This presentation is from the National Center for Campus Public Safety’s (NCCPS) webinar, Sports and Special Event Security Planning: Best Practices. In this August 2015 webinar, Richard Morman, CPP, CSSP, independent consultant and deputy chief of police (retired), The Ohio State University, discusses best practices for safely and effectively managing large on-campus events.
5. Post
9-‐11
The
terrorism
incidents
on
9-‐11-‐2001
changed
the
way
we
all
looked
at
security
planning
and
management
forever.
5
6. Special
Event
A
special
event
can
be
defined
as
any
event
where
a
large
number
of
people
are
brought
together
to
watch
or
par7cipate.
6
7. Special
Event
FEMA
course
IS-‐15
Special
Events
Con4ngency
Planning
defines
a
special
event
as:
“a
non-‐rou7ne
ac7vity
within
a
community
that
brings
together
a
large
number
of
people.
Emphasis
is
not
placed
on
the
total
number
of
people
a]ending
but
rather
the
impact
on
the
community's
ability
to
respond
to
a
large-‐scale
emergency
or
disaster,
or
the
excep7onal
demands
that
the
ac7vity
places
on
response
services.”
7
8. Event
vs.
Incident
Event:
A
scheduled
and
planned
ac7vity
Incident:
Something
unplanned
that
is
either
natural,
technological,
or
human-‐caused
and
warrants
ac7on
to
protect
life,
property,
environment,
and
public
health
or
safety,
and
to
minimize
disrup7ons
of
ac7vi7es.
8
9. Planning
“If
you
fail
to
plan,
you
are
planning
to
fail!”
―
Benjamin
Franklin
9
10. Planning
Pre-‐event
planning
is
intended
to
assist
you
in
developing
a
Game
Day
or
Event
Opera7ons
Plan.
This
plan
can
be
compared
to
an
Incident
Ac7on
Plan
(IAP).
10
11. Planning
Regardless
of
the
type
of
event
iden7fy
the
stake
holders:
Anyone
that
has
a
func7onal
stake
in
the
event
Considera7on
should
be
given
to
surrounding
communi7es
that
may
be
impacted
by
the
event.
11
12. Planning
At
the
start
of
the
process
the
lead
agency
needs
to
be
iden7fied
This
helps
avoid
confusion
and
consterna7on
12
13. Planning
Na7onal
Incident
Management
System
/
Incident
Command
System
can
be
u7lized
to
assist
in
the
planning
process.
13
14. Planning
Unified
Command:
For
events
that
require
use
of
mul7ple
agencies
Command
Post:
Loca7on
should
be
iden7fied.
Should
not
be
located
in
the
venue.
Emergency
Opera7ons
Center
(EOC)
should
be
u7lized.
The
EOC
should
not
be
located
in
the
venue.
14
15. Planning
• Plan
the
plan
• Staff
the
plan
• Train
the
plan
• Prac7ce
the
plan
• Review
and
adjust
the
plan
15
16. Threats
and
Hazards
FEMA
defines
All-‐Hazards
as,
“Natural,
technological,
or
human-‐caused
incidents
that
warrant
ac7on
to
protect
life,
property,
environment,
and
public
health
or
safety,
and
to
minimize
disrup7ons
of
ac7vi7es.”
16
17. Threats
and
Hazards
The
All-‐Hazards
approach
should
look
at
your
community’s
vulnerability
to
specific
hazards.
This
allows
planning
resources
to
be
dedicated
to
those
risks
that
are
most
likely
to
affect
your
community.
17
18. THIRA
Threat
and
Hazard
Iden4fica4on
and
Risk
Assessment
Guide,
Comprehensive
Preparedness
Guide
(CPG)
201
Second
edi7on
August
2013.
This
guide
commonly
referred
to
as
THIRA
will
provide
you
with
a
process
that
will
help
you
iden7fy
and
understand
risk.
The
guide
outlines
a
four
step
process
to
help
you
develop
a
threat
and
hazard
assessment.
18
20. Risk
Management
Risk=Threat
X
Vulnerability
X
Consequence
R=T
x
V
x
C
20
21. Risk
Management
Risk
is
the
poten7al
for
an
unwanted
outcome
resul7ng
from
an
incident,
event,
or
occurrence,
as
determined
by
its
likelihood
and
the
associated
consequences
21
22. Risk
Management
A
threat
is
a
natural,
human,
technological
caused
occurrence,
individual,
en7ty,
or
ac7on
that
has
or
indicates
the
poten7al
to
harm
life,
informa7on,
opera7ons,
the
environment
and/or
property.
22
23. Risk
Management
Vulnerability
is
defined
as
a
physical
feature
or
opera7onal
a]ribute
that
renders
an
en7ty
open
to
exploita7on
or
suscep7ble
to
a
given
hazard.
23
24. Risk
Management
Consequence
is
the
effect
of
an
event,
incident,
or
occurrence
24
26. Risk
Management
The
Department
of
Homeland
Security
(DHS)
defines
four
risk
management
strategies:
1. Risk
avoidance
2. Risk
control
3. Risk
transfer
4. Risk
acceptance
26
27. Event
Security
Take
a
holis7c
approach,
keeping
the
components
of
personnel
security,
informaCon
security,
and
physical
security
in
mind.
27
28. Event
Security
Things
to
think
about:
• What
are
you
protec7ng?
• Why
are
you
protec7ng
it?
• How
will
you
protect
it?
• What
is
the
likelihood
that
something
will
happen?
• What
is
the
plan
if
something
does
happen?
28
29. Event
Security
Temporary
workforce
All
personnel:
• Screened
and
pre-‐employment
background
checks
completed
• Training
needs
assessment
/Training
plan
• Job
descrip7ons
for
each
posi7on
(should
include
post
orders)
29
30. Event
Security
All
employees
working
the
event
should
receive
situa7onal
awareness
training
to
enable
them
to
spot
and
report
unusual
and
or
inappropriate
behavior.
The
training
should
stress
that
event
security
is
the
responsibility
of
all
employees,
not
just
law
enforcement
and
security
officers.
30
31. Event
Security
PosiCons
directly
involved
in
event
security:
• Law
enforcement,
fire,
medical
and
private
and/
or
proprietary
security
AddiConally:
• Game
day
management,
event
opera7ons
manager,
ushers,
and
7cket
takers
• All
need
to
be
included
in
the
security
plan
31
32. Event
Security
Employees
are
the
greatest
vulnerability
in
informa7on
security.
An
educa7on,
training
and
awareness
program
must
to
be
developed
to
insure
all
employees
understand
informa7on
security.
32
33. Event
Security
Access
Control
An
important
protec7ve
measure
u7lized
during
sports
and
special
events.
It
is
important
to
control
vehicles
and
individuals
outside
the
venue,
inside
the
venue
and
in
restricted
areas.
33
35. Event
Security
Outer
Perimeter:
• Is
a
secure
perimeter,
such
as
a
buffer
zone,
established
around
the
venue
to
the
maximum
extent
possible.
• The
perimeter
is
set
up
to
deter
vehicle
traffic.
The
distance
has
been
suggested
to
be
at
least
100
feet
from
the
venue
out,
but
will
vary
from
venue
to
venue.
35
36. Event
Security
Middle
Perimeter:
• The
middle
perimeter
is
the
first
level
of
access
control
for
staff
and
spectators
and
their
possessions.
• To
gain
access
through
this
perimeter
individuals
must
have
a
7cket
or
a
creden7al.
36
37. Event
Security
Inner
Perimeter:
• The
Inner
Perimeter
is
going
to
vary
depending
on
the
venue
and
the
type
of
event.
For
sports
events
the
inner
perimeter
will
include
restricted
spaces
such
as
lockers
rooms
and
the
playing
field.
For
concerts
the
inner
perimeter
would
include
back
stage,
dressing
rooms,
and
the
stage.
37
38. Event
Security
Gate
Security
Counter
Surveillance
Security
Ticket
Taker
Police
Officer
CCTV
Defense
in
depth
is
the
coordinated
use
of
mul7ple
security
countermeasures
to
protect
an
asset.
38
39. Resources
The
Department
of
Homeland
Security,
Protec7ve
Security
Advisor
(PSA)
Program.
Under
certain
circumstances
Protec7ve
Security
Advisors
can
assist
you
in
conduc7ng
assessments
and
security
surveys.
They
can
also
assist
by
providing
access
to
infrastructure
security
and
resilience
resources,
training,
and
informa7on.
h]p://www.dhs.gov/protec7ve-‐security-‐advisors
39
40. Resources
The
Na7onal
Center
for
Spectator
Sports
Safety
and
Security
(NCS4)
Best
Prac7ces
Guides,
including
one
for
Intercollegiate
Athle7cs
Safety
and
Security.
NCS4
also
offers
training
and
other
security
related
services
for
professional
sports,
interscholas7c
athle7cs,
intercollegiate
sports
and
even
marathons.
Informa7on
can
be
accessed
at
h]ps://www.ncs4.com/
40
41. Resources
The
Texas
A&M
University
System,
Texas
Engineering
Extension
Service
(TEEX),
Na7onal
Emergency
Response
and
Rescue
Training
Center
(NERRTC)
offers
extensive
training
courses
on
planning
and
preparedness.
Informa7on
can
be
found
at
h]ps://teex.org
41
42. Resources
Three
training
courses
pertaining
to
sports
and
special
event
security
planning
and
management
are:
• Sport
Event
Risk
Management,
• Sports
and
Special
Event
Evacua7on
Training
and
Exercise,
and
• Sports
and
Special
Events
Incident
Management.
Provided
through
a
partnership
between
NCS4
and
TEEX
are
available
for
free.
Informa7on
about
these
courses
can
be
accessed
at
h]ps://www.ncs4.com/train/overview
42