StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Threat Assessment & Physical Security - Case Study Example

Cite this document
Summary
In the paper “Threat Assessment & Physical Security” the author provides overview of scenario Due to certain events and certain medical conditions, the principal, a 40-something Caucasian is confined to a wheelchair and needs to be accompanied by a nurse twenty-four hours…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.9% of users find it useful
Threat Assessment & Physical Security
Read Text Preview

Extract of sample "Threat Assessment & Physical Security"

Threat Assessment & Physical Security Scenario Overview The principal is a 40-something Caucasian, wealthy, famous and controversial. Due to certain events and certain medical conditions, he is confined to a wheelchair and needs to be accompanied by a nurse twenty-four hours, seven days a week. He has certain medical conditions that require constant medical attention. Because of the nature of the principal’s lifestyle and present predicament, it would be better arrange for a security officer who has a medical or nursing background. Since the work involves a round-the-clock observation, it is important that two nurses or two security officers are available to do the job on shifts in case the other needs to go on a break. Coordinate with the nurse/s and be on the same page with him or her as to what conditions would be beneficial or harmful for the overall well-being of the principal. Be aware of certain types of foods, medication, and environmental factors that may bring about allergies or adverse reactions and be sure to steer clear of such items. With his medical condition and the impending court hearing, the principal is under tremendous stress, as it is. It is important to consider these factors in looking out for the principal. Carelessness in planning and giving out unnecessary information may just cause the principal undue stress that would aggravate the already delicate situation. Always keep in mind that there are certain things without the knowledge of which the principal is better off. In addition, as head of security, always be on hand to ensure the safety of the principal. (The Steele Foundation & Subsidiaries, 2006) Coordination with principal’s Attorney b. Convene with the principal's lawyer as to the principal's medical condition. Know the legal implications and limitations of the protection that the security entourage is supposed to provide. Coordinate with the lawyer and come up plans that fit the need of the principal within the limits of the law at the moment. Since the police are not providing any protection, constantly communicate with principal's lawyer to update oneself with the legal extent up to which protection can be provided for the principal. Presence of cause –oriented groups in the court audience c. With the recent threats of terrorism in the city and their link to white supremacists plus the recent beating of the principal’s chief assistant, the media has made speculations pointing to the principal as one of the possible perpetrators. It is important that the principal realize the importance of this piece of information and the implications of these developments to his case. There have been recent assumptions that rival white supremacist groups are trying to grab power within the organization and it is very important for the principal to take note of this development and consider possible scenarios that may erupt from this incident should this be true. Point out the possibility of these rival groups’ chance to take advantage of the principal’s predicament and vulnerability in pinning the blame of their actions on him. (Fein, Vossekuil, & Holden, 1995) Security in the court house d. As a very outspoken individual, the principal is prone to tactlessness in speech, impulsive reactions and violent episodes that get him into trouble more often than not. Alert the principal with the possible presence of fundamentalist religious groups, white supremacist groups, civil rights groups and other cause-oriented organizations. Remind the principal that all of these people are very sensitive about the causes that they are fighting for. Caution him to be very wary about his statements as any statement that comes out in the wrong way, although not intended may bring about protests from the different groups present during the trial. Constantly remind principal to avoid statements that contain racial slurs as it is in his nature to do so. Doing so would spark resentment and anger from the organizations that are a part of his audience. With his actions and presence eliciting the ire of many, it won’t be difficult for different groups to plan to take him down. In such a quandary, it is necessary to keep the principal calm at all times and avoid situations that would stir up his emotions. It is also important that the principal be careful in answering questions and giving his own opinions as certain issues may be brought to the forefront and may stir up the audiences’ emotions as well. (Fein, Vossekuil, & Holden, 1995) Keeping the principal informed of what is happening may help alleviate his anxiety. However, great care should be taken in giving information as there will be certain events or pieces of information that are better left unsaid as this would worsen the situation. The head of security must also plan for an emergency exit out of the courtroom. Always be ready with a plan to evacuate the principal in case the situation inside the courtroom goes out of hand and poses as a danger to the principal. (Federal Bureau of Investigation) Security at the principal’s estate e. There have been certain and recent threats to the principal’s life. The principal’s current medical condition makes him an easier target. This is the primary reason for beefing up security in the principal’s residence. It is therefore important that security personnel be present in the principal’s residence at all times to ensure his and his family’s safety. Given the principal’s outspoken nature and innate need to communicate his feelings and opinions, he will not agree to not addressing the public through the press. Come up with a mutual agreement with the principal that he can address the press provided that this is done under certain conditions. Explain thoroughly that doing otherwise would jeopardize his chances of winning the case as well as his health. Before the subject's scheduled court appearance in Los Angeles California, agree to let the principal speak to the press on the condition that his piece must be short and to the point, with his words chosen carefully. More importantly, he must constantly be in the company of the security staff to ensure his safety. As security adviser, brief the principal that giving out too much information will not be good for his case. Let him practice what he wants to say with his lawyer to allow the lawyer to edit his piece to ensure that nobody in the audience will be affected negatively. This way, the lawyer can coach the principal into saying the right things in court. This is also, a very good opportunity to remind the principal of the presence of certain groups of people who will be in the audience waiting for him to say one wrong word and pounce on him. Inform the principal of the possible repercussions of tactlessness in his speech. Let him know that doing so would produce another problem altogether. Should this happen, the already delicate situation could be blown out of proportion. Securing the trip back to principal’s residence f. Prepare for the one hour trip from the court house back to the principal’s residence a few weeks in advance. Study the routes that lead to and from the principal’s residence. Consider several routes and study patterns in the flow of traffic. Choose the route that will ensure a safe trip that will also take the least amount of time. Choose alternative routes as well that will be useful as a contingency plan. Consider taking several vehicles to the court as distractions in order to foil attempts by attackers. Take note of the exact day of the week and the time of day to determine which roads are the best options. Take great care in avoiding routes and certain times of the day that are prone to traffic jams. This is important in that it is during moments when the principal’s vehicle is stuck in traffic that the principal’s adversaries may strike. (AT&L Knowledge Sharing System, 2006) On the exact day of the court appearance, have security men go ahead and do a thorough check of the principal's residence to make sure the place is secure before bringing him home. Request those assigned at the principal's residence to be alert, be keep in touch and inform the head of security of developments at all times. This way the head of security can manage to be on top of every situation. (Diligence Intelligence and Risk Management, 2007) After the hearing, before embarking on the trip back the principal’s residence, have the security officers stationed give clearance to signal that it is safe for the principal to come home. Once on the road, be cautious of the possibility that some groups may try to attack while the principal is in transit. Be ready with contingency plans. References AT&L Knowledge Sharing System. (2006, August 10). System-Specific System Threat Assessment. Retrieved April 17, 2007, from AT&L Knowledge Sharing System: : http://akss.dau.mil/dag/Guidebook/IG_c8.2.1.2.asp Bulletcatchers.com. (2003). Threat Assessment. Retrieved April 18, 2007, from Bulletcatchers.: http://www.bulletcatchers.com/images/bulletcatchers_threat.pdf Diligence Intelligence and Risk Management. (2007). Threat Assessment & Physical Security. Retrieved April 18, 2007, from Diligence Intelligence and Risk Management: http://www.diligencellc.com/index.cfm?fuseaction=section.home&id=22 Federal Bureau of Investigation. (n.d.). The School Shooter: A Threat Assessment Perspective . Retrieved April 18, 2007, from Federal Bureau of Investigation: http://www.fbi.gov/publications/school/school2.pdf Fein, R. A., Vossekuil, B., & Holden, G. A. (1995, September). Threat Assessment: An Approach To Prevent Targeted Violence. Retrieved April 18, 2007, from National Criminal Justice Reference Service: http://www.ncjrs.gov/txtfiles/threat.txt The Steele Foundation & Subsidiaries. (2006). Threat Assessment. Retrieved April 18, 2007, from The Steele Foundation & Subsidiaries: http://www.steelefoundation.com/index.php?option=com_content&task=view&id=59&Itemid=162 Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Threat Assessment & Physical Security Case Study”, n.d.)
Retrieved from https://studentshare.org/social-science/1503379-planning-and-threat-assessment
(Threat Assessment & Physical Security Case Study)
https://studentshare.org/social-science/1503379-planning-and-threat-assessment.
“Threat Assessment & Physical Security Case Study”, n.d. https://studentshare.org/social-science/1503379-planning-and-threat-assessment.
  • Cited: 0 times

CHECK THESE SAMPLES OF Threat Assessment & Physical Security

Principles of Information Security

The paper entitled "Principles of Information security" aims to analyze the problem faced by the Assessment Office and provide control recommendations.... security program plan is made when all the controls are identified.... The various controls that are identified are Identity Card, Backup procedures, Training/Awareness, Strictly Comply ITS security policies, Physical Protection of Server (CPU), and Proper Rechecking etc.... hellip; The author of the paper states that risk assessment is the combined process of risk analysis and risk evaluation....
10 Pages (2500 words) Essay

Security Risk Management Process in the Organization

The paper "security Risk Management Process in the Organization" describes the process for analyzing needs identified through a risk assessment and evaluates how many courses of action should be developed to eliminate, reduce, or mitigate risk and contribution of the transfer of knowledge between the security assessment team and firm's staff.... hellip; A security risk assessment plays a very important role in the security management process as it provides information concerning the risks, threats and assets to an organization....
6 Pages (1500 words) Essay

Forensics and Security

This essay "Forensics and security" intends to provide an analysis on security assessment touching on the processes involved, the key technologies used, and the necessity for forensic procedures and policies.... A security assessment is a means to enhance the information technology security of an organization.... hellip; The aim of carrying out a security assessment is to determine an organization's maturity level and enable it to discover its organizational, legal as well as technical risks....
4 Pages (1000 words) Essay

Information Security Risk and the Possible Threats to Information Security

The paper describes information security risk as any danger that may lead to the loss or damage of information.... While determining the course of action to be taken in maximizing security, the current activities and performance of the current information systems should be properly scrutinized.... The most common threat to information is computer viruses....
7 Pages (1750 words) Research Paper

The Organizations Physical, Human, and Electronic Information Holdings That May Be at Risk

This research will begin with the statement that in today's situation, scrutiny of the physical security of services and properties has to turn out to be an even extra serious feature of an organization's information security and industry stability preparation.... Through resources being protected and procedures covering physical security, operations will gain benefit by an enhancement in security on the physical risk to the information.... This essay explores the key areas for physical risk as follows Facility security: access point, information hub, user and sensitivity environments, admittance power and monitoring policy, protector personnel and cabling closets; Internal Company Personnel: Control and accountability for jobs, use of equipments, security procedure compliance, awareness and use of break areas and entry points; External Visitor and Contractor Personnel: Control and accountability, use of equipment, security procedure compliance and use of break areas and entry points; Computer Systems and Equipment: Workstations, servers, backup media, PDAs and modems and physical access points (visual ID only)....
11 Pages (2750 words) Research Paper

Security Plan: Mecklenburg County Courthouse

This essay discusses the security plan: Mecklenburg County Courthouse.... This building was therefore designed to be a large structure easing congestion and improve coordination, among which include security of courtrooms.... hellip; On a vulnerability score, the security Coordinator will formulate an effective security strategy for the Mecklenburg County Courthouse.... For instance, the external risk factor, high occurrence areas as well as grievous risk areas will get the first priority in making the security plan....
6 Pages (1500 words) Research Paper

The IT Infrastructure of the Pharmacy Business

IT security should focus on aspects such as network security, physical security as well as data security (Olzak, 2010).... Hence, the organization needs to focus on enhancing its physical security control, so that the overall risk and uncertainty of the business could be minimized.... The paper 'The IT Infrastructure of the Pharmacy Business' focuses on Information security which is a particular approach of protecting confidential data within a computer security system....
8 Pages (2000 words) Case Study

Security Threat Assessment

This forms the basis of this report which is a literature review to compare and contrast between security risk assessment and security threat assessment.... Similarities and differences between Security threat assessment and a security risk assessmentAccording to Mununta (1999, p.... Fischer & Green (2003) indicates that security threat assessment and security risk assessment is the first stage in estimating and establishing threats, risks and consequences correlated with vulnerabilities and are core foundation to effective establishment and management of efficient security systems....
12 Pages (3000 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us