The Example of the 2010 Vancouver Olympic Games

The Example of the 2010 Vancouver Olympic Games

bs_bs_banner The Geographical Journal, 2013, doi: 10.1111/geoj.12033 Interacting forms of expertise and authority in mega-event security: the example of the 2010 Vancouver Olympic Games FRANCISCO R KLAUSER Institut de Géographie, Université de Neuchâtel, Espace Louis-Agassiz 1, 2000 Neuchâtel, Switzerland E-mail: [email protected] This paper was accepted for publication in March 2013 This paper explores the interests, forms of expertise and sources of authority in security governance at the 2010 Vancouver Olympic Games. To do so, the research approach pursued here focuses on the micro level, locating the various contributions to event security in the context of a particular range of projects and decisions relating to the planning and instauration of Olympic venue security. On this basis, the paper empirically explores how security governance at sport mega events, as the outcome of complex negotiations, permeates and shapes particular places and projects during the event. This investigation also brings to the fore a number of more fundamental insights with regard to the processes, relationships and interests underpinning security governance in the post-9/11 context. KEY WORDS: sport mega events, security, surveillance, city, 2010 Vancouver Olympic Games, expertise thermore, drawing upon the mega-event case study, Introduction the paper also provides a rare insight into the internal his paper explores the interests, forms of exper- logics and driving forces underpinning some of the tise and sources of authority in security govern- most salient developments in contemporary security T ance at the 2010 Vancouver Olympic Games. matters, including current trends of privatisation More specifically, drawing upon 11 in-depth inter- and exemplification of specific security solutions and views conducted with key stakeholders in the policing partnerships. of the 2010 Vancouver Olympic Games, the paper locates the various contributions to event security in Interests and expertise in mega-event security the context of a particular range of projects and deci- sions relating to the planning and instauration of In recent years, a growing body of research has sought Olympic venue security. to explore the modalities and implications of mega- While this investigation focuses predominantly, event security (Thompson 1999; Decker et al. 2007; albeit not exclusively, on the planning and establish- Yu et al. 2009; Jennings and Lodge 2009; Fussey and ment of venue security from the viewpoint of the Coaffee 2011; Fussey et al. 2011). There are many Vancouver 2010 Integrated Security Unit (ISU), the important issues emerging from these literatures, but unit responsible for security planning and operations two of these are of particular interest here: the imbri- at the Games, it also brings to the fore a number of cations of security and economic concerns in the more fundamental insights with regard to the proc- staging of mega events, and the interactions of scale in esses, relationships and interests underpinning secu- the operation and organisation of mega-event secu- rity governance in the post-9/11 context. Thus the rity. These will be outlined briefly below. approach pursued here matters because it exemplifies in empirical detail how security governance at sport Security issues and economic concerns mega events shapes particular places and projects during the event, which is of fundamental importance The first issue to highlight relates to the imbrications – if we are to understand the actual logics behind and that is, partly overlapping positions – of security issues the implications of contemporary event security. Fur- and economic concerns in the staging of sport mega The Geographical Journal, 2013 © 2013 The Author. The Geographical Journal © 2013 Royal Geographical Society (with the Institute of British Geographers) 2 Interacting forms of expertise and authority in mega-event security events. Relevant literatures explore at least three com- and national motivation, expertise and traditions in plementary research directions. First, a growing range security matters. of scholars are now studying the economic relevance Yet whilst the multifold security collaborations at of mega-event security in terms of ‘urban entrepre- sport mega events have been acknowledged on neurialism’ and ‘place selling’ (Boyle 2005; Boyle and various conceptually and empirically informed Haggerty 2011; Klauser 2012). This work substantiates grounds, there is to date a pressing need to better the argument that threats of escalating crowd violence understand the precise ways in which the various (violent protest, hooliganism, etc.) are seen not only to practices of, and interests in, security merge in par- endanger the local population, visitors and athletes ticular sites, and to consider the ramifications of this. but also to threaten the carefully constructed market- What is needed is a micro approach that allows an ing image of an enjoyable, colourful and secure event. understanding of how exactly security governance at Second, existing literatures devote considerable sport mega events permeates and shapes particular attention to the role of private companies in providing places and projects during the event. Focusing on the technology solutions and labour forces for mega- co-construction of venue security at the 2010 Vancou- event security. These literatures shed light not only on ver Olympic Games, this paper addresses precisely the importance of private expertise in event security, this issue. but also on the fierce competition between security providers (Samatas 2007) and on their role in boosting security expenditure (Busch 2006). Scholars also Venue security at the 2010 Vancouver Olympics discuss the role of mega events as testing grounds for and Paralympic Games novel high-tech surveillance technologies (Molnar Stadia and other venues constitute focal points in and Snider 2011). mega-event security. At Vancouver 2010, venue secu- Third, an increasingly sophisticated body of rity relied on three main principles (Vancouver research emphasises the security-related interests and Integrated Security Unit 2010, 193), distinguishing contributions of the event organisers themselves (FIFA, between ‘secure perimeter’ (for purposes of physical UEFA, IOC) (Eick 2011). Recent discussions have separation and intrusion detection), ‘security sweep’ insisted, for example, on the fusing security and (for purposes of internal cleaning and surveillance of branding rationales associated with fan zones in event enclosed perimeters) and ‘access control’ (for pur- cities (Klauser 2012) and on the relationship between poses of filtering and managing venue inflows). The security governance and the commercialisation of following quote, taken from the interview with the sports more generally (Giulianotti 2011). venue security coordinator at the 2010 Vancouver Olympic Games, illustrates the complementarity and interrelation of the three principles: Interactions of scale in the operation and When we look at a venue, we look at physical barriers, organisation of mega-event security fence, structure, perimeter control. Then we look at The second issue to emphasise turns around the sweeping and cleaning to ensure that there is nothing in complex interactions of scale in the operation and that venue, whether explosives or firearms. We do a com- organisational structures of mega-event security. There plete clean of that venue, and then after that we put in a are at least two complementary research directions process of access control. here. On the one hand, an increasingly sophisticated Venue security coordinator, Vancouver 2010 ISU body of theoretical and empirical research explores the transnational exchange and sharing of previously In terms of technical operations, venue security for tested and subsequently exemplified ‘security tem- the 2010 Vancouver Games relied on two main port- plates’, which circulate from event city to event city folios, distinguishing between PIDS (Perimeter Intru- (Samatas 2007 2011; Boyle 2011). Concerned with sion Detection System) and SAP (Secure Access the mechanisms and actor networks through which Program). The aims of these are outlined in more expertise in the field of mega-event security ‘travels’, detail below, before moving to present the methodo- this research focuses on issues of policy learning, logical approach pursued in this paper. convergence and imitation. On the other hand, there is a range of scholars who Perimeter Intrusion Detection System emphasise the locally anchored factors inhibiting and re-orienting such global policy circuits, from legal The overall aim of PIDS was to detect and assess specificities to local organisational cultures (Klauser perimeter intrusions and disturbances in 18 sporting 2011a 2011b). Together, these studies portray sport and non-sporting venues. The system comprised a mega events as highly visible and prestigious projects total of more than 900 CCTV cameras, combined with whose securitisation is firmly embedded in transna- automated assessment and detection software, tional circuits of imitation and exemplification, divided between the venues and covering a total of without, however, forgetting the role of local, regional 27 km across both urban and mountainous terrain. The Geographical Journal, 2013 © 2013 The Author. The Geographical Journal © 2013 Royal Geographical Society (with the Institute of British Geographers) Interacting forms of expertise and authority in mega-event security 3 The installation, maintenance

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    11 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us