Court Storming: Who’ll Stop the Rain?

With March Madness in full swing and the NBA season winding down, it’s a good time to take a closer look at the cultural phenomenon known as court storming. In light of what recently transpired at some NCAA conference tournament games, court storming seems to rank high on the list of collegiate experiences, along with tailgating, toga parties, and beer pong. It is important to understand that court storming cannot be stopped, but it can be controlled.

As a former Director of Security for the NBA, I was only seriously concerned about this crowd control issue during the NBA Finals and, more specifically, following the deciding game for the championship. Because any post-game revelry was a serious security and safety concern, we took the appropriate steps to prepare for this occurrence. With the proper preparation and contingencies in place, risk to the players, coaches, staffs, employees, and spectators can be mitigated.

Strength in Numbers

The first step in planning for this event was training our security and ushers to protect the court. Prior to the opening of the gates, we assembled all of our event personnel and rehearsed how we would secure the floor. The plan centered around two perimeters—an outer to control access to the court and an inner to protect the teams and their family members. We used a nylon rope as a barricade that we extended around the entire court as soon as the game ended. Serving as rope holders, security and usher staff were repositioned from their assigned posts. In order to effectively exercise our plan, we made the determination to pool our resources and reallocate our assets to the floor. I am a strong advocate of strength in numbers because when you have an arena filled with 18,000 fans, you have to be equipped to stem the tide if they decide to rush the court.

Holding Court 

Next in our process was to maintain what we had established. Positioning myself inside the inner perimeter, I was able to personally observe the chaos and frenzy of the rabid fans celebrating a world championship. Fueled by euphoria and mixed with a little alcohol, this dynamic always presented a formidable foe and an omnipresent threat. The image of the little boy with his finger in the dike comes to mind, because as one hole is plugged, another ominously appears. If I saw areas on our rope line being breached, my planned response was to dispatch extra security to those locations from a cadre of personnel I had designated for that exact role. Because my contingency planning had addressed this concern, we were adequately prepared to react and respond to this hazard.

Fluid, Mobile, and Adaptable

The last piece to the puzzle was to get the teams and families off the court, and we used our inner perimeter to facilitate their movement. The use of the nylon rope offered the advantage of moving the barricade and turning the secure zone into a fluid, mobile, adaptable space. Our personnel were able to escort the players, their families, and other people off the court by creating a temporary corridor from the floor to the back-of-the-house. Safety was paramount in this operation for both participants and spectators. By separating the players from the fans, we actually reduced the possibility of an accidental injury or an intentional criminal act, such as a physical altercation.

Education and Awareness    

A comprehensive public service campaign to educate the general public about the arena’s policy on fan behavior can mitigate court storming. If spectators understand that this type of activity is prohibited, violators will be prosecuted, and ticket revocation enforced, then people might think twice before they decide to enter the field of play. Video messages on the scoreboard, announcements over the public address system, posted signage, website material, social media, and specific text on the back of the ticket all offer different means to communicate that court storming poses a safety threat and those storming the court will be dealt with swiftly, sternly, and decisively.

Post-Mortem

Containing court storming involves evaluating how this transgression is reviewed and investigated post-incident. By interviewing staff to collect evidence and reviewing videotape that documents the event, you may be able to identify patrons who have clearly violated the published protocols and in some jurisdictions broken the law, which could result in a charge of trespassing. As cliché as it might sound, it can be beneficial for the sake of security to make an example of some of these individuals and prosecute them to the full extent of the law.

No Silver Bullet

There is no panacea to eliminate court storming, but remedies can be put into place to plan, prepare, respond, and recover from these types of events. By creating security policies, educating staff, conducting ongoing training, maintaining public awareness, identifying discernible boundaries, and communicating consequences, you can put a collaborative and holistic process in place to counter this annual rite of March Madness.


The Erin Andrews Case Exposes Hotel Security

What’s trending in the news this week is the $75 million civil lawsuit filed by sportscaster and television celebrity, Erin Andrews, against three parties: a man who pleaded guilty to stalking her; West End Hotel Partners, franchise owner of the Nashville Marriott; and Windsor Capital Group, which manages the hotel.The jury needs to decide who is responsible for the crime that took take place on hotel property. Their decision will be partially influenced by assessing the security measures in place at the hotel when this criminal action occurred.

The Naked Truth

In 2009, Michael David Barrett pleaded guilty to renting hotel rooms next to Andrews in three cities, altering peepholes, and secretly shooting nude videos of her. Those previous court proceedings revealed that Barrett asked the hotel staff which room she was staying in, was provided the information, and asked to book an adjacent room. This request was granted three separate times, which allowed Barrett to film Andrews in her room through the peephole. Barrett was sentenced to 30 months in prison in March 2011 for stalking Andrews, according to federal court records in California.

Loose Lips

In assessing a security presence in any theater, campus, hospital, stadium, corporation, and, yes, hotel, the four main pillars of security—technical, physical, personnel, and procedural—need to be evaluated. The security policies, plans, and procedures are the most important piece of the four because they don’t only apply to security personnel—but  everyone on the premises needs to be aware of them. Regarding this particular case, the information management procedures need to be reviewed and evaluated to see if they addressed the disclosure of a guest room number, and if they did, were they followed?

Spread the Word

When the front desk is contacted about a hotel guest, staff should be provided specific written directions explicitly instructing what information can and cannot be shared via a telephone call, email, or an in-person inquiry. Simply stated, without a guest’s permission, no information should be shared, especially a room number. This directive needs to be fully disseminated to anyone with access to this information. A common thread to lapses in policy is a disconnect between security and non-security personnel. A continuously updated security plan with regularly scheduled training sessions will protect your organization from both inside and outside threats to maintain the safety of your employees, visitors, and clients.

Asleep at the Wheel

Most hotel floors have a substantial amount of activity during business hours. Between the hotel guests, cleaning staff, room service, maintenance people, and bellhops, enough people are coming and going to observe any unusual activity. Unfortunately, in the incidents involving Erin Andrews, no one noticed that the peephole had been altered or that Mr. Barrett had placed a camera on the door.Another security measure often overlooked in many different situations is the closed-circuit television (CCTV) video surveillance system. Optimally, someone should be monitoring this system to detect any nefarious activity, such as what occurred in this case. It doesn’t make sense to pay for security technologies if they are not going to be used properly.


The Grassroots of Marijuana Security (Part Four)

The fourth in an ongoing series, this blog discusses the connectivity between security and the medical and recreational marijuana industry. In Part One, I explained a holistic security plan for the oversight of commercial cannabis operations. In Part Two, I described the security strategy required to support the construction, implementation, operation, and sustainability of a cannabis cultivation center or dispensary. In Part Three, I delved into securing the day-to-day business operations of a legalized marijuana enterprise. And for Part Four, I examine the emerging legal and regulatory trends in this industry, specifically OSHA compliance, buffer zone rules, unregulated dispensaries, and legalized cannabis clubs.

Safe, Secure, and Compliant

Federal and state regulators are taking a bigger interest in the cannabis industry as the market develops. The Occupational Safety and Health Administration (OSHA) ensures companies are providing safe working conditions for their employees and customers by operating at both the federal and state level, depending on how the state chooses to enforce safety laws. A knowledgeable consultant, well-versed in OSHA guidelines, will benefit your business and safeguard your operations, especially if you include him or her in your strategic security initiatives. Plus, your consultant will partner with you to prepare your company for any random and unannounced site visits by OSHA inspectors that could result in fines or, as a worst-case scenario, closing down your business.

What Does It Mean to Be in The Zone?

Typically, cannabis businesses cannot be located within 1,000 feet of a Drug Free Zone, which include child care centers, educational institutions, libraries, outdoor recreation facilities, schools, and youth activity centers. It’s a big hurdle for applicants if the space for their business is near one of these locations. And this zoning restriction doesn’t just apply to new entrepreneurs getting started in this industry—it also applies to current business owners who will have to adapt or lose their business, due to revised ordinances. For example, the Detroit City Council just passed new restrictions to curb an increase in unregulated dispensaries. The dispensaries that don’t meet these new regulations, including operating under a holistic security plan, can be closed.

