Join or Sign in

Register for your free membership or if you are already a member,
sign in using your preferred method below.

To check your latest product inquiries, manage newsletter preference, update personal / company profile, or download member-exclusive reports, log in to your account now!
Login asmag.comMember Registration

Recommended practices for preventing terrorist attacks

Recommended practices for preventing terrorist attacks
As extremists show more interest in “soft targets,” organizers of large outdoor events at temporary venues need security that can be rapidly assembled.
As extremists show more interest in “soft targets,” organizers of large outdoor events at temporary venues need security that can be rapidly assembled.
Mobile surveillance cameras are preferred to more permanent CCTV cameras at temporary sites.
Mobile surveillance cameras not only help to secure outdoor events, but also enable employee oversight, visitor traffic optimization and demographic analysis of visitors.
The FenceSafe-E by Gallagher and CLD Fencing Systems uses pre-assembled modular units for speedier setup. “Fence lines of over 30 meters with 45-degree corners, ends and 90-degree returns were erected and commissioned with full pulse fencing within 90 minutes,” said Kevin Godfrey, Strategic Business Development Manager at Gallagher.
Given the large footprint of outdoor events, Richard Huison, Regional Manager for Gallagher Security (Europe), suggests “limiting the most secure and costly solutions to smaller ‘priority zones’, such as VIP areas or generator compounds.”
A security team should allocate resources in order to ensure the physical safety of patrons, as well as secure valuable assets and the event’s brand reputation.
Besides standard security hardware, e-ticketing provides another line of defence. Huison said e-ticketing not only reduced the risk of forgeries and unauthorized reselling, but also helped to spot watched individuals, known troublemakers and other security risks in advance.
Thanks to growing use of mobile payment methods such as ApplePay, it is now possible for organizers to hold ticketless and cashless events. Secure QR codes allow organizers to establish what Huison calls as a “virtual electronic perimeter” within which mobile credentials serve to provide security.
When working with third-party security staff, it is recommended that staff report all suspicious behaviour to the main security contractor and avoid engaging in security related actions themselves.
The First Responder’s Toolbox, published by the U.S.’s Joint Counterterrorism Assessment Team (JCAT), suggests that “regardless of the event size, venue, or location, continuous and ongoing efforts to improve interagency coordination and information sharing with event stakeholders will enhance security and improve emergency response.”
Security personnel should maintain constant communication with one another, either through the use of walkie-talkies or other means, so that they can stay informed with the latest development without leaving their area of duty.
According to JCAT, “to prepare for any potential terrorist attack against open-access events and mass gatherings, organizers and security officials are encouraged to establish partnerships with first responders and private sector stakeholders in advance. This will enhance information sharing, coordination, and potential emergency response concerns.”
Subscribe to Newsletter
Stay updated with the latest trends and technologies in physical security

Share to: