psychologist).
- Clear intake pathway for tips, with documented follow-up.
- Role-specific drills (front office lockdown vs. hallway supervision vs. coach at practice).
Perimeter Thinking: Beyond the Building
Attacks frequently exploit areas outside the front doors: parking lots, drop-off loops, athletic fields, wooded edges, and adjacent rooftops. The professional standard is layered security that extends to where a credible threat could stage a rifle shot or vehicle attack.
Low-cost, high-impact habits
- Morning/afternoon exterior sweeps (two-person team), including rooflines and fence lines.
- Temporary vehicle barriers for large events (graduations, games).
- Lighting audits at all approaches and gathering areas.
Cyber Is Physical: Keep the Systems Alive
Modern schools run access controls, PA systems, camera networks, and emergency notification on IP infrastructure. Cyber incidents have shut down learning for days to weeks and can disable safety systems when most needed. GAO finds learning loss from K-12 cyberattacks commonly ranges from 3 days to 3 weeks, with recovery taking months. [12]
Basics that matter
- Offline playbooks if networked systems fail (analog keys, handheld radios, paper rosters).
- Backups for camera/NVR configs and access control rules.
- Cyber tabletop drills with facilities + IT: “If the PA and locks go down at 10:15, who does what?”
Accountability and Continuous Improvement
The difference between resilient and vulnerable schools is whether findings become fixes. The K-12 School Security Guide (3rd Ed.) and its School Security Assessment Tool make it straightforward to baseline, prioritize, and justify changes—especially under budget pressure. They operationalize layered, risk-based security that doesn’t expect teachers to become SWAT, but does expect leaders to maintain discipline. [10]
A practical annual cycle
- Assess (baseline + physical walk-downs).
- Drill (with injects and timers).
- Fix (doors, comms, SOP gaps).
- Re-assess and repeat.
Bottom Line for Schools
Most catastrophic outcomes trace back to human and procedural breakdowns—doors, drills, radios, roles—not the absence of a particular device. Districts that internalize a layered, systems-based approach (access control, trained people, interoperable comms, perimeter sweeps, and real threat assessment) measurably reduce risk. The federal record—from DOJ’s Uvalde review to NTAC’s prevention findings—backs this up. [8][9][10]
When the Weapon Isn’t a Gun: Vehicles and Explosives
A sober look at mass-casualty incidents shows the tool varies; the failure is consistent. Vehicles and improvised explosives have been used repeatedly to kill—yet our policy response in those domains rightly focuses on security measures, not bans. That same logic should apply when a firearm is used.
Vehicle Attacks
- New York City (2017): A rented pickup truck was driven down a Manhattan bike path, killing eight and injuring many more. Federal prosecutors documented months of planning and explicit intent. The durable lesson for cities and venues was bollards, standoff, and protected lanes, not outlawing trucks. [12]
- Charlottesville (2017): A driver deliberately rammed a crowd, murdering Heather Heyer and injuring dozens. Again, the response was to improve traffic control and barrier planning at demonstrations—not to ban vehicles. [13]
- Berlin Christmas Market (2016) & Nice (2016): High-profile vehicle ramming attacks drove policy toward perimeter hardening, hostile-vehicle mitigation, and crowd-flow design across Europe. [14][15]
In each case, the instrument was widely available. The response was not confiscation but smarter planning, stronger perimeters, and better event control.
Explosive Attacks
From Oklahoma City to the Boston Marathon to Manchester Arena, explosives have been used to cause mass casualties. The policy shift has always emphasized intelligence, detection, and standoff distances — not banning chemicals or household products.
- Oklahoma City (1995): A truck bomb using fertilizer killed 168 people. The response focused on surveillance of reconnaissance behaviors, standoff distances, and controlled access to sensitive materials.
- Boston Marathon (2013): Pressure cookers filled with explosives killed three and injured hundreds. The outcome pushed toward bag checks, surveillance, and layered event planning.
- Manchester Arena (2017): A homemade device killed 22 people at a concert. The inquiry concluded the attack could have been mitigated with better venue security and more proactive staff intervention. [5]
The thread is clear: explosives have long been used, yet the solution has always been hardening targets and improving detection.
Existing Guidance on Prevention
We already have field-ready tools to mitigate both vehicle and IED threats:
- Vehicle-ramming mitigation: DHS and CISA publish guides on barrier selection, access control, and standoff for soft targets and crowded places. These emphasize site assessments, tactical traffic plans, and physical measures proportional to risk. [10]
- VBIED/IED preparedness: Federal C-IED guidance and standoff charts help translate alerts into evacuation distances and tactical decisions. [11]
- Mass gatherings: CISA’s Soft Targets and Crowded Places resources stress pre-event planning, unified communications, and role-specific drills. [10]
Bottom Line
When an attacker uses a vehicle or an IED, our collective response is to harden — not to outlaw cars, not to ban fertilizer, not to remove kitchen appliances from homes. But when the weapon is a firearm, logic gives way to politics. The same principle must apply across the board: focus on securing venues, strengthening perimeters, and tightening communication and training. The recurring thread isn’t the instrument; it’s the quality of security guarding the target.
