Museums and Cultural Properties

 

 

https://sm.asisonline.org/Pages/November-2017-Industry-News.aspxNovember 2017 Industry NewsGP0|#3795b40d-c591-4b06-959c-9e277b38585e;L0|#03795b40d-c591-4b06-959c-9e277b38585e|Security by Industry;GTSet|#8accba12-4830-47cd-9299-2b34a43444652017-11-01T04:00:00Zhttps://adminsm.asisonline.org/pages/flora-szatkowski.aspx, Flora Szatkowski<h4>​VIKINGS STADIUM OPENS DOORS</h4><p>The new U.S. Bank Stadium—home of the Minnesota Vikings—hosted more than 66,000 fans at the first Monday night game of the 2017 season. Completed last year, the 1.5 million-square-foot stadium campus is flexible enough to serve as a true multipurpose stadium that can host football, soccer, baseball, basketball, motorsports, major concerts, and other events.</p><p>ASSA ABLOY was tapped to provide more than 1,500 doors and openings for the state-of-the-art stadium. A truncated construction timeframe provided the impetus for using preassembled openings. The ready-to-install openings improved onsite management of multiple components and saved time through a streamlined installation process.</p><p>The openings included products from ASSA ABLOY Architectural Door Accessories, including McKinney hinges, Pemko accessories, and Rockwood door trim, as well as Curries hollow metal doors and frames; Sargent locks, exit devices, and door closers; Medeco high-security cylinders and keys; and Securitron access control components.​</p><h4>PARTNERSHIPS AND DEALS</h4><p>Dahua Technology is partnering with Anixter International to market Dahua products throughout the United States and Canada.</p><p>Anomali and NSS Labs, Inc., announced a strategic partnership that provides enterprise customers with a unified view of unmitigated threats and empirical data regarding the effectiveness of security controls.</p><p>Bold Technologies completed the integration of ManitouNEO with innoVi from Agent Video Intelligence to provide monitoring centers with a video intrusion system. </p><p>Boon Edam product data and customized specifications for the Americas are available through the ARCOM software platform to architects, engineers, and design professionals.</p><p>Brady announced that its Brand Protection business partnered with Kezzler and Honeywell to bring product authentication labeling and tracking to Genetron 134, a refrigerant. </p><p>ByteGrid Holdings LLC announced an agreement with Empowerment through Technology and Education to provide greater compliance and control of hosted business-critical data.</p><p>Baltimore Cyber Range LLC and Cyberbit Ltd. announced the opening of the new Baltimore Cyber Range cybersecurity training and simulation center in Baltimore, Maryland.</p><p>Camden Door Controls retained manufacturer’s representative JClemente & Associates to service its southern California territory.</p><p>Cellebrite is joining the National Center for Missing & Exploited Children and Project VIC in the global fight against child exploitation. </p><p>Claroty and Schneider Electric are partnering to address safety and cybersecurity challenges for the industrial infrastructure sector.</p><p>Conformance Technologies announced that Pivotal Payments selected its solutions to enhance business effectiveness and protection of its North American merchant portfolio. </p><p>The addition of deverus, Inc., background checking software to the iCIMS partner ecosystem will provide cost savings and improved speed to customers.</p><p>EventTracker announced that its SIEM platform was implemented at OneBlood, Inc.</p><p>Exabeam and ThreatConnect, Inc., announced a product integration designed to improve overall cybersecurity and incident response.</p><p>EyeLock LLC entered into a partnership with CSD (Central Security Distribution) to deliver EyeLock’s product suite in Australia. EyeLock is also developing iris authentication solutions to work with Qualcomm Mobile Security. </p><p>Farpointe Data helped Secure Our City, Inc., improve security access for a parking garage.</p><p>Galaxy Control Systems completed an integration with IP-enabled solutions from ASSA ABLOY. </p><p>Genetec and Alutel Mobility partnered to offer extended access control capabilities to open areas without having to rely on physical readers or installations.