Securing Houses of Worship

Author: Carlton Purvis, Published on Feb 25, 2014

What are the most common types of crimes at houses of worship? How to you convince a congregation that you need to add video surveillance or a security system?

Jim McGuffey is a security consultant with 40 years of experience in security management. Now he runs the site ChurchSecurityConsultant.com where he offers free on-site assessments for HOWs. We recently talked with him about house of worship security and what it takes secure sacred places.

**** *** *** **** ****** ***** ** ****** ** ****** of *******? *** ** *** ******** * ************ **** *** need ** *** ***** ************ ** * ******** ******?

*** ******** ** * ******** ********** **** ** ***** ** experience ** ******** **********. *** ** **** *** ****************************.******** ** ****** **** **-**** *********** *** ****. We recently talked with him about house of worship security and what it takes secure sacred places.

[***************]

Most ****** ******* ** ********

*** **** ****** ******* ** **** *** *********, ************, ***** and ********, ** ****. ** **** **** ** *** **** things **** ****** * ******** ************* *** ** ** ** in * **** ***** **** *** **** **** ** ****** and ******** *********** **** **** ** ***** *******.

"****** ****** **** ***** ********* ** ******** **** ***** ****** churches *** *** **** ****** **** ***** **** ***** *** vandalism *** **********. ************* *** **** ****** ******* **** ****** interested ** ******** ********* * ******** ** ******* *******. **** is **** * ******* *** **** ***** *** *********** ** assistance," ** ****. 

***** ******* *** ******** ** ******** ** *** ****** ****** where ********'* ********** ****. ******** ******, ********** ** ***** ************ religious-connected ********, *** ****** ** **** **** ****-*********** ******.

Overcoming ************ **********One of the bigger hurdles when implementing security at a church is making it acceptable to the congregation. People want to feel secure, but at the same time, they don't want to feel scrutinized and maintain a level of privacy in such an intimate setting. Most churches, McGuffey says, have concerns about implementing new technology as a part of their security plans (he also noted that most churches don't even have alarm systems).

"**** ******** ** *** ******* ******* ****** ** ** ******** security *** ************. * ******* **** **** **** ** ******** is *** ** ******* **** * ******** ******* **** ****** unnecessary ***** *** ************," ** ****.

************, **** *** *** **** *** ***** ** ******** *** equipment.

"***** **** ******** ** ********** ********** ** ** **** *** security ******* ** ******** *** *********** ** ********. * **** marketing ******* ** **** ******* ***** ** ************ *** ******** program. **** **** **** ************ *** ***** ** *** ******** from * ******** *******, **** ** ********* *** ******** *** medical ***********," ** ****. "*** **** ********* ** ** *** all ** *** ***** ****** ******** ** *** *** ******* to ****** **** *** **** **** ** ********* ** ***** plan *** *** **** ** *** ******** ************." 

******** **** ** **** ******* *** *** **** *** ****** identify ** ** *** ****** ***** **** ** ** *** pastor *** ****** *******, *** ***** *******, *** ******* ******, any ** ****** *** *********** *********. **** *** ****** * part ** *** ********** *** *** **** ** ******* ***** into **** ***** *****/******** ***.

"**** **'** ****, **'* ***** *******. ** *** **** **** as * **** ** *** ******* **** *** **** ********* that ***** **** ** ** *** ************ *** ****** *** best ******** ** * *********** *****'* **** **** ** *** days *** *** ** ******* ****** *** ******," ** ****.

Security *** ******** *** ** **** ***********

******* **** **** ******** ***’* **** ******** ******* ** ******* funds ** ****** ****** ********, ******** ******* ** **** ********* countermeasures -- *****, ********* ******* **** **** *** *******. *** example, **** ***** ********* *** ***** ** ******, ***** ******** staff ** ********** ** **** *****, ****** ******** *** *********** sensitive ***********. *** ***** ***-**** ****, **** ** ***** *** be *********** ***********, *** ** ***** ** *** ****************************.***.

