Perspective on Security Planning
I have found that in years of planning national and international special events, vehicle intrusion is often considered ‘far-fetched’ or unlikely. Why?
I would venture to say that if one were to consider the ten most famous streets in the United States that fill with pedestrians during special events, Bourbon Street is likely in that top ten, with Mardi Gras as the primary special event, here is “A Perspective on Security Planning.”
Now, if one were to consider the top ten most famous annual special events across the United States, I would venture that New Year’s Eve likely comes up in that list, with the ball drop in New York City the centerpiece of the New Year’s Eve celebration in this country.
Those in the counterterrorism field are very familiar with AQ’s Inspire Magazine, where virtually this identical situation is provided as a viable and recommended attack strategy.
Although I am approaching this primarily from the special event planning perspective, the same planning principles apply to daily business, whether for a government agency, a business, a school, a house of worship, a military installation, or anywhere.
When the approach is to ‘buy’ the way out of security vulnerabilities or select that ONE thing that will solve all the security vulnerabilities, not only does accomplishing the goal fail miserably, but the result ends up with a facility or location that many would likely describe as “looking like a prison”.
Successful security and risk mitigation in the workplace and for special events must be a continuous process. Implementing a comprehensive, multi-faceted, and continuously evolving security plan is far more effective and is much more conducive to an open, inviting, yet secure facility or event location.
In the broadest of strokes, each of the following must be part of a comprehensive security plan.
· Physical security elements that are purposefully designed to mitigate the risks and vulnerabilities identified through an objective and comprehensive assessment process.
· Integrating Security Technologies. Access Control, AI-enhanced Surveillance, Intrusion Detection, and Behavior Anomaly Detection are POWERFUL tools and far more effective than humans monitoring cameras. The key is INTEGRATION.
· Robust Awareness Training and Reporting Platform Use.
· Coordination and Collaboration with Law Enforcement and Intelligence Fusion Centers.
An effective security approach is like preparing for a backpacking trek in the mountains. It’s all about layers. My years spent on a mountain search and rescue team only reinforced what I learned a long time ago in the Boy Scouts: In winter, cotton kills.
Don’t base your security plan on the equivalent of that pair of cotton socks.
Filed under A Perspective on Security Planning Art # 7538I

Glenn Norling, owner of TBR Consulting LLC and retired FBI Special Agent Executive Director Active Shooter Prevention Project
#NEVERHERE