Perspective on Security Planning

I have found that in years of planning national and international special events, vehicle intrusion is often considered ‘far-fetched’ or unlikely.  Why?
I would venture to say that if one were to consider the ten most famous streets in the United States that fill with pedestrians during special events, Bourbon Street is likely in that top ten, with Mardi Gras as the primary special event, here is “A Perspective on Security Planning.”
Now, if one were to consider the top ten most famous annual special events across the United States, I would venture that New Year’s Eve likely comes up in that list, with the ball drop in New York City the centerpiece of the New Year’s Eve celebration in this country.
Those in the counterterrorism field are very familiar with AQ’s Inspire Magazine, where virtually this identical situation is provided as a viable and recommended attack strategy.
Although I am approaching this primarily from the special event planning perspective, the same planning principles apply to daily business, whether for a government agency, a business, a school, a house of worship, a military installation, or anywhere.
When the approach is to ‘buy’ the way out of security vulnerabilities or select that ONE thing that will solve all the security vulnerabilities, not only does accomplishing the goal fail miserably, but the result ends up with a facility or location that many would likely describe as “looking like a prison”.
Successful security and risk mitigation in the workplace and for special events must be a continuous process. Implementing a comprehensive, multi-faceted, and continuously evolving security plan is far more effective and is much more conducive to an open, inviting, yet secure facility or event location.
In the broadest of strokes, each of the following must be part of a comprehensive security plan.
·        Physical security elements that are purposefully designed to mitigate the risks and vulnerabilities identified through an objective and comprehensive assessment process.
·        Integrating Security Technologies.  Access Control, AI-enhanced Surveillance, Intrusion Detection, and Behavior Anomaly Detection are POWERFUL tools and far more effective than humans monitoring cameras.  The key is INTEGRATION.
·        Robust Awareness Training and Reporting Platform Use.
·        Prevention and Response = Procedures and Processes: Train your People!  Do it regularly and do it with purpose.
·        Coordination and Collaboration with Law Enforcement and Intelligence Fusion Centers.
An effective security approach is like preparing for a backpacking trek in the mountains. It’s all about layers. My years spent on a mountain search and rescue team only reinforced what I learned a long time ago in the Boy Scouts: In winter, cotton kills.
Don’t base your security plan on the equivalent of that pair of cotton socks.
Filed under A Perspective on Security Planning Art # 7538I
Glenn Norling Retired FBI Special Agent

Glenn Norling, owner of TBR Consulting LLC and retired FBI Special Agent Executive Director Active Shooter Prevention Project

#NEVERHERE

Share this article

Glenn Norling Retired FBI Special Agent
Written by : Glenn Norling

Glenn Norling, owner of TBR Consulting LLC and retired FBI Special Agent, has extensive experience in emergency management and active shooter preparation. His firm, founded in 2020, specializes in crisis management and emergency planning. With 20 years at the FBI and 10 years in the U.S. Air Force managing multimillion-dollar projects, Glenn has trained over 15,000 people in active shooter awareness. He holds a BA in Physics and a MA in Organizational Management. Glenn is also a member of several professional security and law enforcement organizations.

Download Our White Paper

A lack of knowledge is no excuse for loss of life.

Latest articles