******* *** ***** ** *** ****, ** ** **** * proponent *** ***** ***** ********* ** ******** (**** ******* **** will ***** **). ** ********* ***** ******** *** ******** ** topics ************ ****** **********, ********* ** ******* ******** ** ******,************ ***** *** ************.** ***** ******** ** **** ********* *** ** ****** *** churches ** ***** **** ****** **** ** ***** *****, ** to **** ****** ** ** *** **** ****** ** ****** ******** * ***** **** ****.

"*** *******, ** * ******* ***** *** **** **** **** minutes ******* * ****** ****** ******* *** ***** ** *:** AM *** *:** **, * ****** ***** ** **** ** the ****** ***** ** * ********** ******. ******* *******, ***** occur ** *** ****** **** **** **** * ****** ** sent **** * ********** **** ** ****** ** ******," ** said.

Difference ** ******** ****** ** *******?The basic concept used to protect a church facility is the same as any other facility.

"**’* *** ***** ********** ****** ***** ******, ********** *** ******** and **********. *** ****** **** ********** ****** ******* ********** *** more ******** **********, ******** *** ********** *** ****** ******* ********** training," ** ****.

******** ***** **** *** ********* **** ** *** ******* **** is *** **** ***** ********** ** ********, *** ********* ***** and ********** ******** ** *** *********** *****. **** ***** ********* the ********** ** *** *********** *******.





Comments (2)

* ***** *** ******* **** ****. **** **** ****, ****** security ******** **** ********. ** *** ****** * **** ** there **** **** ******** "******" **** **** ******* **** *** last ******* *****. **** **** **** *** ***** **** ******** breaking *** ******** *** *****. ******* **** ******** ********.

* ***** **** **** ***** ** *** ******** **** **** to ******* **** ************* ****** ******** ******* **** * **** midrange ********* ****** *** **** ********* ****** ******** ******* (*** intrusive, *** ***** *** ******* ** ******* *********), *** ********* value *** **** ** ***** **.

** **** ***** **** ** *** **, ** ** ****, that ***** ** * **** *****.

** ** ******** * *********** ********? ** ******* ****** **** that? ** ** **** ****** *** **** **** *** ***** it ******?

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Most Recent Industry Reports

Anixter End User Sales Troubles on Oct 23, 2017
End user sales have and continue to be a major problem for Anixter's physical security business. Every year, according to various Anixter people,...
Assa Abloy Acquires August on Oct 23, 2017
The mega access control manufacturer, Assa Abbloy, has acquired one of the most well funded access control startups, smart lock...
Axis Q3 2017 Financial Results on Oct 23, 2017
A big issue for Axis this past quarter was their product shortage. Despite that, new Q3 numbers for Axis show solid financial results. In this...
Cisco Falling - Favorite Network Switches 2017 on Oct 20, 2017
1 major manufacturer fell and 1 outsider manufacturer gained as integrator favorites for network switches from more than 140 votes / explanations...
Uniview Recorder Backdoor Examined on Oct 20, 2017
A Chinese research group has identified a vulnerability in Uniview recorders that allows backdoor access in a method similar to the Dahua...
Hikvision Access Control Tested on Oct 19, 2017
Hikvision aggressive pricing and marketing combined with generally reliable hardware and free software has made them a major player in video...
Verkada, Silicon Valley VSaaS Startup, Targets Enterprise on Oct 19, 2017
Verkada says they are building an enterprise-class VSaaS offering, calling it "The new platform for video security". This is a departure from the...
Exacq Unbreaks Avigilon Integration on Oct 18, 2017
For nearly 4 years, Exacq had broken and effectively blocked use with Avigilon cameras, as IPVM reported in January 2014. Now, Exacq has...
Search More Important Than Live Monitoring - Statistics on Oct 18, 2017
Search is overall more important than live monitoring to integrators, according to new IPVM statistics.  The key themes found in integrator...
Axis 'Sold Out' P3707-PVE Multi-Imager Tested on Oct 18, 2017
Axis faced significant product shortages over the summer. Perhaps the most notorious and significantly sold out model was the Axis P3707-PE 8MP...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact