Museums and Cultural Properties

 

 

https://sm.asisonline.org/Pages/October-2018-Industry-News.aspxOctober 2018 Industry NewsGP0|#3795b40d-c591-4b06-959c-9e277b38585e;L0|#03795b40d-c591-4b06-959c-9e277b38585e|Security by Industry;GTSet|#8accba12-4830-47cd-9299-2b34a43444652018-10-01T04:00:00Zhttps://adminsm.asisonline.org/pages/flora-szatkowski.aspx, Flora Szatkowski<h4>​World-Class Security</h4><p>Ion Oblemenco Stadium in the Romanian city of Craiova is home to football club CS Universitatea Craiova and has more than 30,000 seats. The futuristic stadium was built to host international and premium league matches, requiring a security solution that meets European football championship standards for safety.</p><p>Craiova officials chose Bosch to implement a complete security solution. Bosch experts installed a fire and safety solution with four fire panels and 1,500 detectors. The sound system includes Electro-Voice Pro Sound speakers for music and commentary, Dynacord Promatrix for evacuation, Bosch loudspeakers for interior sound, and a conference and interpretation system for the pressroom.</p><p>The fully integrated video security system supports 211 cameras, centrally managed via the Bosch Video Management System. Video is monitored by operator personnel and members of Romania’s police during matches and stored on two Bosch DIVAR IP 7000 network video recording units.​</p><h4>PARTNERSHIPS AND DEALS</h4><p>Panda Restaurant Group, Inc., deployed 3xLOGIC VIGIL Trends Business Intelligence software to its North American locations. Interface Security Systems is the integrator and project manager.</p><p>Acronis formed a new technology partnership with Arsenal Football Club to protect data and the club’s IT infrastructure.</p><p>Noodigs Realty Services selected Acuant AssureID for identity verification.</p><p>AEON Credit Service and Fujitsu are testing a cardless payment system using Fujitsu’s palm vein biometric authentication technology.</p><p>Altronix added Paxton Access to its portfolio of Trove Access and Power Integration Solutions.</p><p>Certiport and EC-Council will launch the EC-Council Associate Series certification exams, practice tests, and curriculum.</p><p>Chubb partnered with DynaRisk to offer a cyber loss mitigation service to its Cyber Enterprise Risk Management policyholders in the United Kingdom and Ireland.</p><p>Comodo Cybersecurity announced that Western New Mexico University has chosen Comodo Advanced Endpoint Protection to secure IT assets.</p><p>Country Kitchen selected DTT as its preferred vendor for loss prevention services. </p><p>Endace and Ixia signed a technology partnership agreement to focus on complementary and integrated network solutions.</p><p>GS1 announced a partnership with Optiseller to enable retailers to check their Global Trade Item Numbers (GTINs) across all eBay listings.</p><p>GTL and Sentinel Offender Services will collaborate on advance­ments in offender tracking and monitoring technology.</p><p>Ilitch Holdings, Inc., selected Avigilon Corporation, a Motorola Solutions company, to enhance customer experience and safety at its Detroit properties, including Little Caesars Arena, Comerica Park, offices, and retailers. Identify, Inc., installed the video solution.</p><p>Keepit A/S is collaborating with Veritas Technologies LLC to provide data protection for the Veritas SaaS Backup solution.</p><p>Legrand announced that its On-Q Digital Audio System has been integrated with Alarm.com.</p><p>N8 Identity is now a Microsoft Azure Silver Partner.</p><p>Caesars Entertainment EMEA deployed Pivot3 HCI to protect critical video surveillance data.</p><p>TITUS and Virtru will partner to deliver integrated data security and compliance offerings for enterprises of all sizes.</p><h4>GOVERNMENT CONTRACTS</h4><p>Axon announced that the Honolulu Police Department will deploy 1,200 Axon Body 2 cameras with unlimited storage on Evidence.com.</p><p>Attenti electronic monitoring solutions were selected for an additional term by the Florida Department of Corrections.</p><p>CGI will enhance the cybersecurity posture and risk awareness of federal government agencies participating in a U.S. Department of Homeland Security (DHS) program.