Museums and Cultural Properties

 

 

https://sm.asisonline.org/Pages/November-2017-Industry-News.aspxNovember 2017 Industry NewsGP0|#3795b40d-c591-4b06-959c-9e277b38585e;L0|#03795b40d-c591-4b06-959c-9e277b38585e|Security by Industry;GTSet|#8accba12-4830-47cd-9299-2b34a43444652017-11-01T04:00:00Zhttps://adminsm.asisonline.org/pages/flora-szatkowski.aspx, Flora Szatkowski<h4>​VIKINGS STADIUM OPENS DOORS</h4><p>The new U.S. Bank Stadium—home of the Minnesota Vikings—hosted more than 66,000 fans at the first Monday night game of the 2017 season. Completed last year, the 1.5 million-square-foot stadium campus is flexible enough to serve as a true multipurpose stadium that can host football, soccer, baseball, basketball, motorsports, major concerts, and other events.</p><p>ASSA ABLOY was tapped to provide more than 1,500 doors and openings for the state-of-the-art stadium. A truncated construction timeframe provided the impetus for using preassembled openings. The ready-to-install openings improved onsite management of multiple components and saved time through a streamlined installation process.</p><p>The openings included products from ASSA ABLOY Architectural Door Accessories, including McKinney hinges, Pemko accessories, and Rockwood door trim, as well as Curries hollow metal doors and frames; Sargent locks, exit devices, and door closers; Medeco high-security cylinders and keys; and Securitron access control components.​</p><h4>PARTNERSHIPS AND DEALS</h4><p>Dahua Technology is partnering with Anixter International to market Dahua products throughout the United States and Canada.</p><p>Anomali and NSS Labs, Inc., announced a strategic partnership that provides enterprise customers with a unified view of unmitigated threats and empirical data regarding the effectiveness of security controls.</p><p>Bold Technologies completed the integration of ManitouNEO with innoVi from Agent Video Intelligence to provide monitoring centers with a video intrusion system. </p><p>Boon Edam product data and customized specifications for the Americas are available through the ARCOM software platform to architects, engineers, and design professionals.</p><p>Brady announced that its Brand Protection business partnered with Kezzler and Honeywell to bring product authentication labeling and tracking to Genetron 134, a refrigerant. </p><p>ByteGrid Holdings LLC announced an agreement with Empowerment through Technology and Education to provide greater compliance and control of hosted business-critical data.</p><p>Baltimore Cyber Range LLC and Cyberbit Ltd. announced the opening of the new Baltimore Cyber Range cybersecurity training and simulation center in Baltimore, Maryland.</p><p>Camden Door Controls retained manufacturer’s representative JClemente & Associates to service its southern California territory.</p><p>Cellebrite is joining the National Center for Missing & Exploited Children and Project VIC in the global fight against child exploitation. </p><p>Claroty and Schneider Electric are partnering to address safety and cybersecurity challenges for the industrial infrastructure sector.</p><p>Conformance Technologies announced that Pivotal Payments selected its solutions to enhance business effectiveness and protection of its North American merchant portfolio. </p><p>The addition of deverus, Inc., background checking software to the iCIMS partner ecosystem will provide cost savings and improved speed to customers.</p><p>EventTracker announced that its SIEM platform was implemented at OneBlood, Inc.</p><p>Exabeam and ThreatConnect, Inc., announced a product integration designed to improve overall cybersecurity and incident response.</p><p>EyeLock LLC entered into a partnership with CSD (Central Security Distribution) to deliver EyeLock’s product suite in Australia. EyeLock is also developing iris authentication solutions to work with Qualcomm Mobile Security. </p><p>Farpointe Data helped Secure Our City, Inc., improve security access for a parking garage.</p><p>Galaxy Control Systems completed an integration with IP-enabled solutions from ASSA ABLOY. </p><p>Genetec and Alutel Mobility partnered to offer extended access control capabilities to open areas without having to rely on physical readers or installations.