BEST PRACTICES in Anti-Terrorism Security for Sporting and Entertainment Venues RESOURCE GUIDE

Total Page:16

File Type:pdf, Size:1020Kb

BEST PRACTICES in Anti-Terrorism Security for Sporting and Entertainment Venues RESOURCE GUIDE Command, Control and Interoperability Center for Advanced Data Analysis A Department of Homeland Security University Center of Excellence BEST PRACTICES in Anti-Terrorism Security for Sporting and Entertainment Venues RESOURCE GUIDE July 2013 Table of Contents Introduction to the Project ............................................................................................................7 Background...................................................................................................................................8 Identifying Best Practices in Anti-Terrorism Security in Sports Venues ......................................8 Identifying the Key Best Practices and Developing Metrics for Each .........................................11 Developing a Best Practices Resource Guide .............................................................................13 Testing the Guid e ........................................................................................................................13 Executive Summary....................................................................................................................13 Chapter 1 – Overview.................................................................................................................15 1.1 Introduction...........................................................................................................................15 1.2 Risk Assessment ...................................................................................................................15 1.3 Staffing: Leadership, Organization and Authority ...............................................................17 1.4 Information Management .....................................................................................................19 1.5 Operations.............................................................................................................................21 1.6 Training and Evaluation........................................................................................................24 1.7 Summary...............................................................................................................................25 Chapter 2 – Risk Assessment......................................................................................................26 Introduction.................................................................................................................................26 2.1 Risk Assessment Team .........................................................................................................28 2.2 Venue Profile ........................................................................................................................29 2.3 Threat, Vulnerability and Consequence ................................................................................32 2.3.1 Threat Identification.......................................................................................................32 2.3.2 Vulnerability and Consequence Ana lys is .......................................................................34 ii 2.3.3 Addressing the Risk Assessment....................................................................................39 2.4 Infrastructure Interdependencies ...........................................................................................40 2.5 Dynamic Re-assessment Protocol .........................................................................................41 2.5.1 Risk Assessment Review Process ..................................................................................41 2.5.2 Dynamic On-Going Risk Assessments ..........................................................................42 2.6 Risk Assessment: Key Points ..............................................................................................44 2.7 Recommendations – Chapter 2 Risk Assessment .................................................................45 Appendix - Chapter 2 ..................................................................................................................50 Risk Assessment Tools ...........................................................................................................50 Risk Assessment Team ...........................................................................................................51 Venue Profile ..........................................................................................................................52 Threat Identification................................................................................................................53 Risk and Vulnerability Ana lys is ..............................................................................................53 Infrastructure Interdependencies .............................................................................................53 Dynamic Re-Assessment Protocol ..........................................................................................54 Chapter 3- Staffing: Leadership, Organization and Authority .......................................................55 Introduction.................................................................................................................................55 3.1 Comma nd and Control, and Unified Command ...................................................................55 3.2 Organizational Hierarchy......................................................................................................58 3.3 Staffing P la n .........................................................................................................................60 3.4 Human Resource Issues ........................................................................................................61 3.4.1 Hir ing and Employee Turnover......................................................................................61 3.4.2 Insider Threat .................................................................................................................62 3.5 Staffing: Leadership, Organization and Authority: Key Points ...........................................64 iii 3.6 Recommendations – Chapter 3 Staffing: Leadership, Organization and Authority ................64 Appendix – Chapter 3 .................................................................................................................68 Tabletop Exercises ..................................................................................................................68 Flexibility of workforce ..........................................................................................................68 Insider Threat/Red-teaming.....................................................................................................69 Span of Control .......................................................................................................................69 Chain of Co mma nd .................................................................................................................69 Incident Co mma nd ..................................................................................................................70 Chapter 4 – Information Management............................................................................................70 Introduction.................................................................................................................................70 4.1 Communication Structures – The Three “Buckets” ..............................................................71 4.1.1 Internal Stakeholder Communications ...........................................................................72 4.1.2 External Stakeholder Communications ..........................................................................77 4.1.3 Patron/Public Stakeholder Communications ..................................................................80 4.2 Cyber-Security ......................................................................................................................86 4.3 Information Management: Key Points .................................................................................88 4.4 Recommendations – Chapter 4 Information Management ....................................................89 Appendix – Chapter 4 .................................................................................................................94 Posted S ignage on Crowd Management..................................................................................94 Socia l Med ia ...........................................................................................................................95 Cyber-Security ........................................................................................................................95 Chapter 5 – Operations ...................................................................................................................96 Introduction.................................................................................................................................96 5.1 Outer Zone ............................................................................................................................97 iv 5.1.1 1 Parking Structures .......................................................................................................98 5.1.2 Coordination W ith Public Transportation ......................................................................99
Recommended publications
  • The Dark Unknown History
    Ds 2014:8 The Dark Unknown History White Paper on Abuses and Rights Violations Against Roma in the 20th Century Ds 2014:8 The Dark Unknown History White Paper on Abuses and Rights Violations Against Roma in the 20th Century 2 Swedish Government Official Reports (SOU) and Ministry Publications Series (Ds) can be purchased from Fritzes' customer service. Fritzes Offentliga Publikationer are responsible for distributing copies of Swedish Government Official Reports (SOU) and Ministry publications series (Ds) for referral purposes when commissioned to do so by the Government Offices' Office for Administrative Affairs. Address for orders: Fritzes customer service 106 47 Stockholm Fax orders to: +46 (0)8-598 191 91 Order by phone: +46 (0)8-598 191 90 Email: [email protected] Internet: www.fritzes.se Svara på remiss – hur och varför. [Respond to a proposal referred for consideration – how and why.] Prime Minister's Office (SB PM 2003:2, revised 02/05/2009) – A small booklet that makes it easier for those who have to respond to a proposal referred for consideration. The booklet is free and can be downloaded or ordered from http://www.regeringen.se/ (only available in Swedish) Cover: Blomquist Annonsbyrå AB. Printed by Elanders Sverige AB Stockholm 2015 ISBN 978-91-38-24266-7 ISSN 0284-6012 3 Preface In March 2014, the then Minister for Integration Erik Ullenhag presented a White Paper entitled ‘The Dark Unknown History’. It describes an important part of Swedish history that had previously been little known. The White Paper has been very well received. Both Roma people and the majority population have shown great interest in it, as have public bodies, central government agencies and local authorities.
    [Show full text]
  • DDS Security Specification Will Have Limited Interoperability with Implementations That Do Implement the Mechanisms Introduced by This Specification
    An OMG® DDS Security™ Publication DDS Security Version 1.1 OMG Document Number: formal/2018-04-01 Release Date: July 2018 Standard Document URL: https://www.omg.org/spec/DDS-SECURITY/1.1 Machine Consumable Files: Normative: https://www.omg.org/spec/DDS-SECURITY/20170901/dds_security_plugins_spis.idl https://www.omg.org/spec/DDS-SECURITY/20170901/omg_shared_ca_governance.xsd https://www.omg.org/spec/DDS-SECURITY/20170901/omg_shared_ca_permissions.xsd https://www.omg.org/spec/DDS-SECURITY/20170901/dds_security_plugins_model.xmi Non-normative: https://www.omg.org/spec/DDS-SECURITY/20170901/omg_shared_ca_governance_example.xml https://www.omg.org/spec/DDS-SECURITY/20170901/omg_shared_ca_permissions_example.xml Copyright © 2018, Object Management Group, Inc. Copyright © 2014-2017, PrismTech Group Ltd. Copyright © 2014-2017, Real-Time Innovations, Inc. Copyright © 2017, Twin Oaks Computing, Inc. Copyright © 2017, THALES USE OF SPECIFICATION – TERMS, CONDITIONS & NOTICES The material in this document details an Object Management Group specification in accordance with the terms, conditions and notices set forth below. This document does not represent a commitment to implement any portion of this specification in any company's products. The information contained in this document is subject to change without notice. LICENSES The companies listed above have granted to the Object Management Group, Inc. (OMG) a nonexclusive, royalty-free, paid up, worldwide license to copy and distribute this document and to modify this document and distribute copies of the modified version. Each of the copyright holders listed above has agreed that no person shall be deemed to have infringed the copyright in the included material of any such copyright holder by reason of having used the specification set forth herein or having conformed any computer software to the specification.
    [Show full text]
  • Fedramp SECURITY ASSESSMENT FRAMEWORK
    FedRAMP SECURITY ASSESSMENT FRAMEWORK Version 2.4 November 15, 2017 EXECUTIVE SUMMARY This document describes a general Security Assessment Framework (SAF) for the Federal Risk and Authorization Management Program (FedRAMP). FedRAMP is a Government-wide program that provides a standardized approach to security assessment, authorization, and continuous monitoring for cloud-based services. FedRAMP uses a “do once, use many times” framework that intends to save costs, time, and staff required to conduct redundant Agency security assessments and process monitoring reports. FedRAMP was developed in collaboration with the National Institute of Standards and Technology (NIST), the General Services Administration (GSA), the Department of Defense (DOD), and the Department of Homeland Security (DHS). Many other Government Agencies and working groups participated in reviewing and standardizing the controls, policies and procedures. | i DOCUMENT REVISION HISTORY DATE VERSION PAGE(S) DESCRIPTION AUTHOR Major revision for NIST SP 800-53 Revision 4. 06/06/2014 2.0 All FedRAMP PMO Includes new template and formatting changes. Formatting changes throughout. Clarified distinction 12/04/2015 2.1 All between 3PAO and IA. Replaced Figures 2 and 3, and FedRAMP PMO Appendix C Figures with current images. 06/06/2017 2.2 Cover Updated logo FedRAMP PMO Removed references to CSP Supplied Path to 11/06/2017 2.3 All Authorization and the Guide to Understanding FedRAMP PMO FedRAMP as they no longer exist. 11/15/2017 2.4 All Updated to the new template FedRAMP PMO HOW TO CONTACT US Questions about FedRAMP or this document should be directed to [email protected]. For more information about FedRAMP, visit the website at http://www.fedramp.gov.
    [Show full text]
  • Threnody Amy Fitzgerald Macalester College, [email protected]
    Macalester College DigitalCommons@Macalester College English Honors Projects English Department 2012 Threnody Amy Fitzgerald Macalester College, [email protected] Follow this and additional works at: http://digitalcommons.macalester.edu/english_honors Part of the English Language and Literature Commons Recommended Citation Fitzgerald, Amy, "Threnody" (2012). English Honors Projects. Paper 21. http://digitalcommons.macalester.edu/english_honors/21 This Honors Project - Open Access is brought to you for free and open access by the English Department at DigitalCommons@Macalester College. It has been accepted for inclusion in English Honors Projects by an authorized administrator of DigitalCommons@Macalester College. For more information, please contact [email protected]. Threnody By Amy Fitzgerald English Department Honors Project, May 2012 Advisor: Peter Bognanni 1 Glossary of Words, Terms, and Institutions Commissie voor Oorlogspleegkinderen : Commission for War Foster Children; formed after World War II to relocate war orphans in the Netherlands, most of whom were Jewish (Dutch) Crèche : nursery (French origin) Fraulein : Miss (German) Hervormde Kweekschool : Reformed (religion) teacher’s training college Hollandsche Shouwberg : Dutch Theater Huppah : Jewish wedding canopy Kaddish : multipurpose Jewish prayer with several versions, including the Mourners’ Kaddish KP (full name Knokploeg): Assault Group, a Dutch resistance organization LO (full name Landelijke Organasatie voor Hulp aan Onderduikers): National Organization
    [Show full text]
  • National Strategy for Homeland Security 2007
    national strategy for HOMELAND SECURITY H OMELAND SECURITY COUNCIL OCTOBER 2 0 0 7 national strategy for HOMELAND SECURITY H OMELAND SECURITY COUNCIL OCTOBER 2 0 0 7 My fellow Americans, More than 6 years after the attacks of September 11, 2001, we remain at war with adversar- ies who are committed to destroying our people, our freedom, and our way of life. In the midst of this conflict, our Nation also has endured one of the worst natural disasters in our history, Hurricane Katrina. As we face the dual challenges of preventing terrorist attacks in the Homeland and strengthening our Nation’s preparedness for both natural and man-made disasters, our most solemn duty is to protect the American people. The National Strategy for Homeland Security serves as our guide to leverage America’s talents and resources to meet this obligation. Despite grave challenges, we also have seen great accomplishments. Working with our part- ners and allies, we have broken up terrorist cells, disrupted attacks, and saved American lives. Although our enemies have not been idle, they have not succeeded in launching another attack on our soil in over 6 years due to the bravery and diligence of many. Just as our vision of homeland security has evolved as we have made progress in the War on Terror, we also have learned from the tragedy of Hurricane Katrina. We witnessed countless acts of courage and kindness in the aftermath of that storm, but I, like most Americans, was not satisfied with the Federal response. We have applied the lessons of Katrina to thisStrategy to make sure that America is safer, stronger, and better prepared.