</p><p>Dragos, Inc., was selected by the U.S. National Cybersecurity Center of Excellence as a collaborator on the Energy Sector Asset Management Project.</p><p>Edesix recently won the contract to supply body-worn cameras to Staffordshire Fire and Rescue in the United Kingdom.</p><p>Argentina selected HID Global to upgrade its ICAO electronic passport. </p><p>KT Corporation completed a new digital system for national identification in Tanzania.</p><p>Park Assist has a parking guidance system contract for San Francisco International Airport. </p><p>The Mission and Installation Contracting Command at Fort Gordon, Georgia, awarded a contract for cybersecurity training to root9B, LLC.</p><p>Salient CRGT, Inc., was awarded a task order to provide enterprise IT support to the U.S. Defense Technology Security Administration.</p><p>Trust Automation Inc. worked with DHS to obtain license to the Autonomic Intelligent Cyber Sensor technology developed by Idaho National Laboratories.</p><p>Unisys Corporation was selected by the U.S. Navy to develop, operate, and manage software used for secure messaging.</p><p>The Vermont State Department of Motor Vehicles selected Valid USA, Inc., to provide secure driver’s licenses and identification cards. </p><p>The Public Safety Information Sharing and Analysis Organization is adopting the VirnetX Gabriel Collaboration Suite to facilitate secure communications with its member network.</p><p>The Ministry of Home Affairs of the People’s Republic of Bangladesh commissioned Veridos to supply and implement electronic passports and border control systems.​</p><h4>AWARDS AND CERTIFICATIONS</h4><p>Avigilon video systems and access control software received SAFETY Act designation as approved technologies from the DHS. </p><p>Coalfire received the Employer Support of the Guard and Reserve Pro Patria Award from the U.S. Department of Defense.</p><p>Dahua Technology USA announced that its 2MP AI Network Box Camera won the 2018 ESX Innovation Award in the video analytics category.</p><p>ECI won the Best Multi-Layer SDN Controller award for its Muse software at NGON 2018.</p><p>Evive Disaster Recovery, Production Network, and User Acceptance Testing applications earned Certified status for information security by HITRUST.</p><p>Illumio Adaptive Security Platform is compliant with the Federal Information Processing Standard (FIPS) 140-2 Level 1 security certification and is in the evaluation stage for Common Criteria certification. </p><p>Italtel announced that its Brazil team won the Technical Readiness Brazil award from Cisco.</p><p>ONVIF announced the winner of its Open Source Spotlight Challenge: CAM X, submitted by Liqiao Ying, offers an object detection system that uses blockchain solutions for storing information obtained from ONVIF cameras. </p><p>Persistent Systems, LLC, announced that its MPU5 mobile ad hoc networking radio received a Level 2 FIPS 140-2 security validation. </p><p>Senstar Symphony received Lenel factory certification and joined the Lenel OpenAccess Alliance Program.​</p><h4>ANNOUNCEMENTS</h4><p>ADME, Inc., parent company of Apollo Security Access Control, created ApolloEM, a new division for sales and support for its software OEM and integration partners. </p><p>Arecont Vision was acquired by Costar Technologies, Inc.</p><p>ASSA ABLOY is acquiring Swiss company Planet GDZ and Chicago-based Door Systems.</p><p>Boon Edam Inc. launched interactive troubleshooting guides for service technicians in the Americas.</p><p>The Brand Safety Institute was launched to advance brand protection through research, education, and professional certification. </p><p>CannaGuard Security is offering franchising opportunities for providing compliant security systems to licensed cannabis growers and retailers.</p><p>CyberInt, in cooperation with Check Point Software Technologies, led Brazilian authorities to cybercriminal Douglas Arrial, who created a phishing kit to sell on the Dark Web.</p><p>Edesix opened a U.S. office in New Jer­sey that will house both U.S. and U.K. staff.