</p><p>Hikvision Canada Inc., provided cameras for the JPPS Children’s Centre in Montreal that were installed by integrator Alarme Sentinelle. Petite Echelle Centre in Montreal worked with integrator Intelgest to upgrade its security system with Hikvision.</p><p>Honeywell and eDist Security expanded their relationship around the Genesis Series Cable product line. </p><p>Huttig Building Products selected TierPoint to provide colocation and data center migration services.</p><p>Imagination Technologies and Sierraware are collaborating to make Sierraware’s SierraTEE available for devices based on Imagination’s MIPS CPUs.</p><p>ISONAS Inc. announced that Transportation Impact selected the ISONAS Pure IP access control solution to secure its corporate headquarters.</p><p>Johnson Controls announced that its American Dynamics victor Video Management Software integrates with the Guardian Indoor Active Shooter Detection System from Shooter Detection Systems.</p><p>Karamba Security joined the Automotive Grade Linux (AGL) Project and The Linux Foundation to help develop its cybersecurity best practices.</p><p>The Legrand On-Q Digital Audio System has been integrated with Alarm.com.</p><p>Netwrix Corporation announced that its Netwrix Auditor empowers Guadalupe Valley Electric Cooperative to minimize insider threats and improve database security.</p><p>OnSSI and Seagate teamed up to provide a robust recording solution designed for more efficient system expansion and scalability.</p><p>Ever and Pinn formed a technology partnership to integrate Ever’s facial recognition into Pinn’s secure attribution platform.</p><p>Enterprise Performance Consulting joined the PSA Business Solutions Program to offer business consulting and operations team training programs to PSA integrators. </p><p>Point Blank Enterprises and Special Ops Bunker made an exclusive global marketing agreement to offer Special Ops Bunker products through the Point Blank global network.</p><p>Golden Lion Marbella, a casino in Panama, selected Qognify VisionHub to upgrade its security, safety, and operations.</p><p>RapidSOS is partnering with WiseWear, Fusar, Kairos, Lumenus, and ROAR for Good to provide a rich data link to 911 from wearable products, so users can connect to 911 by pushing a panic button or by detection from a wearable device during a crash or medical emergency.</p><p>Sky and Cisco have a multi-year digital security agreement to support the expansion of Sky video services across any screen.</p><p>Suprema announced that its BioSign mobile fingerprint authentication algorithm was selected by Samsung for two smartphone models.</p><p>Traka UK joined forces with Edesix, to ensure that equipment used across the U.K. Prison Service is safely stored and managed.</p><p>TruTag Technologies’ signature authentication solution will be used by Hongyang Biotechnology Co. to protect the livestock supply chain from counterfeiting and diversion.</p><p>Visual Management Systems Ltd. was invited to join the Airports Centre of Excellence, which aims to improve the passenger experience.</p><p>Vodafone Group joined the prpl Foundation to focus on enabling the security and interoperability of embedded devices.</p><p>VTT Technical Research Centre of Finland Ltd. and ITS Russia signed a partnership agreement concerning the development of intelligent transport systems for border crossings. </p><p>Watermark Risk Management International, LLC, and TEAM Software, Inc., created a strategic partnership where Watermark will be a preferred provider of consulting services on TEAM software solutions.</p><p>WestJet Airlines realized improved efficiency and streamlined communication by partnering with Send Word Now.​</p><h4>GOVERNMENT CONTRACTS</h4><p>AirMap and the Kansas Department of Transportation will deploy Unmanned Traffic Management technology across Kansas to support the growth of the state’s drone economy and ensure safer skies.</p><p>ATS Armor LLC received an order from Miami-Dade Police Department for 1,500 active shooter kits, enough for every patrol car.</p><p>Canon U.S.A., Inc., received two BLI PaceSetter Awards in the Document Imaging Security and Mobile Print categories from Keypoint Intelligence.</p><p>Cardiac Science announced that Boston Public Schools will purchase Powerheart G5 automated external defibrillators.