</p><p>Hikvision Canada Inc., provided cameras for the JPPS Children’s Centre in Montreal that were installed by integrator Alarme Sentinelle. Petite Echelle Centre in Montreal worked with integrator Intelgest to upgrade its security system with Hikvision.</p><p>Honeywell and eDist Security expanded their relationship around the Genesis Series Cable product line. </p><p>Huttig Building Products selected TierPoint to provide colocation and data center migration services.</p><p>Imagination Technologies and Sierraware are collaborating to make Sierraware’s SierraTEE available for devices based on Imagination’s MIPS CPUs.</p><p>ISONAS Inc. announced that Transportation Impact selected the ISONAS Pure IP access control solution to secure its corporate headquarters.</p><p>Johnson Controls announced that its American Dynamics victor Video Management Software integrates with the Guardian Indoor Active Shooter Detection System from Shooter Detection Systems.</p><p>Karamba Security joined the Automotive Grade Linux (AGL) Project and The Linux Foundation to help develop its cybersecurity best practices.</p><p>The Legrand On-Q Digital Audio System has been integrated with Alarm.com.</p><p>Netwrix Corporation announced that its Netwrix Auditor empowers Guadalupe Valley Electric Cooperative to minimize insider threats and improve database security.</p><p>OnSSI and Seagate teamed up to provide a robust recording solution designed for more efficient system expansion and scalability.</p><p>Ever and Pinn formed a technology partnership to integrate Ever’s facial recognition into Pinn’s secure attribution platform.</p><p>Enterprise Performance Consulting joined the PSA Business Solutions Program to offer business consulting and operations team training programs to PSA integrators. </p><p>Point Blank Enterprises and Special Ops Bunker made an exclusive global marketing agreement to offer Special Ops Bunker products through the Point Blank global network.</p><p>Golden Lion Marbella, a casino in Panama, selected Qognify VisionHub to upgrade its security, safety, and operations.</p><p>RapidSOS is partnering with WiseWear, Fusar, Kairos, Lumenus, and ROAR for Good to provide a rich data link to 911 from wearable products, so users can connect to 911 by pushing a panic button or by detection from a wearable device during a crash or medical emergency.</p><p>Sky and Cisco have a multi-year digital security agreement to support the expansion of Sky video services across any screen.</p><p>Suprema announced that its BioSign mobile fingerprint authentication algorithm was selected by Samsung for two smartphone models.</p><p>Traka UK joined forces with Edesix, to ensure that equipment used across the U.K. Prison Service is safely stored and managed.</p><p>TruTag Technologies’ signature authentication solution will be used by Hongyang Biotechnology Co. to protect the livestock supply chain from counterfeiting and diversion.</p><p>Visual Management Systems Ltd. was invited to join the Airports Centre of Excellence, which aims to improve the passenger experience.</p><p>Vodafone Group joined the prpl Foundation to focus on enabling the security and interoperability of embedded devices.</p><p>VTT Technical Research Centre of Finland Ltd. and ITS Russia signed a partnership agreement concerning the development of intelligent transport systems for border crossings. </p><p>Watermark Risk Management International, LLC, and TEAM Software, Inc., created a strategic partnership where Watermark will be a preferred provider of consulting services on TEAM software solutions.</p><p>WestJet Airlines realized improved efficiency and streamlined communication by partnering with Send Word Now.​</p><h4>GOVERNMENT CONTRACTS</h4><p>AirMap and the Kansas Department of Transportation will deploy Unmanned Traffic Management technology across Kansas to support the growth of the state’s drone economy and ensure safer skies.</p><p>ATS Armor LLC received an order from Miami-Dade Police Department for 1,500 active shooter kits, enough for every patrol car.</p><p>Canon U.S.A., Inc., received two BLI PaceSetter Awards in the Document Imaging Security and Mobile Print categories from Keypoint Intelligence.</p><p>Cardiac Science announced that Boston Public Schools will purchase Powerheart G5 automated external defibrillators.