Arena and Stadium Security Requires Protecting People, Property, and Assets

The tragic event this week in Manchester, England at an arena filled with families and children attending a concert reminds us of the evil of terrorism. The attack by a suicide bomber was Europe’s 13th terrorist incident since 2015. As ISIS claims responsibility, it calls for supporters to strike anywhere and with whatever weapons possible—vehicle, firearm, or explosive—showing us once again that this danger is real with no signs of going away. My professional experiences have taught me how to effectively plan, prepare and implement multi-disciplinary security measures to counter this threat. Remember, security has to be right all the time, but the terrorist only needs to be right once.

High Profile = High Risk   

Large-scale venues, such as an arena in Manchester, stadium in Paris, or major league ballpark in the U.S., are prime targets due to the high volume of people in a condensed area. A terrorist who wants to inflict as much damage as possible to numerous victims is drawn to these types of facilities, especially a high-profile site like an iconic sports venue. Protecting buildings and properties this big is no easy task but risk can be controlled and lives can be protected with the right combination of knowledge, experience, and resources. The key to safeguarding a large piece of real estate is the strategic placement of security assets, which can only be learned from real world experience.          

Your Plan Needs to be Tailored, Customized, Reasonable, and Effective

After years of protecting large-scale operations and major events on a global stage with both the Secret Service and as a security consultant, I understand that a large-scale venue security plan requires appropriate countermeasures to mitigate the various types of hazards and ensure the safety of both the people attending the event and the operation of the venue. With that understanding, a security plan needs to be uniquely tailored to the environment and culture of the property. The Lake Forest Group’s security planning follows a developed and still evolving process based on the 35+ years of experience in law enforcement, security, legal, and human resources of our team.

The Six Pillars of Large-Scale Venue Security Design You Must Consider

The design, creation, and implementation of a large-scale venue security plan begins with an on-site assessment of the site to evaluate risk in six crucial areas:

  1. Personnel security: chain-of-command, manpower, staffing, posts, and supervision
  2. Systems technology: alarms, access control, cameras, monitoring, X-ray screening, metal detectors, and command center capabilities
  3. Physical security: fencing, gates, barriers, locks, windows, and hardware
  4. Processes: security policies, operational protocols, access control, parking, transportation, player/performer protection, crowd control, and guest management
  5. Emergency preparedness: emergency management, incident response, lockdown, shelter, evacuation, and relocation
  6. Liaison with critical third parties and first responders
Leveraging All of the Assets and Resources of the Federal Government

Given the current nature of the terrorist threat and the severity of the consequences associated with many potential attack scenarios, the private sector will need to look to organizations within the U. S. government for intelligence information at critical times. In order to offer you maximum protection, The Lake Forest Group works in collaboration with international, federal, state, and local entities to convene and schedule meetings; develop, write, and disseminate security plans, emergency management procedures, continuity of operations plans, roles and responsibilities of agencies and private sector partners, and counter surveillance plans, among others; and provide daily on-the-ground assistance to meet our client’s goals and objectives and produce a safe and positive environment for participants, guests, employees, and all in attendance.

A Preventative Protective Security Methodology Balances Ends, Ways, and Means 

Ultimately, successful security planning and event management focus on a preventative protective security methodology that balances ends, ways, and means, using the appropriate personnel to identify and assess targeted threats and create enhanced countermeasures to mitigate risk. The Lake Forest Group has provided trusted counsel and thought leadership to our clients by successfully securing professional sports and collegiate stadiums and arenas, corporate offices, industrial plants, commercial properties, government venues, entertainment sites, medical facilities, and academic institutions across the country and around the globe.

Spotlight on Residential Security

The tragic murders of the Savopoulos family and their housekeeper in Washington, D.C. unfortunately show us how high net worth people are at risk to be targets of potentially violent crime. As of today, two persons of interest have been identified—one is a former employee and the other suspect a current one. As the facts continue to surface, we won’t be surprised to learn that this was premeditated, coordinated, rehearsed, and conspired by at least two individuals and possibly others. The main suspect has an arrest record that includes harassment, concealed weapons, theft, and violating an order of protection. The other suspect has bounced around from job to job, was fired by his previous employer, and had been recently hired to do odd jobs for the family. The checkered pasts of these two individuals fit the characteristics of what we see in many insider threat cases. An arrest record, unstable work history, job terminations, and access to weapons are some common denominators. And where these two subjects previously crossed paths provides pieces to a puzzle that has ultimately landed them as suspects in the torture and deaths of innocent people.

Executives Benefit from a Residential Security Assessment

After conducting countless residential security assessments for senior-level executives of major corporations, I have found the number one concern of these individuals is the personal safety of their families. In order to deliver the highest value possible to each engagement, I uniquely tailor the project to best serve my client by beginning with a framework for the assessment that is extremely flexible and adaptable to the environment. The structure then follows a developed and still evolving outline that leverages more than 30 years in the law enforcement and security fields and is based on four main pillars: 1) physical security, 2) technical security, 3) network security, and 4) procedural security. These assessments include an on-site security survey of the residence including the building, property, and its outer perimeter; the risks, threats, and vulnerabilities potentially impacting the safety and security of the home along with the occupants and guests; countermeasures and strategies for risk transfer, avoidance, mitigation, or acceptance; and detailed risk mitigation considerations.

A Prime Example of Insider Threat 

In 2008, the Secret Service National Threat Assessment Center (NTAC) and the CERT® Program (CERT) of Carnegie Mellon University’s Software Engineering Institute collaborated on the Insider Threat Study (ITS) in the cyber security realm. The study focused on employees who committed illegal or unauthorized acts against organizations using a computer, system, or network, such as theft of intellectual property, fraud, and acts of sabotage within critical infrastructure sectors. This research found that current and former employees carried out insider activities in nearly equal numbers, many of these individuals had prior arrests, and a specific work-related event triggered the actions of most insiders—all of which are eerily applicable to what has been uncovered in the Savopoulos case.

How You Can Protect Your Home and Family 

So what can we learn from this incident to help prevent future tragedies? First, whether you’re the founder of a multi-million dollar company or a private homeowner, you need to know the people you come into contact with every day and, more importantly, have access to your home. Your list might include landscapers, cleaning ladies, nannies, dog walkers, and contractors, to name a few. Before any of these people set foot on your property, you have to ensure their backgrounds have been properly screened by their employer. If they are sole proprietors, they must provide proof of passing a background check and establishing legal residency, if applicable. These checks should not be more than three years old and should include, at a minimum, criminal history, civil litigation, and drug testing.

A professional and comprehensive residential security assessment will evaluate the technical, physical, and cyber security measures of your home. When you follow the recommendations of the key takeaways, you will not only help safeguard your home and family from a preventative standpoint, but you will also have a planned response and recovery to any type of nefarious event occurring on your private property. Corporate leaders need to be aware that danger is not only found in the workplace or while travelling abroad; it can also occur in their own backyard.