</p><p>The State of Louisiana is working with CA Technologies to enable citizens to securely access information across government services through the Louisiana Enterprise Architecture Project.</p><p>An Elbit Systems of America Integrated Fixed Tower border security system passed U.S. Customs and Border Protection systems acceptance testing.</p><p>The city of Troy, Alabama, selected Extreme Networks software-driven networking technology to provide reliable, fast, and secure connectivity across 70 locations.</p><p>FirstNet and AT&T will deliver a specialized wireless broadband network to Arizona’s public safety community.</p><p>Sherburne County Sheriff’s Office in Minnesota will use GUARDIAN RFID technology to mitigate risk and improve operational efficiency in the Sherburne County Jail. </p><p>IPVideo Corporation was selected by the San Jose Police Department to help improve and upgrade its interview recording platform. </p><p>Janus Global Operations will clear areas of Mosul, Iraq, of ISIS-placed booby traps and other explosives under an agreement with the U.S. Department of State’s Office of Weapons Removal and Abatement.</p><p>Milestone Systems completed a security surveillance solution for Goyang City in South Korea.</p><p>NEC Corporation provided a facial recognition system for South Wales Police in the United Kingdom through NEC Europe Ltd.</p><p>Scott Safety was selected to provide technology and equipment to the California Department of Forestry and Fire Protection.</p><p>Southern Linc entered into a partnership with the City of Huntsville and Madison County Alabama’s 911 dispatch center to add LTE wireless data transmission equipment to connect first responders to the new network. </p><p>Agencies, including the U.S. General Services Administration, the U.S. Joint Chiefs of Staff, and the U.S. Army, have used eSignLive from VASCO Data Security for secure and compliant electronic signing of documents using Personal Identity Verification cards or Common Access Cards.​</p><h4>AWARDS AND CERTIFICATIONS</h4><p>Atomic Data attained SOC 3 certification for the seventh year in a row from the American Institute of Certified Public Accountants.</p><p>Conduent Incorporated was awarded a U.S. patent for technology that automatically recognizes facial expressions using images from low-resolution cameras.</p><p>Consolidated Communications Holdings, Inc., achieved MEF CE 2.0 certification for carrier grade, interoperable Ethernet services. </p><p>Day & Zimmermann earned a ranking of 188 on the Forbes America’s Largest Private Companies list. It is also on the Defense News Top 100 List.</p><p>Everest Technologies received ISO 27001:2013 accreditation for its information security management system.</p><p>Fornetix, LLC, gained a U.S. patent that covers breakthrough solutions for the management of encryption keys and other security objects.</p><p>Hesco was placed in the Commander’s Choice category and recognized as a Superior Supplier to the U.S. Defense Logistics Agency.</p><p>Frost & Sullivan recognized IriTech, Inc., with the 2017 North American Frost & Sullivan Award for New Product Innovation.</p><p>StoneLock is the winner of the annual Government Security News Airport, Seaport, Border Security Awards Program for Best Facial Recognition Technology.</p><p>TEAM Software, Inc., is the winner of the Web.com 2017 Small Business of the Tournament Award for Nebraska.</p><p>Vinson Guard Service, Inc., gained national certification as a Women’s Business Enterprise by WBEC South, a regional certifying partner of the Women’s Business Enterprise National Council. </p><p>Zentera Systems, Inc., was awarded Best of Show for Best Security or Privacy Solution at IoT Evolution Expo.​</p><h4>ANNOUNCEMENTS</h4><p>AngelTrax relocated all operations into a renovated facility that serves as its new headquarters and manufacturing, inventory, and distribution centers.</p><p>ASSA ABLOY acquired SMI (Shree Mahavir Metalcraft), a leading OEM manufacturer of architectural hardware in India.</p><p>The Association of Public-Safety Communications Officials (APCO) International and IBM announced that APCO International’s new guide card software will use IBM Watson Speech-to-Text and Watson Analytics.</p><p>CEDIA and The Electronic Security Association announced a strategic reciprocal training relationship that will expand the educational opportunities for members of both associations.