</p><p>The State of Louisiana is working with CA Technologies to enable citizens to securely access information across government services through the Louisiana Enterprise Architecture Project.</p><p>An Elbit Systems of America Integrated Fixed Tower border security system passed U.S. Customs and Border Protection systems acceptance testing.</p><p>The city of Troy, Alabama, selected Extreme Networks software-driven networking technology to provide reliable, fast, and secure connectivity across 70 locations.</p><p>FirstNet and AT&T will deliver a specialized wireless broadband network to Arizona’s public safety community.</p><p>Sherburne County Sheriff’s Office in Minnesota will use GUARDIAN RFID technology to mitigate risk and improve operational efficiency in the Sherburne County Jail. </p><p>IPVideo Corporation was selected by the San Jose Police Department to help improve and upgrade its interview recording platform. </p><p>Janus Global Operations will clear areas of Mosul, Iraq, of ISIS-placed booby traps and other explosives under an agreement with the U.S. Department of State’s Office of Weapons Removal and Abatement.</p><p>Milestone Systems completed a security surveillance solution for Goyang City in South Korea.</p><p>NEC Corporation provided a facial recognition system for South Wales Police in the United Kingdom through NEC Europe Ltd.</p><p>Scott Safety was selected to provide technology and equipment to the California Department of Forestry and Fire Protection.</p><p>Southern Linc entered into a partnership with the City of Huntsville and Madison County Alabama’s 911 dispatch center to add LTE wireless data transmission equipment to connect first responders to the new network. </p><p>Agencies, including the U.S. General Services Administration, the U.S. Joint Chiefs of Staff, and the U.S. Army, have used eSignLive from VASCO Data Security for secure and compliant electronic signing of documents using Personal Identity Verification cards or Common Access Cards.​</p><h4>AWARDS AND CERTIFICATIONS</h4><p>Atomic Data attained SOC 3 certification for the seventh year in a row from the American Institute of Certified Public Accountants.</p><p>Conduent Incorporated was awarded a U.S. patent for technology that automatically recognizes facial expressions using images from low-resolution cameras.</p><p>Consolidated Communications Holdings, Inc., achieved MEF CE 2.0 certification for carrier grade, interoperable Ethernet services. </p><p>Day & Zimmermann earned a ranking of 188 on the Forbes America’s Largest Private Companies list. It is also on the Defense News Top 100 List.</p><p>Everest Technologies received ISO 27001:2013 accreditation for its information security management system.</p><p>Fornetix, LLC, gained a U.S. patent that covers breakthrough solutions for the management of encryption keys and other security objects.</p><p>Hesco was placed in the Commander’s Choice category and recognized as a Superior Supplier to the U.S. Defense Logistics Agency.</p><p>Frost & Sullivan recognized IriTech, Inc., with the 2017 North American Frost & Sullivan Award for New Product Innovation.</p><p>StoneLock is the winner of the annual Government Security News Airport, Seaport, Border Security Awards Program for Best Facial Recognition Technology.</p><p>TEAM Software, Inc., is the winner of the Web.com 2017 Small Business of the Tournament Award for Nebraska.</p><p>Vinson Guard Service, Inc., gained national certification as a Women’s Business Enterprise by WBEC South, a regional certifying partner of the Women’s Business Enterprise National Council. </p><p>Zentera Systems, Inc., was awarded Best of Show for Best Security or Privacy Solution at IoT Evolution Expo.​</p><h4>ANNOUNCEMENTS</h4><p>AngelTrax relocated all operations into a renovated facility that serves as its new headquarters and manufacturing, inventory, and distribution centers.</p><p>ASSA ABLOY acquired SMI (Shree Mahavir Metalcraft), a leading OEM manufacturer of architectural hardware in India.</p><p>The Association of Public-Safety Communications Officials (APCO) International and IBM announced that APCO International’s new guide card software will use IBM Watson Speech-to-Text and Watson Analytics.</p><p>CEDIA and The Electronic Security Association announced a strategic reciprocal training relationship that will expand the educational opportunities for members of both associations.