Closing the Gaps: Field-Ready Checklists for Events, Security Details, and Schools
This section distills best practice into do-now actions. It is deliberately operational so it can be used as guidance, a training insert, or an audit template.
Political Events & High-Profile Appearances
Context: On September 10, 2025, conservative activist Charlie Kirk was fatally shot during an outdoor event at Utah Valley University. Law enforcement described it as a “political assassination,” with shots reportedly fired from ~200 yards. [1] Despite the presence of security, the attacker was able to establish a firing position undetected — a catastrophic perimeter failure.
Other recent examples reinforce the point:
- Butler, Pennsylvania (July 2024): A rooftop gunman nearly killed President Trump during a rally after communication failures and unchecked rooftops left a critical blind spot. [2]
- West Palm Beach Golf Course (September 2024): An attacker hid in bushes for nearly 12 hours with a scoped rifle just 300–500 yards from Trump, exploiting the absence of perimeter sweeps at an “off-schedule” event. [3]
Perimeter & vantage control
- Define three layers: inner (stage/dais), middle (crowd & structures), outer (streets/rooflines/woodlines). Assign ownership for each layer and require logged sweeps.
- Rooftops and elevated positions: clear, occupy, or deny. If you cannot occupy, document the reason and assign optical overwatch.
- Woodlines and course edges: treat wooded perimeters as hostile reconnaissance zones; sweep and re-sweep on a set interval.
Communications & command
- Put all agencies and contract guards on interoperable radios — no cell phone threads.
- Establish primary/alternate channels and plain-English hailing protocols.
- Print a one-page Comms/Authority card: who declares evacuation, who reroutes VIPs, who authorizes counter-sniper repositioning, who owns public messaging.
Detection & response
- Assign trained spotters with binoculars and sector maps whose job is only threat detection.
- Treat AI or video alerts as action items: once a camera flags an anomaly, the clock starts for confirmation and decision.
- Assume a distant-fire threat: rehearse hard-cover routes and evacuation plans accordingly.
Vehicle/IED considerations
- Deploy temporary vehicle barriers proportionate to street layout and expected traffic.
- Pre-print standoff cards listing evacuation distances for various explosive threats and rehearse their use.
Protective Details (Government & Private)
Core failure modes to audit quarterly:
- Complacency: any post where guards chat, scroll, or face inward is a blind spot. Rotate posts every 30–45 minutes.
- Perimeter intelligence: establish fixed-interval sweeps of rooftops, woodlines, and service corridors.
- Unified command: sign memoranda of understanding (MOUs) with local police/fire that specify shared radio plans, camera access, and zone ownership.
- Counter-sniper/overwatch: document which elevated positions are occupied or denied.
- Alert-to-action playbooks: every alert must map to a specific action (reposition, cover, reroute, evacuate).
Staff training:
- Train beyond “observe & report.” Guards must know hostile recon indicators, who to hail first, and what to lock or close under a code.
- Issue laminated role cards to every guard with priority calls, codes, and sector diagrams.
Schools (K-12 & Higher Ed)
Federal doctrine has matured: layered, systems-based security with people, policy, and technology working together. CISA’s K-12 School Security Guide (3rd Edition) provides the benchmark. [10]
Foundations that actually change outcomes:
- Access control discipline: test auto-latching doors monthly; enforce strict visitor sign-in/out.
- Unified comms: interoperable radios with law enforcement; avoid reliance on cell phones.
- Threat assessment teams: multidisciplinary teams trained on U.S. Secret Service NTAC principles (leakage, concerning communications, pathway behaviors). [9]
- Surveillance that is actionable: camera maps with coverage fields documented, monitored during peak times, and linked to written playbooks.
- Truth in materials: window films marketed as “bulletproof” must be treated as delay tools, not ballistic protection. [11]
- Perimeter thinking: athletic fields, parking lots, and wooded edges get sweeps and lighting checks.
- Cyber-contingency: assume PA systems, locks, and cameras may fail; maintain analog backups.
A practical yearly cycle:
- Assess (baseline + walk-downs).
- Drill (timed scenarios with radio traffic recorded).
- Fix (doors, comms, SOP gaps).
- Re-assess and repeat.
Bottom Line
Whether it’s a political rally, a governor’s mansion, or a K-12 school, the solutions are not mysterious. They are practical, documented, and already available through federal guidance. The difference lies in execution. Security isn’t about looking secure; it’s about being secure. And that requires layered perimeters, unified communication, trained personnel, and a culture of vigilance that leaves no blind spots for tragedy to slip through.