</p><p>Columbus State University received a grant from the U.S. National Security Agency to develop a new tool for rapid cybersecurity training and curriculum development. </p><p>EventTracker introduced the EventTracker Partner Program. </p><p>EY opened its advanced cybersecurity center in Dallas, Texas, to help clients stay ahead of emerging threats.</p><p>Lantronix, Inc., joined the Kepware IoT Alliance Program.</p><p>Marks USA, a division of NAPCO, launched a new website at marksusa.com.</p><p>NXP Semiconductors N.V. is expanding its operations in the United States, enabling its U.S. facilities to manufacture security chips for government applications.</p><p>ONVIF announced the final release of Profile A for broader access control configuration and the Release Candidate for Profile T, a draft specification with advanced streaming capabilities that adds in support for H.265 video compression.</p><p>Proficio expanded into Hong Kong to broaden its presence in the Asia-Pacific region.</p><p>PSA is working with Matterhorn Consulting to enable PSA members to hire military veterans.</p><p>Stanley Black & Decker opened a new Breakthrough Innovation center in Boston dedicated to advancing technological innovation in its security business.</p><p>The Protection Bureau awarded scholarships to 10 children of company employees.</p><p>ThetaRay opened its first U.K. office in London.</p><p>Top Notch Distributors updated its website at topnotchinc.com.</p><p>Toshiba Surveillance & IP Video Products Group launched its Safe Scholar program to help schools reduce the total cost of video surveillance system ownership. </p><p>WatchGuard Technologies acquired Datablink, a provider of advanced authentication solutions. </p><p>Webroot acquired the assets of Securecast, a security awareness training platform, and launched Webroot Security Awareness Training as a beta program.</p><p> ​</p>

Museums and Cultural Properties

 

 

https://sm.asisonline.org/Pages/November-2017-Industry-News.aspx2017-11-01T04:00:00ZNovember 2017 Industry News
https://sm.asisonline.org/Pages/Safety-in-Shared-Spaces.aspx2017-09-01T04:00:00ZSafety in Shared Spaces
https://sm.asisonline.org/Pages/Protecting-Fine-Art-and-Other-Industry-News.aspx2017-09-01T04:00:00ZProtecting Fine Art and Other Industry News
https://sm.asisonline.org/Pages/Securing-Sacred-Spaces.aspx2017-08-01T04:00:00ZSecuring Sacred Spaces
https://sm.asisonline.org/Pages/Javits-Embraces-High-Tech-Hospitality.aspx2017-08-01T04:00:00ZJavits Embraces High-Tech Hospitality
https://sm.asisonline.org/Pages/UN-MUSEO-DEL-MUNDO-Y-PARA-EL-MUNDO.aspx2017-06-03T04:00:00ZUN MUSEO DEL MUNDO Y PARA EL MUNDO
https://sm.asisonline.org/Pages/Communal-Protection.aspx2017-04-01T04:00:00ZCommunal Protection
https://sm.asisonline.org/Pages/Surveillance-is-Instrumental.aspx2017-02-01T05:00:00ZSurveillance is Instrumental
https://sm.asisonline.org/Pages/A-Museum-of-the-World-and-for-the-World.aspx2017-01-01T05:00:00ZA Museum of the World and for the World
https://sm.asisonline.org/Pages/Culture-in-Crisis.aspx2016-11-01T04:00:00ZCulture in Crisis
https://sm.asisonline.org/Pages/Soft-Target-Trends.aspx2016-09-01T04:00:00ZSoft Target Trends
https://sm.asisonline.org/Pages/A-New-Mandate-for-the-Modern-Library.aspx2016-07-01T04:00:00ZA New Mandate for the Modern Library
https://sm.asisonline.org/Pages/Book-Review---Religions-Institutions.aspx2016-06-01T04:00:00ZBook Review: Keeping Religious Institutions Secure
https://sm.asisonline.org/Pages/All-Secure-on-Set.aspx2016-06-01T04:00:00ZAll Secure on Set
https://sm.asisonline.org/Pages/Book-Review---Library-Security.aspx2016-06-01T04:00:00ZBook Review: Library Security
https://sm.asisonline.org/Pages/Protection-on-Display.aspx2016-05-01T04:00:00ZProtection on Display
https://sm.asisonline.org/Pages/Smithsonian-To-Host-Conference-on-Cultural-Property-Protection.aspx2016-04-26T04:00:00ZSmithsonian to Host Conference on Cultural Property Protection
https://sm.asisonline.org/Pages/IFCPP-Symposium-Focuses-on-Collaboration.aspx2015-11-04T05:00:00ZIFCPP Symposium Focuses on Collaboration
https://sm.asisonline.org/Pages/Artful-Engagement.aspx2015-07-06T04:00:00ZArtful Engagement
https://sm.asisonline.org/Pages/Dynamically-Securing-Cultural-Heritage.aspx2014-03-01T05:00:00ZDynamically Securing Cultural Heritage

 You May Also Like...

