StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Security Planning and Threat Assessment - Essay Example

Cite this document
Summary
This essay "Security Planning and Threat Assessment" is about he client that presents a high-risk assignment due to the highly controversial racist ideals. This kind of behavior has alienated him from the public and provides another dimension of risk – public persecution…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.1% of users find it useful
Security Planning and Threat Assessment
Read Text Preview

Extract of sample "Security Planning and Threat Assessment"

Security Planning and Threat Assessment Paper Scenario: A nurse-assisted wheelchair-bound client is to be transported from his residence to a court for a hearing on charges of multiple counts of murder. The case is highly controversial since it has racist overtones and the client is outspoken regarding the issue. Due to this behavior, the community and authorities generally dislikes him and are unlikely to provide any support or assistance. He plans to make a grand entrance in the court in the presence of the press and a large number of various advocacy groups. As a security team leader, provide a plan for the activity. Risk Level: High risk Team Composition and Assignment of Responsibilities Racial Profile of Team Since the case involves heavy racial undertones, the composition and characteristics of the security detail is a critical issue and should be analyzed. Every individual must be cross-checked to determine any conflicting issues as internal threats must be eliminated before effectively managing possible external threats. First, it would be appropriate to have all men come from the white profile as having others from other races would present a conflict of interest. No matter how much training the security personnel has received, there is still the probability of reacting negatively to the blatant and controversial statements made by the client. Secondly, any affiliations and correspondences made by each security personnel should be analyzed to determine any pathways for leakage of information and breach of confidentiality. It should be stressed upon each individual that no information regarding the operation shall be discussed in any way to other people no matter how close or innocent they are. When all of these have been settled, the bodyguard team shall be met by the team leader to distribute the responsibilities. The team shall be split into two groups for the actual day's activity: Team A This group shall be comprised of 6 individuals and shall provide the escort and guarding of the client during the trip and case hearing. 1 person shall be the designated driver and shall guard the automobile against any threat. 2 individuals shall be responsible for crowd control and the remaining shall provide close security. Team B Monitoring and securing of property in the absence of the client shall be undertaken by 2 individuals. 1 individual should have been enough to scare away any intruder or alert the authorities regarding any unusual activities but from the given case, it should be expected that only minimal assistance shall be provided by the community who hates the client. This situation makes 2 individuals appropriate for the job. Preliminary Information Gathering Activities Security and threat assessment necessitates that intensive and exhaustive information regarding the risk associated with the activity shall be provided. In the case given, the client is required to be present in a highly controversial hearing and safely return to his residence after it. It shall be assumed that the itinerary would not only be limited to going to the court and back but shall also consider any variety of functions requested by the client during the course of the trip. This shall include meetings, invitations for meals at restaurants, other personal activities or a trip to the hospital. Thus, the necessary information shall include the following: Transportation method There shall be two vehicles for transport of the client, the nurse and the security personnel. The first vehicle shall be occupied by three security individuals while the second one would contain the other three security detail including the team leader, the client and the nurse. When the vehicle containing the client is damaged, he shall be transferred to the other car. Designated drivers shall be skilled enough for driving in stressful situations. The client's protection is the priority but the nurse shall also be provided enough protection to be able to function in case medical treatments become necessary. As minimum requirements, the vehicles shall have reinforcement to protect the occupants of the vehicle from any ballistics such as gunfire or any other materials thrown and shall also have reinforced front and rear end bumpers rigid enough for ramming any obstructions. Both of the cars shall be heavily tinted to prevent people from knowing who is inside the car. The vehicle must also be heavy enough or with low center of gravity so that it will not easily be toppled. It shall also be maneuverable enough to allow for sharp turns. A portable fire extinguisher shall also be provided to put out any fires from Molotov cocktail bombs. Communication between the vehicles shall be by cellular phones where the team leader is the one authorized to provide instructions to the first car. Both cars shall be close enough for the first car to be able to provide assistance to the second car. In case of any events where the first car is unable to continue, the second car shall proceed without any further delay. Transportation routes The main route to be used during the transport shall be studied and existing conditions verified. Total travel time, length of traffic stops, settings of travel stops, repairs and congestion shall be checked if the planned route will minimize risk of exposure. As a general rule, the more time the vehicles are not moving, the greater will be the opportunity for people to inflict harm or gang-up on the vehicle. Alternative routes and detours shall be determined and assessed for safety. A GPS or a map shall be available for the security personnel for both cars. Since the client's physical condition is not reliable, the probability of needing to go to a hospital is high. In any case, this kind of security detail usually necessitates the knowledge of how to get to a hospital in the fastest way possible. Court Setting Preliminary information on the court's environ shall be acquired. This includes parking area, exposure associated with the deployment of the client from the vehicle to the court and back, alternative escape routes, possible exit pathways and the security provided by the justice system itself. As previously mentioned, two men will serve as crowd controllers while the other three shall always maintain close proximity to the client. The remaining security detail shall stay with the vehicles and guard for any tampering or any attacks on it. One of the three men shall assist the nurse in handling the client during placement to wheelchair