</p><p>Columbus State University received a grant from the U.S. National Security Agency to develop a new tool for rapid cybersecurity training and curriculum development. </p><p>EventTracker introduced the EventTracker Partner Program. </p><p>EY opened its advanced cybersecurity center in Dallas, Texas, to help clients stay ahead of emerging threats.</p><p>Lantronix, Inc., joined the Kepware IoT Alliance Program.</p><p>Marks USA, a division of NAPCO, launched a new website at marksusa.com.</p><p>NXP Semiconductors N.V. is expanding its operations in the United States, enabling its U.S. facilities to manufacture security chips for government applications.</p><p>ONVIF announced the final release of Profile A for broader access control configuration and the Release Candidate for Profile T, a draft specification with advanced streaming capabilities that adds in support for H.265 video compression.</p><p>Proficio expanded into Hong Kong to broaden its presence in the Asia-Pacific region.</p><p>PSA is working with Matterhorn Consulting to enable PSA members to hire military veterans.</p><p>Stanley Black & Decker opened a new Breakthrough Innovation center in Boston dedicated to advancing technological innovation in its security business.</p><p>The Protection Bureau awarded scholarships to 10 children of company employees.</p><p>ThetaRay opened its first U.K. office in London.</p><p>Top Notch Distributors updated its website at topnotchinc.com.</p><p>Toshiba Surveillance & IP Video Products Group launched its Safe Scholar program to help schools reduce the total cost of video surveillance system ownership. </p><p>WatchGuard Technologies acquired Datablink, a provider of advanced authentication solutions. </p><p>Webroot acquired the assets of Securecast, a security awareness training platform, and launched Webroot Security Awareness Training as a beta program.</p><p> ​</p>

Museums and Cultural Properties

 

 

https://sm.asisonline.org/Pages/November-2017-Industry-News.aspx2017-11-01T04:00:00ZNovember 2017 Industry News
https://sm.asisonline.org/Pages/Safety-in-Shared-Spaces.aspx2017-09-01T04:00:00ZSafety in Shared Spaces
https://sm.asisonline.org/Pages/Protecting-Fine-Art-and-Other-Industry-News.aspx2017-09-01T04:00:00ZProtecting Fine Art and Other Industry News
https://sm.asisonline.org/Pages/Securing-Sacred-Spaces.aspx2017-08-01T04:00:00ZSecuring Sacred Spaces
https://sm.asisonline.org/Pages/Javits-Embraces-High-Tech-Hospitality.aspx2017-08-01T04:00:00ZJavits Embraces High-Tech Hospitality
https://sm.asisonline.org/Pages/UN-MUSEO-DEL-MUNDO-Y-PARA-EL-MUNDO.aspx2017-06-03T04:00:00ZUN MUSEO DEL MUNDO Y PARA EL MUNDO
https://sm.asisonline.org/Pages/Communal-Protection.aspx2017-04-01T04:00:00ZCommunal Protection
https://sm.asisonline.org/Pages/Surveillance-is-Instrumental.aspx2017-02-01T05:00:00ZSurveillance is Instrumental
https://sm.asisonline.org/Pages/A-Museum-of-the-World-and-for-the-World.aspx2017-01-01T05:00:00ZA Museum of the World and for the World
https://sm.asisonline.org/Pages/Culture-in-Crisis.aspx2016-11-01T04:00:00ZCulture in Crisis
https://sm.asisonline.org/Pages/Soft-Target-Trends.aspx2016-09-01T04:00:00ZSoft Target Trends
https://sm.asisonline.org/Pages/A-New-Mandate-for-the-Modern-Library.aspx2016-07-01T04:00:00ZA New Mandate for the Modern Library
https://sm.asisonline.org/Pages/Book-Review---Religions-Institutions.aspx2016-06-01T04:00:00ZBook Review: Keeping Religious Institutions Secure
https://sm.asisonline.org/Pages/All-Secure-on-Set.aspx2016-06-01T04:00:00ZAll Secure on Set
https://sm.asisonline.org/Pages/Book-Review---Library-Security.aspx2016-06-01T04:00:00ZBook Review: Library Security
https://sm.asisonline.org/Pages/Protection-on-Display.aspx2016-05-01T04:00:00ZProtection on Display
https://sm.asisonline.org/Pages/Smithsonian-To-Host-Conference-on-Cultural-Property-Protection.aspx2016-04-26T04:00:00ZSmithsonian to Host Conference on Cultural Property Protection
https://sm.asisonline.org/Pages/IFCPP-Symposium-Focuses-on-Collaboration.aspx2015-11-04T05:00:00ZIFCPP Symposium Focuses on Collaboration
https://sm.asisonline.org/Pages/Artful-Engagement.aspx2015-07-06T04:00:00ZArtful Engagement
https://sm.asisonline.org/Pages/Dynamically-Securing-Cultural-Heritage.aspx2014-03-01T05:00:00ZDynamically Securing Cultural Heritage

 You May Also Like...