 

 

https://sm.asisonline.org/Pages/Securing-Sacred-Spaces.aspxSecuring Sacred Spaces<p>​Christians were gathered in churches around the world to celebrate Palm Sunday on April 9, 2017, marking the beginning of Holy Week. During this time of year, many Christians share in a renewal of their faith as they remember the pilgrimage that Jesus took before his death and resurrection.</p><p>At Saint George Church in Tanta, Egypt, the church was full. Scriptures were read. Songs were sung. Somewhere between welcome and amen, a bomb exploded—killing at least 25 people and wounding dozens of parishioners and members of the clergy.</p><p>Investigators reportedly believe, according to CNN and other media reports, that someone had placed an explosive device under a seat in the prayer hall. Exactly how the bomb was detonated is still unknown.</p><p>As emergency personnel were working to secure the scene at Saint George, a second attack occurred just outside of St. Mark Coptic Orthodox Cathedral in Alexandria, Egypt. </p><p>The church service had just ended and people were leaving the building when a man arrived wearing a zipped-up jacket with one hand in his pocket. A security officer denied the visitor access to the cathedral and referred him to the metal detector outside the church’s entrance.</p><p>The man can be seen on video talking with the officer and then walking towards the metal detector. He walked a few steps past it, turned, entered the metal detector frame, and detonated a bomb, killing at least 11 people—including three police officers—and wounding 35 others. The actions of the security officer and the use of the metal detector saved numerous lives that day.</p><p>Between the two attacks, 43 people died and approximately 100 were injured. ISIS claimed responsibility for both attacks and warned that there would be more attacks in the future against Christians, police, and the military, according to CNN.</p><p>However, these attacks left many questions unanswered. Details such as how the bombers picked their targets, whether they were working together, and what advance preparations they had made all remained a mystery.</p><p>Did the bombers choose these congregations based on the size of the facilities? It appears that the attackers selected a day in which they knew more people would be present at the churches, possibly in an attempt to create more terror and politicize them as an assault on Christianity. A similar attack at a Christian church in Alexandria on New Year’s Day in 2011 killed 21 and injured 96, according to The Telegraph. Christians have been targeted in several attacks in Egypt, which explains the enhanced security precautions in place on Palm Sunday in 2017.</p><p>These bombings prompt several questions. What can be done to prevent an attack from occurring in our respective places of worship? Will it become customary to have a bomb-sniffing dog search the premises? Will metal detectors become a common feature outside religious and cultural properties?</p><p>“There is no commonly accepted or developed profile of a suicide bomber,” the Anti-Defamation League (ADL) wrote in Protecting Your Jewish Institution in 2015. “The only characteristic accepted by experts is that the overwhelming majority are prepared to die in the service of their cause.”</p><p>Security leaders are faced with the challenge of preventing an act that someone else is determined to achieve, even in the face of death. </p><p>We have known for years that the Islamic State wants to destroy Western culture, and that they plan to attack various locations, including houses of worship, bus stops, airports, hospitals, schools, shopping venues, concert halls, night clubs, parades, sporting events, and other places with large gatherings of people. Additionally, we are experiencing more attacks by individual terrorists with various affiliations, as seen in recent attacks using vehicles in Paris and London. </p><p>The ADL reported in January 2017 that bomb threats have increased. In addition, there is an increase in anti-Semitic assaults on college campuses. As a result, the league has updated some of its resources to assist synagogues with their security plans as they seek to secure places of wor­ship, religious artifacts, and those attending services.</p><p>The Muslim community is not exempt from crime, and has reported increases in incidents of violence and vandalism, most of which are suspected to be committed by homegrown extremists in response to terror acts committed across the globe. In the Middle East, extremists often target more moderate Muslims as they seek to impose Sharia Law.</p><p>Houses of worship around the world are faced with various challenges as they try to secure their facilities, people, and programs with limited budgets and resources. A congregation of 1,000 will have some of the same challenges as a congregation of 100, but it will have more resources. Smaller congregations may not face the same complexities as larger organizations but they may still encounter violence.</p><p>For example, when 21-year-old Dylann Roof entered the Emmanuel African Methodist Episcopal Church in Charleston, South Carolina, on June 17, 2015, only 12 parishioners were present.</p><p>Every church throughout the world has the same goal: to provide a safe place to worship. We can implement interior and exterior controls and follow best practices to prevent many types of crimes. However, nothing can protect houses of worship from a bombing except denied access.