BEST PRACTICES in Anti-Terrorism Security for Sporting and Entertainment Venues RESOURCE GUIDE

BEST PRACTICES in Anti-Terrorism Security for Sporting and Entertainment Venues RESOURCE GUIDE

Command, Control and Interoperability Center for Advanced Data Analysis A Department of Homeland Security University Center of Excellence BEST PRACTICES in Anti-Terrorism Security for Sporting and Entertainment Venues RESOURCE GUIDE July 2013 Table of Contents Introduction to the Project ............................................................................................................7 Background...................................................................................................................................8 Identifying Best Practices in Anti-Terrorism Security in Sports Venues ......................................8 Identifying the Key Best Practices and Developing Metrics for Each .........................................11 Developing a Best Practices Resource Guide .............................................................................13 Testing the Guid e ........................................................................................................................13 Executive Summary....................................................................................................................13 Chapter 1 – Overview.................................................................................................................15 1.1 Introduction...........................................................................................................................15 1.2 Risk Assessment ...................................................................................................................15 1.3 Staffing: Leadership, Organization and Authority ...............................................................17 1.4 Information Management .....................................................................................................19 1.5 Operations.............................................................................................................................21 1.6 Training and Evaluation........................................................................................................24 1.7 Summary...............................................................................................................................25 Chapter 2 – Risk Assessment......................................................................................................26 Introduction.................................................................................................................................26 2.1 Risk Assessment Team .........................................................................................................28 2.2 Venue Profile ........................................................................................................................29 2.3 Threat, Vulnerability and Consequence ................................................................................32 2.3.1 Threat Identification.......................................................................................................32 2.3.2 Vulnerability and Consequence Ana lys is .......................................................................34 ii 2.3.3 Addressing the Risk Assessment....................................................................................39 2.4 Infrastructure Interdependencies ...........................................................................................40 2.5 Dynamic Re-assessment Protocol .........................................................................................41 2.5.1 Risk Assessment Review Process ..................................................................................41 2.5.2 Dynamic On-Going Risk Assessments ..........................................................................42 2.6 Risk Assessment: Key Points ..............................................................................................44 2.7 Recommendations – Chapter 2 Risk Assessment .................................................................45 Appendix - Chapter 2 ..................................................................................................................50 Risk Assessment Tools ...........................................................................................................50 Risk Assessment Team ...........................................................................................................51 Venue Profile ..........................................................................................................................52 Threat Identification................................................................................................................53 Risk and Vulnerability Ana lys is ..............................................................................................53 Infrastructure Interdependencies .............................................................................................53 Dynamic Re-Assessment Protocol ..........................................................................................54 Chapter 3- Staffing: Leadership, Organization and Authority .......................................................55 Introduction.................................................................................................................................55 3.1 Comma nd and Control, and Unified Command ...................................................................55 3.2 Organizational Hierarchy......................................................................................................58 3.3 Staffing P la n .........................................................................................................................60 3.4 Human Resource Issues ........................................................................................................61 3.4.1 Hir ing and Employee Turnover......................................................................................61 3.4.2 Insider Threat .................................................................................................................62 3.5 Staffing: Leadership, Organization and Authority: Key Points ...........................................64 iii 3.6 Recommendations – Chapter 3 Staffing: Leadership, Organization and Authority ................64 Appendix – Chapter 3 .................................................................................................................68 Tabletop Exercises ..................................................................................................................68 Flexibility of workforce ..........................................................................................................68 Insider Threat/Red-teaming.....................................................................................................69 Span of Control .......................................................................................................................69 Chain of Co mma nd .................................................................................................................69 Incident Co mma nd ..................................................................................................................70 Chapter 4 – Information Management............................................................................................70 Introduction.................................................................................................................................70 4.1 Communication Structures – The Three “Buckets” ..............................................................71 4.1.1 Internal Stakeholder Communications ...........................................................................72 4.1.2 External Stakeholder Communications ..........................................................................77 4.1.3 Patron/Public Stakeholder Communications ..................................................................80 4.2 Cyber-Security ......................................................................................................................86 4.3 Information Management: Key Points .................................................................................88 4.4 Recommendations – Chapter 4 Information Management ....................................................89 Appendix – Chapter 4 .................................................................................................................94 Posted S ignage on Crowd Management..................................................................................94 Socia l Med ia ...........................................................................................................................95 Cyber-Security ........................................................................................................................95 Chapter 5 – Operations ...................................................................................................................96 Introduction.................................................................................................................................96 5.1 Outer Zone ............................................................................................................................97 iv 5.1.1 1 Parking Structures .......................................................................................................98 5.1.2 Coordination W ith Public Transportation ......................................................................99

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    155 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us