Rights, Reality, and Responsibility
The September 10, 2025, assassination of Charlie Kirk [1], the July 2024 and September 2024 assassination attempts on Donald Trump [2][3], the New York City truck murders of 2017 [12], and countless bombing plots share a single through-line: the tool changes, but preventable security failures repeat.
We can keep arguing about objects—or we can fix the systems that either deter an attacker or leave a crowd exposed. The expert consensus embedded in federal guidance is not mysterious:
- Layered perimeters that extend beyond the immediate venue.
- Unified communications so intelligence never dies in silos.
- Trained personnel who understand hostile reconnaissance and escalation.
- Timed sweeps of rooftops, woodlines, parking lots, and crowd approaches.
- Truthful technology claims that pair tools with real human oversight.
Do these well and the probability that an attacker can stage, aim, and act collapses. Fail to do them, and we get more tragedies that could have been prevented.
The national conversation should reflect that reality. When vehicles and explosives are used, no one suggests banning trucks or pressure cookers. Instead, policy emphasizes hardening targets, increasing standoff, and strengthening intelligence. But when firearms are involved, logic gives way to politics — and the discussion shifts toward restricting rights rather than correcting failures.
That approach is not only ineffective; it’s dangerous. It diverts attention from the only interventions that actually save lives: competent, proactive, accountable security.
The path forward is clear. Whether at a political rally, a school, or a city street, security lapses are the common denominator. Guns, trucks, or bombs are simply tools exploited when protection systems fail. The solution is not to criminalize tools, but to professionalize and discipline the systems meant to stop attackers from exploiting them.
That is the actionable path for schools, campuses, and political events—and it respects both safety and civil rights. The goal is not to create fear; it is to close gaps so that the most common failure in modern tragedies—failed security—stops being common.
Honoring Charlie Kirk
As this conversation turns to policy, procedures, and prevention, it’s important not to lose sight of the human cost. The assassination of Charlie Kirk on September 10, 2025, was not only a security failure—it was a devastating loss for his family, his friends, and the countless Americans who looked to him as a voice for conservative values and free expression.
Charlie dedicated his life to engaging students, encouraging civic involvement, and challenging young people to think critically about the future of this country. Whether one agreed with every position he took or not, his passion for his work and his willingness to stand boldly in the public square defined his contribution.
Honoring Charlie Kirk means more than remembering his words. It means refusing to let his death be reduced to another statistic in a political argument. It means asking the tough questions about why his security failed and insisting that such lapses never become acceptable in our schools, our events, or our political life.
The best tribute we can give is to ensure that no family, no community, and no nation has to relive the preventable heartbreak that came from the lapses surrounding his final public appearance. By demanding excellence in security, accountability in leadership, and a commitment to proactive protection, we not only defend public figures—we defend the right of all Americans to speak, gather, and learn without fear.
References
- Associated Press, “Charlie Kirk killed in Utah college shooting, authorities call it assassination,” AP News, Sept. 10, 2025.
- Associated Press, “Secret Service report details communication failures preceding July assassination attempt on Trump,” AP News, July 2024.
- The Guardian, “Secret Service golf course breach leaves Trump vulnerable,” The Guardian, Sept. 17, 2024.
- Associated Press, “Intruder breaches Pennsylvania Governor Shapiro’s residence,” AP News, 2025.
- Pitchfork, “Public inquiry into Manchester Arena bombing reveals security lapses,” Pitchfork, 2023.
- Campus Safety Magazine, “School Safety and Security Is a Process, Not a Purchase,” Campus Safety, 2022.
- Reuters, “New York gunman was flagged by AI-enabled cameras before attack,” Reuters, July 29, 2025.
- U.S. Department of Justice, “Critical Incident Review: Robb Elementary School Shooting,” DOJ, Jan. 2023.
- U.S. Secret Service National Threat Assessment Center, “Protecting America’s Schools: A U.S. Secret Service Analysis of Targeted School Violence,” NTAC Report, 2019.
- U.S. Department of Homeland Security / CISA, “K-12 School Security Guide (3rd Edition),” CISA, 2022.
- Associated Press, “Schools spent millions on ‘bulletproof’ window film that doesn’t stop bullets,” AP News, Aug. 2025.
- U.S. Department of Justice – Southern District of New York, “Terrorist Sentenced in Manhattan Truck Attack,” DOJ Press Release, 2017.
- PBS News, “Charlottesville: Remembering Heather Heyer,” PBS, 2017.
- The Guardian, “Berlin Christmas Market Attack: What We Know,” The Guardian, Dec. 2016.
- BBC News, “Nice Attack: Truck Driver Kills 86,” BBC, July 2016.
Read full article here