BEST PRACTICES in Anti-Terrorism Security for Sporting and ...

Command, Control and Interoperability Center for Advanced Data Analysis

A Department of Homeland Security University Center of Excellence

BEST PRACTICES in Anti-Terrorism

Security for Sporting and Entertainment

Venues RESOURCE GUIDE

July 2013

Table of Contents Introduction to the Project ............................................................................................................7 Background...................................................................................................................................8 Identifying Best Practices in Anti- Terrorism Security in Sports Venues ......................................8 Identifying the Key Best Practices and Developing Metrics for Each.........................................11 Developing a Best Practices Resource Guide .............................................................................13 Testing the Guide........................................................................................................................13 Executive Summary....................................................................................................................13 Chapter 1 ? Overview.................................................................................................................15 1.1 Introduction...........................................................................................................................15 1.2 Risk Assessment...................................................................................................................15 1.3 Staffing: Leadership, Organization and Authority ...............................................................17 1.4 Information Management .....................................................................................................19 1.5 Operations.............................................................................................................................21 1.6 Training and Evaluation........................................................................................................24 1.7 Summary...............................................................................................................................25 Chapter 2 ? Risk Assessment......................................................................................................26 Introduction.................................................................................................................................26 2.1 Risk Assessment Team.........................................................................................................28 2.2 Venue Profile ........................................................................................................................29 2.3 Threat, Vulnerability and Consequence ................................................................................32

2.3.1 Threat Identification.......................................................................................................32 2.3.2 Vulnerability and Consequence Analysis.......................................................................34

ii

2.3.3 Addressing the Risk Assessment....................................................................................39 2.4 Infrastructure Interdependencies ...........................................................................................40 2.5 Dynamic Re-assessment Protocol.........................................................................................41

2.5.1 Risk Assessment Review Process ..................................................................................41 2.5.2 Dynamic On-Going Risk Assessments ..........................................................................42 2.6 Risk Assessment: Key Points ..............................................................................................44 2.7 Recommendations ? Chapter 2 Risk Assessment .................................................................45 Appendix - Chapter 2..................................................................................................................50 Risk Assessment Tools ...........................................................................................................50 Risk Assessment Team ...........................................................................................................51 Venue Profile ..........................................................................................................................52 Threat Identification................................................................................................................53 Risk and Vulnerability Analysis..............................................................................................53 Infrastructure Interdependencies .............................................................................................53 Dynamic Re-Assessment Protocol..........................................................................................54 Chapter 3- Staffing: Leadership, Organization and Authority.......................................................55 Introduction.................................................................................................................................55 3.1 Command and Control, and Unified Command ...................................................................55 3.2 Organizational Hierarchy......................................................................................................58 3.3 Staffing Plan .........................................................................................................................60 3.4 Human Resource Issues ........................................................................................................61 3.4.1 Hiring and Employee Turnover......................................................................................61 3.4.2 Insider Threat.................................................................................................................62 3.5 Staffing: Leadership, Organization and Authority: Key Points ...........................................64

iii

3.6 Recommendations ? Chapter 3 Staffing: Leadership, Organization and Authority................64 Appendix ? Chapter 3 .................................................................................................................68

Tabletop Exercises ..................................................................................................................68 Flexibility of workforce ..........................................................................................................68 Insider Threat/Red-teaming.....................................................................................................69 Span of Control.......................................................................................................................69 Chain of Command .................................................................................................................69 Incident Command ..................................................................................................................70 Chapter 4 ? Information Management............................................................................................70 Introduction.................................................................................................................................70 4.1 Communication Structures ? The Three "Buckets" ..............................................................71 4.1.1 Internal Stakeholder Communications ...........................................................................72 4.1.2 External Stakeholder Communications ..........................................................................77 4.1.3 Patron/Public Stakeholder Communications ..................................................................80 4.2 Cyber-Security......................................................................................................................86 4.3 Information Management: Key Points .................................................................................88 4.4 Recommendations ? Chapter 4 Information Management ....................................................89 Appendix ? Chapter 4 .................................................................................................................94 Posted Signage on Crowd Management..................................................................................94 Social Media ...........................................................................................................................95 Cyber-Security ........................................................................................................................95 Chapter 5 ? Operations ...................................................................................................................96 Introduction.................................................................................................................................96 5.1 Outer Zone ............................................................................................................................97

iv

5.1.1 1 Parking Structures .......................................................................................................98 5.1.2 Coordination With Public Transportation ......................................................................99 5.1.3 Vendors and Service Providers ....................................................................................100 5.1.4 Airports ........................................................................................................................101 5.2 Middle Zone .......................................................................................................................102 5.2.1 Patron Access...............................................................................................................102 5.2.2 Loading Dock Access ..................................................................................................105 5.2.3 Media Access ...............................................................................................................105 5.2.4 Cameras .......................................................................................................................106 5.2.5 Sweeps .........................................................................................................................107 5.3 Inner Zone ..........................................................................................................................107 5.3.1 Cameras .......................................................................................................................107 5.3.2 Sweeps .........................................................................................................................108 5.3.3 Access Control.............................................................................................................108 5.3.4 Security........................................................................................................................109 5.4 Response.............................................................................................................................111 5.4.1 Incident Response Plans ..............................................................................................112 5.4.2 Evacuation ...................................................................................................................113 5.4.3 Planning .......................................................................................................................116 5.5 Operations: Key Points ......................................................................................................118 5.6 Recommendations ? Chapter 5 Operations .........................................................................119 Appendix ? Chapter 5 ...............................................................................................................129 General..................................................................................................................................129 Outer Zone ............................................................................................................................130

v

................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download