Verified Document

How To Plan A Security Detail Essay

Related Topics:

The client will be speaking at a Holiday Inn at a rally for the 2nd Amendment supporters. A separate group of anti-gun protestors has already announced that it will picket the event. A third group of white nationalists has also pledged to come to the event to protest against the anti-gun protestors. Anti-Trump protestors have announced on Facebook that they too will be protesting the event and picketing with the anti-gun protestors. Parkland students are also set to arrive bringing the media in tow. Four death threats have been sent to the Holiday Inn, threatening it with violence should the rally proceed. Both the Holiday Inn and the client and rally organizers are determined to proceed with the event. Therefore, in order to protect the client, it is necessary to provide maximum security. This paper will discuss the proper security procedures that will be implemented in order to protect the client.Pre-screening the venue is crucial. This will include a screening of the inner, outer and middle perimeters. Vulnerabilities will be noted with regard to vendors, arrivals, trucks, mail, trash collection, and service. The use of security video cameras as well as the installation of alternatives where necessary will be employed to ensure that all ingress and egress routes are monitored in advance of the speaking event. The facilities connected to the hall and packages will also be inspected.

Upon the client’s arrival, the lane will be secured and an alternate arrival route will be planned in case the primary arrival route is compromised. The client wishes to arrive at the hotel’s lobby entrance so that he can make an appearance before his fans and his protestors. Photographers will be on the scene and must be cordoned off along with media tracking...

Vehicle flow must be efficient as guests to the speech will be arriving and their ingress into the hotel’s parking lot must be guided away from the two routes provided for the client. Guest parking will be re-directed along a separate course that does not connect with or interfere with the ingress and egress routes of the client.
Support from the FBI local field office is expected as the Bureau has been notified of the potential conflicts that may arise as well as of the death threats lodged against the Holiday Inn. Their support will come in the form of gathering intelligence, communications, and management in terms of having an intelligence expert stationed at the Bureau’s command center.

The venue’s critical infrastructure and utilities must also be reviewed: public trash cans will be removed, manhole covers will be welded shut, and the media will be advised on the importance of keeping citizens safe through timely and affective alerts if necessary. Local fire, EMS, and hospitals will be on alert in case an emergency develops and their support is required.

The security team will be responsible for coordinating with local agencies and facilities to secure the event, guiding traffic, configuring ingress and egress routes for the client, planning emergency routes should they be needed, keeping picketers and protestors at a safe distance from the hotel’s entrance, communicating with the FBI’s intelligence expert, working with local city workers to remove potential risks, secure manhole covers, and dispense of public trash receptacles till the event’s conclusion. The team will also be responsible for monitoring via live camera footage the grounds of the…

Cite this Document:
Copy Bibliography Citation

Related Documents

Security for Networks With Internet Access
Words: 4420 Length: 12 Document Type: Term Paper

Security for Networks With Internet Access The continual process of enterprise risk management (ERM) has become an integral component of successful organizational assessment, because the process of accurately identifying various risk factors, and interpreting their potential advantages and disadvantages, ensures that a business remains capable of anticipating and addressing internal and external contingencies. The following ERM implementation plan for the security of internet-accessible networks is intended to provide a navigable framework

Security Overview Businesses Today Are
Words: 3366 Length: 13 Document Type: Research Paper

(Gartenberg, 2005) Like all other aspects of business today, security systems often prove to be highly complex and hard (even for the participants) to identify. The culture of an organization is like the culture of a family, a community, or a nation: Because it surrounds the people in it they often have a great deal of difficulty in recognizing to what extent policies and procedures arise from the constraints of culture

Security Management the Role of a Security
Words: 4672 Length: 15 Document Type: Essay

Security Management The role of a security manager varies widely according to the particular organization and its needs, but despite this variety, there remain certain best practices and policies that can help maintain security and stability. This is nowhere more true than in the case of organizational loss, because while loss can mean widely different things depending on the field, the underlying theoretical concepts which inform attempts to minimize loss are

Security Policy of a Dental
Words: 1254 Length: 3 Document Type: Term Paper

SECURITY and PRIVACY - the following security and privacy requirements apply: The Office does not accept responsibility for the privacy, confidentiality or security of data or information not generated by this office or transmitted from external sources into the system. The Office does not accept responsibility for loss, corruption, misdirection or delays in transmission of personal data through the system. Users are responsible for the integrity of all data and

Security - Agip Kazakhstan North
Words: 14948 Length: 35 Document Type: Term Paper

They need to know what their responsibilities are not only as individuals but also as team members and corporate employees. David cites an excerpt from a corporate security document that illustrates his point: "A security policy serves many functions. It is a central document that describes in detail acceptable network activity and penalties for misuse. A security policy also provides a forum for identifying and clarifying security goals and

Security Plan: Pixel Inc. About Pixel Inc.
Words: 1669 Length: 6 Document Type: Essay

Security Plan: Pixel Inc. About Pixel Inc. We are a 100-person strong business dedicated to the production of media, most specifically short animations, for advertising clients worldwide. Our personnel include marketing specialists, visual designers, video editors, and other creative staff. This security plan encompasses the general and pragmatic characteristics of the security risks expected for our business and the specific actions that aim to, first and foremost, minimize such risks, and, if that's

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now