This research paper describes the use of FEMA's THIRA methodology to assess the risks to a structure that will be used as a venue for a high - level dignitary protectee.
Posted as a courtesy by:
David G. Sweigert CISA CISSP HCISPP PMP SEC+
Pycap is registered by the Canadian Federal Government as a Designated Organization for the Startup Visa Program, offering the following:
- Facilitating Canadian immigration for foreign entrepreneurs
- Providing a game changing incubation program to launch a business in Canada, raise capital, and expand throughout North America
- Fastest processing time for evaluation and issuing a Letter of Support
- Select candidates may be eligible for up to $300K in financing
Presented at 6th International Conference on Security - SECCON 2014, Karachi
Seamless Integrated Security Planning
Mr. Keith Rayson
Managing Director, Consulting Solutions International (UAE)
Topics Covered:
• Security Design Implementation and Management
• Risk & Threat Assessment
• What do we mean by Integrated Security Planning?
• What fourth pillar of the strategy calls for?
• The Integrated Planning System (IPS)
• Benefits of the IPS
RUNNING HEADER: AIRPORT PART 1 1
3
The Potential Threats and Vulnerabilities at the Richmond International Airport
Part 1
CJUC 382
Kenton Shatzer
Liberty University
Introduction
This research paper is geared towards finding out the potential threats and vulnerabilities at the Richmond International Airport which is located in Virginia. The report will also enable us to find out the state of security in the airport and whether its customers, employees and their luggage and cargo are safe.
Security Stakeholders.
The security stakeholders at Richmond International Airport include the security officers at the airport, passengers and all the employees. Everyone has an obligation to take in ensuring that airport is safe for all to travel. The security stakeholder consists of: Security Committee (SC) and Security Working Groups (SWG). They include even the top management of the airlines and they are all involved in the formulation of strategies, actions and major decision making with regards to Richmond International Airport’s security (Cox & Clother, 2004).
Description of Assessment.
Threat Assessment
A threat refers to a plan to impose pain, wound and harm on someone or something. Insecurity at Richmond International Airport could pose a threat to the safety of passengers, employees and that of the surrounding environment. As a result, lives could be lost, people would lose out on jobs and the airport could be no more leading to damages on the economy (Haerens & Zott, 2013). The attacks could be well organized by groups of terrorists and they could range hijacking of the planes, plane suicide bombers, taking passengers hostage and even kidnapping. Some of the possible the threats at the airport would include;
1. Bombs and nuclear materials hidden in the freight cargo. If the bomb could go off then the whole plan and the passengers in it could be in real danger.
2. Stealing from passengers. The passengers would be angered by the theft thus losing faith in Richmond International Airport and consequently reducing the number of customers. The company’s name would be tarnished (Cox & Clother, 2004).
3. Explosive devices hidden in the aircrafts and sometimes in the passenger terminal. If the devices would explode they would lead to massive loss of lives.
4. Hijacking aircrafts. When aircrafts are hijacked, the amount of tension in the environment increases causing fear and panic among passengers. In some cases it leads to killing of passengers by the hijackers if they do not comply with their wishes.
5. Illegal immigrations whereby people who are not cleared by the immigrations office could make travel arrangements and eventually leave the state thus increasing the number of individuals who are in the country illegally.
6. Cyber-attacks carried out by malicious people corrupt the organization’s computer and information sy.
DRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERSReputelligence
My talk will be about drone threats in general and how you can assess drone based threats. I will show the comprehensive threat assessment methodology and the countermeasures you can take against the drone threat. The threat assessment is based on a catalog of about 140 items. Particularly interesting will be looking at the drone threats in relation to:
Planting payload at specific locations (i.e. hacking equipment transported to target location for instance)
Tampering communication equipment with the help of drones
Insider threat communicate with an insider with the help of a drone
Hacking the communication of a drone
Privacy violations
etc.
This presentation discusses the training requirements for the Hazardous Material Safety Officer. Reviews their roles & responsibilities, U S Safety regulations, health and safety risks, implementation of a safety plan, post exposure health effects, incident rehabilitation, and hazards off f WMD’s and clandestine drug labs. This presentation meets OSHA, NFPA, & EPA training requirements. Presentation is over 220 slides in length.
In 2006, the Pennsylvania Bureau of Workers’ Compensation received reports on 10,055 construction-related injuries. Despite extensive federal and state regulations designed to maintain safe worksites, 21 construction workers suffered fatal injuries in 2006 in Pennsylvania, an increase from 14 fatalities of the previous year.
This presentation will review root causes of construction accidents, OSHA’s role of “the work place safety gatekeeper” and the various duties of care for contractors and sub contractors. Identification of hazard factors affecting managing safety in assembly, erection, excavation and demolition operations in order to analyze their effect to the risk of accident occurrence.
Additionally the design professional’s opportunity and obligation to design for safety will be reviewed.
This presentation will demonstrate by review of case histories how risks can be managed and if not what liabilities can be incurred.
Pycap is registered by the Canadian Federal Government as a Designated Organization for the Startup Visa Program, offering the following:
- Facilitating Canadian immigration for foreign entrepreneurs
- Providing a game changing incubation program to launch a business in Canada, raise capital, and expand throughout North America
- Fastest processing time for evaluation and issuing a Letter of Support
- Select candidates may be eligible for up to $300K in financing
Presented at 6th International Conference on Security - SECCON 2014, Karachi
Seamless Integrated Security Planning
Mr. Keith Rayson
Managing Director, Consulting Solutions International (UAE)
Topics Covered:
• Security Design Implementation and Management
• Risk & Threat Assessment
• What do we mean by Integrated Security Planning?
• What fourth pillar of the strategy calls for?
• The Integrated Planning System (IPS)
• Benefits of the IPS
RUNNING HEADER: AIRPORT PART 1 1
3
The Potential Threats and Vulnerabilities at the Richmond International Airport
Part 1
CJUC 382
Kenton Shatzer
Liberty University
Introduction
This research paper is geared towards finding out the potential threats and vulnerabilities at the Richmond International Airport which is located in Virginia. The report will also enable us to find out the state of security in the airport and whether its customers, employees and their luggage and cargo are safe.
Security Stakeholders.
The security stakeholders at Richmond International Airport include the security officers at the airport, passengers and all the employees. Everyone has an obligation to take in ensuring that airport is safe for all to travel. The security stakeholder consists of: Security Committee (SC) and Security Working Groups (SWG). They include even the top management of the airlines and they are all involved in the formulation of strategies, actions and major decision making with regards to Richmond International Airport’s security (Cox & Clother, 2004).
Description of Assessment.
Threat Assessment
A threat refers to a plan to impose pain, wound and harm on someone or something. Insecurity at Richmond International Airport could pose a threat to the safety of passengers, employees and that of the surrounding environment. As a result, lives could be lost, people would lose out on jobs and the airport could be no more leading to damages on the economy (Haerens & Zott, 2013). The attacks could be well organized by groups of terrorists and they could range hijacking of the planes, plane suicide bombers, taking passengers hostage and even kidnapping. Some of the possible the threats at the airport would include;
1. Bombs and nuclear materials hidden in the freight cargo. If the bomb could go off then the whole plan and the passengers in it could be in real danger.
2. Stealing from passengers. The passengers would be angered by the theft thus losing faith in Richmond International Airport and consequently reducing the number of customers. The company’s name would be tarnished (Cox & Clother, 2004).
3. Explosive devices hidden in the aircrafts and sometimes in the passenger terminal. If the devices would explode they would lead to massive loss of lives.
4. Hijacking aircrafts. When aircrafts are hijacked, the amount of tension in the environment increases causing fear and panic among passengers. In some cases it leads to killing of passengers by the hijackers if they do not comply with their wishes.
5. Illegal immigrations whereby people who are not cleared by the immigrations office could make travel arrangements and eventually leave the state thus increasing the number of individuals who are in the country illegally.
6. Cyber-attacks carried out by malicious people corrupt the organization’s computer and information sy.
DRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERSReputelligence
My talk will be about drone threats in general and how you can assess drone based threats. I will show the comprehensive threat assessment methodology and the countermeasures you can take against the drone threat. The threat assessment is based on a catalog of about 140 items. Particularly interesting will be looking at the drone threats in relation to:
Planting payload at specific locations (i.e. hacking equipment transported to target location for instance)
Tampering communication equipment with the help of drones
Insider threat communicate with an insider with the help of a drone
Hacking the communication of a drone
Privacy violations
etc.
This presentation discusses the training requirements for the Hazardous Material Safety Officer. Reviews their roles & responsibilities, U S Safety regulations, health and safety risks, implementation of a safety plan, post exposure health effects, incident rehabilitation, and hazards off f WMD’s and clandestine drug labs. This presentation meets OSHA, NFPA, & EPA training requirements. Presentation is over 220 slides in length.
In 2006, the Pennsylvania Bureau of Workers’ Compensation received reports on 10,055 construction-related injuries. Despite extensive federal and state regulations designed to maintain safe worksites, 21 construction workers suffered fatal injuries in 2006 in Pennsylvania, an increase from 14 fatalities of the previous year.
This presentation will review root causes of construction accidents, OSHA’s role of “the work place safety gatekeeper” and the various duties of care for contractors and sub contractors. Identification of hazard factors affecting managing safety in assembly, erection, excavation and demolition operations in order to analyze their effect to the risk of accident occurrence.
Additionally the design professional’s opportunity and obligation to design for safety will be reviewed.
This presentation will demonstrate by review of case histories how risks can be managed and if not what liabilities can be incurred.
Securing National Events with Anti-Drone TechnologyNovoQuad
In national events, anti-drone technology can help to prevent incidents such as unauthorized photography, surveillance, or even the deployment of harmful payloads.
Vehicular Ad hoc Network (VANET) needs security to implement the wireless environment and serves users with safety and non safety applications. Attackers generate different attacks in this life saving vehicular network. In this paper, we propose five different classes of attacks and every class is expected to provide better perspective for the VANET security. The main contribution of this paper is the proposed solution for classification and identification of different attacks in VANET.
Exploration & Production onshore and offshore: technical challenges and their...ITE Oil&Gas
Presentation at TUROGE 2014 (Turkish International Oil and Gas Conference) on Safety of Onshore and Offshore Oil & Gas Operations.
By Giovanni Uguccioni - Oil & Gas Sector Development Manager at D’Appolonia SpA, Italy
RISK SCORE CALCULATOR
Use the Risk Score Calculator to Determine the Level of Risk of each Hazard
What would be the
CONSEQUENCE
of an occurrence be? What is the LIKELIHOOD of an occurrence? Hierarchy of Controls
Frequent/Almost certain (5)
Continuous or will happen frequently Often (4)
6 to 12 times a year Likely (3)
1 to 5 times a year Possible (2)
Once every 5 years Rarely (1)
Less than once every 5 years Can the hazard be Eliminated or removed from the work place?
Catastrophic (5)
Multiple Fatalities High 25 High 20 High 15 Medium 10 Medium 5 Can the product or process be substituted for a less hazardous alternative?
Serious (4)
Class 1 single fatality High 20 High 16 High 12 Medium 8 Low 4 Can the hazard be engineered away with guards or barriers?
Moderate (3)
Class2 (AWI or LTI) or Class 1 Permanently disabling effects High 15 High 12 Medium 9 Medium 6 Low 3 Can Administration Controls be adopted
I.e. procedures, job rotation etc.
Minor (2)
Medical attention needed, no work restrictions. MTI Medium10 Medium 8 Medium 6 Low 4 Low 2 Can Personal Protective Equipment & Clothing be worn to safe guard against hazards?
Insignificant (1)
FAI Medium10 Medium 4 Low 3 Low 2 Low 1
Project Name: xxx
RA Ref No.: xxx
RA compilation Date: Review date:
Date:
Compiled by:
Reviewed by:
Approved by:
Overall Task Details
Overall project Emergency response specific to the size, location and complexity of the area, including the requirements of the UAE Fire Life Safety Code of Practice 2017 Chapters 2 and 12. Use with RA 17 – Initial Site Set up; Relevant Applicable MAS:
• 00241 Fire Fighting Equipment;
• 00236 Housekeeping; Additional Training required:
NOC’s Required for task:
No Specific Task Step Hazard Details Consequence/Risk Initial Risk Rating Control Measures Residual Risks Additional Control Measures RR
P S RR
1 Emergency Procedure • Emergency Response; • Uncontrolled emergency responses; 5 5 25 i. Each ATC project shall create a specific Emergency Response Management Plan following requirements and Codes of Practice contained below; Low
2 Access requirement for Emergency Vehicles
• Police;
• Civil Defense;
• Ambulance;
(Including as per 2017 Fire Life Safety COP Requirements) • Access required by emergency vehicles during incident; • Emergency vehicles not able to access site in an emergency;
• Unable to attend to incident due to blocked roads;
• Unable to reach incident with equipment;
• Inadequate width of roads;
• Time delay in rescue, treatment of injured and fighting fire; 5 5 25 HIGH ii. Access for use of Civil Defence apparatus shall be designated and provided at the start of the project and maintained until completion;
iii. All ATC project sites shall be designed to be accessible by Civil Defence apparatus by means of roadways having an all-weather driving service of not less than 6.1m of unobstructed width;
iv. The roads shall have the ability to withstand the live loads of fire apparatus of 80 tons
Defentect is an advanced CBRN threat detection system marketing by Rapidsoft Systems Inc. (http://www.rapidsoftsystems.com). It is only system of its kind that can save lives by detecting threats before they occur.
Jennifer Schaus and Associates hosts a complimentary webinar series on The FAR in 2024. Join the webinars on Wednesdays and Fridays at noon, eastern.
Recordings are on YouTube and the company website.
https://www.youtube.com/@jenniferschaus/videos
Jennifer Schaus and Associates hosts a complimentary webinar series on The FAR in 2024. Join the webinars on Wednesdays and Fridays at noon, eastern.
Recordings are on YouTube and the company website.
https://www.youtube.com/@jenniferschaus/videos
What is the point of small housing associations.pptxPaul Smith
Given the small scale of housing associations and their relative high cost per home what is the point of them and how do we justify their continued existance
This session provides a comprehensive overview of the latest updates to the Uniform Administrative Requirements, Cost Principles, and Audit Requirements for Federal Awards (commonly known as the Uniform Guidance) outlined in the 2 CFR 200.
With a focus on the 2024 revisions issued by the Office of Management and Budget (OMB), participants will gain insight into the key changes affecting federal grant recipients. The session will delve into critical regulatory updates, providing attendees with the knowledge and tools necessary to navigate and comply with the evolving landscape of federal grant management.
Learning Objectives:
- Understand the rationale behind the 2024 updates to the Uniform Guidance outlined in 2 CFR 200, and their implications for federal grant recipients.
- Identify the key changes and revisions introduced by the Office of Management and Budget (OMB) in the 2024 edition of 2 CFR 200.
- Gain proficiency in applying the updated regulations to ensure compliance with federal grant requirements and avoid potential audit findings.
- Develop strategies for effectively implementing the new guidelines within the grant management processes of their respective organizations, fostering efficiency and accountability in federal grant administration.
Russian anarchist and anti-war movement in the third year of full-scale warAntti Rautiainen
Anarchist group ANA Regensburg hosted my online-presentation on 16th of May 2024, in which I discussed tactics of anti-war activism in Russia, and reasons why the anti-war movement has not been able to make an impact to change the course of events yet. Cases of anarchists repressed for anti-war activities are presented, as well as strategies of support for political prisoners, and modest successes in supporting their struggles.
Thumbnail picture is by MediaZona, you may read their report on anti-war arson attacks in Russia here: https://en.zona.media/article/2022/10/13/burn-map
Links:
Autonomous Action
http://Avtonom.org
Anarchist Black Cross Moscow
http://Avtonom.org/abc
Solidarity Zone
https://t.me/solidarity_zone
Memorial
https://memopzk.org/, https://t.me/pzk_memorial
OVD-Info
https://en.ovdinfo.org/antiwar-ovd-info-guide
RosUznik
https://rosuznik.org/
Uznik Online
http://uznikonline.tilda.ws/
Russian Reader
https://therussianreader.com/
ABC Irkutsk
https://abc38.noblogs.org/
Send mail to prisoners from abroad:
http://Prisonmail.online
YouTube: https://youtu.be/c5nSOdU48O8
Spotify: https://podcasters.spotify.com/pod/show/libertarianlifecoach/episodes/Russian-anarchist-and-anti-war-movement-in-the-third-year-of-full-scale-war-e2k8ai4
Understanding the Challenges of Street ChildrenSERUDS INDIA
By raising awareness, providing support, advocating for change, and offering assistance to children in need, individuals can play a crucial role in improving the lives of street children and helping them realize their full potential
Donate Us
https://serudsindia.org/how-individuals-can-support-street-children-in-india/
#donatefororphan, #donateforhomelesschildren, #childeducation, #ngochildeducation, #donateforeducation, #donationforchildeducation, #sponsorforpoorchild, #sponsororphanage #sponsororphanchild, #donation, #education, #charity, #educationforchild, #seruds, #kurnool, #joyhome
ZGB - The Role of Generative AI in Government transformation.pdfSaeed Al Dhaheri
This keynote was presented during the the 7th edition of the UAE Hackathon 2024. It highlights the role of AI and Generative AI in addressing government transformation to achieve zero government bureaucracy
ZGB - The Role of Generative AI in Government transformation.pdf
Blending risk analysis with executive protection
1. Physical Risk Assessment – Preliminary Report
SWEIGERT, DAVE Page 1
Threat and Hazard Identification
and
Risk Assessment
COMMUNITY THEATER
July 2015
Training Material
Distributed for educational purposes only
AUTHOR:
Dave Sweigert, M.Sci.,
CISSP, CISA, HCISSP, PMP, SEC+
2. Physical Risk Assessment – Preliminary Report
SWEIGERT, DAVE Page 2
Executive Summary
This report is a preliminary Threat and Hazard Identification and Risk Assessment
(THIRA) report that addresses associated risks and threats to a community theatre
that may host a dignitary visit. The specific community theatre is not identified in
this high-level generic report, as this report is distributed for tutorial purposes for
the THIRA community. Actual particulars of the security details of this facility,
along with photographs, are contained in a series of confidential annexes.
Disclaimer
The author is a non-attorney security practitioner that has produced this document
as part of scholarly research. The reader is cautioned that this document is not
intended to provide specific security advice to a particular structure, venue or
setting. This document is distributed for tutorial purposes only.
Credits
The majority of illustrations used in this document have been procured from
printed materials of the Federal Emergency Management Administration (FEMA).
All others have been procured from government web-sites and Copyright has been
waived. This work is a Copyrighted work (2015).
3. Physical Risk Assessment – Preliminary Report
SWEIGERT, DAVE Page 3
Background
As a preliminary matter, this report will address basic terroristic threats to a
community theatre. The guiding principles for this assessment are contained in
these Federal Emergency Management Administration (FEMA) documents:
FEMA 426, Reference Manual to Mitigate Potential Terrorist Attacks Against
Buildings, and
FEMA 452, Risk Assessment, A How-to Guide to Mitigate Potential Terrorist
Attacks Against Buildings
Scope
This report provides a scenario based assessment to simulate the issues that may
impact a dignitary visiting the community theatre. For the purposes of this
scenario it will be assumed that:
a. A preliminary assessment of the structure will be undertaken (phase one);
b. Recommendations as to permanent upgrades to security will be cited (phase
two); and,
c. Specifics will be addressed concerning a dignitary visit to the theatre.
Threats to be addressed:
Improvised Explosive Device (IED) placed in building
(internal explosive attack)
IED worn by suicide intruder and exploded
IED borne by vehicle that penetrates security
4. Physical Risk Assessment – Preliminary Report
SWEIGERT, DAVE Page 4
Target Zones
To aid in the threat analysis of the structure, FEMA suggests the use of target
zones.
Zone 1 Building and perimeter within 100 feet
Zone 2 More than 100 but less than 300 feet
Zone 3 More than 300 feet but less than 1,000 feet
This approach can be co-mingled with threats to produce the following hybrid:
Zone 1 Internal explosive attack
Zone 2 Individual borne IED
Zone 3 Vehicle borne IED
5. Physical Risk Assessment – Preliminary Report
SWEIGERT, DAVE Page 5
THIRA Methodology
As the following is provided for tutorial purpose, the information expressed below
is an over-simplification. However, this approach is designed to provide a general
roadmap for conducting the THIRA.
Pre-field Activities
Identify key objectives of stakeholders Objective: conduct threat analysis of
community theatre to contain 200
patrons attending a dignitary event
Pre-threat assessment Review open source intelligence
(OSINT); such as Google maps, Google
Earth, publicly available building floor
plans, evacuation procedures, fire
prevention documents, etc.
Field Visit
Tour exterior and publicly accessible
areas
Use of a physical security checklist
completed during site survey.
Post-field Activities
Transfer data collected Prepare a written report summarizing
findings
6. Physical Risk Assessment – Preliminary Report
SWEIGERT, DAVE Page 6
Pre-Field Information
Building name: Name withheld Community Theatre Building
Address: Name withheld street address and identifying information
Cross streets: Withheld
Year Built: 1972
Floors/Height: Approximately four stories tall
Field Visit
Locality: Semi-urban/light-industrial
Number of occupants: More than or equal to 200, less than 400
Building characteristics: Educational/Auditorium
Business Continuity (after attack): Low
Physical Loss Impact: Local
Overall Site Accessibility: Accessible
Target Potential: Yes
Distance to unsecured vehicles: More than 75 feet (non-public road)
Perimeter Boundary: No Security / Discontinuous Security
Unobstructed view: More than 30 feet
Storage of Hazardous Materials: Low
Building Height: High, more than or equal to 50 ft. less than 100 ft. (4 floors)
Building Configuration: Circular (convex)
7. Physical Risk Assessment – Preliminary Report
SWEIGERT, DAVE Page 7
Lobby Location: External
Vehicular penetration of exterior envelope: Yes
Window Support Type: No Windows (some glass in front lobby)
Building Type: Reinforced Masonry
8. Physical Risk Assessment – Preliminary Report
SWEIGERT, DAVE Page 8
Intrusion Detection: None
Video surveillance and assessment: None
Security Guards: None
Security Lighting: Low to Moderate
9. Physical Risk Assessment – Preliminary Report
SWEIGERT, DAVE Page 9
Post Field Mitigation Strategies
The following recommendations are suggested as temporary/permanent upgrades
to the facility. The temporary upgrades should be considered for the purposes of
accommodating a dignitary.
Site: (1) Close street lane and use vehicles to block vehicle traffic at times of high
alert; otherwise, (2) consider fixed anti-ram barriers around perimeter at strategic
points.
Architecture: (1) Offsite deliveries, parking and visitor screening during high
alert; otherwise, (2) optimize internal spaces to separate secure from unsecure
spaces.
Security: (1) Screen all persons at property line, at building entrance, and when
entering secured spaces during high alert; otherwise, (2) screen all persons entering
secure spaces.
Surveillance system: (1) Install extra temporary cameras to provide coverage of
parking areas, screening areas, internal areas during high alert; otherwise, (2)
provide external security cameras on building.
Vehicle circulation: (1) Consider shuttle bus transportation from parking area
outside of Zone 3 (1,000 feet away) to screening area during high alert; otherwise,
(2) create fire lanes or no parking lanes around building perimeter that are strictly
enforced with towing.
10. Physical Risk Assessment – Preliminary Report
SWEIGERT, DAVE Page 10
Risk Scoring
Relying on a rough order of magnitude (ROM), a basic risk scoring model can help
the THIRA practitioner to quantify risks to the visit of a dignitary to the facility.
Consequence (C) Threat Rating (T) Vulnerability
Rating (V)
Aggregate
(C+T+V)
Threat: Inside IED (explosive device) within Zone 1
The inside threat addresses devices that have been placed in the facility prior to the
event. Such devices can be designed to cause death, life threatening injuries and
property damage.
Special factors: the explosive blast-wave of an explosive device, when detonated
indoors, increases by a factor of 2 to 9 times. Therefore, an indoor explosive
device is the most threatening to the event.
Consequence (C) Threat Rating (T) Vulnerability
Rating (V)
Aggregate
(C+T+V)
10 10 10 30
Threat: Carried IED (human borne) within Zone 2
A human borne IED can be carried by a suicide bomber that is masquerading as a
legitimate guest, staff member, visitor, patron, etc. It is assumed that in this case
the human borne IED will be exploded within Zone 2 (assuming proper security
precautions).
As Zone 2 primarily consists of open air space, the explosive impact of the blast-
wave will be greatly reduced.
Consequence (C) Threat Rating (T) Vulnerability
Rating (V)
Aggregate
(C+T+V)
5 7 5 17
11. Physical Risk Assessment – Preliminary Report
SWEIGERT, DAVE Page 11
Vehicle borne IED within Zone 3
Vehicles can carry a great deal more explosives than a suicide bomber or what can
be considered an unnoticeable package hidden inside the structure. To this end,
having a vehicle borne IED explode more than 300 feet from the structure, crowd,
visitors, etc. may still cause significant damage due to the massive amounts of
explosive a vehicle can transport.
Consequence (C) Threat Rating (T) Vulnerability
Rating (V)
Aggregate
(C+T+V)
8 10 5 23
Summary
Inside threat 30
Vehicle borne IED 23
Human borne IED (carried) 17
12. Physical Risk Assessment – Preliminary Report
SWEIGERT, DAVE Page 12
Dignitary Protection Scenario
This section will address the proactive steps that can be taken to provide relevant
protection in such a setting that is hosting a dignitary reception. This section will
provide a scenario-based list of counter-measures that can be deployed to provide a
high level of confidence that a negative event that endangers life or property will
not take place.
Assumptions
This scenario will assume the following:
• Protectee arrives at 10:00 am.
• Protectee (dignitary) will be in the zones for three (3) hours.
• He/she will land via helicopter about one mile from the venue
• Protectee will arrive via a six (6) to seven (7) vehicle motorcade
• He/she will be transported from motorcade to a small “green room”
• After ten minutes (10) protectee will enter “meet and greet” room to mingle
with twenty (20) local/regional/state officials and important guests
• After one half hour (30 minutes) protectee will be ushered into auditorium to
provide a speech of about 45 minutes.
• Following speech, protectee will walk a “rope line” to shake hands with
audience members for about 15-20 minutes.
• Protectee departs the area approximately 2 ½ hours later.
• This document will address protections issues up to the arrival of the
protectee.
• Protectee motorcade logistics will not be the responsibility of the pre-event
THIRA report team.
• This report will provide THIRA and protectee suggestions to the protection
details providing protectee security.
• This report will address event area logistics and site preparation and provide
examples of technical resources to assist in scholarly research.
13. Physical Risk Assessment – Preliminary Report
SWEIGERT, DAVE Page 13
Zone Concept
To provide the reader better clarity about the zone concept a figure is presented
below. Terminology is borrowed from the Fire Service Hazardous Materials
(HazMat) community (see cold zone, hot zone, etc.).
Notice the corridor which provides only two access points.
FEMA THIRA Fire Service HazMat
Zone 1 Hot Zone
Zone 2 Warm Zone
Zone 3 Cold Zone
External to Zone 3 Crowd Control line
The reader should observe the decontamination corridor, which penetrates the
warm zone. As will be explained later, the guest “chute” pedestrian passage way
will resemble this corridor.
14. Physical Risk Assessment – Preliminary Report
SWEIGERT, DAVE Page 14
External to Zone 3 boundary (+1,000 feet), aka Security Boundary
The extreme outer perimeter extends beyond 1,000 feet. To reduce threats from
vehicular circulation the following suggestions are made.
Based on the combined consequence, threat and vulnerability (CTV) score, a
vehicle borne IED is the highest threat category.
To mitigate this threat, the following actions are suggested:
• Assuming a 10:00 am arrival of the protectee, a one-way, unidirectional
traffic pattern should be deployed at 8:00 am. The end goal is to reduce,
and/or eliminate and cross (bi-directional), two-way traffic on major
adjacent streets.
• NO PARKING – SPECIAL EVENT signs shall be posted 24 hours in
advance along the one-way loop traffic pattern.
• One way traffic flow will create a quasi-boundary by disturbing normal
traffic patterns that eliminates the possibility that vehicles slow down or stop
along the one-way traffic pattern.
• The one-way loop traffic pattern can be monitored and observed by
uniformed traffic control agents, parking enforcement, reserve patrol
officers, etc.
15. Physical Risk Assessment – Preliminary Report
SWEIGERT, DAVE Page 15
Example of traffic loop
Outer perimeter one-way loop traffic pattern
16. Physical Risk Assessment – Preliminary Report
SWEIGERT, DAVE Page 16
• Consideration should be given to the use of public works personnel to
perform observation and surveillance of the roadway loop and other surface
streets between 1,000 and 5,000 feet from Zone 1.
• Public works and traffic engineering personnel can be briefed to watch for
various suspicious behaviors and provide radio call intelligence reports via
radio-equipped public works and street maintenance vehicles.
• Public works equipment such as heavy dump trucks can be utilized to block
streets to create the outer perimeter traffic loop.
Example of ancillary resources
17. Physical Risk Assessment – Preliminary Report
SWEIGERT, DAVE Page 17
Zone 3 (300 to 1,000 feet)
The reader should recall the below graphic and the concept of a “cold zone”.
There are two major points of entry into Zone 3 – the guest screen area and the
entrance/exit to the guest parking lot (see below).
Notice the corridor which provides only two access points.
Guest parking lot
• Pre-arranged individuals on guest list (200) receive parking passes for a
special parking lot 24-36 hours prior to the event.
• Guest vehicles with parking passes will be staged in a parking lot at least
1,000 feet from the venue.
• Parking placards must be displayed on the guest vehicle dashboard.
• The guest parking lot should be opened between 8:00 am and 9:00 am. It
will be closed at 9:30 am in anticipation of the 10:00 am beginning of the
event.
• Barrier tape, traffic cones and directional devices shall be used to create a
pedestrian chute between the guest parking lot and the Zone 2 screening
area.
18. Physical Risk Assessment – Preliminary Report
SWEIGERT, DAVE Page 18
Example of pedestrian cone and belt “chute” barrier
The following actions and tasks should be accomplished 24 – 48 hours prior to the
event:
• Trash removal vendors empty all fixed trash cans and remove portable trash
cans and dumpsters.
• Grounds keeping operations shall be halted 24 hours prior to the event.
• Sprinklers should be de-activated.
• Begin increasing roving patrols by non-sworn security officers, grounds
keepers, maintenance workers, etc.
• Excessive overgrowth of brush and shrubs trimmed back.
• Deployment of highway construction type 400 kilowatt generator with 50 ft.
telescoping light array to flood darkened areas and shadowy buildings the
night prior to the event.
• Deployment of Jersey Barriers to areas identified as weakened sections that
would permit vehicle penetration of the security zone.
• Increased litter patrols, increased sworn Law Enforcement Officer (LEO)
patrols (sporadic and random), etc.
19. Physical Risk Assessment – Preliminary Report
SWEIGERT, DAVE Page 19
Example of Jersey Barrier
The following actions should be accomplished four (4) hours prior to the event (by
6 am):
• Placement of barrier POLICE tape around the Zone 2 perimeter.
• Placement of barrier POLICE tape around the entire guest parking lot.
• Commencement of four (4) roving law enforcement patrol cars to patrol the
Zone 3 outer perimeter in a continuous fashion.
• Commencement of four (4) roving LEO foot patrols walking the Zone 3
area.
• Two LEO patrol cars stationed in guest parking lot to control entry.
20. Physical Risk Assessment – Preliminary Report
SWEIGERT, DAVE Page 20
Zone 2 (100 to 300 feet)
Recall that the human borne IED threat is considered the least of all identified
risks.
There is only one entrance into Zone 2, a controlled screening area. The controlled
screening area will “funnel” guests through a screening process. This access point
is located at the opposite end of the guest “chute”.
It will be necessary for preliminary screeners to be posted at the entrance to
the guest “chute” at the guest parking lot. The screener team at the guest
parking lot will perform initial observational screening, reminding persons to
return heavy bags, and questionable packages to their vehicle.
The screening process will rely on wanding, ad hoc pat-downs, and magnetometer
passage. The screening area will resemble the figures below:
Tables for bag inspection, magnetometers for pedestrian inspection
21. Physical Risk Assessment – Preliminary Report
SWEIGERT, DAVE Page 21
The remainder of the guest “chute” that enters into Zone One shall be comprised of
hardened barriers, such as seen below.
Hardened barrier for guest “chute” from Zone 2 to Zone 1
There will also be a wanding and pat-down team to assist with handicapped or
special needs individuals.
Example of wanding
22. Physical Risk Assessment – Preliminary Report
SWEIGERT, DAVE Page 22
It is estimated that a single individual can clear the screening process in 30 seconds
(two (2) per minute). 200 individuals would take 100 man-minutes of screening.
With four (4) magnetometers, wands and pat-downs, this should take about 25-30
minutes.
Tasks to be completed and/or on-going activities to commence prior to 7:00 am:
• Twelve (12) private security screeners arrive to set-up equipment
(magnetometers, tables, wand stations, etc.).
• Two two-person counter assault teams arrive to support interdiction of
human-borne IED.
• One two-person bomb sniffing Explosive Ordinance Disposal (EOD) K-9
team deployed onsite at screening area. Will remain stationed at screening
area for possible alerts to IEDs.
• Two two-person LEO teams are deployed to screening area.
• Two LEO patrol cars are positioned as obstacles near screening area to deny
vehicle penetration of the area.
• One Basic Life Support (BLS) ambulance is deployed near screening area
with two-person Emergency Medical Technician (EMT) crew to handle
guest emergencies.
• Aid Station First-Aid tent deployed at near entrance of guest parking lot and
guest “chute” to handle any minor medical emergencies (extra chairs, eight
cases of bottled water, awning and shade. Maintained by volunteers from
American Red Cross.
• Two two-person LEO teams deployed to roving patrols within 100 feet of
screening area.
23. Physical Risk Assessment – Preliminary Report
SWEIGERT, DAVE Page 23
Example of American Red Cross aid station
24. Physical Risk Assessment – Preliminary Report
SWEIGERT, DAVE Page 24
Zone 1 (Building to 100 ft)
The inside, or inner-building, threat was identified as the area of most risk.
Therefore, more mitigation counter-measures will be deployed within Zone 1 (as
compared to other zones). The highest potential threat for Zone 1 remains the
placement of an IED pre-event.
Tasks to be completed 48 hours prior to the event:
• Staff advised building will be closed during event.
• Arrangements made to deliver packages off-site (UPS, Fed-EX, etc.)
• Inventory of all staff working in building to include Social Security Account
Number (SSAN) and Date of Birth (DOB) receive Live Scan background
check (15-20 staff).
• Local fire prevention inspection of the building, removal of unnecessary
chemicals, cleaners, HazMat items. Securing of remainder chemicals in
small amounts (cleaning fluids, etc.) under lock-and-key.
• Local government building inspection service conducts building inspection.
• Selection of “green room” for dignitary use (to accommodate 10-12
persons), equipped with several phone line jacks (RJ-11).
• Selection of “meet and greet” room to accommodate 15-20 persons.
Installation of two Closed Circuit Television (CCTV) cameras that provide
feed to recording device in secure area.
• Hours of access to building restricted to day-light hours until after event.
• Commencement of one two-person roving private security patrol around
exterior of building and internal to the building.
• Commencement, by private security, of door lock checks, questioning
strangers in the building, etc.
• Final cleaning arrangements, final custodial chores, “spring cleaning” of
facility to sanitize building for excess debris, unnecessary clutter, etc.
• Walk-thru of building with facility manager to conduct preliminary
inspection of all rooms.
25. Physical Risk Assessment – Preliminary Report
SWEIGERT, DAVE Page 25
Example of fire inspection
Tasks to be completed 24 hours prior to the event:
• Building temporarily closed. No further in and out traffic from non-visit
staff personnel.
• CCTV cameras installed in main auditorium to provide coverage of exits and
audience. Video feed to secure room with recorders.
• “THIS AREA UNDER VIDEO SURVEILLANCE” signs posted at all
entrances and on stand-alone placards within the building.
• Essential personnel issued special event picture ID badges (5-7 individuals);
such as: facility manager, chief electrician, fire prevention, etc.
• EOD K-9 unit (two-person) begin sweeping floors and offices.
• Four (4) additional private security guards deployed for exterior patrols.
• Two LEO patrol cars deployed near exterior areas.
• Press and media platform deployed to the rear of the auditorium following
sweep of the area.
• Offices locked after EOD K-9 sweep, locks reset allowing only master key
access and denying access to other key holders.
26. Physical Risk Assessment – Preliminary Report
SWEIGERT, DAVE Page 26
Tasks to be completed 12 hours prior to the event (during daylight hours):
• Guest “chute” barriers deployed.
• Screening area equipment deployed and barriers put in place.
• Magnetometers tested.
• Two (2) private security guards deployed to screening area to observe and
protect all equipment and materials.
• Two (2) two-person EOD teams conduct visual inspection of all areas of the
building for potential IEDs (confirming offices are locked, assessment of
auditorium, evaluation of maintenance areas).
• Spare 440 Kvolt CalTrans type generator deployed in appropriate area to
operate as electrical power back-up.
• Spare magnetometer deployed in the event of malfunction.
• CCTV cameras deployed to provide coverage of screening area.
• AREA UNDER VIDEO SURVELLIANCE signs deployed at appropriate
areas around screening area.
• Deploy two (2) additional private security officers (total of six (6)) for
exterior patrols and door checks.
• Deploy two (2) additional LEO patrol cars (total of four (4)) for exterior
surveillance.
• Test CCTV recording equipment.
• Issue special event badges to all personnel on-site. Conduct roll-call.
Personnel accountability checks.
• Final check of roster of personnel that will be “working” the evnt the
following morning. Verification of availability, alternates, etc.
27. Physical Risk Assessment – Preliminary Report
SWEIGERT, DAVE Page 27
Tasks to be completed four (4) hours prior t to the event.
• Establish Incident Command Post (use of mobile Sheriff’s Department ICP
[RV type of vehicle]).
• Activate Operations Section (OPS) for Security at ICP. Roll-call of LEO
forces on-site; to include: ten (10) additional LEO patrol vehicles and four
(4) additional foot patrol rovers.
• Radio-checks, operational briefings.
• Activate Fire-Life Safety Manager (FIRE/MEDICAL) within OPS. Deploy
two additional BLS ambulances (one in guest parking, additional BLS rig at
screening area).
• Pre-position fire engine company with team of four (4) fire-
fighters/paramedics (FF/P) at appropriate staging point. Radio checks.
Establish emergency MAYDAY frequency for FIRE/MEDICAL.
• Pre-position HazMat unit in an appropriate area with crew of four FF/Ps.
• Deploy six (6) “port-a-potty” units near the screening area – within secure
zone.
• Deploy four (4) “port-a-potty” units in the guest parking lot.
• Deploy two-person sniper team on highest point (building adjacent to event
venue); radio-checks, roll-call.
• Additional EOD K-9 sweep of all building areas.
• Building is placed in “lock down” status. All entrances closed except
screening area. Eight (8) additional private security officers position to the
exterior of locked door entrances.
• Deploy four (4) bike patrol LEOs to begin exterior perimeter surveillance
and continuous loop of inspection.
• Issuance of event ID credentials to all appropriate staff near badging staging
at screening area.
• Activation of City Emergency Operations Center (EOC) with four (4)
support staff to coordinate with LEO and FIRE/MEDICAL.
• Deploy two (2) Wildland radio cache tactical repeater at highest building
location.
• Distribute Wildland radio cache King/Bendix radios to all personnel.
28. Physical Risk Assessment – Preliminary Report
SWEIGERT, DAVE Page 28
Example of Incident Command Post
Example of Operational Briefing
29. Physical Risk Assessment – Preliminary Report
SWEIGERT, DAVE Page 29
Example of Tactical Repeater
Tasks two (2) hours prior to the event:
• Roll-call, equipment check, radio checks, personnel accountability.
• Additional EOD K-9 sweep of exterior of the building.
• Staffing of areas (greeters, screening, guest chute, ID badge check).
• Issuance of color-code vests to private security, screeners, etc.
• Open guest parking lot, staff with eight (8) parking lot attendants; attendants
to remind guests to leave all personal articles in their automobiles.
• Impose Temporary Flight Restriction to 2,000 feet; Civil Air Patrol (CAP)
begins a 5-mile loop pattern over the event at 1,000 feet with radio contact to
ICP.
• Deploy rope lines and press/media barriers in auditorium.
• Allow press/media to begin deployment of cameras, audio feeds, etc.
30. Physical Risk Assessment – Preliminary Report
SWEIGERT, DAVE Page 30
Tasks one (1) hour prior to the event:
• Medivac helicopter at nearest hospital goes into hot stand-by mode,
establishing radio communications with ICP (pre-arranged).
• BLS ambulance rig-to-hospital VHF radio checks.
• Two (2) LEO patrol units deployed to Emergency Department (ED) of
nearest designated hospital (pre-arranged).
• Trauma ED teams goes into hot stand-by mode; surgical team in ED (pre-
arranged).
• Hospital security establishes barrier tape and cone entrances to ED.
• Hospital deploys four (4) additional private security officers to ED.
• Hospital activates Incident Command center and emergency operations plan
(can receive credit for drill activation).
• Hospital establishes contact with City EOC and ICP.
• City EOC establishes contact with designated nearest Federal Aviation
Administration radar control point to verify clear traffic pattern.
• Pre-arranged for local tower at FAA controlled executive airport to halt all
take-offs and divert all incoming aircraft at 9:45 am.
• ICP provides City EOC with status update from CAP every ten (10)
minutes.
• EOD K-9 team joins additional EOD K-9 team at screening area.
• Guests arriving, walking to screening area, under observation for behavior
anomalies (behavioral screening).
• Final check of “green room”, “meet and greet room”, “press and media
area”.
• Press arrive, credentials checked, equipment inspected, begin set-up at press
platform.
• Guests begin to pass thru magnetometers, receive pat-downs and wanding.
• Prior to auditorium entry: rope lines deployed, final visual inspection, re-
deployment of six (6) LEOs to the auditorium.
• Reployment of two (2) LEOs to the “green” room.
• Reployment of two (2) LEOs to “meet and greet” room.