 

 

https://sm.asisonline.org/Pages/Active-Shooter.aspxActive Shooter Guidelines<p>​How to handle an active shooter situation is the subject of two new guidelines, including one <a href="http://www.dhs.gov/publication/active-shooter-how-to-respond" target="_blank">released by the Department of Homeland Security</a> that​ targets a more general audience of managers and employees.</p>GP0|#cd529cb2-129a-4422-a2d3-73680b0014d8;L0|#0cd529cb2-129a-4422-a2d3-73680b0014d8|Physical Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465
https://sm.asisonline.org/Pages/Bag-Checks-At-Hotels-Unlikely-To-Become-New-Normal,-Expert-Says.aspxBag Checks At Hotels Unlikely To Become New Normal, Expert Says<p>​In the aftermath of the Las Vegas shooting that killed 59 people and wounded more than 500 others, many are wondering if hotels will change their security policies and procedures. </p><p>One area of concern is if hotels will begin implementing bag checks because gunman Stephen Paddock was able to smuggle 23 firearms, along with other equipment, into his suite at Mandalay Bay to carry out Sunday’s massacre.<br></p><p>The Wynn resort in Las Vegas—located on the opposite end of the Vegas Strip from the Mandalay Bay resort—introduced security guards on Monday afternoon to screen visitors with metal-detector wands. It also implemented a bag check, which created a 10-minute wait to get inside the facility. <br></p><p>This is unlikely to become the new normal for hotel security in the near future, however, says Russell Kolins, CEO of the Kolins Security Group and chair of the ASIS International Hospitality, Entertainment, and Tourism Security council.<br></p><p>“Hotels are in the business of selling privacy—they’re offering hospitality and selling privacy,” Kolins explains, adding that hotels would likely start to lose business if they began checking bags—especially in locations like Las Vegas. <br></p><p>“In Vegas especially, what happens in Vegas stays in Vegas,” Kolins says. “People bring items they don’t want other people to see.”<br></p><p>At airports, travelers are subject to bag searches—as well as body scans—because they are a different kind of target than a hotel. Travelers also have no expectation of privacy while on a plane, except for in the bathroom, unlike in a hotel where travelers expect privacy within their room, Kolins says.<br></p><p>One policy that might need to be revisited following the shooting, however, is how hotels handle checking rooms that have a “Do Not Disturb” sign on the door. <br></p><p>Paddock checked into the Mandalay Bay on Thursday and kept a “Do Not Disturb” sign on his hotel door throughout his stay. This meant hotel cleaning staff did not enter his room, <a href="https://www.nytimes.com/2017/10/03/us/las-vegas-gunman.html?hp&action=click&pgtype=Homepage&clickSource=story-heading&module=a-lede-package-region&region=top-news&WT.nav=top-news&_r=0" target="_blank">according to a hotel worker who spoke to The New York Times,​</a> because housekeeping is only allowed to enter a room with such a sign on it if a security guard is present.<br></p><p>Requiring a security guard be present to enter rooms with privacy signs is the right move, Kolins says, but hotels should consider changing their policies to require room checks every other day.<br></p><p>“That’s an arbitrary period of time, but I think a policy should be instilled to at least check on the rooms,” Kolins says, adding that hotels would have to make patrons aware of the policy. But such a policy could, potentially, prevent an individual from using a hotel room for an extended period of time to plot a criminal act.<br></p><p>Kolins leads a team of court-certified security experts at his firm. He says he thinks it’s unlikely that Mandalay Bay will be sued for negligence for the shooting because to sue for negligence, plaintiffs must be able to show foreseeability. <br></p><p>“This is unprecedented—nothing like this has ever happened,” Kolins explains. “If something happens the first time, it’s not foreseeable.”<br></p><p>Now that such an attack has happened, though, if a similar attack happens plaintiffs could potentially bring a lawsuit saying it was foreseeable. In response, Kolins says he expects the hotel security industry to begin having seminars and tabletop meetings to determine how they would handle a similar case.<br></p><p>“I think what this has done is show that the slogan ‘expect the unexpected’ is again proven to be true,” Kolins says. “It wasn’t foreseeable because it was unprecedented.”​<br></p>GP0|#cd529cb2-129a-4422-a2d3-73680b0014d8;L0|#0cd529cb2-129a-4422-a2d3-73680b0014d8|Physical Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465