Organized Crime and Minors

Two of the most serious regulations your business must follow are 1) ensuring that the product is not distributed to minors and 2) guaranteeing that revenue from marijuana sales does not go to criminal enterprises. Since many of these facilities cost millions of dollars to develop, build, and operate, failure to adhere to and enforce these requirements is a death sentence for most operations. Without the assistance of a subject matter expert in the law enforcement and security fields, you put yourself at risk of engaging in these prohibited activities to some degree. The logical first step in mitigating this risk is to develop an integrated and coordinated strategy with current police practices designed to prevent these crimes.

An Interesting Dichotomy

Washington, D.C. is considering the consumption, but not the sale, of cannabis at private clubs. The sale of recreational marijuana is illegal in the city, but liberal city council members are fighting with conservative anti-cannabis lawmakers to change the law. If this ordinance passes, residents will be able to consume marijuana at select locations. In the ever-changing world of the cannabis industry, one thing remains constant: an increased vigilance in security involvement with these enterprises will ensure the safety of their staff, protect the people frequenting these clubs, and safeguard their license to operate the business.


Super Bowl Needs Super Security

This weekend marks the 50th anniversary of the Super Bowl, which arguably has become the biggest one-day event on the planet. Other major sporting events like the Olympics and soccer’s World Cup garner worldwide coverage and enthusiasm, but those events are spread over weeks compared to this one-game world championship. Many make the case that the Super Bowl is more than just one day, and I wouldn’t argue against it. An assortment of events leads up to the big game including media appearances, corporate functions, and NFL-experience sessions for the fans. All this hoopla and global attention call for the need for unparalleled security measures. The Super Bowl certainly requires super-sized security and I’ll explain how to tackle this challenge.  

Strength in Numbers                                                       

An enormous number of stakeholders is involved in the creation, design, and implementation of a security plan for a Super Bowl. I have had the opportunity to contribute to the security plans for previous Super Bowls in San Diego and New Orleans. Based on my experiences, the best practice-based approach begins the process by identifying the entities associated with the event and separating them into the following categories: federal, state, local, and private. As the next step divides these groups within their respective categories, I will use the Feds as an example. Some of the federal agencies involved are FBI, Secret Service, FEMA, TSA, FAA, U.S. Customs and Border Patrol, and U.S. Coast Guard. This list is not inclusive and other federal agencies will contribute to the security plan.

It’s Important to Know Your Role

Continuing with the federal entities as an example, it’s important to separate the responsibilities of the partners that will be contributing to the security design. Here is what those roles could look like by agency:
• FBI—collecting intelligence, monitoring terrorist groups
• Secret Service—assisting with the creation of the security plan
• FEMA—preparing for any mass casualty incident
• TSA—coordinating domestic and international flights associated with the event
• FAA—implementing no fly zones for aircraft including drones
• U.S. Customs and Border Patrol—screen foreign visitors, airspace security
• U.S. Coast Guard—protecting the waters near the venue

These roles are a microcosm of the prevention, planning, and preparedness that goes into a security plan for any event the scale of a Super Bowl. Think about what is being done at the state and local level. The host city is tapping into every neighboring jurisdiction for support from police departments, fire departments, emergency managers, and county agencies.

Divide and Conquer

Another important piece to the puzzle is to combine these assets into a multi-jurisdictional structure that can maximize your resources. The committee structure has been very effective and allows for these different entities to work side-by-side. These committees represent various areas of responsibility, such as credentialing, legal, tactical, intelligence, and cyber security. For example, the Emergency Medical Committee will have representatives from hospitals, ambulance services, physicians, EMTs, emergency management agencies, fire departments, and the CDC (Center for Disease Control). One of the greatest challenges is to ensure every security- and safety-related discipline has been accounted for.

What Else Goes Into the Plan?