​</p><h4>Bombings in the United States</h4><p>The most notorious church bombing in the United States occurred in September 1963 in Birmingham, Alabama, at the Sixteenth Street Baptist Church. A bomb exploded in the building, killing four African-American girls during a service and injuring at least 14 others. Three former Ku Klux Klan members were eventually convicted of murder for the bombing.</p><p>Between 1970 and 2007, there were 25 terrorist attacks against religious figures or institutions in the United States; nine of the 25 attacks involved explosives or bombings, according to the National Consortium for the Study of Terrorism and Responses to Terrorism (START). Nine of those attacks targeted Jewish institutions.</p><p>The FBI also tracks hate crimes against individuals and religious institutions, with a reported 1,402 victims of anti-religious hate crimes in 2015, according to the Uniform Crime Reports: Hate Crime Statistics 2016. </p><p>Those crimes primarily targeted Jews (52 percent), Muslims (22 percent), Catholics (4 percent), and individuals of varying religious groups (4 percent).</p><p>This was an increase from figures released in 2015, when the FBI reported that there were 1,140 victims of religious hate crimes in the United States. Hate crimes, as defined by the FBI, include traditional crimes—like murder, arson, or vandalism—that are motivated by bias.</p><p>For example, in January 2012 in Rutherford, New Jersey, several Molotov cocktails and incendiary devices were thrown at a synagogue, starting a fire in the second-floor bedroom of the rabbi’s residence. This was deemed the fourth bias incident in a month against a Jewish religious institution. Other incidents included a fire that was intentionally set and graffiti at two synagogues. ​</p><h4>Bombings Suspects</h4><p>The profile of a bomber in the United States may be different from what security professionals expect. It could be a jilted spouse or lover who is seeking revenge at the end of their romantic involvement. It could be former business partners or employees looking for retribution when a business relationship goes south. It could also be the work of a terrorist—foreign or homegrown—trying to make a political statement toward a specific person or group.  </p><p>As of this writing, most bombings in the United States are carried out by an individual working alone. Further investigations after the fact generally indicate that a spouse or family member had suspicions about the bomber’s behaviors, but did not seek help. </p><p>While security cannot anticipate the moves of a bomber, there are a few behavioral characteristics that could be considered suspicious.</p><div><span style="white-space:pre;"> </span></div><p>• Nervousness, including sweating, tunnel vision, and repeated, inappropriate prayers or muttering, as well as repeated entrances and exits from the building.</p><p>• Inappropriate, oversized, and loose-fitting clothing.</p><p>• Concealed hands, such as in pockets, to hold a triggering device.</p><p>• Favoring one side or area of the body, as if wearing something unusual or uncomfortable.</p><p>• Projected angles under clothing, such as those that would indicate the individual is carrying a firearm at the waist or ankle.</p><p>• Constantly adjusting clothing.</p><p>• Carrying packages or backpacks.</p><p>When this kind of behavior is observed, the “See Something, Say Something” principle is applicable. However, at religious institutions, if at all possible, congregants should be encouraged to leave the area.</p><p>Reports should be made to a law enforcement officer if possible. If law enforcement is not available at the location, individuals have the option to investigate on their own, report suspicions to church staff, or do nothing. In these instances, security professionals should trust their instincts.​</p><h4>PREVENTING A BOMBING</h4><p>The attacker could use a mail bomb or a placed bomb. Placed bombs, like the one used in the Boston Marathon bombing, injure indiscriminately and can be concealed in boxes, backpacks, briefcases, and purses. </p><p>There is no certain way to prepare for a bombing. As witnessed with the Boston Marathon bombing, members of the public are vulnerable at events and in crowds. Someone can enter a facility with intent to do harm and there is little security can do to stop him or her.</p><p>But, just as Boston responded quickly with paramedics and doctors, houses of worship need to be prepared with security and safety measures. </p><p>Places of worship need video cameras for successful identification of attackers. Congregants must be diligent in their observations of attendees who might intend harm. They also need to be observant of behavior that is unusual, such as a person who attempts to enter a church after the service had ended, as the second Palm Sunday bomber did. </p><p>As a precautionary step, religious institutions’ office personnel should be trained about mail bombs and suspicious packages, such as the pipe bomb that was mailed to a Lakewood Church in Houston, Texas, in January 1990.</p><p>The pastor’s daughter, director of ministries for the church, opened the package addressed to her father, suffering minor burns and bruises, according to The New York Times.