and transport to the building. The team leader shall lead the way while the other personnel would keep a three-dimensional assessment of the environs. As a preventive measure and prior to the activity, the team leader shall discuss to the client the risk associated with him talking to the press or with anybody. The team leader should expect that the client shall resist his efforts to limit his white supremacist expressions for the sake of minimizing exposure to any violent attacks. As a psychological strategy, the team leader can make the client appreciate avoiding discussions and exposure by arguing that if he did not, he would be unable to pursue his cause and loose to his competitors and critics. The client can also be persuaded to talk to the press in a secure and comfortable environment. He can call for a press con in his home and speak out his mind in that setting. In this case, he is less exposed and can argue more effectively. When the client still insists on expressing his views, the security personnel shall cover the client at all sides with only a limited space for allowing the client to talk to one individual. Since the client is in a wheelchair, the security personnel standing on all sides is sufficient in protecting him from any harmful projectile or ballistics. After the interview, he shall be led to the vehicle for the return trip. Probable Emergency Situations during the activity The security team shall always prepare for the worst case scenario. Since the customer is highly unpopular and that the case lodged against him is also highly controversial, the threat to the client's life is high. The team should consider the following: 1. Gunfire clash during transport There are two possible sources of a gunfire clash. First is from angry individuals or groups because of the racist remarks made by the client and the murders associated to him. The other comes from the competition from suspected rival white supremacist groups. Violence is highly probable as exemplified by the beating-up of the client's assistant. Since the probability of violence is high, the security personnel must be adequately armed as well to be able to respond. As much as possible, return fire shall be avoided. Instead, the vehicles shall get out of the incident site as soon as possible. The trip to the court shall be discontinued and the client shall be transported to a predetermined safe house. If in case of injury of any individual, the group shall proceed to the nearest hospital without any further delay. The client shall take the highest priority at all times. The security team shall have the contact numbers of police authorities, emergency medical providers and court personnel to be able to inform them of any incidents. Nevertheless, reliance on police authorities and the community shall be avoided and self-reliance shall be the mind setting at all times. 2. Ganging up In the event that a crowd is able to identify the client during the vehicle trip and decides to harass him, the security detail shall have crowd dispersing equipments or shall have security individuals secure the perimeter of the vehicles as it drives through the crowd. As much as possible, violence shall be avoided but when it comes to that point, the security personnel shall board the vehicle immediately and leave the scene with no regard of running over someone from the crowd. The client's life as well as all as that of the nurse and the security is all put to risk thus justifying the method. The client shall be asked whether to proceed to the court, return to his residence or go to a safe area. Authorities shall be duly informed. 3. Attack during the stay in the court environs Since there will be a large number of advocacy groups who may be angered by the controversial remarks of the clients, the threat to the client is indeed very high. Surrounding the client at all sides should be enough to dissuade any attacks or prevent any direct injury to the client's person. According to Sciacca (2007), the security provider should always try to distance the client from any opposing parties. Return Trip The route originally used is not always the route to be used in returning to the point of origin. In any case, any other destinations shall be identified by the client and he shall agree that there should no deviation from this (Fry and Nystrom, 2009). However, considering the temper of the client, one should be prepared for detours. In this case, the security detail shall always be in close proximity to the client. Nonetheless, it does not mean that the security provider should always agree on the decisions made by the client as this can endanger the life not only of the customer and the nurse but also his men as well. Authority Agreements According to Thompson (2005), security contracts shall be clear on the details regarding the project and it shall be impressed on the client that while all efforts shall be done to address his needs, he will be subject to an authority override by the team leader if he thinks it is in the best interest of the client. After all, the efforts would be futile if the client or any personnel is injured, incapacitated or expires. Conclusion The client presents a high-risk assignment due to the highly controversial racist ideals that he so vehemently voice out to the public. This kind of behavior has alienated him from the public and provides another dimension of risk - public persecution. Such conditions produce two notable situations: a) limited possibility of assistance and b) ganging up on the client. Thus, the necessary characteristics of the security plan are maneuverability and limited exposure during transportation. Exposure is expected to be high during the trip in the court environs due to the propensity of the client to voice out his opinions. In such case, close proximity and crowd control become very important. Information regarding alternative routes and medical provider locations and contact numbers are the most important information. References: Fry, Chris and Nystrom, Martin (2009). Security Monitoring. O'Reilly Media Inc.: U.S. Sciacca, Frank (2007). Body guard Principles: Protection and Operational Planning. Infinity Publishing: U.S. Thompson, Leroy (2005). Body Guard Manual. Greenhills Books: U.S. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Planning and Threat Assessment Paper Essay Example | Topics and Well Written Essays - 1500 words”, n.d.)
Planning and Threat Assessment Paper Essay Example | Topics and Well Written Essays - 1500 words. Retrieved from https://studentshare.org/miscellaneous/1510203-planning-and-threat-assessment-paper
(Planning and Threat Assessment Paper Essay Example | Topics and Well Written Essays - 1500 Words)
Planning and Threat Assessment Paper Essay Example | Topics and Well Written Essays - 1500 Words. https://studentshare.org/miscellaneous/1510203-planning-and-threat-assessment-paper.
“Planning and Threat Assessment Paper Essay Example | Topics and Well Written Essays - 1500 Words”, n.d. https://studentshare.org/miscellaneous/1510203-planning-and-threat-assessment-paper.
  • Cited: 0 times

CHECK THESE SAMPLES OF Security Planning and Threat Assessment

Security Planning and Assessment

This paper ''security planning and Assessment'' tells that Risky materials in transportation are vulnerable to sabotage or misuse and in the wrong hands pose a significant security threat.... One of the most critical components of rulemaking for the department of transportation is the assessment of possible transportation security risks for covered shipments of risky materials.... When conducting a proper assessment of the threats to and vulnerabilities of the operation to a terrorist attack or terrorist activity, the types of information to consider include: (a) the type of risky material to transport, (b) the frequency and quantity of shipments, (c) the packaging type, and (d) the amount stored on-site....
12 Pages (3000 words) Assignment

Security Planning and Risk Assessment

The writer of the essay "security planning and Risk Assessment" seeks to address the issue of misuse of organizational resource for the sake of secure management.... One of the most important, and often overlooked, aspects of security assessment and planning is the human impact.... In addition, they may be a significant source of intelligence concerning an impending, or ongoing, threat.... The nature of the threat may demand a level of security that is not economically practical for a private business....
5 Pages (1250 words) Essay

Security Planning

This assignment "security planning" presents workplace violence as violence or the threat of violence against workers.... A good first step for prevention in all workplaces consists of a general assessment designed to evaluate the presence of any specific risks of violence, both from within and outside the organization.... uch an assessment will help the organization to fully understand the particular safety and security needs of the workplace - information that will help shape its prevention efforts....
14 Pages (3500 words) Assignment

Security Planning and Assessment

The author of the "security planning and Assessment" paper defines workplace violence, identifies to what degree workplace violence is a problem in the United States, and examines the most significant or important aspect of security assessment and planning.... Workplace violence is violence or the threat of violence against workers....
14 Pages (3500 words) Assignment

Security Plan: Mecklenburg County Courthouse

Such an assessment will entail a one on one assessment of all the units inside the building and determine the source of the threats.... This essay discusses the security plan: Mecklenburg County Courthouse.... This building was therefore designed to be a large structure easing congestion and improve coordination, among which include security of courtrooms.... On a vulnerability score, the security Coordinator will formulate an effective security strategy for the Mecklenburg County Courthouse....
6 Pages (1500 words) Research Paper

Security Threat Assessment

The paper "Security threat assessment" accents the importance for firms not only to develop an effective management system and deliver quality products and services continuously but also effectively and efficiently identify current and future potential business risks and threats.... This forms the basis of this report which is a literature review to compare and contrast security risk assessment and security threat assessment.... Similarities and differences between a Security threat assessment and a security risk assessmentAccording to Mununta (1999, p....
12 Pages (3000 words) Essay

Similarities and Differences between Security Risk Management

However, objectives of security risk and threat assessment do vary from one organization to the other; this is because of contextual differences and potential and expected risks identified (Talbot and Jakesman, 2009).... threat assessment identifies the possibility of adverse consequences and responses to apply to the threat that depends on probability and impact.... Careful study of risks and threats in an organization constitute significant assessments of both the threats and risks which leads to an effective and efficient risk and threat management systems (Sutton, 2010)....
10 Pages (2500 words) Coursework

Comparison and Contrast between a Security Threat Assessment and a Security Risk Assessment

The similarities and differences between risk and security management is the topical area covered in this paper "Comparison and Contrast between a Security threat assessment and a Security Risk Assessment".... The paper is to highlights the reasons for conducting a risk or security threat assessment.... The last section explores how the risk and security threat assessment informs decision-making.... For many people, risk and threat are two similar concepts and are used interchangeably....
11 Pages (2750 words) Literature review
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us