Verified Document

How To Plan A Security Detail Essay

Related Topics:

The client will be speaking at a Holiday Inn at a rally for the 2nd Amendment supporters. A separate group of anti-gun protestors has already announced that it will picket the event. A third group of white nationalists has also pledged to come to the event to protest against the anti-gun protestors. Anti-Trump protestors have announced on Facebook that they too will be protesting the event and picketing with the anti-gun protestors. Parkland students are also set to arrive bringing the media in tow. Four death threats have been sent to the Holiday Inn, threatening it with violence should the rally proceed. Both the Holiday Inn and the client and rally organizers are determined to proceed with the event. Therefore, in order to protect the client, it is necessary to provide maximum security. This paper will discuss the proper security procedures that will be implemented in order to protect the client.Pre-screening the venue is crucial. This will include a screening of the inner, outer and middle perimeters. Vulnerabilities will be noted with regard to vendors, arrivals, trucks, mail, trash collection, and service. The use of security video cameras as well as the installation of alternatives where necessary will be employed to ensure that all ingress and egress routes are monitored in advance of the speaking event. The facilities connected to the hall and packages will also be inspected.

Upon the client’s arrival, the lane will be secured and an alternate arrival route will be planned in case the primary arrival route is compromised. The client wishes to arrive at the hotel’s lobby entrance so that he can make an appearance before his fans and his protestors. Photographers will be on the scene and must be cordoned off along with media tracking...

Vehicle flow must be efficient as guests to the speech will be arriving and their ingress into the hotel’s parking lot must be guided away from the two routes provided for the client. Guest parking will be re-directed along a separate course that does not connect with or interfere with the ingress and egress routes of the client.
Support from the FBI local field office is expected as the Bureau has been notified of the potential conflicts that may arise as well as of the death threats lodged against the Holiday Inn. Their support will come in the form of gathering intelligence, communications, and management in terms of having an intelligence expert stationed at the Bureau’s command center.

The venue’s critical infrastructure and utilities must also be reviewed: public trash cans will be removed, manhole covers will be welded shut, and the media will be advised on the importance of keeping citizens safe through timely and affective alerts if necessary. Local fire, EMS, and hospitals will be on alert in case an emergency develops and their support is required.

The security team will be responsible for coordinating with local agencies and facilities to secure the event, guiding traffic, configuring ingress and egress routes for the client, planning emergency routes should they be needed, keeping picketers and protestors at a safe distance from the hotel’s entrance, communicating with the FBI’s intelligence expert, working with local city workers to remove potential risks, secure manhole covers, and dispense of public trash receptacles till the event’s conclusion. The team will also be responsible for monitoring via live camera footage the grounds of the…

Cite this Document:
Copy Bibliography Citation

Related Documents

Comprehensive Security Plan for the Maryland Public Safety Education...
Words: 2800 Length: 9 Document Type: Term Paper

Security Plan for the Maryland Public Safety Education and Training Center This paper will focus on a security plan designated for the Maryland Public Safety Education and Training Center. Here emphasis will be given on many things including facility assets that require protection, various threats which are directed towards the assets and the probability of loss. It is important to note that there are many complexes and facilities associated with the

Securities Regulation of Nonprofit Organizations
Words: 12607 Length: 45 Document Type: Dissertation or Thesis complete

Securities Regulation SECURITIES REGULARIZATIONS IN NON-PROFIT ORGANIZATIONS The ensuring of the fact that an organization is working as per regulations and is following the code of conduct, while keeping the interest of the public first, are matters which are becoming more and more complicated with the passage of time. Therefore, it can be said with some emphasis, that today one of the most basic issues of many organizations is the issue of

Security Breach Case Scenario 1: Security Breach
Words: 1969 Length: 7 Document Type: Essay

Security Breach Case Scenario 1: Security Breach Hospitals have the opportunity and responsibility to integrate sound policies and procedures in relation to the protection of the confidential client information (Rodwin, 2010). St. John's Hospital in no different to this notion has the organization seeks to enhance the security and confidentiality of the information of its clients. The organization is a role model to other institutions within the geographical area on the essential

Security Overview Businesses Today Are
Words: 3366 Length: 13 Document Type: Research Paper

(Gartenberg, 2005) Like all other aspects of business today, security systems often prove to be highly complex and hard (even for the participants) to identify. The culture of an organization is like the culture of a family, a community, or a nation: Because it surrounds the people in it they often have a great deal of difficulty in recognizing to what extent policies and procedures arise from the constraints of culture

Security in Cloud Computing
Words: 3274 Length: 10 Document Type: Research Paper

Security in Cloud Computing Security issues associated with the cloud Cloud Security Controls Deterrent Controls Preventative Controls Corrective Controls Detective Controls Dimensions of cloud security Security and privacy Compliance Business continuity and data recovery Logs and audit trails Legal and contractual issues Public records The identified shortcomings in the cloud computing services and established opportunities for growth regarding security aspects are discussed in the current research. The security of services is regarded as the first obstacle. The opportunity for growth is provided as combination

Security Manager Leadership Analysis & Assessment of
Words: 2003 Length: 7 Document Type: Essay

Security Manager Leadership Analysis & Assessment of Main Management Skills of Security Managers The role of security managers and their progression to Chief Information Security Officers (CISO) in their careers is often delineated by a very broad base of experiences, expertise, skills and the continual development of management and leadership skills. The intent of this analysis and assessment is to define the most critically important management skills for security managers, including those

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now