    [Show full text]
  • Global Terrorism: IPI Blue Paper No. 4
    IPI Blue Papers Global Terrorism Task Forces on Strengthening Multilateral Security Capacity No. 4 2009 INTERNATIONAL PEACE INSTITUTE Global Terrorism Global Terrorism Task Forces on Strengthening Multilateral Security Capacity IPI Blue Paper No. 4 Acknowledgements The International Peace Institute (IPI) owes a great debt of gratitude to its many donors to the program Coping with Crisis, Conflict, and Change. In particular, IPI is grateful to the governments of Belgium, Canada, Denmark, Finland, Greece, Luxembourg, the Netherlands, Norway, Spain, Sweden, Switzerland, and the United Kingdom. The Task Forces would also not have been possible without the leadership and intellectual contribution of their co-chairs, government representatives from Permanent Missions to the United Nations in New York, and expert moderators and contributors. IPI wishes to acknowledge the support of the Greentree Foundation, which generously allowed IPI the use of the Greentree Estate for plenary meetings of the Task Forces during 2008. note Meetings were held under the Chatham House Rule. Participants were invited in their personal capacity. This report is an IPI product. Its content does not necessarily represent the positions or opinions of individual Task Force participants. suggested citation: International Peace Institute, “Global Terrorism,” IPI Blue Paper No. 4, Task Forces on Strengthening Multilateral Security Capacity, New York, 2009. © by International Peace Institute, 2009 All Rights Reserved www.ipinst.org CONTENTS Foreword, Terje Rød-Larsen. vii Acronyms. x Executive Summary. 1 The Challenge for Multilateral Counterterrorism. .6 Ideas for Action. 18 I. strengThen Political SupporT For The un’S role In CounTerIng Terrorism ii. enhanCe straTegic CommunicationS iii. deePen relationShips BeTween un head- quarTerS and national and regIonal parTnerS Iv.
    [Show full text]
  • Federal Bureau of Investigation Department of Homeland Security
    Federal Bureau of Investigation Department of Homeland Security Strategic Intelligence Assessment and Data on Domestic Terrorism Submitted to the Permanent Select Committee on Intelligence, the Committee on Homeland Security, and the Committee of the Judiciary of the United States House of Representatives, and the Select Committee on Intelligence, the Committee on Homeland Security and Governmental Affairs, and the Committee of the Judiciary of the United States Senate May 2021 Page 1 of 40 Table of Contents I. Overview of Reporting Requirement ............................................................................................. 2 II. Executive Summary ......................................................................................................................... 2 III. Introduction...................................................................................................................................... 2 IV. Strategic Intelligence Assessment ................................................................................................... 5 V. Discussion and Comparison of Investigative Activities ................................................................ 9 VI. FBI Data on Domestic Terrorism ................................................................................................. 19 VII. Recommendations .......................................................................................................................... 27 Appendix ....................................................................................................................................................
    [Show full text]
  • The Interim National Security Strategic Guidance
    March 29, 2021 The Interim National Security Strategic Guidance On March 3, 2021, the White House released an Interim and what the right emphasis - in terms of budgets, priorities, National Security Strategic Guidance (INSSG). This is the and activities—ought to be between the different kinds of first time an administration has issued interim guidance; security challenges. The 2017 Trump Administration NSS previous administrations refrained from issuing formal framed the key U.S. national security challenge as one of guidance that articulated strategic intent until producing the strategic competition with other great powers, notably congressionally mandated National Security Strategy (NSS) China and Russia. While there were economic dimensions (originating in the Goldwater-Nichols Department of to this strategic competition, the 2017 NSS emphasized Defense Reorganization Act of 1986 P.L. 99-433, §603/50 American military power as a key part of its response to the U.S.C §3043). The full NSS is likely to be released later in challenge. 2021 or early 2022. By contrast, the Biden INSSG appears to invert traditional The INSSG states the Biden Administration’s conceptual national security strategy formulations, focusing on approach to national security matters as well as signaling its perceived shortcomings in domestic social and economic key priorities, particularly as executive branch departments policy rather than external threats as its analytic starting and agencies prepare their Fiscal Year (FY) 2022 budget point. The Biden Administration contends that the lines submissions. With respect to the latter, FY2022 will be the between foreign and domestic policy have been blurred to first budget prepared after the expiration of the budget caps the point of near nonexistence.
    [Show full text]
  • Principles for Software Assurance Assessment a Framework for Examining the Secure Development Processes of Commercial Technology Providers
    Principles for Software Assurance Assessment A Framework for Examining the Secure Development Processes of Commercial Technology Providers PRIMARY AUTHORS: Shaun Gilmore, Senior Security Program Manager, Trustworthy Computing, Microsoft Corporation Reeny Sondhi, Senior Director, Product Security Engineering, EMC Corporation Stacy Simpson, Director, SAFECode © 2015 SAFECode – All Rights Reserved. Principles for Software Assurance Assessment Table of Contents Foreword ��������������������������������������������������������������������������������������������������������������������������������� 3 Methodology �������������������������������������������������������������������������������������������������������������������������� 3 Problem Statement ���������������������������������������������������������������������������������������������������������������� 4 Framework Overview ������������������������������������������������������������������������������������������������������������� 5 Guiding Principles for Software Security Assessment ����������������������������������������������������������������������6 The SAFECode Supplier Software Assurance Assessment Framework ������������������������������ 7 What Are Your Risk Management Requirements? ����������������������������������������������������������������������������7 The Tier Three Assessment �����������������������������������������������������������������������������������������������������������������8 The Tier One and Tier Two Assessments ���������������������������������������������������������������������������������������������8
    [Show full text]
  • Small Business Information Security: the Fundamentals
    NISTIR 7621 Small Business Information Security: The Fundamentals Richard Kissel NISTIR 7621 Small Business Information Security: The Fundamentals Richard Kissel Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899 October 2009 U.S. Department of Commerce Gary Locke, Secretary National Institute of Standards and Technology Patrick D. Gallagher, Deputy Director Acknowledgements The author, Richard Kissel, wishes to thank his colleagues and reviewers who contributed greatly to the document’s development. Special thanks goes to Mark Wilson, Shirley Radack, and Carolyn Schmidt for their insightful comments and suggestions. Kudos to Kevin Stine for his awesome Word editing skills. Certain commercial entities, equipment, or materials may be identified in this document in order to describe and experimental procedure or concept adequately. Such identification is not intended to imply recommendation or endorsement by the National Institute of Standards and Technology, nor is it intended to imply that the entities, materials, or equipment are necessarily the best available for the purpose. i Table of Contents Overview...................................................................................................................................................... 1 1. Introduction.......................................................................................................................................... 1 2. The “absolutely necessary” actions that a small
    [Show full text]
  • Department of Homeland Security Appropriations for Fiscal Year 2013
    S. HRG. 112–838 DEPARTMENT OF HOMELAND SECURITY APPROPRIATIONS FOR FISCAL YEAR 2013 HEARINGS BEFORE A SUBCOMMITTEE OF THE COMMITTEE ON APPROPRIATIONS UNITED STATES SENATE ONE HUNDRED TWELFTH CONGRESS SECOND SESSION ON H.R. 5855/S. 3216 AN ACT MAKING APPROPRIATIONS FOR THE DEPARTMENT OF HOME- LAND SECURITY FOR THE FISCAL YEAR ENDING SEPTEMBER 30, 2013, AND FOR OTHER PURPOSES Department of Homeland Security Nondepartmental Witnesses Printed for the use of the Committee on Appropriations ( Available via the World Wide Web: http://www.gpo.gov/fdsys/browse/ committee.action?chamber=senate&committee=appropriations U.S. GOVERNMENT PRINTING OFFICE 72–317 PDF WASHINGTON : 2013 For sale by the Superintendent of Documents, U.S. Government Printing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512–1800; DC area (202) 512–1800 Fax: (202) 512–2104 Mail: Stop IDCC, Washington, DC 20402–0001 COMMITTEE ON APPROPRIATIONS DANIEL K. INOUYE, Hawaii, Chairman PATRICK J. LEAHY, Vermont THAD COCHRAN, Mississippi TOM HARKIN, Iowa MITCH MCCONNELL, Kentucky BARBARA A. MIKULSKI, Maryland RICHARD C. SHELBY, Alabama HERB KOHL, Wisconsin KAY BAILEY HUTCHISON, Texas PATTY MURRAY, Washington SUSAN COLLINS, Maine DIANNE FEINSTEIN, California LISA MURKOWSKI, Alaska RICHARD J. DURBIN, Illinois LINDSEY GRAHAM, South Carolina TIM JOHNSON, South Dakota MARK KIRK, Illinois MARY L. LANDRIEU, Louisiana DANIEL COATS, Indiana JACK REED, Rhode Island ROY BLUNT, Missouri FRANK R. LAUTENBERG, New Jersey JERRY MORAN, Kansas BEN NELSON, Nebraska JOHN HOEVEN, North Dakota MARK PRYOR, Arkansas RON JOHNSON, Wisconsin JON TESTER, Montana SHERROD BROWN, Ohio CHARLES J. HOUY, Staff Director BRUCE EVANS, Minority Staff Director SUBCOMMITTEE ON THE DEPARTMENT OF HOMELAND SECURITY MARY L.
    [Show full text]
  • Department of Homeland Security
    Vol. 81 Friday, No. 48 March 11, 2016 Part II Department of Homeland Security 8 CFR Parts 214 and 274a Improving and Expanding Training Opportunities for F–1 Nonimmigrant Students With STEM Degrees and Cap-Gap Relief for All Eligible F–1 Students; Final Rule VerDate Sep<11>2014 19:04 Mar 10, 2016 Jkt 238001 PO 00000 Frm 00001 Fmt 4717 Sfmt 4717 E:\FR\FM\11MRR2.SGM 11MRR2 asabaliauskas on DSK3SPTVN1PROD with RULES 13040 Federal Register / Vol. 81, No. 48 / Friday, March 11, 2016 / Rules and Regulations DEPARTMENT OF HOMELAND B. Summary of the Major Provisions of the II. Executive Summary SECURITY Final Rule C. Costs and Benefits A. Purpose of the Regulatory Action 8 CFR Parts 214 and 274a III. Background This final rule affects certain F–1 A. Statutory and Regulatory Authority and nonimmigrant students who seek to [DHS Docket No. ICEB–2015–0002] History obtain an extension of optional practical B. The 2015 NPRM RIN 1653–AA72 C. Basis and Purpose of Regulatory Action training (OPT) based on study at a U.S. IV. Discussion of Comments and Final Rule institution of higher education in a Improving and Expanding Training A. Including a STEM OPT Extension science, technology, engineering or Opportunities for F–1 Nonimmigrant Within the OPT Program mathematics (STEM) field, as well as Students With STEM Degrees and Cap- B. Enforcement, Monitoring, and Oversight certain F–1 nonimmigrant students who Gap Relief for All Eligible F–1 Students C. Qualifying F–1 Nonimmigrants seek so-called Cap-Gap relief. The F–1 D.
    [Show full text]