Command, Control and Interoperability Center for Advanced Data Analysis A Department of Homeland Security University Center of Excellence BEST PRACTICES in Anti-Terrorism Security for Sporting and Entertainment Venues RESOURCE GUIDE July 2013 Table of Contents Introduction to the Project ............................................................................................................7 Background...................................................................................................................................8 Identifying Best Practices in Anti-Terrorism Security in Sports Venues ......................................8 Identifying the Key Best Practices and Developing Metrics for Each .........................................11 Developing a Best Practices Resource Guide .............................................................................13 Testing the Guid e ........................................................................................................................13 Executive Summary....................................................................................................................13 Chapter 1 – Overview.................................................................................................................15 1.1 Introduction...........................................................................................................................15 1.2 Risk Assessment ...................................................................................................................15 1.3 Staffing: Leadership, Organization and Authority ...............................................................17 1.4 Information Management .....................................................................................................19 1.5 Operations.............................................................................................................................21 1.6 Training and Evaluation........................................................................................................24 1.7 Summary...............................................................................................................................25 Chapter 2 – Risk Assessment......................................................................................................26 Introduction.................................................................................................................................26 2.1 Risk Assessment Team .........................................................................................................28 2.2 Venue Profile ........................................................................................................................29 2.3 Threat, Vulnerability and Consequence ................................................................................32 2.3.1 Threat Identification.......................................................................................................32 2.3.2 Vulnerability and Consequence Ana lys is .......................................................................34 ii 2.3.3 Addressing the Risk Assessment....................................................................................39 2.4 Infrastructure Interdependencies ...........................................................................................40 2.5 Dynamic Re-assessment Protocol .........................................................................................41 2.5.1 Risk Assessment Review Process ..................................................................................41 2.5.2 Dynamic On-Going Risk Assessments ..........................................................................42 2.6 Risk Assessment: Key Points ..............................................................................................44 2.7 Recommendations – Chapter 2 Risk Assessment .................................................................45 Appendix - Chapter 2 ..................................................................................................................50 Risk Assessment Tools ...........................................................................................................50 Risk Assessment Team ...........................................................................................................51 Venue Profile ..........................................................................................................................52 Threat Identification................................................................................................................53 Risk and Vulnerability Ana lys is ..............................................................................................53 Infrastructure Interdependencies .............................................................................................53 Dynamic Re-Assessment Protocol ..........................................................................................54 Chapter 3- Staffing: Leadership, Organization and Authority .......................................................55 Introduction.................................................................................................................................55 3.1 Comma nd and Control, and Unified Command ...................................................................55 3.2 Organizational Hierarchy......................................................................................................58 3.3 Staffing P la n .........................................................................................................................60 3.4 Human Resource Issues ........................................................................................................61 3.4.1 Hir ing and Employee Turnover......................................................................................61 3.4.2 Insider Threat .................................................................................................................62 3.5 Staffing: Leadership, Organization and Authority: Key Points ...........................................64 iii 3.6 Recommendations – Chapter 3 Staffing: Leadership, Organization and Authority ................64 Appendix – Chapter 3 .................................................................................................................68 Tabletop Exercises ..................................................................................................................68 Flexibility of workforce ..........................................................................................................68 Insider Threat/Red-teaming.....................................................................................................69 Span of Control .......................................................................................................................69 Chain of Co mma nd .................................................................................................................69 Incident Co mma nd ..................................................................................................................70 Chapter 4 – Information Management............................................................................................70 Introduction.................................................................................................................................70 4.1 Communication Structures – The Three “Buckets” ..............................................................71 4.1.1 Internal Stakeholder Communications ...........................................................................72 4.1.2 External Stakeholder Communications ..........................................................................77 4.1.3 Patron/Public Stakeholder Communications ..................................................................80 4.2 Cyber-Security ......................................................................................................................86 4.3 Information Management: Key Points .................................................................................88 4.4 Recommendations – Chapter 4 Information Management ....................................................89 Appendix – Chapter 4 .................................................................................................................94 Posted S ignage on Crowd Management..................................................................................94 Socia l Med ia ...........................................................................................................................95 Cyber-Security ........................................................................................................................95 Chapter 5 – Operations ...................................................................................................................96 Introduction.................................................................................................................................96 5.1 Outer Zone ............................................................................................................................97 iv 5.1.1 1 Parking Structures .......................................................................................................98 5.1.2 Coordination W ith Public Transportation ......................................................................99
Details
-
File Typepdf
-
Upload Time-
-
Content LanguagesEnglish
-
Upload UserAnonymous/Not logged-in
-
File Pages155 Page
-
File Size-