Description

Unlike traditional key assets, special events are limited by duration, and do not require a permanent allocation of security resources. However, they are prime targets due to the significant exposure from national and international media, large congregations of people, and the presence of world, national, state, and local leaders.

The purpose of this assessment is to provide special event managers, facility administrators, public safety personnel, first responders and security professionals with principles and techniques that can make a special event safe from human attack, as well provide guidance on dealing with the potential effects natural hazards on the event.

Details

  • (S) In this section, much information about the special event is obtained and collected. The Area of Operation (AO) is identified and the special event is measured against 46 inherent threats. The event is studied in 3 parts (outer, middle and inner protective layers). Inside the inner protective layer a vulnerability risk analysis is completed upon the building(s).
  • (A) Asvaco incorporated findings from studies of how aggressors may act and react regarding special events are captured within this area. A common method to evaluate aggressor threats is to analyze five factors: existence, capability, history, intention, and targeting. This assessment will measure all five factors and weigh results against the threat profile, allowing planners to adjust resources according to the potential threat. If applicable, the analysis includes the studies of the aggressor's tactics, techniques and procedures of instilling fear and or destruction. This methodology was built for the use of defenders and emergency responders as the assessor looks through the eyes of the aggressor.
  • (L) This section draws on the National Incident Management systems (NIMS) guideline which provides a consistent, flexible and adjustable framework for tracking every phase of an incident. This incident command system can be shared with local, state and federal personnel if desired.
  • (U) This component can be used for two important functions: first, as a checklist for those entities that need or should be notified before and during the event; and, second, as a quick look-up list to obtain additional resources if required.
  • (T) This analysis approach is also known as a "Mission Comparison Rating Matrix" when used by military forces around the world. Looking "through the eyes of an aggressor" information is obtained to ultimately determine if this special event is worth attacking and if so, the types of weapons and mode of attack considered. The analysis proceeds on by collecting intelligence within the area, such as the Avenues of Approach (mobility routes of aggressor), Red Zones (surveillance locations) and Attack Zones (most likely location to be considered a target). The intense analysis of how a target will be attacked is then measured against the placement of security personnel and surveillance resources, such as cameras.
  • (E) This final section will help guide emergency personnel stage in pre-defined areas. Information obtained to properly run a command post includes ingress and egress routes, helipad information, restroom facilities, accommodations for special needs participants and communication infrastructure (landlines, satellite links, LMR and cellular coverage).