</p><p>Access control is key to a secure environment, as the Tanta, Egypt, bombing shows. Someone was able to place a bomb inside the sanctuary, showing that someone had access to the facility prior to the start of the service.</p><p>Staff should also be advised to keep offices and desks locked when they are not in use to avoid creating hiding places for explosives. Staff should also ensure that utility janitorial closets, boiler rooms, mail rooms, computer offices, switchboards, and elevator control rooms are locked at all times.</p><p>Additionally, trash receptacles—especially dumpsters—should be locked and located far from the building. The area around the receptacles should also be free of debris. As demonstrated by the Oklahoma City bombing in 1995, cars and trucks should be required to maintain a safe setback from the facility. </p><p>A security plan should also include an evacuation plan for the facility with a designated meeting point to ensure that everyone is safe, should it be used. Places of worship should also be equipped with medically trained staff, first aid kits, and ambulatory services to quickly respond, should an attack take place.</p><p>There are no easy answers to this disturbing dilemma. There is no easy way to predict when or where a bombing may occur. There are even fewer ways to prevent it. As security leaders, we must be diligent in our observations of human behavior. </p><p><em>Paula L. Ratliff is the coauthor of </em>Crime Prevention for Houses of Worship<em>, the first book published on the topic in 2001 and the author of the second edition. She began researching crimes against religious facilities in the early 1990s and has written several articles on crime prevention for places of worship. She is a member of ASIS International and a graduate of the University of Louisville.        ​</em></p>GP0|#cd529cb2-129a-4422-a2d3-73680b0014d8;L0|#0cd529cb2-129a-4422-a2d3-73680b0014d8|Physical Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465
https://sm.asisonline.org/Pages/house-worship-security-and-training-tips.aspxHouse of Worship Security and Training Tips<div class="body"> <p>Last year’s shootings at a Colorado mission and megachurch are a reminder that even houses of worship must address security.</p> <p>One major initiative is the Secure Community Network, or SCN (pronounced “scan”), organized by major American Jewish leadership organizations to bring Jewish community security under one group. SCN’s Web site is packed with security resources and advice for all types of houses of worship. ASIS International also has church security guidelines, which include advice on physical security and on hiring security personnel.</p> <p>“The biggest void between police and security in the public is the flow of information,” says SCN’s National Director Paul Goldenberg. SCN attempts to rectify that issue by forging relationships with law enforcement.</p> <p>The group receives sensitive information on threats to the Jewish community around-the-clock, which it then disseminates to its members. Goldenberg adds that the SCN is the first nongovernmental organization to have a memorandum of understanding with the New York City Police Department.</p> <p>The group is also working with the Department of Homeland Security to coordinate its house of worship training. The most important step a house of worship can take is to train its staff to handle threatening situations and to ensure that they are able to operate any security equipment the building has, says Goldenberg, who was part of a south Florida undercover strike force for several years.</p> <p>Training is all the more important in this field given that many house of worship security force members are volunteers and may not have law enforcement backgrounds.</p> <p>Some states are requiring that volunteers get licensed or that churches hire only licensed security professionals.</p> <p>Texas, for example, requires that anyone providing volunteer security services under the title “security” be licensed by the state. That law forced Dallas megachurch The Potter’s House last year to professionalize its force, says Sean Smith, who was the security director there when he says the Texas Private Security Bureau told the church it would be fined because the volunteer security team was unlicensed.</p> <p>The church chose to contract its security to an outside company. Smith went through the state licensing program and became senior account manager, with the rest of the security staff coming from the contracted company. </p> <p>“It’s just forcing us to be better,” says Smith, adding that once the church contracted its security out, its liability insurance “dropped tremendously.”</p> <p>Chuck Chadwick, of the National Association of Church Security & Safety Management (NACSSM), thinks crackdowns like the one in Texas are necessary. “Unlicensed security is rampant across the country,” he says.</p> <p>Jim Hashem, chief of staff of Kingdom Life Christian Church in Milford, Connecticut, had his all-volunteer security force trained by an outside company and licensed. Even so, says Hashem, if there is even a hint of violence, his security team is instructed to immediately call 911. The team’s job is only to manage the interim time before the police show up.