View Categories

House of Worship Glossary

3 min read

Security Terms and Definitions

A

  • Active Threat: An immediate and ongoing threat to life, such as an active shooter or bomber. Requires immediate response to neutralize the threat and protect individuals.
  • Access Control: Measures taken to regulate who can enter specific areas within the religious facility. This can include key cards, security codes, or manned security checkpoints.
  • After-Hours Security: Security protocols and measures in place when the religious facility is closed or has limited occupancy, often involving alarms, patrols, and surveillance.
  • Anomaly Detection: The process of identifying unusual patterns or behaviors that may indicate a potential security threat. This can be done through observation or technological monitoring.
  • Asset Protection: Measures taken to safeguard valuable items and resources belonging to the religious facility, such as financial assets, historical artifacts, or sensitive equipment.

B

  • Behavioral Indicators: Observable actions or mannerisms that may suggest a person is planning or preparing to commit a harmful act. Security personnel should be trained to recognize these indicators.
  • Blast Radius: The area potentially affected by an explosion. Security planning should consider evacuation zones and structural vulnerabilities within this radius.
  • Building Vulnerability Assessment: A systematic evaluation of the physical security weaknesses of the religious facility that could be exploited by an adversary.

C

  • CCTV (Closed-Circuit Television): A system of video cameras used for surveillance and monitoring of the religious facility’s premises.
  • Code of Conduct (Security): A set of rules and guidelines outlining the expected behavior and responsibilities of security personnel.
  • Crowd Management: Strategies and techniques used to safely and effectively manage large gatherings of people during services, events, or emergencies.
  • Cybersecurity Awareness: Understanding and practicing safe online behaviors to protect the religious facility’s digital assets and prevent cyberattacks.

D

  • De-escalation Techniques: Communication strategies and tactics used by security personnel to calm potentially volatile situations and prevent them from escalating into violence.
  • Drill (Security): A simulated emergency scenario conducted to practice response procedures and evaluate the effectiveness of security plans.
  • Duty of Care: The legal and ethical obligation of the religious facility to provide a safe and secure environment for its staff, members, and visitors.

E

  • Emergency Action Plan (EAP): A documented plan outlining the procedures to be followed in various emergency situations, such as fire, medical emergency, or active threat.
  • Evacuation Plan: A detailed plan specifying routes and procedures for safely evacuating individuals from the religious facility in case of an emergency.
  • Exterior Lighting: The use of lighting around the perimeter of the religious facility to deter criminal activity and enhance visibility for security personnel.

F

  • First Aid/CPR Certified: Training and certification in providing immediate medical assistance in case of injury or medical emergency. Often a requirement for security personnel.
  • Force Continuum: A model that outlines the levels of force that security personnel are authorized to use in response to different levels of threat.

H

  • Hardening (Security): Implementing physical security measures to make the religious facility more resistant to attack, such as reinforced doors, windows, and barriers.
  • House of Worship Specific Threats: Understanding the unique vulnerabilities and potential threats that religious facilities may face, such as hate crimes, targeted violence, or disruptions of services.

I

  • Incident Command System (ICS): A standardized, on-scene, all-hazard incident management system used to coordinate emergency response efforts.
  • Intruder Detection System: Electronic systems, such as alarms and sensors, used to detect unauthorized entry into the religious facility.

L

  • Lockdown Procedures: Specific steps to be taken to secure the religious facility and protect occupants during an active threat situation.

M

  • Mobile Patrol: Security personnel conducting regular patrols of the religious facility’s grounds and buildings in marked vehicles or on foot.

P

  • Perimeter Security: Measures implemented to protect the outer boundaries of the religious facility, such as fences, gates, and surveillance.
  • Policy and Procedure (Security): Written guidelines and protocols that dictate how security operations are to be conducted.
  • Protective Detail: A team of security professionals assigned to protect a specific individual associated with the religious facility.

R

  • Risk Assessment: The process of identifying potential security threats, evaluating their likelihood and impact, and determining appropriate countermeasures.
  • Roving Patrol: Similar to mobile patrol, but may involve less predictable routes and methods of patrol within the facility.

S

  • Security Awareness Training: Training provided to staff, members, and visitors on how to recognize and report suspicious activity and respond to security incidents.
  • Security Post: A designated location where security personnel are stationed to monitor activity and respond to incidents.
  • Situational Awareness: The ability to perceive and understand what is happening in the environment around you, in order to identify potential threats or hazards.
  • Suspicious Activity Reporting (SAR): A systematic process for documenting and reporting observed behaviors or incidents that may indicate a potential security threat.

V

  • Vulnerability: A weakness in the security of the religious facility that could be exploited by a threat.

Remember to tailor these terms and add others specific to the nuances of security in religious environments and the curriculum of your course.

WPGrow