</p><p>ExteNet Systems joined the Safer Buildings Coalition to help set standards for in-building public safety wireless communications. </p><p>The Nevada Institute for Autonomous Systems launched the Nevada Drone Center of Excellence for Public Safety to reduce air hazards from drone incursions as drones enter the commercial air traffic system. </p><p>Nice S.p.A. acquired FIBARO.</p><p>RealNetworks, Inc., announced the free and immediate availability of SAFR for K-12, an AI and machine learning based facial recognition solution to help enhance safety in K-12 schools in the United States and Canada. </p><p>Red Hawk Fire & Security, LLC., purchased Security and Data Technologies, Inc., to reach customers in Philadelphia, eastern Pennsylvania, parts of New Jersey, and Delaware.</p><p>Safe-T acquired the intellectual property and marks of CyKick Labs, Ltd.</p><p>Securiosity is a new weekly cyber­security podcast from Scoop News Group.</p><p>SecurityScorecard investigated the top 15 CISOs and their programs and created a downloadable report.</p><p>Sonitrol of Lexington and Bates Security joined with 3xLOGIC to upgrade security for The Nest Center for Women, Children, and Families in Lexington, Kentucky.</p><p>The Streaming Video Alliance published a document on forensic watermarking for streaming media.</p><p>Structured Innovations merged with Legacy Marketing, a manufacturers’ representative agency in the Great Lakes region.</p><p>Summit Companies purchased the Michigan branch offices of Indianapolis-based Koorsen Fire & Security, Inc.</p><p>Threat Sketch released Malicious IT Employee: A Survival Guide, a white paper addressing internal threats. </p><p>Thycotic released a free Incident Response Policy Template, which outlines proactive steps companies can take to build resilience and be prepared to respond to a cyber incident.</p>

Museums and Cultural Properties

 

 

https://sm.asisonline.org/Pages/October-2018-Industry-News.aspx2018-10-01T04:00:00ZOctober 2018 Industry News
https://sm.asisonline.org/Pages/Open-Doors,-Secure-Spaces.aspx2018-09-01T04:00:00ZOpen Doors, Secure Spaces
https://sm.asisonline.org/Pages/November-2017-Industry-News.aspx2017-11-01T04:00:00ZNovember 2017 Industry News
https://sm.asisonline.org/Pages/Safety-in-Shared-Spaces.aspx2017-09-01T04:00:00ZSafety in Shared Spaces
https://sm.asisonline.org/Pages/Protecting-Fine-Art-and-Other-Industry-News.aspx2017-09-01T04:00:00ZProtecting Fine Art and Other Industry News
https://sm.asisonline.org/Pages/Securing-Sacred-Spaces.aspx2017-08-01T04:00:00ZSecuring Sacred Spaces
https://sm.asisonline.org/Pages/Javits-Embraces-High-Tech-Hospitality.aspx2017-08-01T04:00:00ZJavits Embraces High-Tech Hospitality
https://sm.asisonline.org/Pages/UN-MUSEO-DEL-MUNDO-Y-PARA-EL-MUNDO.aspx2017-06-03T04:00:00ZUN MUSEO DEL MUNDO Y PARA EL MUNDO
https://sm.asisonline.org/Pages/Communal-Protection.aspx2017-04-01T04:00:00ZCommunal Protection
https://sm.asisonline.org/Pages/Surveillance-is-Instrumental.aspx2017-02-01T05:00:00ZSurveillance is Instrumental
https://sm.asisonline.org/Pages/A-Museum-of-the-World-and-for-the-World.aspx2017-01-01T05:00:00ZA Museum of the World and for the World
https://sm.asisonline.org/Pages/Culture-in-Crisis.aspx2016-11-01T04:00:00ZCulture in Crisis
https://sm.asisonline.org/Pages/Soft-Target-Trends.aspx2016-09-01T04:00:00ZSoft Target Trends
https://sm.asisonline.org/Pages/A-New-Mandate-for-the-Modern-Library.aspx2016-07-01T04:00:00ZA New Mandate for the Modern Library
https://sm.asisonline.org/Pages/Book-Review---Religions-Institutions.aspx2016-06-01T04:00:00ZBook Review: Keeping Religious Institutions Secure
https://sm.asisonline.org/Pages/All-Secure-on-Set.aspx2016-06-01T04:00:00ZAll Secure on Set
https://sm.asisonline.org/Pages/Book-Review---Library-Security.aspx2016-06-01T04:00:00ZBook Review: Library Security
https://sm.asisonline.org/Pages/Protection-on-Display.aspx2016-05-01T04:00:00ZProtection on Display
https://sm.asisonline.org/Pages/Smithsonian-To-Host-Conference-on-Cultural-Property-Protection.aspx2016-04-26T04:00:00ZSmithsonian to Host Conference on Cultural Property Protection
https://sm.asisonline.org/Pages/IFCPP-Symposium-Focuses-on-Collaboration.aspx2015-11-04T05:00:00ZIFCPP Symposium Focuses on Collaboration

 You May Also Like...

