Skip to content
Menu
menu

Extremism Against Places of Worship Extends Across Faiths

Hot-button political issues are a leading reason for violence at places of worship. Not every one of these incidents is committed by a member of an organized extremist group—whether right-, left-, or alt-leaning—but all are concerning and deserve in-depth review to determine how they might affect future house of worship security. Are the attacks planned and organized or a random mob reacting to a recent event, choosing to act in anger instead of creating a dialogue toward reconciliation and peace? Have criminal gangs evolved into political extremists? Are these events perpetrated by lone actors or groups?

Read More

Featured Articles

Security Management: Focus on House of Worship Security

Extremism Against Places of Worship Extends Across Faiths

Houses of worship across many religions faced a spike in security incidents in recent years, whether driven by the response to a controversial event or a longstanding tension or discrimination. In this collection of articles from Security Management, explore how security and religious leaders are tracking threats, changing mindsets, and preparing for extremist-linked incidents. 

More On This Topic
5 Underlying Reasons for Extremist Attacks on Houses of Worship
How Faith-Based Organizations Can Improve Threat Intelligence Collection
Infographic: How to Build Priority Lists for Threat Monitoring
PRAY: A Model to Change Mindsets about Security in Houses of Worship
4 Steps to Mitigate Crime Risks at Houses of Worship
Fast Facts: 11 Security Scenarios Religious Personnel Should Prepare For

Illustration of  a hand pushing a globe off a cliff.

Security Technology: Supply Chain Challenges and Opportunities

Semiconductor shortages. Trucking delays. Counterfeits and compromises. Cargo ships stuck in canals. Sanctions stopping supplies. Society depends on supply chains, and when they’re broken, stalled, or compromised, the ripple effects are enormous. This issue of Security Technology explores supply chain security, from the technology that’s helping monitor and secure the physical movement of goods to threats to software supply chains to vetting of third-party suppliers and more.

Security Management Podcast

March 2023: Are You Ready for What’s Next? Evacuations, Resilience, and Pitching New Ideas

Do you have the infrastructure, programs, and soft skills in place to adapt to any situation? In this episode of Security Management Highlights, host Brendan Howard speaks with Dale Buckner about mass evacuations and duty of care; ASIS Europe co-chairs Inge Huijbrechts and Gavin Henderson discuss the business case for sustainability and resilience; and Suzanna Alsayed gives some practical advice about how to ready your reputation—and your pitch—to increase chances of buy-in success.

Want to learn more about these topics? Check out additional resources from Security Management and ASIS International:

Focus on Bomb Threats

Historically Black, Historically Targeted

Historically Black colleges and universities were increasingly targeted by bomb threats in 2022. The incidents, however, are just part of a longer pattern of violence and intimidation towards Black institutions in the United States.

An Explosive Situation: Strategies to Prevent Youth Radicalization

A recent wave of bomb threats against historically Black colleges and universities said to be made by a juvenile highlights how extremist ideologies are being spread in places where young people congregate. It also highlights the need for resources to help community members effectively intervene.

ASIS Calendar of Webinars & Events

As the preeminent organization for security management professionals, ASIS International offers a dynamic calendar of events to advance your professional development. From executive education to global exchanges, our events work together to help you reach new heights in your career.

Book Review: The Psychology of Extremism

The Psychology of Extremism: A Motivational Perspective is a compilation of research on humans’ engagement in extremism.

Catch Up With SM on Social Media

Be the first to hear about new SM articles, issues, videos, and more on Twitter.
Share the latest SM articles, infographics, and stories with your friends and colleagues.
Get more award-winning security content in your search results by following us on Google News.
record_voice_over

Podcasts

Hear what Security Management editors and guest speakers have to say about this month’s magazine.

cast_for_education

Webinars

View all of our past and upcoming educational webinars.

co_present

Media Kit

Learn more about opportunities to partner with Security Management for editorial, marketing, or research purposes. 

cloud_download

Download

ASIS Members: Download all the latest editions of Security Managment for your PC, tablet, or mobile device.

arrow_upward