Ask the Expert

Last December, a gunman opened fire at a Colorado church and missionary training center, killing five people and wounding numerous other worshippers. Several months earlier, a gunman opened fire in a Missouri church during Sunday services, killing three people, including the pastor, and wounding three others.

A vandal broke into a New York synagogue that was under construction and caused $7,000 worth of damage, including broken doors, windows and restroom fixtures. Violence at places of worship is increasing at an alarming rate.

ISSUE: What’s behind this increase in crime at places of worship, and what are some effective ways to secure a church or synagogue?

SOLUTION: A quick search of news resources shows that houses of worship are frequent targets for criminals— from petty thieves to those wishing harm to children. Churches, synagogues and mosques typically have valuable A/V equipment to use as part of their worship experience; some have expensive furnishings and fixtures and cash from offerings on site. Many places of worship run schools or daycare centers with children on the grounds, and differing belief systems also can result in hate crimes aimed at a particular religion or congregation.

Securing a house of worship involves special challenges. Security cannot have an intrusive presence, making the use of metal detectors or routine searches impossible. “All are welcome” policies in most denominations encourage community involvement, making it easy for criminals to gain access to church facilities. And with many houses of worship hosting community meetings, election polls and other nonchurch activities, there may be many unknown people passing through the facilities each week. To ask any church to change these policies would cut to the core of its existence.

But it is possible to secure a sanctuary and surrounding grounds in a discreet manner. The first step should be the formation of a security committee composed of worship leaders, staff and members of the congregation. This group should look for a security systems integrator with proven experience in helping protect houses of worship that understands the importance of creating a welcoming environment that is both safe and secure. A risk assessment of the location likely will result in the recommendation of several electronic security systems that go beyond standard intrusion detection.

Access control system. If an employee or congregant loses a standard metal key, it may be wise to undergo the expense of rekeying all the locks. But it takes only seconds on a computer to deactivate a lost access credential. Also, an access system provides a record of who accesses a controlled door and when. That information may be useful in determining when and how an offense occurred. Access controls also can be programmed for specific access at specific times, allowing trusted individuals within the congregation to access facilities.

Video surveillance cameras. These can be positioned discreetly throughout the complex, inside and out, and have the ability to serve as a deterrent to criminal activity. With a DVR, law enforcement can review events if an offense occurs. Cameras placed in daycare areas and classrooms allow caregivers and teachers the ability to check on children remotely, and the more caring eyes watching children, the better.

Call boxes. Call boxes throughout the facility, especially in parking lots and garages, can provide an instant link to facility security staff or local law enforcement in an emergency. They also can serve to summon assistance for lost children or medical needs.

Communication system. An intercom or telephone-based communication system can link offices, entrances, and daycare and/or school facilities. There are affordable systems that come with cameras, monitors and door release systems that can be used by staff in areas where remote access is desired or in higher-security areas where money is handled.

ISSUE: Are there any low-tech ways to supplement a place of worship’s security system?

SOLUTION: While these systems are not inexpensive, lower costs and higher performance are improving the value of systems to a facility’s operation all the time. A good security integrator also should be able to suggest some low-technology solutions such as lighting, fencing and landscape modifications to further improve security. Members of the congregation also should be educated about common-sense practices such as locking car doors, keeping valuables out of site and identifying the nearest exit for use in an emergency. With violence and criminal activity increasing everywhere, including the places where people worship, awareness and attention to one’s surroundings are critical.

Working with an experienced systems integrator, it is possible to design a costeffective security system that can greatly enhance security and safety without major influence on the daily activities of a house of worship.

READER QUESTION: We have a highly sensitive office in our facility and have thought about adding a biometric device to enhance security. I know the fingerprint is the most common biometric measurement. Is it truly reliable and difficult to defeat, or should we look at another possibility? As with any business, cost is an issue.

SOLUTION: For interior applications, the most common and cost-effective biometric technology is fingerprint recognition. With recent improvements in imaging technology, lower cost for storage and improved template algorithms, fingerprint readers are increasingly reliable, secure and affordable. For a low user count, a one-to-many template match allows the convenience of simply presenting an enrolled digit (finger). The device then searches the template database— usually stored directly on the reader—for a match and grants access.

For larger user populations or highsecurity environments, a one-to-one match, where a PIN code or card is used to identify the user and the fingerprint is matched to a specific template, is more common. Today’s smart card technology allows user templates to be stored on the card rather than stored in a central database, addressing local storage issues and privacy concerns while increasing security.

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

  • OpenAI's GPT-4 Is Capable of Autonomously Exploiting Zero-Day Vulnerabilities

    According to a new study from four computer scientists at the University of Illinois Urbana-Champaign, OpenAI’s paid chatbot, GPT-4, is capable of autonomously exploiting zero-day vulnerabilities without any human assistance. Read Now

  • Getting in Someone’s Face

    There was a time, not so long ago, when the tradeshow industry must have thought COVID-19 might wipe out face-to-face meetings. It sure seemed that way about three years ago. Read Now

    • Industry Events
    • ISC West

Featured Cybersecurity

Webinars

New Products

  • ComNet CNGE6FX2TX4PoE

    The ComNet cost-efficient CNGE6FX2TX4PoE is a six-port switch that offers four Gbps TX ports that support the IEEE802.3at standard and provide up to 30 watts of PoE to PDs. It also has a dedicated FX/TX combination port as well as a single FX SFP to act as an additional port or an uplink port, giving the user additional options in managing network traffic. The CNGE6FX2TX4PoE is designed for use in unconditioned environments and typically used in perimeter surveillance. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3