StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Planning and Threat Assessment - Essay Example

Cite this document
Summary
This work called "Planning and Threat Assessment" describes the particular case concerning danger from a rival group in organizations. From this work, it is clear how the author will handle these instances to ensure the safety of his client and his team…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.9% of users find it useful
Planning and Threat Assessment
Read Text Preview

Extract of sample "Planning and Threat Assessment"

The Threat at Hand: My client, being a supremacist, is under danger from a rival group in his organizations. These organizations have a record of violence where racial conflicts are involved and recently, his personal assistant was severely beaten by members of the other rival group in his organization challenging his leadership. This was to send an informal message to my client that he is a wanted man and, thus, he should act carefully. The main source of conflict is leadership as this group lost confidence in the ability of my client due to his physical health. They also accuse my client of arrogance, and cruelty in dealing with other members of the group, and to replace him, he needs to be killed since he controls the armed wing of the group which he uses to unleash terror to anyone who opposes him. The associates of the murdered person, his family, and violent civil rights organizations also pose a threat to the security of my client due to his arrogance and violent nature. This group has an access to modern weapons which are extremely dangerous, and can cause havoc. They have the capability of conducting an ambush on a highway, and it is widely believed that’s what they intend to do when my client attends the courts session. This racial organization, due to the immense wealth they control, has placed a ransom on my client’s head, which runs to millions of dollars and, thus, it is my duty to protect him from any danger that arises from these initiatives. My client cannot defend himself from any danger since he confined in a wheel chair twenty four hours a day. His security team must have a nurse to handle his disable situation, and she must be sheltered from danger as my client is totally reliant on her. My client is an outspoken and controversial person, who likes media attention, and as a result, he plans a grand entry while attending the courts. This is a risky approach since other groups, including members of his supremacist movement, will be in attendance and, thus, knowing an assassin will be difficult. My team compromises eight people, and we are highly trained to handle such kind of situations and circumstances. The following are the threats at hand: My client risks being assassinated at the entrance of the court room. My client risks being assassinated while on transit to the courts. My client risks being assassinated while addressing the media. My client risks being assassinated while in attendance at the court room. My client risks being assassinate while leaving the court room. This paper is a plan on how I will handle these instances to ensure the safety on my client, and my team. Coming up with a security plan is very important since it reduces the likely hood of the threats occurring, and determines their implications (Amidon, 2009). This plan is essential because it will build confidence to all the parties involved, the eight security officers, the nurse and my client. This plan has identified the threats at hand and the probability of their prevention, as well as strategies which should be employed in mitigating the threats my client faces (Cunningham, 2010). Stage One: I will identify the organization and the people at risk. The organization that poses a risk to my client is his white supremacist group. He is the leader of the group, and another faction that wants leadership aspires to eliminate him. Another group that poses a risk to my client is the relatives of the slain person; the state accuses my client of killing him. This is because they would want to avenge his murder since they have the resources to do so. Another group that poses a risk to the security of my client is the radical human rights group that cannot tolerate the outspoken nature of my client and, thus, hates him for his arrogance and character. Stage Two: I will identify the people vulnerable in case of an attack against my client, and they are: I together with my men as security officers, we can be the first people to be killed by an assassin’s bullet. My client who is the main target of the assassins. The nurse who takes care of my client because of her proximity to my client. The drivers who will be driving my client to and from the law courts. Stage Three I will identify the probability of the attacks being a success, and the loss expected. Basing on the character of my client, the percentage of the assassin’s succeeding is high. This is because there will be numerous loopholes in his security. For example, his desire to make a grand entry into the court rooms will make him vulnerable of an attack because it will be difficult to identify an assassin in the crowd, following the limited number of his security detail. The expected losses in case of a success in the assassination attempt are: Loss of my client’s life. Loss of the nurse’s life Loss of the lives of some of my security men. Damage to his vehicle in case of an ambush. Possible loss of the assassin’s life. Stage Four: At this stage, I will develop the expected impact in case the assassins’ succeed in killing my client or not. In case the assassins do not kill my client, the impact will not be significant, since business will resume as usual. In case the assassins succeed in killing my client, the following are the likely events that will occur at his death: Extensive media coverage of the life and times of my client. Revenge attacks carried out by supporters of my group. Celebrations by his rivals and all those who hate him. My security company will get a bad air time from the media due to inefficiency. Stage Five At this stage, I will develop strategies to ensure I mitigate the risks my client faces, and they are: I will undertake an interview with my client and his staff, as well as the nurse in order to know their concerns, and thereafter build my security strategies based on their concerns and the concerns of my team. I will gather data on the movements of my client, his daily routine, and associations in order to know how to protect him effectively and come up with a strategic and effective security plan. Set up an operational room, possibly at my client’s home, fitted with modern gadgets to monitor my client’s movement, his security at the court house, and facilitate the smooth running of the operation. My client does not have trained security dogs. In order to effectively protect him, we need trained attack dogs which will be based at his premises, and also while making an entrance to the court room. This will boost the morale of the security staff since they will not only rely on their weapons but also on trained animals to provide security. My client should be advised on the risks of his plan to make a grand entry to the court house as this will compromise his security detail, and make it more difficult to protect him. More staff will need to be hired who will on a constant basis keep vigil at the court house where he is expected to appear on a daily basis. This is because, eight people are not enough to offer effective protection on a daily basis since they need to rest, and locations are varied. Since it is likely that my client may be ambushed while on transit to the court house, the vehicles to be used need to be armored, and all manner of first aid kits need to be put into the vehicle. It has to have waterproof pod and fire extinguishers (Sweet, 2006). Communication to my client with the outside world needs to be monitored. For example, any one visiting my client needs to be screened if he possesses any weapons that might compromise my client’s security. Incoming mail should be screened to verify if it contains any dangerous substances. Effective communication within the security group is essential, and satellite radios are required in order to provide optional communication ability in the principles office, court room, vehicle, and his home (Landeu, 2010). I will also establish communication channel with the local police to help when we are attacked or to inform on every security endeavors my group will be undertaking. This will act as a back up plan. They will provide additional security to my client while attending the court session and while on transit since it is their duty to prevent the occurrence of any crime (Orakhelashvili, 2011). Before taking my client to the court room, I will provide drills to my security team in order to prepare them in case of an attack from the rival group targeting my client. Before transiting to the court room, the wheel chair my client sits on must be fitted with a bullet proof glass equipped with all manner of electronic gadgets to facilitate entry and exit of his house and the court rooms. The driver employed by my client must be screened since his enemies might use him to kill my client; when found faithful, he should be kept under surveillance by my security team. I will train the nurse, and the driver working for my client on the security threats at hand, as well as how they must behave in case of an attack. The home of my client and his working place need to be fitted with anti burglary alarms which are linked to the police officers, and other security providing agencies. These devices include machineries such as cellular telephone systems, GPS instruments, computer systems, and generators to back up the operations of these instruments (Yanchuk, 2008). I will assign the duty of an escape driver to one of my man; an extra vehicle fitted with all security mechanisms will be reserved for this purpose. The duty of my agent is to stand by in case of an attack and provide an escape option to my client. Stage Six: I will perform a cost benefit analysis, and come up with a budget, and compare it with the budget presented by my client. In case the allocate amount is insufficient, I will request for additional funds from my client in order to effectively protect him from his enemies. This is an important stage because it is after the availability of funds that the plan can be implemented to the fullest. This stage requires careful understanding of the costs of security gadgets such as computer systems, GPS, armored vehicles, and alarm systems which are connected to the local police bureau. The cost of maintaining a separate office, equipped with powerful communication equipments should also be analyzed since this is a crucial aspect of maintain a smooth flowing operation. The office will be used for surveillance operations. In conclusion, if this plan is implemented to the fullest, the safety of my client is guaranteed. References Amidon, S. (2009). Security. New York: Farrar, Straus and Giroux. Cunningham, W. C., Strauchs, J. J. & VanMeter, C. W. (1990). Private security trends, 1970 to 2000: the Hallcrest report II. Boston: Butterworth-Heinemann. Landau, S. E. (2010). Surveillance or security?: the risks posed by new wiretapping technologies. Cambridge, Mass.: MIT Press. Mueller, J. E. (2006). Overblown: how politicians and the terrorism industry inflate national security threats, and why we believe them. New York: Free Press. Orakhelashvili, A. (2011). Collective security. Oxford: Oxford University Press. Sweet, K. M. (2006). Transportation and cargo security: threats and solutions. Upper Saddle River, N.J.: Pearson/Prentice Hall. Yanchuk, I. A. & Mezzane, D. (2008). Smart materials for energy, communications and security. Dordrecht: Springer. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Planning and Threat Assessment Essay Example | Topics and Well Written Essays - 1750 words, n.d.)
Planning and Threat Assessment Essay Example | Topics and Well Written Essays - 1750 words. https://studentshare.org/law/1771409-planning-and-threat-assessment
(Planning and Threat Assessment Essay Example | Topics and Well Written Essays - 1750 Words)
Planning and Threat Assessment Essay Example | Topics and Well Written Essays - 1750 Words. https://studentshare.org/law/1771409-planning-and-threat-assessment.
“Planning and Threat Assessment Essay Example | Topics and Well Written Essays - 1750 Words”. https://studentshare.org/law/1771409-planning-and-threat-assessment.
  • Cited: 0 times

CHECK THESE SAMPLES OF Planning and Threat Assessment

Security Risk Assessment and Audit into the connection of the internal network with the Internet

It is a continuous process that begins from the process of assessment right down to implementation.... And even after implementation, the process loops back to assessment because risks to information networks are diverse and constantly change necessitating the iterative process (Sennewald, 2011).... This process is detailed below: Figure 1: An iterative process to IT security Management Risk assessment is the initial step that involves the identification of potential threats to the information networks ((Boyce & Jennings, 2002)....
18 Pages (4500 words) Essay

Security Planning and Assessment

This paper ''Security planning and Assessment'' tells that Risky materials in transportation are vulnerable to sabotage or misuse and in the wrong hands pose a significant security threat.... hellip; One of the most critical components of rulemaking for the department of transportation is the assessment of possible transportation security risks for covered shipments of risky materials.... nbsp; When conducting a proper assessment of the threats to and vulnerabilities of the operation to a terrorist attack or terrorist activity, the types of information to consider include: (a) the type of risky material to transport, (b) the frequency and quantity of shipments, (c) the packaging type, and (d) the amount stored on-site....
12 Pages (3000 words) Assignment

Security Planning and Threat Assessment

reliminary Information Gathering Activities Security and threat assessment necessitates that intensive and exhaustive information regarding the risk associated with the activity shall be provided.... 1 person shall be the designated driver and shall guard the automobile against any threat....
8 Pages (2000 words) Essay

Security Planning

good first step for prevention in all workplaces consists of a general assessment designed to evaluate the presence of any specific risks of violence, both from within and outside the organization.... Such an assessment will help the organization to fully understand the particular safety and security needs of the workplace - information that will help shape its prevention efforts.... nswer 1) Workplace violence is violence or the threat of violence against workers....
14 Pages (3500 words) Assignment

The Importance of Teamwork in a Close Protection Environment

This essay The Importance of Teamwork in a Close Protection Environment talks that teamwork is conjoint action by a group of people, in which personal interests are subjected to group unanimity and efficiency, it is a concerted effort.... Teamwork is the conception of people working jointly as a team....
5 Pages (1250 words) Essay

Threat and Risk Assessments

ne of the key challenges law enforcement agencies are facing within crime intelligence is the confusion in definition of two terminologies, which include threat assessment and risk assessment (Calder & Watkins, 2007).... o beginners, threat assessment involves a cross extermination of the nature and intensity of a particular threat that can cause harm.... This kind of framework can be achieved through Threats and Risk… t, which primarily focus on jurisdictional determination of the ability to respond to technological and natural disaster through identification, prioritization and assessment of threats that are caused by different criminals or crime groups (Ratcliffe, 2009). ...
5 Pages (1250 words) Essay

Security Threat Assessment

12 Pages (3000 words) Essay

Comparison and Contrast between a Security Threat Assessment and a Security Risk Assessment

The similarities and differences between risk and security management is the topical area covered in this paper "Comparison and Contrast between a Security threat assessment and a Security Risk Assessment".... The paper is to highlights the reasons for conducting a risk or security threat assessment.... The last section explores how the risk and security threat assessment informs decision-making.... hellip; For many people, risk and threat are two similar concepts and are used interchangeably....
11 Pages (2750 words) Literature review
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us