 

 

https://sm.asisonline.org/Pages/Securing-Sacred-Spaces.aspxSecuring Sacred Spaces<p>​Christians were gathered in churches around the world to celebrate Palm Sunday on April 9, 2017, marking the beginning of Holy Week. During this time of year, many Christians share in a renewal of their faith as they remember the pilgrimage that Jesus took before his death and resurrection.</p><p>At Saint George Church in Tanta, Egypt, the church was full. Scriptures were read. Songs were sung. Somewhere between welcome and amen, a bomb exploded—killing at least 25 people and wounding dozens of parishioners and members of the clergy.</p><p>Investigators reportedly believe, according to CNN and other media reports, that someone had placed an explosive device under a seat in the prayer hall. Exactly how the bomb was detonated is still unknown.</p><p>As emergency personnel were working to secure the scene at Saint George, a second attack occurred just outside of St. Mark Coptic Orthodox Cathedral in Alexandria, Egypt. </p><p>The church service had just ended and people were leaving the building when a man arrived wearing a zipped-up jacket with one hand in his pocket. A security officer denied the visitor access to the cathedral and referred him to the metal detector outside the church’s entrance.</p><p>The man can be seen on video talking with the officer and then walking towards the metal detector. He walked a few steps past it, turned, entered the metal detector frame, and detonated a bomb, killing at least 11 people—including three police officers—and wounding 35 others. The actions of the security officer and the use of the metal detector saved numerous lives that day.</p><p>Between the two attacks, 43 people died and approximately 100 were injured. ISIS claimed responsibility for both attacks and warned that there would be more attacks in the future against Christians, police, and the military, according to CNN.</p><p>However, these attacks left many questions unanswered. Details such as how the bombers picked their targets, whether they were working together, and what advance preparations they had made all remained a mystery.</p><p>Did the bombers choose these congregations based on the size of the facilities? It appears that the attackers selected a day in which they knew more people would be present at the churches, possibly in an attempt to create more terror and politicize them as an assault on Christianity. A similar attack at a Christian church in Alexandria on New Year’s Day in 2011 killed 21 and injured 96, according to The Telegraph. Christians have been targeted in several attacks in Egypt, which explains the enhanced security precautions in place on Palm Sunday in 2017.</p><p>These bombings prompt several questions. What can be done to prevent an attack from occurring in our respective places of worship? Will it become customary to have a bomb-sniffing dog search the premises? Will metal detectors become a common feature outside religious and cultural properties?</p><p>“There is no commonly accepted or developed profile of a suicide bomber,” the Anti-Defamation League (ADL) wrote in Protecting Your Jewish Institution in 2015. “The only characteristic accepted by experts is that the overwhelming majority are prepared to die in the service of their cause.”</p><p>Security leaders are faced with the challenge of preventing an act that someone else is determined to achieve, even in the face of death. </p><p>We have known for years that the Islamic State wants to destroy Western culture, and that they plan to attack various locations, including houses of worship, bus stops, airports, hospitals, schools, shopping venues, concert halls, night clubs, parades, sporting events, and other places with large gatherings of people. Additionally, we are experiencing more attacks by individual terrorists with various affiliations, as seen in recent attacks using vehicles in Paris and London. </p><p>The ADL reported in January 2017 that bomb threats have increased. In addition, there is an increase in anti-Semitic assaults on college campuses. As a result, the league has updated some of its resources to assist synagogues with their security plans as they seek to secure places of wor­ship, religious artifacts, and those attending services.</p><p>The Muslim community is not exempt from crime, and has reported increases in incidents of violence and vandalism, most of which are suspected to be committed by homegrown extremists in response to terror acts committed across the globe. In the Middle East, extremists often target more moderate Muslims as they seek to impose Sharia Law.</p><p>Houses of worship around the world are faced with various challenges as they try to secure their facilities, people, and programs with limited budgets and resources. A congregation of 1,000 will have some of the same challenges as a congregation of 100, but it will have more resources. Smaller congregations may not face the same complexities as larger organizations but they may still encounter violence.</p><p>For example, when 21-year-old Dylann Roof entered the Emmanuel African Methodist Episcopal Church in Charleston, South Carolina, on June 17, 2015, only 12 parishioners were present.</p><p>Every church throughout the world has the same goal: to provide a safe place to worship. We can implement interior and exterior controls and follow best practices to prevent many types of crimes. However, nothing can protect houses of worship from a bombing except denied access.