In an effort to increase awareness and knowledge on potential security risks, especially in large public gatherings, Titan would like to share the following information:
Public Gathering Security Awareness
As one of the nation’s most populous metropolitan areas, Chicago frequently hosts large public gatherings. For example, the first full weekend in October included multiple festivals and charity events, the Chicago Marathon, and home games for both the Chicago Cubs and Chicago Bears. Awareness and alertness are imperative for such circumstances.
Potential Indicators of Terrorist Activity
Terrorists have a wide variety of weapons and tactics available to achieve their objectives. The Department of Homeland Security (DHS) notes that the specific threats of most concern to large outdoor public gatherings include:
- Improvised explosive devices (IEDs)
- Vehicle-borne improvised explosive devices (VBIEDs)
- Chemical/biological/radiological agents
- Small arms attack
Terrorist activity indicators are observable anomalies or incidents that may precede a terrorist or lone violent actor attack. Indicators of an imminent attack requiring immediate action may include the following:
- Persons wearing unusually bulky clothing that might conceal explosives or weapons
- Suspicious or illegally parked vehicles near a gathering
- Unattended packages (backpacks, boxes, briefcases, etc.) that may contain explosives
- Persons attempting to gain unauthorized entry to the gathering or restricted areas
- Persons possessing stand-off weapons (grenade launchers, rifles) near the event
Indicators of potential surveillance by terrorists or lone violent actors include:
- Persons discovered with documents highlighting critical areas, infrastructure, or high-profile attendees
- Persons questioning event employees about practices pertaining to the gathering and its operations
- Event employees inquiring about operations or security protocols, or possessing sensitive materials not related to their job functions
- Event employees noted as willfully associating with suspicious individuals
- A noted pattern of false alarms, equipment failures, or power outages with indicators of sabotage or intentional disruption
- Theft or unauthorized possession of identification cards or uniforms
- Theft or disappearance of radios or other communications equipment
- Unusual and unexpected maintenance activities, such as road or utility repairs, near the event site
- Displaced or misaligned manhole covers or maintenance hatches near the gathering site
Common Vulnerabilities
The following are key common vulnerabilities of large outdoor public gatherings:
- A concenrtation of pedestrians in a single space
- Unrestricted public access to grounds and peripheral areas, such as parking lots
- Multiple access points with limited screening or control
- Temporary structures lacking safety features
- Limited security force or employee background checks
- Lack of exercises for emergency plans
- Multiple locations to place explosives or hazardous agents
Protective Measures
Protective measures include equipment, personnel, and procedures designed to protect against threats and to mitigate the effects of an attack. Protective measures for large gatherings may include:
Planning and Preparedness
- Develop comprehensive security and emergency response plans and exercise periodically
- Designate a security director to develop, implement, and coordinate all security-related activities
- Maintain constant awareness of threat conditions and available intelligence
- Develop policies and procedures for dealing with hoaxes and false alarms
- Establish liaison and regular communications with local first responders
- Keep records of all security-related incidents
- Review and implement pertinent recommendations from FEMA IS-15 course, “Special Events Contingency Planning for Public Safety Agencies”
Personnel
- Conduct background checks on security employees and others with access to sensitive information or locations
- Incorporate security awareness and appropriate response procedures for security situations into vendor and employee training programs
- Maintain and adequately sized, equipped, and trained security force
- Provide adequate security supervision and oversight for all events
- Be alert to indicators of suspicious activity
- Coordinate security force operations with local/state/federal law enforcement as appropriate
Access Control
- Define an event or gathering perimeter
- Identify a buffer zone to restrict access to the event
- Provide signage to restrict access to nonpublic areas
- Provide security personnel at key access points
- Prohibit entry of security-sensitive items
- Use centralized parking and shuttle service if possible
- Promptly remove any unauthorized vehicles
Barriers
- Evaluate and install perimeter barriers if warranted
- Establish a clear zone around sensitive or critical facilities within the perimeter
- Install barriers to separate vehicles from crowds
Communications and Notification
- Install systems that provide communications with all people at the event, including employees and guests
- Install systems that provide communications with local law enforcement and emergency responders
- Develop a notification protocol that outlines who should be contacted in emergencies, including appropriate contact numbers, e-mail addresses, etc.
- Provide a simple and straightforward means for people to communicate the presence of a potential threat or emergency
Monitoring/Surveillance/Inspection
- Evaluate, design, and implement a monitoring, counter-surveillance, and inspection program
- Provide visual surveillance capabilities
- Deploy the security force to regularly inspect sensitive or critical areas for suspicious activities or packages
- Monitor all persons entering or departing the event
- Inspect packages, bags, and parcels entering the event space
- Monitor and work adjacent to the event or gathering
Infrastructure Interdependencies
- Ensure that the event has adequate utility service capacity to meet normal and emergency needs
- As practical, locate gatherings at a safe distance from hazardous areas or infrastructure
- Contingency plans should include options for infrastructure or utility failures
Incident Response
- Ensure that an adequate number of emergency responders are on duty or on call at all times
- Develop policies and procedures for dealing with an incident to advise the public or the situation and to diffuse rumors
- Designate emergency ingress and egress routes for first responders and attendees, respectively