Security Terms and Definitions
A
- Active Threat: An immediate and ongoing threat to life, such as an active shooter or bomber. Requires immediate response to neutralize the threat and protect individuals.
- Access Control: Measures taken to regulate who can enter specific areas within the religious facility. This can include key cards, security codes, or manned security checkpoints.
- After-Hours Security: Security protocols and measures in place when the religious facility is closed or has limited occupancy, often involving alarms, patrols, and surveillance.
- Anomaly Detection: The process of identifying unusual patterns or behaviors that may indicate a potential security threat. This can be done through observation or technological monitoring.
- Asset Protection: Measures taken to safeguard valuable items and resources belonging to the religious facility, such as financial assets, historical artifacts, or sensitive equipment.
B
- Behavioral Indicators: Observable actions or mannerisms that may suggest a person is planning or preparing to commit a harmful act. Security personnel should be trained to recognize these indicators.
- Blast Radius: The area potentially affected by an explosion. Security planning should consider evacuation zones and structural vulnerabilities within this radius.
- Building Vulnerability Assessment: A systematic evaluation of the physical security weaknesses of the religious facility that could be exploited by an adversary.
C
- CCTV (Closed-Circuit Television): A system of video cameras used for surveillance and monitoring of the religious facility’s premises.
- Code of Conduct (Security): A set of rules and guidelines outlining the expected behavior and responsibilities of security personnel.
- Crowd Management: Strategies and techniques used to safely and effectively manage large gatherings of people during services, events, or emergencies.
- Cybersecurity Awareness: Understanding and practicing safe online behaviors to protect the religious facility’s digital assets and prevent cyberattacks.
D
- De-escalation Techniques: Communication strategies and tactics used by security personnel to calm potentially volatile situations and prevent them from escalating into violence.
- Drill (Security): A simulated emergency scenario conducted to practice response procedures and evaluate the effectiveness of security plans.
- Duty of Care: The legal and ethical obligation of the religious facility to provide a safe and secure environment for its staff, members, and visitors.
E
- Emergency Action Plan (EAP): A documented plan outlining the procedures to be followed in various emergency situations, such as fire, medical emergency, or active threat.
- Evacuation Plan: A detailed plan specifying routes and procedures for safely evacuating individuals from the religious facility in case of an emergency.
- Exterior Lighting: The use of lighting around the perimeter of the religious facility to deter criminal activity and enhance visibility for security personnel.
F
- First Aid/CPR Certified: Training and certification in providing immediate medical assistance in case of injury or medical emergency. Often a requirement for security personnel.
- Force Continuum: A model that outlines the levels of force that security personnel are authorized to use in response to different levels of threat.
H
- Hardening (Security): Implementing physical security measures to make the religious facility more resistant to attack, such as reinforced doors, windows, and barriers.
- House of Worship Specific Threats: Understanding the unique vulnerabilities and potential threats that religious facilities may face, such as hate crimes, targeted violence, or disruptions of services.
I
- Incident Command System (ICS): A standardized, on-scene, all-hazard incident management system used to coordinate emergency response efforts.
- Intruder Detection System: Electronic systems, such as alarms and sensors, used to detect unauthorized entry into the religious facility.
L
- Lockdown Procedures: Specific steps to be taken to secure the religious facility and protect occupants during an active threat situation.
M
- Mobile Patrol: Security personnel conducting regular patrols of the religious facility’s grounds and buildings in marked vehicles or on foot.
P
- Perimeter Security: Measures implemented to protect the outer boundaries of the religious facility, such as fences, gates, and surveillance.
- Policy and Procedure (Security): Written guidelines and protocols that dictate how security operations are to be conducted.
- Protective Detail: A team of security professionals assigned to protect a specific individual associated with the religious facility.
R
- Risk Assessment: The process of identifying potential security threats, evaluating their likelihood and impact, and determining appropriate countermeasures.
- Roving Patrol: Similar to mobile patrol, but may involve less predictable routes and methods of patrol within the facility.
S
- Security Awareness Training: Training provided to staff, members, and visitors on how to recognize and report suspicious activity and respond to security incidents.
- Security Post: A designated location where security personnel are stationed to monitor activity and respond to incidents.
- Situational Awareness: The ability to perceive and understand what is happening in the environment around you, in order to identify potential threats or hazards.
- Suspicious Activity Reporting (SAR): A systematic process for documenting and reporting observed behaviors or incidents that may indicate a potential security threat.
V
- Vulnerability: A weakness in the security of the religious facility that could be exploited by a threat.
Remember to tailor these terms and add others specific to the nuances of security in religious environments and the curriculum of your course.