</p> <p>And they avoid physical confrontation. “[We’ve] trained our people that the best way through a situation is to try to talk your way through it first,” Hashem explains. </p> <p>The Potter’s House sponsors a church security conference called STOPPED (Security Training Offering Policies, Procedure, Education, and Direction), which has brought in actors for demonstrations on how to handle an irate congregation member. That’s more typical than a shooter.  </p> <p>Smith says such comprehensive training is integral to responding effectively. “If all you’ve practiced on is what to do when the guy comes with a gun, then what do you do when the alcoholic comes, and he’s drunk?” he says, adding that “you’re going to see that a hundred times more than what happened in Colorado.”</p> <p class="MsoNormal"><!--[if !supportEmptyParas]--> <!--[endif]--></p> </div>GP0|#cd529cb2-129a-4422-a2d3-73680b0014d8;L0|#0cd529cb2-129a-4422-a2d3-73680b0014d8|Physical Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465
https://sm.asisonline.org/Pages/smaller-churches-lack-security-experts-say-005316.aspxSmaller Churches Lack Security, Experts Say<div class="body"> <span class="article_date"> <span class="date-display-single">03/10/2009</span> - </span> <p>Experts say smaller churches generally lack security plans that could help identify an attacker beforehand or minimize the damage of an attack, <a href="http://www.google.com/hostednews/ap/article/ALeqM5jl7sa7F5lsTzkPKYB5AvnlLppzTgD96R21IG0" target="_blank">the Associated Press reports</a>. </p> <p>The new emphasis comes after the Reverand Fred Winters was gunned down Sunday morning in Maryville, Illinois, while saying mass. The shooter, 27-year-old Jeff Sedlacek, has been charged with Winters' murder as well as aggravated assault for stab wounds inflicted on two parishoners who subdued him after the shooting.</p> <p>The fact that the First Baptist Church had initiated a security and emergency plan six months before the shooting shouldn't dissuade other churches from planning ahead, the church's associate pastor Mark Jones told the AP.</p> <p>Televangelist churches and megachurches with attendance levels around 5,000, however, generally have coordinated security plans and have hired undercover security guards to protect high-profile preachers, according to Dave Travis, managing director of the <a href="http://www.leadnet.org/about_OurMission.asp" target="_blank">Leadership Network</a>,  which helps church leaders grow their churches. </p> <p>Jeffrey Hawkins, executive director of the <a href="http://www.christiansecuritynetwork.org/" target="_blank">Christian Security Network</a>, says churches are "soft targets." A survey conducted last year after a church shooting in Knoxville, Tennesee, showed that 75 percent of churches do not have a security plan, while polling of 250 churches conducted by his organization showed a third have already experienced a security incident this year. </p> <p>The Christian Security Network advises churches take an all-hazards approach to their security plan, accounting for everything from low-level crime to natural disasters.</p> <p>And it's not only Christian houses of worship that are taking precautions.</p> <p>Because of anti-semiticism and attacks in Israel, Jewish organizations have long been security conscious.</p> <p>"You don't want iron gates and armed guards, but houses of worship do need to train staff, congregants and ushers to identify and respond to such threats as an emotionally disturbed person," said Paul Goldenberg, national director of the <a href="http://www.scnus.org/index.aspx?page=1">Secure Community Network</a> (SCN), a Jewish security organization. </p> <p>According to <em>Security Management's </em>Laura Spadanuta last April, <a href="http://www.securitymanagement.com/article/house-worship-security-and-training-tips" target="_blank">SCN has been an innovative leader</a> in securing Jewish houses of worship through public-private partnerships. </p> <p class="rteindent1">The group receives sensitive information on threats to the Jewish community around-the-clock, which it then disseminates to its members. Goldenberg adds that the SCN is the first nongovernmental organization to have a memorandum of understanding with the New York City Police Department.</p> <p class="rteindent1">The group is also working with the Department of Homeland Security to coordinate its house of worship training. The most important step a house of worship can take is to train its staff to handle threatening situations and to ensure that they are able to operate any security equipment the building has, says Goldenberg, who was part of a south Florida undercover strike force for several years.</p> <p>The Council on American-Islamic Relations (CAIR), a Muslim civil rights organization, has also published security guidelines for mosques and worshippers because of an increase in assaults after 9-11. (Click <a href="http://pa.cair.com/index.php?Page=safetykit&Side=crights" target="_blank">here </a>for CAIR-Pennsylvania's security guide.) </p> <p>For more on protecting houses of worship, see ASIS International's " <a href="http://www.asisonline.org/newsroom/surveys/HousesofWorship.pdf" target="_blank">Securing Houses of Worship</a>." </p> </div>GP0|#3795b40d-c591-4b06-959c-9e277b38585e;L0|#03795b40d-c591-4b06-959c-9e277b38585e|Security by Industry;GTSet|#8accba12-4830-47cd-9299-2b34a4344465