You need to establish additional security measures at the airports, hotels, practice facilities, air space, transportation routes, trains, and waterways. Security perimeters have to be created along with the screening of people, packages, and vehicles such as x-raying the cargo of trucks making deliveries to the stadium. Chemical and biological sensors will need to be placed around the site to detect any harmful gases. Fans will need to pass through metal detection systems and be subjected to baggage inspection and pat-downs. Counterfeit ticketing and ticket scalping will be addressed along with fake merchandising. So, as you can see, a lot of moving parts must be considered to provide a holistic security plan for an event like the Super Bowl. Just make sure your plans are super-sized.


High Stakes for High-Rise Security and Safety

The global image of every major urban area throughout the world is shaped and characterized by the tall and dynamic structures that pierce the city skyline. And because husbands and wives, mothers and fathers, daughters and sons spend their days within these structures, protecting human lives is paramount to successful high-rise security. The recent fire that engulfed a 63-story hotel in Dubai on New Year’s Eve stands as a real-world example of the dangers high-rise buildings, their managers, and their occupants face every day.

It All Starts with Access Control

No matter how tall or big a building may be, the #1 security and safety concern is controlling access to the property. Access control is not only about people entering the site, but it also concerns vehicles, mail, packages, deliveries, and equipment. Different types of people — residents, employees, contractors, clients, visitors, and service personnel — can be separated by their respective reasons for requiring access to the building.

A truly holistic approach to protecting the building and the people within it addresses all access control areas, individually evaluates each entry point, and offers specifically tailored measures to control access. While an ID badging system will filter and identify individuals once they are on the property, the loading dock for entry of deliveries and trucks and the mailroom used to screen packages require other means to control access. Some of the more sophisticated access control measures are x-ray screening, metal detection, and biometric readers.

Let’s Talk About Hardening the Target

Security- and safety-related policies and procedures, such as visitor management and mail screening, can assist in mitigating risk to a high-rise building along with these tangible items that can harden a venue:
• Property barriers
• Vehicle barricades
• Blast resistant window film
• Electronic locking devices
• Signage
• Card access systems
• Intrusion detection systems
• Video surveillance systems
• Lighting

These examples offer different options for you to consider when crafting the security posture for the property. Highly visible signs that inform visitors of the building rules, list prohibited firearms, or point to an emergency exit can increase safety and provide cost-effective solutions. More expensive items such as closed-circuit television (CCTV) are typically planned and allocated within a security budget. Regardless of cost, these areas need to be addressed to harden the property.

How Do I Escape From the Penthouse?

One of the greatest challenges of effective high-rise security involves an emergency evacuation from a floor higher than a rescue ladder can reach. Since most hook and ladders cannot go above the 10th floor, a well-designed and continuously trained emergency evacuation plan combats this logistical issue as well as other challenges inherent to building security. All occupants should know what to do in an evacuation and where to go regardless of where they are in the building. You must be committed to education and dissemination of critical information, such as the location of the emergency exits and shelters areas, if evacuation is not possible.

What Else Do I Need to Know?

Additionally, you need to follow fire codes, test smoke detectors, conduct fire drills, assign emergency roles, designate floor monitors, select searchers, and coordinate with first responders. You must make current rosters of building personnel available, including handicapped and elderly individuals, and publicize basic fire safety “don’ts” like using an elevator, moving to the roof, or breaking a window. Be sure to recognize that information is your great ally—the more that you can provide, the greater the potential for a safe outcome.


How Planning and Preparedness Saved 80,000 Lives

We all watched in horror last week as Paris suffered a tremendous tragedy when terrorists targeted innocent citizens in multiple locations across the city. People lost their lives as they were caught up in the evil cast by these ruthless extremists. Could this be a warning of how our society is changing? These events were suicide missions somberly exhibited by the self-induced deaths of a number of terrorists. The radicals struck nighttime places of entertainment—restaurants, bars, a concert hall, and a sports stadium. This is the enemy and it is extremely important to understand that they are willing to sacrifice their lives for their cause.

Of all the targeted locations, the stadium was the brass ring. The planned strike entailed three suicide bombers detonating explosives vests inside the venue where 80,000 people were cheering on a soccer game between France and Germany. Authorities have speculated this site was chosen because these two countries represent Western Christianity and the venue offered the potential for a high body count. The actions that security personnel took to prevent this attack contribute to a textbook example of how security planning and emergency preparedness can save lives.

If You Can’t Control Access, You Can’t Control Anything 

You can have every bell, whistle, and the latest, greatest, cutting edge, state-of-the-art, innovative, protective security countermeasure or risk mitigation tool in the world, and none of them will be effective in protecting your venue if you cannot control access. The definitive access control strategy is a disciplined, thorough, and comprehensive approach to filtering all personnel, assets, services, and equipment seeking entry into the site. This paradigm applies to everyone and everything—from employees, part-time workers, and general public to vehicles, mail, and deliveries to drones, helicopters, and unauthorized aircraft. It all begins and ends with controlling access.

The Importance of Gatekeepers

A suicide bomber tried to enter the stadium 15 minutes after the match started. The security officer at the gate followed established protocol to conduct pat downs before allowing access. This security measure prompted the terrorist to back away from the gate and detonate a bomb wrapped with hundreds of nails. The terrorist was killed along with one passerby. About 10 minutes later, another suicide bomber detonated an explosive vest outside another gate, killing only himself. Approximately 20 minutes later, a third terrorist detonated an explosive device outside the stadium, blowing himself up but no one else. Security did its job and prevented what could have been a mind-numbing tragedy.   

Lockdown and Shelter-In-Place

Following the three explosions, the authorities responsible for securing the stadium and protecting its occupants needed to make some critical decisions under tremendous pressure. They decided to keep everyone inside the facility and not allow anyone to leave, determining that the stadium was the safest place to be considering the events in downtown Paris at the time. The people were eventually allowed to leave hours later, but the German soccer team decided to spend most of the night on the field. Mattresses were made available and the team slept inside the stadium until transportation could be arranged for travel to the airport. The site of what could have been one of the most horrific terrorist events in history ended up as a safe haven for a city under siege. 

After Action and Lessons Learned

Professionals in law enforcement, fire, emergency medical, emergency management, and security all advocate learning lessons from real world events. The best example is an After Action Report that assesses security and emergency management plans and documents what went right and what could have been done better. What was done right at the stadium:

1) Searching and screening (pat downs at the gate)

2) Access control (preventing the terrorists from entering)

3) Shelter-in-place (80,000 people kept inside the stadium out of harm’s way)

Lives were saved by the brave individuals responsible for safeguarding the stadium who demonstrated great leadership and decision making in the face of unfathomable adversity.


What Is the Best Way to Stop an Active Shooter?

Unfortunately, our country continues to be plagued by tragedies caused by individuals with unregulated access to firearms. What compounds this serious issue is the deadly consequences created by a society that allows people without the legal authority or proper mental capacity to possess weapons. There is no silver bullet or panacea to stem the tide of these horrific events that are occurring all too often, but we can take steps to create a safer environment.

An all-inclusive approach that cuts to the heart of this problem and attacks the genesis of these events is required, rather than responding to the aftermath of the event itself. Instead of focusing most of our attention, energy, and efforts on what can be done to stop an active shooter during one of these attacks, let’s step back and try to determine what caused the incident in the first place.

It All Begins at the Beginning

Your goal should be to identify individuals before they have the means, mindset, and motive to carry out their violence. These events are not spontaneous—people don’t just “snap” and set out on a killing spree. Instead they are premeditated, planned, and if you look closely enough, announced. Having your organization supported by policy is the foundation to an Active Shooter Plan. You need to have the capability to identify, assess, and control anyone exhibiting traits that can be categorized as pre-attack indicators, which without intervention could manifest into violence.

Horizontally, Vertically, and Across an Organization

“Power in numbers” is another remedial action that results in a multi-disciplinary approach with select people up, down, and parallel in your organization, designated to prevent active shooter incidents. Individuals with diverse backgrounds, skill sets, and experience will come together and work collaboratively to design a plan to mitigate this threat. After forming a committee of representatives from entities such as management, law enforcement security, medical, mental health, fire, legal, HR, and training, this group will be charged with the mission to collectively develop a strategy and processes for preventing, controlling, and resolving an active shooter scenario.

Addressing Workplace Violence Protects Against an Active Shooter

Because an active shooter event is the most serious form of workplace violence, you must focus on mitigation and creating the processes that prevent any behavior deemed irregular or inappropriate from occurring. To be adequately prepared, you need to direct your attention to security, personnel, policies, procedures, systems, and physical measures. Examples are private guards (security), clinical health professionals (personnel), code of conduct (policies), employee assistance program (procedures), blast text messaging (systems), and lock-operated access points (physical measures). All of these disciplines contribute to the framework of the plan.

Signs, Signs, Everywhere a Sign

Because each situation is unique, knowing the signs to look for using professional judgment or outside assistance may be necessary to determine if intervention is necessary. Some of these signs are: disruptive behavior; physical injuries; absenteeism or tardiness; poor job performance; stalking a co-worker; inappropriate comments; threatening emails; and harassing phone calls. All of these signs could be an indication of a much more serious problem that may require identifying, assessing, and managing a potential violent situation.

Out With the Old and In With the New

The antiquated way to deal with a problem was to remove it. History has taught us that eliminating the source does not resolve the issue. It used to be that workplace managers fired, police officers arrested, and school principals expelled. None of these actions puts an end to the threat; they just delay it. Eventually, people get out of jail or return to the workplace or school to bring closure for themselves. Your best remedy is to have mechanisms that not only prevent, but also treat.

All of these recommended measures that I’ve presented have to be created, implemented, and when necessary, applied. Until then, a truly holistic program is not in place to protect your most valuable assets—your people—against the threat of an active shooter.


The Grassroots of Marijuana Security (Part Two)

This blog is the second in a three part series focusing on the connection between security and the medical and recreational cannabis industry. In Part One I talked about what was required in a security plan for the oversight of the dispensing/cultivating operations. In summary, I recommended that the plan address technology (cyber security, digital video cameras, automated access control, biometric readers, and intrusion detection alarm systems); processes (security policies, incident response, visitor management, prohibited items, and training); personnel (on-site security and transportation security); and liaison with critical third parties (state officials) and first responders (police and fire). Now, I’ll discuss a security strategy to implement during the construction (if applicable), build out, preparation, and operations planning of your business. In Part Three, I will explain the necessary ongoing security posture for sustainability.

Congratulations You Have Your License!

So you’ve cleared the first hurdle—you were issued a license by the state to run a commercial cannabis business. The good news is you have your license, and the bad news is you have your license. I’ll explain. Just because the state has authorized you to operate in this industry does not guarantee that you will succeed. In Illinois, you’ll be in a four-year pilot period for fledgling cannabis businesses. If at any point during this timeframe you experience a security- or safety-related incident or non-compliance with the Illinois Department of Agriculture or Department of Financial and Professional Regulation, your license could go up in smoke (another terrible pun, but somehow appropriate). So the key to your success after getting your license is keeping your license.

Why Can’t We All Just Get Along?   

I have found that to be a successful security consultant I must understand the importance of collaboration. In this specific industry I have worked with professionals who offer very diverse backgrounds and skill sets. I have sat alongside venture capitalists, builders, architects, designers, owners, investors, engineers, chemists, doctors, police, fire, and emergency medical personnel, and cyber experts, to name a few. These interactions have taught me to know my limitations and stick to my specific area of expertise. Deferring to another professional, especially when you find yourself outside of your domain, is a sign of strength not weakness—plus it’s just smart business.

Separating the Walk from the Talk

Another dynamic that comes along with the opening of a marijuana enterprise is the inundation of vendors and companies that want to sell you everything from electronic tracking devices to bulletproof glass to biometric readers. A qualified security professional can run interference and be the filter for vetting all of the necessary services. Backed by my expertise and counsel, I research, identify, and validate candidates seeking to do business with my cannabis clients, offering products and services such as security systems integrators, contract security services, safe and vault specialists, transportation vehicles, and point-of-sale software. Through due diligence, interviewing, reference checking, and proposal request and review, I am able to save (my client) thousands of dollars by ultimately finding the most suitable provider at a cost-efficient price—to deliver the best bang for the buck.

The Whole Is Greater Than the Sum of Its Parts

This focused security strategy has been created to support the design, construction, implementation, operation, and sustainability of a cannabis cultivation center or dispensary. Because the commercial cannabis industry is fast becoming a highly competitive market, the success of most businesses in this sector is based on several critical categories, with a safe and secure environment to prevent theft, diversion, tampering, and crime at the top of the list. As the outsourced security expert, I achieve these objectives through prevention-oriented planning; continuous coordination with organizational leadership; liaison with state and local government; application of security best practices; and installation of the latest technology to deter, secure, monitor, and mitigate risk in all aspects of the business. This methodology has been developed through many years of experience in the security field and uniquely tailored to address the specific needs of this industry.


The Grassroots of Marijuana Security (Part One)

To say the medical and recreational cannabis industry is precipitously growing (pun definitely intended) could be the understatement of the century. And before jumping into this emerging multi-million dollar business (over $700 million in sales in Colorado alone last year), you need to know some important facts. First, the entire endeavor starts and potentially ends with an exhaustive application package to the state where your facility (dispensary or cultivation) will be located. This is an expensive piece to the puzzle and could cost millions. I compare the evaluation and scoring of the application package to legalized gambling. It’s an extremely competitive process, you are not guaranteed to be issued a license, and unfortunately more losers than winners emerge.

I Love When a Plan Comes Together

Every successful business venture begins with a plan and this industry is no exception. Your security plan should include procedures for the oversight of the dispensing and/or cultivating operations that ensure accurate record keeping, patient confidentiality, and a ubiquitous security posture. The plan should address technology (digital video cameras, automated access control, biometric readers, and intrusion detection alarm systems); processes (security policies, incident response, visitor management, prohibited items, and training); personnel (on-site security and transportation security); and liaison with critical third parties (state officials) and first responders (police and fire). Well, that’s the 30,000-foot view. Since the plans I have helped create are about 100 pages in length, I obviously can’t fit everything in a blog—unless you want to read “War and Peace”—but I’ll try to include the most important points.

Location, Location, Location!

As you know location trumps all and in this industry, a number of zoning restrictions will determine the location of your facility. You also need to demonstrate why the location is suitable for public and patient access, parking, handicap compliance, safe cultivation and dispensing, product handling, and storage. You’ll need to articulate how the business will support the immediate community and how your security will negate any detrimental impact. Additionally, security schematics will indicate fire and life safety systems, CCTV, card readers, burglar alarms, panic buttons, fencing, and gates, and diagrams will depict the property, boundary lines, exterior landscape, and interior layout, as well as storage and delivery areas.

How to Separate Yourself From the Competition  

Let’s start with exhibiting industry (and state) compliant labor and employment practices. You will need a safe, secure, and healthy working environment that will include background screening, emergency preparedness, workplace violence mitigation, code of conduct, and an employee assistance program. Other ways you can differentiate yourself are to show support to the local community, benefits to the socio-economic status of the residents, and coordination with the law enforcement, fire, and emergency medical personnel. Remember, you’re creating a strategy to protect a business that is (presently) in violation of federal law. It’s a cash only business that requires safes, vaults, armed guards, and armored vehicles to transport product and money.

It’s a Town Full of Losers and I’m Pulling Out of Here to Win   

Sorry, I needed to include at least one Bruce Springsteen reference. Today’s security climate offers an opportune time for a holistic safety and security approach related to the daily operations and activities of this emerging industry. The design and creation of a comprehensive security plan to mitigate risk to employees, customers, products, operations, and brand can and should be addressed directly by implementing security strategies through an integrated approach in a number of areas I have addressed. In Illinois the security plan accounted for 20% of the overall score for the application package. When applications were evaluated equally, whether or not the license was granted was ultimately determined by the strength of the security plan. Remember that your security methodology along with the competence of your security practitioner may be the tipping points to your success or failure.