https://sm.asisonline.org/Pages/Securing-Sacred-Spaces.aspxSecuring Sacred Spaces<p>​Christians were gathered in churches around the world to celebrate Palm Sunday on April 9, 2017, marking the beginning of Holy Week. During this time of year, many Christians share in a renewal of their faith as they remember the pilgrimage that Jesus took before his death and resurrection.</p><p>At Saint George Church in Tanta, Egypt, the church was full. Scriptures were read. Songs were sung. Somewhere between welcome and amen, a bomb exploded—killing at least 25 people and wounding dozens of parishioners and members of the clergy.</p><p>Investigators reportedly believe, according to CNN and other media reports, that someone had placed an explosive device under a seat in the prayer hall. Exactly how the bomb was detonated is still unknown.</p><p>As emergency personnel were working to secure the scene at Saint George, a second attack occurred just outside of St. Mark Coptic Orthodox Cathedral in Alexandria, Egypt. </p><p>The church service had just ended and people were leaving the building when a man arrived wearing a zipped-up jacket with one hand in his pocket. A security officer denied the visitor access to the cathedral and referred him to the metal detector outside the church’s entrance.</p><p>The man can be seen on video talking with the officer and then walking towards the metal detector. He walked a few steps past it, turned, entered the metal detector frame, and detonated a bomb, killing at least 11 people—including three police officers—and wounding 35 others. The actions of the security officer and the use of the metal detector saved numerous lives that day.</p><p>Between the two attacks, 43 people died and approximately 100 were injured. ISIS claimed responsibility for both attacks and warned that there would be more attacks in the future against Christians, police, and the military, according to CNN.</p><p>However, these attacks left many questions unanswered. Details such as how the bombers picked their targets, whether they were working together, and what advance preparations they had made all remained a mystery.</p><p>Did the bombers choose these congregations based on the size of the facilities? It appears that the attackers selected a day in which they knew more people would be present at the churches, possibly in an attempt to create more terror and politicize them as an assault on Christianity. A similar attack at a Christian church in Alexandria on New Year’s Day in 2011 killed 21 and injured 96, according to The Telegraph. Christians have been targeted in several attacks in Egypt, which explains the enhanced security precautions in place on Palm Sunday in 2017.</p><p>These bombings prompt several questions. What can be done to prevent an attack from occurring in our respective places of worship? Will it become customary to have a bomb-sniffing dog search the premises? Will metal detectors become a common feature outside religious and cultural properties?</p><p>“There is no commonly accepted or developed profile of a suicide bomber,” the Anti-Defamation League (ADL) wrote in Protecting Your Jewish Institution in 2015. “The only characteristic accepted by experts is that the overwhelming majority are prepared to die in the service of their cause.”</p><p>Security leaders are faced with the challenge of preventing an act that someone else is determined to achieve, even in the face of death. </p><p>We have known for years that the Islamic State wants to destroy Western culture, and that they plan to attack various locations, including houses of worship, bus stops, airports, hospitals, schools, shopping venues, concert halls, night clubs, parades, sporting events, and other places with large gatherings of people. Additionally, we are experiencing more attacks by individual terrorists with various affiliations, as seen in recent attacks using vehicles in Paris and London. </p><p>The ADL reported in January 2017 that bomb threats have increased. In addition, there is an increase in anti-Semitic assaults on college campuses. As a result, the league has updated some of its resources to assist synagogues with their security plans as they seek to secure places of wor­ship, religious artifacts, and those attending services.</p><p>The Muslim community is not exempt from crime, and has reported increases in incidents of violence and vandalism, most of which are suspected to be committed by homegrown extremists in response to terror acts committed across the globe. In the Middle East, extremists often target more moderate Muslims as they seek to impose Sharia Law.</p><p>Houses of worship around the world are faced with various challenges as they try to secure their facilities, people, and programs with limited budgets and resources. A congregation of 1,000 will have some of the same challenges as a congregation of 100, but it will have more resources. Smaller congregations may not face the same complexities as larger organizations but they may still encounter violence.</p><p>For example, when 21-year-old Dylann Roof entered the Emmanuel African Methodist Episcopal Church in Charleston, South Carolina, on June 17, 2015, only 12 parishioners were present.</p><p>Every church throughout the world has the same goal: to provide a safe place to worship. We can implement interior and exterior controls and follow best practices to prevent many types of crimes. However, nothing can protect houses of worship from a bombing except denied access.​</p><h4>Bombings in the United States</h4><p>The most notorious church bombing in the United States occurred in September 1963 in Birmingham, Alabama, at the Sixteenth Street Baptist Church. A bomb exploded in the building, killing four African-American girls during a service and injuring at least 14 others. Three former Ku Klux Klan members were eventually convicted of murder for the bombing.</p><p>Between 1970 and 2007, there were 25 terrorist attacks against religious figures or institutions in the United States; nine of the 25 attacks involved explosives or bombings, according to the National Consortium for the Study of Terrorism and Responses to Terrorism (START). Nine of those attacks targeted Jewish institutions.</p><p>The FBI also tracks hate crimes against individuals and religious institutions, with a reported 1,402 victims of anti-religious hate crimes in 2015, according to the Uniform Crime Reports: Hate Crime Statistics 2016. </p><p>Those crimes primarily targeted Jews (52 percent), Muslims (22 percent), Catholics (4 percent), and individuals of varying religious groups (4 percent).</p><p>This was an increase from figures released in 2015, when the FBI reported that there were 1,140 victims of religious hate crimes in the United States. Hate crimes, as defined by the FBI, include traditional crimes—like murder, arson, or vandalism—that are motivated by bias.</p><p>For example, in January 2012 in Rutherford, New Jersey, several Molotov cocktails and incendiary devices were thrown at a synagogue, starting a fire in the second-floor bedroom of the rabbi’s residence. This was deemed the fourth bias incident in a month against a Jewish religious institution. Other incidents included a fire that was intentionally set and graffiti at two synagogues. ​</p><h4>Bombings Suspects</h4><p>The profile of a bomber in the United States may be different from what security professionals expect. It could be a jilted spouse or lover who is seeking revenge at the end of their romantic involvement. It could be former business partners or employees looking for retribution when a business relationship goes south. It could also be the work of a terrorist—foreign or homegrown—trying to make a political statement toward a specific person or group.  </p><p>As of this writing, most bombings in the United States are carried out by an individual working alone. Further investigations after the fact generally indicate that a spouse or family member had suspicions about the bomber’s behaviors, but did not seek help. </p><p>While security cannot anticipate the moves of a bomber, there are a few behavioral characteristics that could be considered suspicious.</p><div><span style="white-space:pre;"> </span></div><p>• Nervousness, including sweating, tunnel vision, and repeated, inappropriate prayers or muttering, as well as repeated entrances and exits from the building.