Court Storming: Who’ll Stop the Rain?

With March Madness in full swing and the NBA season winding down, it’s a good time to take a closer look at the cultural phenomenon known as court storming. In light of what recently transpired at some NCAA conference tournament games, court storming seems to rank high on the list of collegiate experiences, along with tailgating, toga parties, and beer pong. It is important to understand that court storming cannot be stopped, but it can be controlled.

As a former Director of Security for the NBA, I was only seriously concerned about this crowd control issue during the NBA Finals and, more specifically, following the deciding game for the championship. Because any post-game revelry was a serious security and safety concern, we took the appropriate steps to prepare for this occurrence. With the proper preparation and contingencies in place, risk to the players, coaches, staffs, employees, and spectators can be mitigated.

Strength in Numbers

The first step in planning for this event was training our security and ushers to protect the court. Prior to the opening of the gates, we assembled all of our event personnel and rehearsed how we would secure the floor. The plan centered around two perimeters—an outer to control access to the court and an inner to protect the teams and their family members. We used a nylon rope as a barricade that we extended around the entire court as soon as the game ended. Serving as rope holders, security and usher staff were repositioned from their assigned posts. In order to effectively exercise our plan, we made the determination to pool our resources and reallocate our assets to the floor. I am a strong advocate of strength in numbers because when you have an arena filled with 18,000 fans, you have to be equipped to stem the tide if they decide to rush the court.

Holding Court 

Next in our process was to maintain what we had established. Positioning myself inside the inner perimeter, I was able to personally observe the chaos and frenzy of the rabid fans celebrating a world championship. Fueled by euphoria and mixed with a little alcohol, this dynamic always presented a formidable foe and an omnipresent threat. The image of the little boy with his finger in the dike comes to mind, because as one hole is plugged, another ominously appears. If I saw areas on our rope line being breached, my planned response was to dispatch extra security to those locations from a cadre of personnel I had designated for that exact role. Because my contingency planning had addressed this concern, we were adequately prepared to react and respond to this hazard.

Fluid, Mobile, and Adaptable

The last piece to the puzzle was to get the teams and families off the court, and we used our inner perimeter to facilitate their movement. The use of the nylon rope offered the advantage of moving the barricade and turning the secure zone into a fluid, mobile, adaptable space. Our personnel were able to escort the players, their families, and other people off the court by creating a temporary corridor from the floor to the back-of-the-house. Safety was paramount in this operation for both participants and spectators. By separating the players from the fans, we actually reduced the possibility of an accidental injury or an intentional criminal act, such as a physical altercation.

Education and Awareness    

A comprehensive public service campaign to educate the general public about the arena’s policy on fan behavior can mitigate court storming. If spectators understand that this type of activity is prohibited, violators will be prosecuted, and ticket revocation enforced, then people might think twice before they decide to enter the field of play. Video messages on the scoreboard, announcements over the public address system, posted signage, website material, social media, and specific text on the back of the ticket all offer different means to communicate that court storming poses a safety threat and those storming the court will be dealt with swiftly, sternly, and decisively.

Post-Mortem

Containing court storming involves evaluating how this transgression is reviewed and investigated post-incident. By interviewing staff to collect evidence and reviewing videotape that documents the event, you may be able to identify patrons who have clearly violated the published protocols and in some jurisdictions broken the law, which could result in a charge of trespassing. As cliché as it might sound, it can be beneficial for the sake of security to make an example of some of these individuals and prosecute them to the full extent of the law.

No Silver Bullet

There is no panacea to eliminate court storming, but remedies can be put into place to plan, prepare, respond, and recover from these types of events. By creating security policies, educating staff, conducting ongoing training, maintaining public awareness, identifying discernible boundaries, and communicating consequences, you can put a collaborative and holistic process in place to counter this annual rite of March Madness.