​</p><h4>Bombings in the United States</h4><p>The most notorious church bombing in the United States occurred in September 1963 in Birmingham, Alabama, at the Sixteenth Street Baptist Church. A bomb exploded in the building, killing four African-American girls during a service and injuring at least 14 others. Three former Ku Klux Klan members were eventually convicted of murder for the bombing.</p><p>Between 1970 and 2007, there were 25 terrorist attacks against religious figures or institutions in the United States; nine of the 25 attacks involved explosives or bombings, according to the National Consortium for the Study of Terrorism and Responses to Terrorism (START). Nine of those attacks targeted Jewish institutions.</p><p>The FBI also tracks hate crimes against individuals and religious institutions, with a reported 1,402 victims of anti-religious hate crimes in 2015, according to the Uniform Crime Reports: Hate Crime Statistics 2016. </p><p>Those crimes primarily targeted Jews (52 percent), Muslims (22 percent), Catholics (4 percent), and individuals of varying religious groups (4 percent).</p><p>This was an increase from figures released in 2015, when the FBI reported that there were 1,140 victims of religious hate crimes in the United States. Hate crimes, as defined by the FBI, include traditional crimes—like murder, arson, or vandalism—that are motivated by bias.</p><p>For example, in January 2012 in Rutherford, New Jersey, several Molotov cocktails and incendiary devices were thrown at a synagogue, starting a fire in the second-floor bedroom of the rabbi’s residence. This was deemed the fourth bias incident in a month against a Jewish religious institution. Other incidents included a fire that was intentionally set and graffiti at two synagogues. ​</p><h4>Bombings Suspects</h4><p>The profile of a bomber in the United States may be different from what security professionals expect. It could be a jilted spouse or lover who is seeking revenge at the end of their romantic involvement. It could be former business partners or employees looking for retribution when a business relationship goes south. It could also be the work of a terrorist—foreign or homegrown—trying to make a political statement toward a specific person or group.  </p><p>As of this writing, most bombings in the United States are carried out by an individual working alone. Further investigations after the fact generally indicate that a spouse or family member had suspicions about the bomber’s behaviors, but did not seek help. </p><p>While security cannot anticipate the moves of a bomber, there are a few behavioral characteristics that could be considered suspicious.</p><div><span style="white-space:pre;"> </span></div><p>• Nervousness, including sweating, tunnel vision, and repeated, inappropriate prayers or muttering, as well as repeated entrances and exits from the building.</p><p>• Inappropriate, oversized, and loose-fitting clothing.</p><p>• Concealed hands, such as in pockets, to hold a triggering device.</p><p>• Favoring one side or area of the body, as if wearing something unusual or uncomfortable.</p><p>• Projected angles under clothing, such as those that would indicate the individual is carrying a firearm at the waist or ankle.</p><p>• Constantly adjusting clothing.</p><p>• Carrying packages or backpacks.</p><p>When this kind of behavior is observed, the “See Something, Say Something” principle is applicable. However, at religious institutions, if at all possible, congregants should be encouraged to leave the area.</p><p>Reports should be made to a law enforcement officer if possible. If law enforcement is not available at the location, individuals have the option to investigate on their own, report suspicions to church staff, or do nothing. In these instances, security professionals should trust their instincts.​</p><h4>PREVENTING A BOMBING</h4><p>The attacker could use a mail bomb or a placed bomb. Placed bombs, like the one used in the Boston Marathon bombing, injure indiscriminately and can be concealed in boxes, backpacks, briefcases, and purses. </p><p>There is no certain way to prepare for a bombing. As witnessed with the Boston Marathon bombing, members of the public are vulnerable at events and in crowds. Someone can enter a facility with intent to do harm and there is little security can do to stop him or her.</p><p>But, just as Boston responded quickly with paramedics and doctors, houses of worship need to be prepared with security and safety measures. </p><p>Places of worship need video cameras for successful identification of attackers. Congregants must be diligent in their observations of attendees who might intend harm. They also need to be observant of behavior that is unusual, such as a person who attempts to enter a church after the service had ended, as the second Palm Sunday bomber did. </p><p>As a precautionary step, religious institutions’ office personnel should be trained about mail bombs and suspicious packages, such as the pipe bomb that was mailed to a Lakewood Church in Houston, Texas, in January 1990.</p><p>The pastor’s daughter, director of ministries for the church, opened the package addressed to her father, suffering minor burns and bruises, according to The New York Times.</p><p>Access control is key to a secure environment, as the Tanta, Egypt, bombing shows. Someone was able to place a bomb inside the sanctuary, showing that someone had access to the facility prior to the start of the service.</p><p>Staff should also be advised to keep offices and desks locked when they are not in use to avoid creating hiding places for explosives. Staff should also ensure that utility janitorial closets, boiler rooms, mail rooms, computer offices, switchboards, and elevator control rooms are locked at all times.</p><p>Additionally, trash receptacles—especially dumpsters—should be locked and located far from the building. The area around the receptacles should also be free of debris. As demonstrated by the Oklahoma City bombing in 1995, cars and trucks should be required to maintain a safe setback from the facility. </p><p>A security plan should also include an evacuation plan for the facility with a designated meeting point to ensure that everyone is safe, should it be used. Places of worship should also be equipped with medically trained staff, first aid kits, and ambulatory services to quickly respond, should an attack take place.</p><p>There are no easy answers to this disturbing dilemma. There is no easy way to predict when or where a bombing may occur. There are even fewer ways to prevent it. As security leaders, we must be diligent in our observations of human behavior. </p><p><em>Paula L. Ratliff is the coauthor of </em>Crime Prevention for Houses of Worship<em>, the first book published on the topic in 2001 and the author of the second edition. She began researching crimes against religious facilities in the early 1990s and has written several articles on crime prevention for places of worship. She is a member of ASIS International and a graduate of the University of Louisville.        ​</em></p>GP0|#cd529cb2-129a-4422-a2d3-73680b0014d8;L0|#0cd529cb2-129a-4422-a2d3-73680b0014d8|Physical Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465
https://sm.asisonline.org/Pages/house-worship-security-and-training-tips.aspxHouse of Worship Security and Training Tips<div class="body"> <p>Last year’s shootings at a Colorado mission and megachurch are a reminder that even houses of worship must address security.</p> <p>One major initiative is the Secure Community Network, or SCN (pronounced “scan”), organized by major American Jewish leadership organizations to bring Jewish community security under one group. SCN’s Web site is packed with security resources and advice for all types of houses of worship. ASIS International also has church security guidelines, which include advice on physical security and on hiring security personnel.</p> <p>“The biggest void between police and security in the public is the flow of information,” says SCN’s National Director Paul Goldenberg. SCN attempts to rectify that issue by forging relationships with law enforcement.</p> <p>The group receives sensitive information on threats to the Jewish community around-the-clock, which it then disseminates to its members. Goldenberg adds that the SCN is the first nongovernmental organization to have a memorandum of understanding with the New York City Police Department.</p> <p>The group is also working with the Department of Homeland Security to coordinate its house of worship training. The most important step a house of worship can take is to train its staff to handle threatening situations and to ensure that they are able to operate any security equipment the building has, says Goldenberg, who was part of a south Florida undercover strike force for several years.</p> <p>Training is all the more important in this field given that many house of worship security force members are volunteers and may not have law enforcement backgrounds.</p> <p>Some states are requiring that volunteers get licensed or that churches hire only licensed security professionals.</p> <p>Texas, for example, requires that anyone providing volunteer security services under the title “security” be licensed by the state. That law forced Dallas megachurch The Potter’s House last year to professionalize its force, says Sean Smith, who was the security director there when he says the Texas Private Security Bureau told the church it would be fined because the volunteer security team was unlicensed.</p> <p>The church chose to contract its security to an outside company. Smith went through the state licensing program and became senior account manager, with the rest of the security staff coming from the contracted company. </p> <p>“It’s just forcing us to be better,” says Smith, adding that once the church contracted its security out, its liability insurance “dropped tremendously.”</p> <p>Chuck Chadwick, of the National Association of Church Security & Safety Management (NACSSM), thinks crackdowns like the one in Texas are necessary. “Unlicensed security is rampant across the country,” he says.</p> <p>Jim Hashem, chief of staff of Kingdom Life Christian Church in Milford, Connecticut, had his all-volunteer security force trained by an outside company and licensed. Even so, says Hashem, if there is even a hint of violence, his security team is instructed to immediately call 911. The team’s job is only to manage the interim time before the police show up.</p> <p>And they avoid physical confrontation. “[We’ve] trained our people that the best way through a situation is to try to talk your way through it first,” Hashem explains. </p> <p>The Potter’s House sponsors a church security conference called STOPPED (Security Training Offering Policies, Procedure, Education, and Direction), which has brought in actors for demonstrations on how to handle an irate congregation member. That’s more typical than a shooter.  </p> <p>Smith says such comprehensive training is integral to responding effectively. “If all you’ve practiced on is what to do when the guy comes with a gun, then what do you do when the alcoholic comes, and he’s drunk?” he says, adding that “you’re going to see that a hundred times more than what happened in Colorado.”</p> <p class="MsoNormal"><!--[if !supportEmptyParas]--> <!--[endif]--></p> </div>GP0|#cd529cb2-129a-4422-a2d3-73680b0014d8;L0|#0cd529cb2-129a-4422-a2d3-73680b0014d8|Physical Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465
https://sm.asisonline.org/Pages/smaller-churches-lack-security-experts-say-005316.aspxSmaller Churches Lack Security, Experts Say<div class="body"> <span class="article_date"> <span class="date-display-single">03/10/2009</span> - </span> <p>Experts say smaller churches generally lack security plans that could help identify an attacker beforehand or minimize the damage of an attack, <a href="http://www.google.com/hostednews/ap/article/ALeqM5jl7sa7F5lsTzkPKYB5AvnlLppzTgD96R21IG0" target="_blank">the Associated Press reports</a>. </p> <p>The new emphasis comes after the Reverand Fred Winters was gunned down Sunday morning in Maryville, Illinois, while saying mass. The shooter, 27-year-old Jeff Sedlacek, has been charged with Winters' murder as well as aggravated assault for stab wounds inflicted on two parishoners who subdued him after the shooting.</p> <p>The fact that the First Baptist Church had initiated a security and emergency plan six months before the shooting shouldn't dissuade other churches from planning ahead, the church's associate pastor Mark Jones told the AP.</p> <p>Televangelist churches and megachurches with attendance levels around 5,000, however, generally have coordinated security plans and have hired undercover security guards to protect high-profile preachers, according to Dave Travis, managing director of the <a href="http://www.leadnet.org/about_OurMission.asp" target="_blank">Leadership Network</a>,  which helps church leaders grow their churches. </p> <p>Jeffrey Hawkins, executive director of the <a href="http://www.christiansecuritynetwork.org/" target="_blank">Christian Security Network</a>, says churches are "soft targets." A survey conducted last year after a church shooting in Knoxville, Tennesee, showed that 75 percent of churches do not have a security plan, while polling of 250 churches conducted by his organization showed a third have already experienced a security incident this year. </p> <p>The Christian Security Network advises churches take an all-hazards approach to their security plan, accounting for everything from low-level crime to natural disasters.</p> <p>And it's not only Christian houses of worship that are taking precautions.</p> <p>Because of anti-semiticism and attacks in Israel, Jewish organizations have long been security conscious.</p> <p>"You don't want iron gates and armed guards, but houses of worship do need to train staff, congregants and ushers to identify and respond to such threats as an emotionally disturbed person," said Paul Goldenberg, national director of the <a href="http://www.scnus.org/index.aspx?page=1">Secure Community Network</a> (SCN), a Jewish security organization. </p> <p>According to <em>Security Management's </em>Laura Spadanuta last April, <a href="http://www.securitymanagement.com/article/house-worship-security-and-training-tips" target="_blank">SCN has been an innovative leader</a> in securing Jewish houses of worship through public-private partnerships. </p> <p class="rteindent1">The group receives sensitive information on threats to the Jewish community around-the-clock, which it then disseminates to its members. Goldenberg adds that the SCN is the first nongovernmental organization to have a memorandum of understanding with the New York City Police Department.</p> <p class="rteindent1">The group is also working with the Department of Homeland Security to coordinate its house of worship training. The most important step a house of worship can take is to train its staff to handle threatening situations and to ensure that they are able to operate any security equipment the building has, says Goldenberg, who was part of a south Florida undercover strike force for several years.</p> <p>The Council on American-Islamic Relations (CAIR), a Muslim civil rights organization, has also published security guidelines for mosques and worshippers because of an increase in assaults after 9-11. (Click <a href="http://pa.cair.com/index.php?Page=safetykit&Side=crights" target="_blank">here </a>for CAIR-Pennsylvania's security guide.) </p> <p>For more on protecting houses of worship, see ASIS International's " <a href="http://www.asisonline.org/newsroom/surveys/HousesofWorship.pdf" target="_blank">Securing Houses of Worship</a>." </p> </div>GP0|#3795b40d-c591-4b06-959c-9e277b38585e;L0|#03795b40d-c591-4b06-959c-9e277b38585e|Security by Industry;GTSet|#8accba12-4830-47cd-9299-2b34a4344465