</p><p>• Inappropriate, oversized, and loose-fitting clothing.</p><p>• Concealed hands, such as in pockets, to hold a triggering device.</p><p>• Favoring one side or area of the body, as if wearing something unusual or uncomfortable.</p><p>• Projected angles under clothing, such as those that would indicate the individual is carrying a firearm at the waist or ankle.</p><p>• Constantly adjusting clothing.</p><p>• Carrying packages or backpacks.</p><p>When this kind of behavior is observed, the “See Something, Say Something” principle is applicable. However, at religious institutions, if at all possible, congregants should be encouraged to leave the area.</p><p>Reports should be made to a law enforcement officer if possible. If law enforcement is not available at the location, individuals have the option to investigate on their own, report suspicions to church staff, or do nothing. In these instances, security professionals should trust their instincts.​</p><h4>PREVENTING A BOMBING</h4><p>The attacker could use a mail bomb or a placed bomb. Placed bombs, like the one used in the Boston Marathon bombing, injure indiscriminately and can be concealed in boxes, backpacks, briefcases, and purses. </p><p>There is no certain way to prepare for a bombing. As witnessed with the Boston Marathon bombing, members of the public are vulnerable at events and in crowds. Someone can enter a facility with intent to do harm and there is little security can do to stop him or her.</p><p>But, just as Boston responded quickly with paramedics and doctors, houses of worship need to be prepared with security and safety measures. </p><p>Places of worship need video cameras for successful identification of attackers. Congregants must be diligent in their observations of attendees who might intend harm. They also need to be observant of behavior that is unusual, such as a person who attempts to enter a church after the service had ended, as the second Palm Sunday bomber did. </p><p>As a precautionary step, religious institutions’ office personnel should be trained about mail bombs and suspicious packages, such as the pipe bomb that was mailed to a Lakewood Church in Houston, Texas, in January 1990.</p><p>The pastor’s daughter, director of ministries for the church, opened the package addressed to her father, suffering minor burns and bruises, according to The New York Times.</p><p>Access control is key to a secure environment, as the Tanta, Egypt, bombing shows. Someone was able to place a bomb inside the sanctuary, showing that someone had access to the facility prior to the start of the service.</p><p>Staff should also be advised to keep offices and desks locked when they are not in use to avoid creating hiding places for explosives. Staff should also ensure that utility janitorial closets, boiler rooms, mail rooms, computer offices, switchboards, and elevator control rooms are locked at all times.</p><p>Additionally, trash receptacles—especially dumpsters—should be locked and located far from the building. The area around the receptacles should also be free of debris. As demonstrated by the Oklahoma City bombing in 1995, cars and trucks should be required to maintain a safe setback from the facility. </p><p>A security plan should also include an evacuation plan for the facility with a designated meeting point to ensure that everyone is safe, should it be used. Places of worship should also be equipped with medically trained staff, first aid kits, and ambulatory services to quickly respond, should an attack take place.</p><p>There are no easy answers to this disturbing dilemma. There is no easy way to predict when or where a bombing may occur. There are even fewer ways to prevent it. As security leaders, we must be diligent in our observations of human behavior. </p><p><em>Paula L. Ratliff is the coauthor of </em>Crime Prevention for Houses of Worship<em>, the first book published on the topic in 2001 and the author of the second edition. She began researching crimes against religious facilities in the early 1990s and has written several articles on crime prevention for places of worship. She is a member of ASIS International and a graduate of the University of Louisville.        ​</em></p>GP0|#cd529cb2-129a-4422-a2d3-73680b0014d8;L0|#0cd529cb2-129a-4422-a2d3-73680b0014d8|Physical Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465