The Erin Andrews Case Exposes Hotel Security

What’s trending in the news this week is the $75 million civil lawsuit filed by sportscaster and television celebrity, Erin Andrews, against three parties: a man who pleaded guilty to stalking her; West End Hotel Partners, franchise owner of the Nashville Marriott; and Windsor Capital Group, which manages the hotel.The jury needs to decide who is responsible for the crime that took take place on hotel property. Their decision will be partially influenced by assessing the security measures in place at the hotel when this criminal action occurred.

The Naked Truth

In 2009, Michael David Barrett pleaded guilty to renting hotel rooms next to Andrews in three cities, altering peepholes, and secretly shooting nude videos of her. Those previous court proceedings revealed that Barrett asked the hotel staff which room she was staying in, was provided the information, and asked to book an adjacent room. This request was granted three separate times, which allowed Barrett to film Andrews in her room through the peephole. Barrett was sentenced to 30 months in prison in March 2011 for stalking Andrews, according to federal court records in California.

Loose Lips

In assessing a security presence in any theater, campus, hospital, stadium, corporation, and, yes, hotel, the four main pillars of security—technical, physical, personnel, and procedural—need to be evaluated. The security policies, plans, and procedures are the most important piece of the four because they don’t only apply to security personnel—but  everyone on the premises needs to be aware of them. Regarding this particular case, the information management procedures need to be reviewed and evaluated to see if they addressed the disclosure of a guest room number, and if they did, were they followed?

Spread the Word

When the front desk is contacted about a hotel guest, staff should be provided specific written directions explicitly instructing what information can and cannot be shared via a telephone call, email, or an in-person inquiry. Simply stated, without a guest’s permission, no information should be shared, especially a room number. This directive needs to be fully disseminated to anyone with access to this information. A common thread to lapses in policy is a disconnect between security and non-security personnel. A continuously updated security plan with regularly scheduled training sessions will protect your organization from both inside and outside threats to maintain the safety of your employees, visitors, and clients.

Asleep at the Wheel

Most hotel floors have a substantial amount of activity during business hours. Between the hotel guests, cleaning staff, room service, maintenance people, and bellhops, enough people are coming and going to observe any unusual activity. Unfortunately, in the incidents involving Erin Andrews, no one noticed that the peephole had been altered or that Mr. Barrett had placed a camera on the door.Another security measure often overlooked in many different situations is the closed-circuit television (CCTV) video surveillance system. Optimally, someone should be monitoring this system to detect any nefarious activity, such as what occurred in this case. It doesn’t make sense to pay for security technologies if they are not going to be used properly.


The Grassroots of Marijuana Security (Part Four)

The fourth in an ongoing series, this blog discusses the connectivity between security and the medical and recreational marijuana industry. In Part One, I explained a holistic security plan for the oversight of commercial cannabis operations. In Part Two, I described the security strategy required to support the construction, implementation, operation, and sustainability of a cannabis cultivation center or dispensary. In Part Three, I delved into securing the day-to-day business operations of a legalized marijuana enterprise. And for Part Four, I examine the emerging legal and regulatory trends in this industry, specifically OSHA compliance, buffer zone rules, unregulated dispensaries, and legalized cannabis clubs.

Safe, Secure, and Compliant

Federal and state regulators are taking a bigger interest in the cannabis industry as the market develops. The Occupational Safety and Health Administration (OSHA) ensures companies are providing safe working conditions for their employees and customers by operating at both the federal and state level, depending on how the state chooses to enforce safety laws. A knowledgeable consultant, well-versed in OSHA guidelines, will benefit your business and safeguard your operations, especially if you include him or her in your strategic security initiatives. Plus, your consultant will partner with you to prepare your company for any random and unannounced site visits by OSHA inspectors that could result in fines or, as a worst-case scenario, closing down your business.

What Does It Mean to Be in The Zone?

Typically, cannabis businesses cannot be located within 1,000 feet of a Drug Free Zone, which include child care centers, educational institutions, libraries, outdoor recreation facilities, schools, and youth activity centers. It’s a big hurdle for applicants if the space for their business is near one of these locations. And this zoning restriction doesn’t just apply to new entrepreneurs getting started in this industry—it also applies to current business owners who will have to adapt or lose their business, due to revised ordinances. For example, the Detroit City Council just passed new restrictions to curb an increase in unregulated dispensaries. The dispensaries that don’t meet these new regulations, including operating under a holistic security plan, can be closed.

Organized Crime and Minors

Two of the most serious regulations your business must follow are 1) ensuring that the product is not distributed to minors and 2) guaranteeing that revenue from marijuana sales does not go to criminal enterprises. Since many of these facilities cost millions of dollars to develop, build, and operate, failure to adhere to and enforce these requirements is a death sentence for most operations. Without the assistance of a subject matter expert in the law enforcement and security fields, you put yourself at risk of engaging in these prohibited activities to some degree. The logical first step in mitigating this risk is to develop an integrated and coordinated strategy with current police practices designed to prevent these crimes.

An Interesting Dichotomy

Washington, D.C. is considering the consumption, but not the sale, of cannabis at private clubs. The sale of recreational marijuana is illegal in the city, but liberal city council members are fighting with conservative anti-cannabis lawmakers to change the law. If this ordinance passes, residents will be able to consume marijuana at select locations. In the ever-changing world of the cannabis industry, one thing remains constant: an increased vigilance in security involvement with these enterprises will ensure the safety of their staff, protect the people frequenting these clubs, and safeguard their license to operate the business.


Super Bowl Needs Super Security

This weekend marks the 50th anniversary of the Super Bowl, which arguably has become the biggest one-day event on the planet. Other major sporting events like the Olympics and soccer’s World Cup garner worldwide coverage and enthusiasm, but those events are spread over weeks compared to this one-game world championship. Many make the case that the Super Bowl is more than just one day, and I wouldn’t argue against it. An assortment of events leads up to the big game including media appearances, corporate functions, and NFL-experience sessions for the fans. All this hoopla and global attention call for the need for unparalleled security measures. The Super Bowl certainly requires super-sized security and I’ll explain how to tackle this challenge.  

Strength in Numbers                                                       

An enormous number of stakeholders is involved in the creation, design, and implementation of a security plan for a Super Bowl. I have had the opportunity to contribute to the security plans for previous Super Bowls in San Diego and New Orleans. Based on my experiences, the best practice-based approach begins the process by identifying the entities associated with the event and separating them into the following categories: federal, state, local, and private. As the next step divides these groups within their respective categories, I will use the Feds as an example. Some of the federal agencies involved are FBI, Secret Service, FEMA, TSA, FAA, U.S. Customs and Border Patrol, and U.S. Coast Guard. This list is not inclusive and other federal agencies will contribute to the security plan.

It’s Important to Know Your Role

Continuing with the federal entities as an example, it’s important to separate the responsibilities of the partners that will be contributing to the security design. Here is what those roles could look like by agency:
• FBI—collecting intelligence, monitoring terrorist groups
• Secret Service—assisting with the creation of the security plan
• FEMA—preparing for any mass casualty incident
• TSA—coordinating domestic and international flights associated with the event
• FAA—implementing no fly zones for aircraft including drones
• U.S. Customs and Border Patrol—screen foreign visitors, airspace security
• U.S. Coast Guard—protecting the waters near the venue

These roles are a microcosm of the prevention, planning, and preparedness that goes into a security plan for any event the scale of a Super Bowl. Think about what is being done at the state and local level. The host city is tapping into every neighboring jurisdiction for support from police departments, fire departments, emergency managers, and county agencies.

Divide and Conquer

Another important piece to the puzzle is to combine these assets into a multi-jurisdictional structure that can maximize your resources. The committee structure has been very effective and allows for these different entities to work side-by-side. These committees represent various areas of responsibility, such as credentialing, legal, tactical, intelligence, and cyber security. For example, the Emergency Medical Committee will have representatives from hospitals, ambulance services, physicians, EMTs, emergency management agencies, fire departments, and the CDC (Center for Disease Control). One of the greatest challenges is to ensure every security- and safety-related discipline has been accounted for.

