Securing Houses of Worship

Author: Carlton Purvis, Published on Feb 25, 2014

What are the most common types of crimes at houses of worship? How to you convince a congregation that you need to add video surveillance or a security system?

Jim McGuffey is a security consultant with 40 years of experience in security management. Now he runs the site ChurchSecurityConsultant.com where he offers free on-site assessments for HOWs. We recently talked with him about house of worship security and what it takes secure sacred places.

**** *** *** **** ****** ***** ** ****** ** ****** of *******? *** ** *** ******** * ************ **** *** need ** *** ***** ************ ** * ******** ******?

*** ******** ** * ******** ********** **** ** ***** ** experience ** ******** **********. *** ** **** *** ****************************.******** ** ****** **** **-**** *********** *** ****. We recently talked with him about house of worship security and what it takes secure sacred places.

[***************]

Most ****** ******* ** ********

*** **** ****** ******* ** **** *** *********, ************, ***** and ********, ** ****. ** **** **** ** *** **** things **** ****** * ******** ************* *** ** ** ** in * **** ***** **** *** **** **** ** ****** and ******** *********** **** **** ** ***** *******.

"****** ****** **** ***** ********* ** ******** **** ***** ****** churches *** *** **** ****** **** ***** **** ***** *** vandalism *** **********. ************* *** **** ****** ******* **** ****** interested ** ******** ********* * ******** ** ******* *******. **** is **** * ******* *** **** ***** *** *********** ** assistance," ** ****. 

***** ******* *** ******** ** ******** ** *** ****** ****** where ********'* ********** ****. ******** ******, ********** ** ***** ************ religious-connected ********, *** ****** ** **** **** ****-*********** ******.

Overcoming ************ **********One of the bigger hurdles when implementing security at a church is making it acceptable to the congregation. People want to feel secure, but at the same time, they don't want to feel scrutinized and maintain a level of privacy in such an intimate setting. Most churches, McGuffey says, have concerns about implementing new technology as a part of their security plans (he also noted that most churches don't even have alarm systems).

"**** ******** ** *** ******* ******* ****** ** ** ******** security *** ************. * ******* **** **** **** ** ******** is *** ** ******* **** * ******** ******* **** ****** unnecessary ***** *** ************," ** ****.

************, **** *** *** **** *** ***** ** ******** *** equipment.

"***** **** ******** ** ********** ********** ** ** **** *** security ******* ** ******** *** *********** ** ********. * **** marketing ******* ** **** ******* ***** ** ************ *** ******** program. **** **** **** ************ *** ***** ** *** ******** from * ******** *******, **** ** ********* *** ******** *** medical ***********," ** ****. "*** **** ********* ** ** *** all ** *** ***** ****** ******** ** *** *** ******* to ****** **** *** **** **** ** ********* ** ***** plan *** *** **** ** *** ******** ************." 

******** **** ** **** ******* *** *** **** *** ****** identify ** ** *** ****** ***** **** ** ** *** pastor *** ****** *******, *** ***** *******, *** ******* ******, any ** ****** *** *********** *********. **** *** ****** * part ** *** ********** *** *** **** ** ******* ***** into **** ***** *****/******** ***.

"**** **'** ****, **'* ***** *******. ** *** **** **** as * **** ** *** ******* **** *** **** ********* that ***** **** ** ** *** ************ *** ****** *** best ******** ** * *********** *****'* **** **** ** *** days *** *** ** ******* ****** *** ******," ** ****.

Security *** ******** *** ** **** ***********

******* **** **** ******** ***’* **** ******** ******* ** ******* funds ** ****** ****** ********, ******** ******* ** **** ********* countermeasures -- *****, ********* ******* **** **** *** *******. *** example, **** ***** ********* *** ***** ** ******, ***** ******** staff ** ********** ** **** *****, ****** ******** *** *********** sensitive ***********. *** ***** ***-**** ****, **** ** ***** *** be *********** ***********, *** ** ***** ** *** ****************************.***.

