Post on 13-Apr-2017
transcript
Sports and Special Event Security Planning: Best
Prac7ces Richard Morman, CPP, CSSP
Deputy Chief of Police (re7red)
August 18, 2015
2
GOAL
Examine current best prac7ces for safely and effec7vely managing large on-‐campus events.
3
Objec7ves
• Planning • Threats and Hazards • Risk Management
• Event Security • Resources
4
Post 9-‐11
The terrorism incidents on 9-‐11-‐2001 changed the way we all looked at security planning and management forever.
5
Special Event
A special event can be defined as any event where a large number of people are brought together to watch or par7cipate.
6
Special Event
FEMA course IS-‐15 Special Events Con4ngency Planning defines a special event as:
“a non-‐rou7ne ac7vity within a community that brings together a large number of people. Emphasis is not placed on the total number of people a]ending but rather the impact on the community's ability to respond to a large-‐scale emergency or disaster, or the excep7onal demands that the ac7vity places on response services.”
7
Event vs. Incident
Event: A scheduled and planned ac7vity
Incident: Something unplanned that is either natural, technological, or human-‐caused and warrants ac7on to protect life, property, environment, and public health or safety, and to minimize disrup7ons of ac7vi7es.
8
Planning
“If you fail to plan, you are planning to fail!” ― Benjamin Franklin
9
Planning
Pre-‐event planning is intended to assist you in developing a Game Day or Event Opera7ons Plan. This plan can be compared to an Incident Ac7on Plan (IAP).
10
Planning
Regardless of the type of event iden7fy the stake holders:
Anyone that has a func7onal stake in the event
Considera7on should be given to surrounding communi7es that may be impacted by the event.
11
Planning
At the start of the process the lead agency needs to be iden7fied
This helps avoid confusion and consterna7on
12
Planning
Na7onal Incident Management System / Incident Command System can be u7lized to assist in the planning process.
13
Planning
Unified Command: For events that require use of mul7ple agencies
Command Post: Loca7on should be iden7fied. Should not be located in the venue.
Emergency Opera7ons Center (EOC) should be u7lized. The EOC should not be located in the venue.
14
Planning
• Plan the plan • Staff the plan • Train the plan • Prac7ce the plan • Review and adjust the plan
15
Threats and Hazards
FEMA defines All-‐Hazards as, “Natural, technological, or human-‐caused incidents that warrant ac7on to protect life, property, environment, and public health or safety, and to minimize disrup7ons of ac7vi7es.”
16
Threats and Hazards
The All-‐Hazards approach should look at your community’s vulnerability to specific hazards.
This allows planning resources to be dedicated to those risks that are most likely to affect your community.
17
THIRA Threat and Hazard Iden4fica4on and Risk Assessment Guide, Comprehensive Preparedness Guide (CPG) 201 Second edi7on August 2013.
This guide commonly referred to as THIRA will provide you with a process that will help you iden7fy and understand risk. The guide outlines a four step process to help you develop a threat and hazard assessment.
18
THIRA process
19
Risk Management
Risk=Threat X Vulnerability X Consequence
R=T x V x C
20
Risk Management
Risk is the poten7al for an unwanted outcome resul7ng from an incident, event, or occurrence, as determined by its likelihood and the associated consequences
21
Risk Management
A threat is a natural, human, technological caused occurrence, individual, en7ty, or ac7on that has or indicates the poten7al to harm life, informa7on, opera7ons, the environment and/or property.
22
Risk Management
Vulnerability is defined as a physical feature or opera7onal a]ribute that renders an en7ty open to exploita7on or suscep7ble to a given hazard.
23
Risk Management
Consequence is the effect of an event, incident, or occurrence
24
Risk Management
Threat
Vulnerability
25
Risk Management
The Department of Homeland Security (DHS) defines four risk management strategies:
1. Risk avoidance 2. Risk control 3. Risk transfer 4. Risk acceptance
26
Event Security
Take a holis7c approach, keeping the components of personnel security, informaCon security, and physical security in mind.
27
Event Security
Things to think about: • What are you protec7ng?
• Why are you protec7ng it?
• How will you protect it? • What is the likelihood that something will happen?
• What is the plan if something does happen?
28
Event Security
Temporary workforce All personnel: • Screened and pre-‐employment background checks completed
• Training needs assessment /Training plan • Job descrip7ons for each posi7on (should include post orders)
29
Event Security
All employees working the event should receive situa7onal awareness training to enable them to spot and report unusual and or inappropriate behavior.
The training should stress that event security is the responsibility of all employees, not just law enforcement and security officers.
30
Event Security
PosiCons directly involved in event security:
• Law enforcement, fire, medical and private and/or proprietary security
AddiConally:
• Game day management, event opera7ons manager, ushers, and 7cket takers
• All need to be included in the security plan
31
Event Security
Employees are the greatest vulnerability in informa7on security.
An educa7on, training and awareness program must to be developed to insure all employees understand informa7on security.
32
Event Security
Access Control
An important protec7ve measure u7lized during sports and special events. It is important to control vehicles and individuals outside the venue, inside the venue and in restricted areas.
33
Event Security Perimeters
Inner
Middle
Outer
34
Event Security
Outer Perimeter:
• Is a secure perimeter, such as a buffer zone, established around the venue to the maximum extent possible.
• The perimeter is set up to deter vehicle traffic. The distance has been suggested to be at least 100 feet from the venue out, but will vary from venue to venue.
35
Event Security
Middle Perimeter:
• The middle perimeter is the first level of access control for staff and spectators and their possessions.
• To gain access through this perimeter individuals must have a 7cket or a creden7al.
36
Event Security
Inner Perimeter:
• The Inner Perimeter is going to vary depending on the venue and the type of event. For sports events the inner perimeter will include restricted spaces such as lockers rooms and the playing field. For concerts the inner perimeter would include back stage, dressing rooms, and the stage.
37
Event Security
Gate Security
Counter Surveillance
Security
Ticket Taker Police Officer
CCTV
Defense in depth is the coordinated use of mul7ple security countermeasures to protect an asset.
38
Resources
The Department of Homeland Security, Protec7ve Security Advisor (PSA) Program. Under certain circumstances Protec7ve Security Advisors can assist you in conduc7ng assessments and security surveys. They can also assist by providing access to infrastructure security and resilience resources, training, and informa7on.
h]p://www.dhs.gov/protec7ve-‐security-‐advisors
39
Resources
The Na7onal Center for Spectator Sports Safety and Security (NCS4)
Best Prac7ces Guides, including one for Intercollegiate Athle7cs Safety and Security.
NCS4 also offers training and other security related services for professional sports, interscholas7c athle7cs, intercollegiate sports and even marathons. Informa7on can be accessed at
h]ps://www.ncs4.com/
40
Resources
The Texas A&M University System, Texas Engineering Extension Service (TEEX), Na7onal Emergency Response and Rescue Training Center (NERRTC) offers extensive training courses on planning and preparedness. Informa7on can be found at
h]ps://teex.org
41
Resources Three training courses pertaining to sports and special event security planning and management are: • Sport Event Risk Management, • Sports and Special Event Evacua7on Training and Exercise,
and • Sports and Special Events Incident Management.
Provided through a partnership between NCS4 and TEEX are available for free. Informa7on about these courses can be accessed at h]ps://www.ncs4.com/train/overview
42
Contact Informa7on
Richard Morman
RMorman100@gmail.com
43