What Else Goes Into the Plan?

You need to establish additional security measures at the airports, hotels, practice facilities, air space, transportation routes, trains, and waterways. Security perimeters have to be created along with the screening of people, packages, and vehicles such as x-raying the cargo of trucks making deliveries to the stadium. Chemical and biological sensors will need to be placed around the site to detect any harmful gases. Fans will need to pass through metal detection systems and be subjected to baggage inspection and pat-downs. Counterfeit ticketing and ticket scalping will be addressed along with fake merchandising. So, as you can see, a lot of moving parts must be considered to provide a holistic security plan for an event like the Super Bowl. Just make sure your plans are super-sized.


High Stakes for High-Rise Security and Safety

The global image of every major urban area throughout the world is shaped and characterized by the tall and dynamic structures that pierce the city skyline. And because husbands and wives, mothers and fathers, daughters and sons spend their days within these structures, protecting human lives is paramount to successful high-rise security. The recent fire that engulfed a 63-story hotel in Dubai on New Year’s Eve stands as a real-world example of the dangers high-rise buildings, their managers, and their occupants face every day.

It All Starts with Access Control

No matter how tall or big a building may be, the #1 security and safety concern is controlling access to the property. Access control is not only about people entering the site, but it also concerns vehicles, mail, packages, deliveries, and equipment. Different types of people — residents, employees, contractors, clients, visitors, and service personnel — can be separated by their respective reasons for requiring access to the building.

A truly holistic approach to protecting the building and the people within it addresses all access control areas, individually evaluates each entry point, and offers specifically tailored measures to control access. While an ID badging system will filter and identify individuals once they are on the property, the loading dock for entry of deliveries and trucks and the mailroom used to screen packages require other means to control access. Some of the more sophisticated access control measures are x-ray screening, metal detection, and biometric readers.

Let’s Talk About Hardening the Target

Security- and safety-related policies and procedures, such as visitor management and mail screening, can assist in mitigating risk to a high-rise building along with these tangible items that can harden a venue:
• Property barriers
• Vehicle barricades
• Blast resistant window film
• Electronic locking devices
• Signage
• Card access systems
• Intrusion detection systems
• Video surveillance systems
• Lighting

These examples offer different options for you to consider when crafting the security posture for the property. Highly visible signs that inform visitors of the building rules, list prohibited firearms, or point to an emergency exit can increase safety and provide cost-effective solutions. More expensive items such as closed-circuit television (CCTV) are typically planned and allocated within a security budget. Regardless of cost, these areas need to be addressed to harden the property.

How Do I Escape From the Penthouse?

One of the greatest challenges of effective high-rise security involves an emergency evacuation from a floor higher than a rescue ladder can reach. Since most hook and ladders cannot go above the 10th floor, a well-designed and continuously trained emergency evacuation plan combats this logistical issue as well as other challenges inherent to building security. All occupants should know what to do in an evacuation and where to go regardless of where they are in the building. You must be committed to education and dissemination of critical information, such as the location of the emergency exits and shelters areas, if evacuation is not possible.

What Else Do I Need to Know?

Additionally, you need to follow fire codes, test smoke detectors, conduct fire drills, assign emergency roles, designate floor monitors, select searchers, and coordinate with first responders. You must make current rosters of building personnel available, including handicapped and elderly individuals, and publicize basic fire safety “don’ts” like using an elevator, moving to the roof, or breaking a window. Be sure to recognize that information is your great ally—the more that you can provide, the greater the potential for a safe outcome.


How Planning and Preparedness Saved 80,000 Lives

We all watched in horror last week as Paris suffered a tremendous tragedy when terrorists targeted innocent citizens in multiple locations across the city. People lost their lives as they were caught up in the evil cast by these ruthless extremists. Could this be a warning of how our society is changing? These events were suicide missions somberly exhibited by the self-induced deaths of a number of terrorists. The radicals struck nighttime places of entertainment—restaurants, bars, a concert hall, and a sports stadium. This is the enemy and it is extremely important to understand that they are willing to sacrifice their lives for their cause.

Of all the targeted locations, the stadium was the brass ring. The planned strike entailed three suicide bombers detonating explosives vests inside the venue where 80,000 people were cheering on a soccer game between France and Germany. Authorities have speculated this site was chosen because these two countries represent Western Christianity and the venue offered the potential for a high body count. The actions that security personnel took to prevent this attack contribute to a textbook example of how security planning and emergency preparedness can save lives.

If You Can’t Control Access, You Can’t Control Anything 

You can have every bell, whistle, and the latest, greatest, cutting edge, state-of-the-art, innovative, protective security countermeasure or risk mitigation tool in the world, and none of them will be effective in protecting your venue if you cannot control access. The definitive access control strategy is a disciplined, thorough, and comprehensive approach to filtering all personnel, assets, services, and equipment seeking entry into the site. This paradigm applies to everyone and everything—from employees, part-time workers, and general public to vehicles, mail, and deliveries to drones, helicopters, and unauthorized aircraft. It all begins and ends with controlling access.

The Importance of Gatekeepers

A suicide bomber tried to enter the stadium 15 minutes after the match started. The security officer at the gate followed established protocol to conduct pat downs before allowing access. This security measure prompted the terrorist to back away from the gate and detonate a bomb wrapped with hundreds of nails. The terrorist was killed along with one passerby. About 10 minutes later, another suicide bomber detonated an explosive vest outside another gate, killing only himself. Approximately 20 minutes later, a third terrorist detonated an explosive device outside the stadium, blowing himself up but no one else. Security did its job and prevented what could have been a mind-numbing tragedy.   

Lockdown and Shelter-In-Place

Following the three explosions, the authorities responsible for securing the stadium and protecting its occupants needed to make some critical decisions under tremendous pressure. They decided to keep everyone inside the facility and not allow anyone to leave, determining that the stadium was the safest place to be considering the events in downtown Paris at the time. The people were eventually allowed to leave hours later, but the German soccer team decided to spend most of the night on the field. Mattresses were made available and the team slept inside the stadium until transportation could be arranged for travel to the airport. The site of what could have been one of the most horrific terrorist events in history ended up as a safe haven for a city under siege. 

After Action and Lessons Learned

Professionals in law enforcement, fire, emergency medical, emergency management, and security all advocate learning lessons from real world events. The best example is an After Action Report that assesses security and emergency management plans and documents what went right and what could have been done better. What was done right at the stadium:

1) Searching and screening (pat downs at the gate)

2) Access control (preventing the terrorists from entering)

3) Shelter-in-place (80,000 people kept inside the stadium out of harm’s way)

Lives were saved by the brave individuals responsible for safeguarding the stadium who demonstrated great leadership and decision making in the face of unfathomable adversity.


What Is the Best Way to Stop an Active Shooter?

Unfortunately, our country continues to be plagued by tragedies caused by individuals with unregulated access to firearms. What compounds this serious issue is the deadly consequences created by a society that allows people without the legal authority or proper mental capacity to possess weapons. There is no silver bullet or panacea to stem the tide of these horrific events that are occurring all too often, but we can take steps to create a safer environment.

An all-inclusive approach that cuts to the heart of this problem and attacks the genesis of these events is required, rather than responding to the aftermath of the event itself. Instead of focusing most of our attention, energy, and efforts on what can be done to stop an active shooter during one of these attacks, let’s step back and try to determine what caused the incident in the first place.

It All Begins at the Beginning

Your goal should be to identify individuals before they have the means, mindset, and motive to carry out their violence. These events are not spontaneous—people don’t just “snap” and set out on a killing spree. Instead they are premeditated, planned, and if you look closely enough, announced. Having your organization supported by policy is the foundation to an Active Shooter Plan. You need to have the capability to identify, assess, and control anyone exhibiting traits that can be categorized as pre-attack indicators, which without intervention could manifest into violence.

Horizontally, Vertically, and Across an Organization

“Power in numbers” is another remedial action that results in a multi-disciplinary approach with select people up, down, and parallel in your organization, designated to prevent active shooter incidents. Individuals with diverse backgrounds, skill sets, and experience will come together and work collaboratively to design a plan to mitigate this threat. After forming a committee of representatives from entities such as management, law enforcement security, medical, mental health, fire, legal, HR, and training, this group will be charged with the mission to collectively develop a strategy and processes for preventing, controlling, and resolving an active shooter scenario.

Addressing Workplace Violence Protects Against an Active Shooter

Because an active shooter event is the most serious form of workplace violence, you must focus on mitigation and creating the processes that prevent any behavior deemed irregular or inappropriate from occurring. To be adequately prepared, you need to direct your attention to security, personnel, policies, procedures, systems, and physical measures. Examples are private guards (security), clinical health professionals (personnel), code of conduct (policies), employee assistance program (procedures), blast text messaging (systems), and lock-operated access points (physical measures). All of these disciplines contribute to the framework of the plan.

Signs, Signs, Everywhere a Sign

Because each situation is unique, knowing the signs to look for using professional judgment or outside assistance may be necessary to determine if intervention is necessary. Some of these signs are: disruptive behavior; physical injuries; absenteeism or tardiness; poor job performance; stalking a co-worker; inappropriate comments; threatening emails; and harassing phone calls. All of these signs could be an indication of a much more serious problem that may require identifying, assessing, and managing a potential violent situation.

Out With the Old and In With the New

The antiquated way to deal with a problem was to remove it. History has taught us that eliminating the source does not resolve the issue. It used to be that workplace managers fired, police officers arrested, and school principals expelled. None of these actions puts an end to the threat; they just delay it. Eventually, people get out of jail or return to the workplace or school to bring closure for themselves. Your best remedy is to have mechanisms that not only prevent, but also treat.

All of these recommended measures that I’ve presented have to be created, implemented, and when necessary, applied. Until then, a truly holistic program is not in place to protect your most valuable assets—your people—against the threat of an active shooter.


Emergency Management Is No Laughing Matter

Located in Chicago, the iconic comedy club Second City is renowned for its legendary comedians and famous alumni like John Belushi, Dan Aykroyd, Bill Murray, and Tina Fey. Recently, Second City was in the news, but not for comedy. A fire started in the kitchen of a restaurant that shares the building with Second City, destroying the offices. The theater in the next building was spared, but tenants were forced to relocate. Because I am a security practitioner, my first thought after learning no one was seriously injured, “Was there an emergency management plan?

An all-hazards approach prepares for all kinds of emergencies since emergency plans rarely cover everything that might be required for an incident. Because the evacuation requirements for a fire may differ significantly from those for a hazardous materials spill, the plan needs to be adaptable to circumstances, innovative, and, when necessary, improvisational. An all-hazards plan provides a basic framework for responding to a wide variety of emergencies.

An Ounce of Prevention Is Worth a Pound of Cure      

Simply stated, the recommended approach to preparing for an emergency begins with the plan. Your plan should address the four phases of emergency management: (1) prevention, (2) preparedness, (3) response, and (4) recovery. The first phase of the plan, prevention, includes any activities that are preventative, reduce the chance of an emergency happening, or mitigate the damaging effects of unavoidable emergencies. A practical example is an emergency notification system to alert people of a security- or safety-related incident in real time.

When You’re Prepared There is No Pressure

The famous Notre Dame football coach, Lou Holtz, was once asked before a big game if he was nervous. Coach Holtz stated, “When you’re prepared, there is no pressure.” This mantra also applies to an emergency, and as long as you know that you have done everything you can to prepare for an incident, then you don’t need to be nervous about the outcome. The second phase, preparedness, details measures needed to prepare for an emergency. Training is at the heart of preparedness, and specific examples include a fire drill conducted to familiarize building occupants with emergency evacuation routes and the shelter-in-place stocking of items like water, food, and blankets.

Every Emergency Is an Incident, but Not Every Incident Is an Emergency

The third phase, response, has general actions including moving people to a safe room or assembly area and turning off gas lines in a fire scenario. A well-constructed plan also outlines specific roles and responsibilities for designated personnel to perform once an incident occurs and may prevent it from becoming an emergency. This orchestrated response not only mitigates danger, it also brings calm to potential chaos. If people know how to respond during an incident, it might not become an emergency. We want to be able to pour water on the fire, not gasoline; or in other words, douse the flames, not fan the fire.

What Doesn’t Kill You…

The saying “What doesn’t kill you, makes you stronger” definitely applies to recovering from an emergency. Now that the event is over, how will you recover? How will you continue to serve and support your employees, as well as your clients? A well-crafted and thought-out plan has a recovery process to allow continuity of operations without disrupting business. Recovery from an emergency includes implementing actions to return to normal operations or to an even safer situation following an incident. Temporary housing, an alternate work site, and individual counseling are all parts of this process. Following these four phases will prepare you for all types of emergencies and may even allow you to crack a smile in the face of danger.


How to Protect President Donald J. Trump

It seems that Donald J. Trump has taken the fight to the Republican Party and shows no signs of going away as a serious candidate to become the GOP presidential nominee. As a matter of fact, at this point if it were a boxing match, the referee might have to stop the bout because the other contenders are bloodied, battered and beaten. Ever since he jumped into this race, Mr. Trump has been on the attack and the mainstay of his campaign has been to punch and counterpunch his competitors as well as his critics. Just ask John McCain, Lindsey Graham, Hillary Clinton, and Megyn Kelly, to name a few, how it feels to be in the crosshairs of The Donald.

High Profile Equals High Exposure

In today’s political world, these candidates become high-profile targets because of their high exposure. Due in part to the Internet and social media, sensitive information about candidates, such as addresses of private residences, family members, salaries, and business ventures, are accessible to the public. And magnifying this exposure, the candidates are constantly attending public events, especially in Iowa and New Hampshire that require maneuvering through crowds of unscreened people at functions such as state fairs and parades. A preventative protective methodology balances ends, ways, means, and threats to identify and assess risks in these scenarios and opportunistic vulnerabilities. To reach optimum event security, a thorough process of properly trained and prepared security personnel analyze appropriate risk control measures and apply interrelated countermeasures and protective tactics to harden these events.

I Stepped Into a Burning Ring of Fire

Event security planning can be more easily described by explaining the “ring” methodology. The five rings of protection are: (1) the outer perimeter typically secured by public sector personnel at the federal, state, and local level, filtering people, equipment, and vehicles requiring event access; (2) the middle perimeter is the event security assets comprised of private security guards and law enforcement officers screening and controlling entry; (3) the inner perimeter is the restricted areas inside the event site, such as the stage; (4) the fourth perimeter is the intelligence collection and information sharing between the private and public sectors; and (5) the fifth perimeter, the life blood of the event, is cyber security dedicated to critical infrastructure, including electricity, power grid, water, and communications.

If You’re Not First, You’re Last

Armed with the “knowledge and power of the rings,” a best practice-based event security template identifies appropriate countermeasures that will lower the various levels of risk. The countermeasures and design alternatives are specifically tailored to address an event security operational plan, executive protection measures, emergency preparedness policies, interoperable communications, and risk mitigation strategies. I believe the ability to meet security, risk management, and emergency preparedness objectives will—at many critical junctures—rise or fall on whether the security team can execute-to-plan. That is the benchmark and you should never settle for anything other than the highest level of execution and performance when designing your event security and executive protection strategies.

Imitation is the Sincerest Form of Flattery

Best practices in executive protection should be benchmarked to determine the most effective and efficient operations suitable for the candidate and the event. Following how the best executive protection programs keep apprised of emerging threats while also staying informed of industry trends in countering these risks will strengthen your own strategy. The advance work that precedes the arrival of the candidate is just as, if not more, important than the security employed during the event. A laser-focused emphasis needs to be placed on the preparations, strategies, instructions, and responses, so that if any crisis were to occur, all contingencies are in place.

Even though many of us are not experienced with protecting a presidential candidate as he or she moves through large-scale event venues, the tenants of rock solid executive protection and event security plans are still paramount to your own specific needs and situations.


The Grassroots of Marijuana Security (Part Three)

This blog is the third in a three part series, discussing the connectivity between security and the medical and recreational marijuana industry. In Part One I tackled a holistic security plan for the oversight of commercial cannabis operations. In Part Two, I explained the security strategy to support the construction, implementation, operation, and sustainability of a cannabis cultivation center or dispensary. For Part Three, I am delving into securing the day-to-day business operations of a legalized marijuana enterprise. Specifically, I examine the design and creation of a comprehensive security standard to mitigate risk to employees, products, money, operation, and brand that can and should be addressed directly by incorporating security strategies through an integrated approach in a number of areas.

You Can’t Make an Omelet without Breaking Eggs

After identifying the particular needs and challenges of a commercial cannabis business, the proposed security path is based on my professional experience as an expert in securing private and public properties. I recommend a strategic business model that addresses specific security goals and objectives and avoids disrupting business operations or negatively impacting the aesthetics of the venue. However, there will be some growing (another bad pun!) pains as I craft a strategy and vision built to last. The potential domino effect from this model is a unique security environment that may take some getting used to. The best example is a searching policy to mitigate diversion of product or theft of funds. Employees working in this industry will need to be prepared to have their packages, workspace, vehicles, lockers, and attire inspected when entering and exiting the facility. If employees are uncomfortable with these processes and procedures, then they will probably need to find another line of work.

If You Build It They Will Come

The paramount goal of a successful business model in the cannabis industry is to protect people, product, property, brand, and assets. The business will thrive when people see that protection is an important part of the company’s mission. Employees are more likely to see security as a company priority if management visibly supports security efforts and initiatives. Some of the best ways to demonstrate that support are to include security as one of management’s core values and to promulgate official company policies regarding security. Customers are more likely to frequent your place of business knowing that a great deal of thought and effort has gone into creating a safe and secure environment. Access control standards and practices and the ability to screen and filter all personnel, services, deliveries, and equipment seeking access to the dispensary and its environs are crucial. The design also includes training curriculums, security awareness and education materials, emergency preparedness, fire prevention, and employee assistance programs, among many areas. Additional documents and policies will further protect your investment by focusing on strategies such as social media, open-source intelligence and analysis, technical surveillance, threat assessment, and incident response.

Security Technology Is Like Taking a Drink from a Fire Hydrant

Security technologies evolve at such a breakneck pace that as soon as your systems are installed they seem outdated. The only way to stay ahead of this curve is through the implementation, use, and effectiveness of the latest security systems and technologies, such as digital closed-circuit video surveillance equipment, exterior and perimeter security systems and monitoring, electronic access control systems, automated alerts, and information-sharing software. A well-qualified and experienced systems integrator can be worth their weight in gold because they can bring to your operation best-in-class performance and capabilities regardless of the product company. This independence will keep you away from vendors who push their own equipment without properly evaluating its effectiveness for your situation.

Many Receive Advice, but Few Profit from It

A trusted advisor can provide insight and counsel based on an institutional knowledge of the security industry often attained by sharing information and acting as a liaison with the federal, state, and local law enforcement and regulatory agencies. This model focuses on service to clients by developing strategic security relationships. Acting as a reliable and dependable confidant while offering an objective and independent voice, I not only keep you apprised of emerging threats but also informed of industry trends in countering these risks. In this fast-paced and ever-changing environment, the Lake Forest Group’s market leadership is maintained by a steadfast emphasis on research, analysis, and continuous interaction with subject matter experts who are leaders in their field.