******* *** ***** ** *** ****, ** ** **** * proponent *** ***** ***** ********* ** ******** (**** ******* **** will ***** **). ** ********* ***** ******** *** ******** ** topics ************ ****** **********, ********* ** ******* ******** ** ******,************ ***** *** ************.** ***** ******** ** **** ********* *** ** ****** *** churches ** ***** **** ****** **** ** ***** *****, ** to **** ****** ** ** *** **** ****** ** ****** ******** * ***** **** ****.

"*** *******, ** * ******* ***** *** **** **** **** minutes ******* * ****** ****** ******* *** ***** ** *:** AM *** *:** **, * ****** ***** ** **** ** the ****** ***** ** * ********** ******. ******* *******, ***** occur ** *** ****** **** **** **** * ****** ** sent **** * ********** **** ** ****** ** ******," ** said.

Difference ** ******** ****** ** *******?The basic concept used to protect a church facility is the same as any other facility.

"**’* *** ***** ********** ****** ***** ******, ********** *** ******** and **********. *** ****** **** ********** ****** ******* ********** *** more ******** **********, ******** *** ********** *** ****** ******* ********** training," ** ****.

******** ***** **** *** ********* **** ** *** ******* **** is *** **** ***** ********** ** ********, *** ********* ***** and ********** ******** ** *** *********** *****. **** ***** ********* the ********** ** *** *********** *******.





Comments (2)

I found the article very good. Some very good, simple security concepts were outlined. In the region I live in there have been multiple "events" that have occured over the last several years. Many that made the local news involved breaking and entering and theft. Several have involved assaults.

I think that many times if the churches were able to install some strategically placed exterior cameras with a good midrange recording device and some carefully placed exterior signage (not intrusive, but clear and concise in several languages), the deterrent value may well be worth it.

If they never have to use it, in my mind, that would be a good thing.

Is Mr McGuffey a technologic agnostic? Do Worship Houses mind that? Or do WHOs prefer him even with the irony it brings?

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Most Recent Industry Reports

Software Only VMS vs NVR Appliances on May 23, 2018
Should you buy your own PC/server and load VMS software on it or get a turnkey appliance (both hardware and software, e.g., NVR, Hybrid DVR) from a...
Buy Arecont: Top Bid $10 Million Cash on May 22, 2018
Last year, Arecont had a deal for a purchase price of $170 million (see Failed Arecont China Acquisition). This year, Arecont has a deal for a...
Installing Box Cameras Indoors Tutorial on May 22, 2018
This tutorial starts our physical installation for video surveillance series, starting with Box Cameras, one of the oldest and most basic types....
The Hikvision Smart Classroom Behavior Management System on May 22, 2018
Hikvision's rapidly growing offering of analytics, which we most recently examined with Hikvision's ethnic minority analytics, is now going into...
Dahua Intrusion Analytics And VMD Tested on May 21, 2018
Dahua ships basic analytics on practically all their cameras, ranging from low cost to high end. To see how these analytics work in real world...
Exacq Improving Technical Support, Responding To Integrator Complaints on May 21, 2018
Exacq had been a long-term favorite of integrators, but since their 2014 Tyco acquisition, Exacq has fallen in IPVM integrator studies (though...
Best Manufacturer Technical Support 2018 on May 21, 2018
While 5 manufacturers made the worst technical support 2018 list, only 3 stood out as providing the best technical support to 190+ integrators in...
Stealth / UCIT - Remote Video Monitoring Provider Profile on May 18, 2018
Can 2 remote video monitoring companies, Stealth Monitoring from the US and UCIT from Canada combine to impact the market and compete in a changing...
Cybersecurity for IP Video Surveillance Guide on May 18, 2018
Keeping surveillance networks secure can be a daunting task, but there are several methods that can greatly reduce risk, especially when used in...
Forced Entry / Duress Access Tutorial on May 17, 2018
Even though access control normally keeps people safe, tragedies have revealed a significant issue. If users are forced to unlock doors for...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact