Skip to main content

Science Informed Major Event Security Planning: From Vulnerability Analysis to Security Design

  • Chapter
  • First Online:
Science Informed Policing

Abstract

The post 9/11 security landscape has seen a fundamental shift in security planning, organization and management across the national and global security domain. This shift is particularly evident with regards to special events. Major national regional and global events such as the Olympic Games, FIFA world cup, the US Super Bowl, and the Boston Marathon draw large crowds of spectators and participants thereby creating vulnerable targets. The 1972 Munich Olympics and 1996 Atlanta Olympics are 2 examples of pre-9/11 attacks on sporting events. Since 9/11, we have seen attacks on events such as the Boston Marathon in 2013, Las Vegas active shooter in 2017 and the bombing in Manchester at the Ariana Grande concert in 2017. These examples highlight the inherent vulnerabilities and security challenges that reside in major events (sporting, cultural, religious, musical). With this in mind, security budgets have increased to deal with such risks and threats. For example, the security budget for the 2012 London Olympics topped $1.46 Billion and the 2010 Vancouver Olympics was over $900 million.

This chapter examines the security challenges and solutions for managing major event security. Scenario planning and disaster forensic methodologies (Masys AJ (ed), Disaster forensics: understanding root cause and complex causality. Springer, Cham, 2016) are presented along with the role of predictive analytics in supporting vulnerability analysis and security solution navigation. Key recommendations are made pertaining to vulnerability analysis and the development and design of a security architecture planning framework rooted in a High Reliability Security Organizations (Masys AJ, Designing high reliability security organizations for the homeland security enterprise. In: A Siedschlag, A Jerkovic (eds) Homeland security cultures: enhancing values while fostering resilience. Rowman & Littlefield International, London).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 109.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 149.00
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 139.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • All Hazards Risk Taxonomy. Available at https://www.publicsafety.gc.ca/cnt/rsrcs/pblctns/ll-hzrds-ssssmnt/ll-hzrds-ssssmnt-eng.pdf

  • Dekker, S. (2011). Drift into failure: From hunting broken components to understanding complex systems. Aldershot: Ashgate Publishing.

    Google Scholar 

  • DODAF. (2015). Volume I: Overview and concepts. Available at: https://dodcio.defense.gov/Portals/0/Documents/DODAF2/DoDAF%20v2.02%20Chg%201%20Vol%20I%20Final%202015-01-19.pdf

  • Edson, R. (2008). Systems thinking. Applied: A Primer. ASysT Institute http://www.anser.org/docs/systems_thinking_applied.pdf

  • Fussey, P., Richards, A., & Silke, A. (2012). Chapter 12 – Critical reflections on securing the Olympics: Conclusions and ways forward. Routledge Online Studies on the Olympic and Paralympic Games, 1(41), 227–238.

    Article  Google Scholar 

  • Gardner, W. L., Panaou, T., Watterson, K., Alao, S., & Jacob, B. G. (2017). Predicting potential human trafficking recruiting geolocations using Eigen decompressed non-zero spatial autocorrelation coefficients and Poissonian heterogeneous gamma distributed variables. International Journal of Geographic Information System,4(2). Retrieved from http://acascipub.com/Journals.php

  • Goldin, I., & Mariathasan, M. (2014). The butterfly defect- how globalization creates systemic risks, and what to do about it. Princeton: Princeton University Press.

    Book  Google Scholar 

  • Hodgkinson, G., & Wright, G. (2002). Confronting strategic inertia in a top management team: Learning from failure. Organization Studies, 23(6), 949–978.

    Article  Google Scholar 

  • Hollnagel, E. (2012). A tale of two Safeties. http://www.resilienthealthcare.net/A_tale_of_two_safeties.pdf

  • Home Office. (2011). London 2012 Olympic and Paralympic safety and security strategy. Available at: https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/97983/olympic-safety-security-strategy.pdf

  • IAEA. (2008). Nuclear security culture (IAEA nuclear security series no. 7). Available at: https://www-pub.iaea.org/MTCD/Publications/PDF/Pub1347_web.pdf

  • Janis, I. (1972). Victims of groupthink. Boston: Houghton-Mifflin.

    Google Scholar 

  • Jennings, W. (2012). Chapter 8 – Governing the games in an age of uncertainty: The Olympics and organisational responses to risk. Routledge Online Studies on the Olympic and Paralympic Games, 1(41), 135–162. https://doi.org/10.4324/9780203835227_chapter_8.

    Article  Google Scholar 

  • Kamara, J. K., Agho, K., & Renzaho, A. M. N. (2019, March 1). Understanding disaster resilience in communities affected by recurrent drought in Lesotho and Swaziland—A qualitative study. PLOS One. Available at: https://journals.plos.org/plosone/article?id=10.1371/journal.pone.0212994

  • Masys, A. J. (2012). Black swans to grey swans- revealing the uncertainty. International Journal of Disaster Prevention and Management, 21(3), 320–335.

    Article  Google Scholar 

  • Masys, A. J. (Ed.). (2015). Applications of systems thinking and soft operations research in managing complexity. Cham: Springer.

    Google Scholar 

  • Masys, A. J. (Ed.). (2016). Disaster forensics: Understanding root cause and complex causality. Cham: Springer.

    Google Scholar 

  • Masys, A. J. (2018). Designing high reliability security organizations for the homeland security Enterprise. In A. Siedschlag & A. Jerkovic (Eds.), Homeland security cultures: Enhancing values while fostering resilience. London/Lanham: Rowman & Littlefield International.

    Google Scholar 

  • Masys, A. J., Ray-Bennett, N., Shiroshita, H., & Jackson, P. (2014). High impact/low frequency extreme events: Enabling reflection and resilience in a hyper-connected world. 4th International conference on building resilience, 8–11 September 2014, Salford Quays, United Kingdom. Procedia Economics and Finance, 18(2014), 772–779.

    Article  Google Scholar 

  • Mateski, M. (2009). Red teaming: A short introduction 1.0. Available at: http://redteamjournal.com/papers/A%20Short%20Introduction%20to%20Red%20Teaming%20(1dot0).pdf. Accessed 4 Sept 2009.

  • Perrow, C. (1984). Normal accidents- living with high-risk technologies. New York: Basic Books.

    Google Scholar 

  • Perrow, C. (1999). Normal accidents- living with high-risk technologies. Princeton: Princeton University Press.

    Google Scholar 

  • RAND. (2018). Olympic-caliber cybersecurity. https://www.rand.org/pubs/research_reports/RR2395.html

  • Reason, J. (2000). Human error: Models and management. BMJ (Clinical Research Ed.), 320(7237), 768–770. https://doi.org/10.1136/bmj.320.7237.768.

    Article  Google Scholar 

  • Richards, A. (2012). Chapter 2 – Terrorism, the Olympics and sport: Recent events and concerns for the future. Routledge Online Studies on the Olympic and Paralympic Games, 1(41), 15–31.

    Article  Google Scholar 

  • Schön, D. (1983). The reflective practitioner: How professionals think in action. London: Temple Smith.

    Google Scholar 

  • Senge, P. (1990). The fifth discipline: The art and practice of the learning organization. New York: Doubleday Currency.

    Google Scholar 

  • Spann D. (2006). Coping with the unexpected: Integrating HRO and agile. Cutter IT Journal. Available at: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.606.2955&rep=rep1&type=pdf

  • Stanely, N., Jacob, B. G., Masys, A. J., Parikh, J., Izurieta, R., Ortiz, M. (2019). Global Health Security and Disaster Forensics: A solution oriented approach to mapping public health vulnerabilities through predictive analytics. In E-Proceedings of the 38th IAHR World Congress, September 1–6, 2019, Panama City, Panama.

    Google Scholar 

  • Taleb, N. N. (2007). The black swan: The impact of the highly improbable. London: Penguin Books Ltd.

    Google Scholar 

  • Taylor, T., & Toohey, K. (2017). The security agencies’ perspective. In M. Parent & J.-L. Chappalet (Eds.), Routledge handbook of sports event management. London: Routledge.

    Google Scholar 

  • Weick, K. E. (1995). Sensemaking in organizations. Thousand Oakes: SAGE.

    Google Scholar 

  • Weick, K. E., & Sutcliffe, K. M. (2007). Managing the unexpected: Resilient performance in an age of uncertainty (2nd ed.). San Francisco: Wiley.

    Google Scholar 

  • Woods, D. D. (2006). Essential characteristics of resilience. In E. Hollnagel, D. D. Woods, & N. Leveson (Eds.), Resilience engineering: Concepts and precepts (pp. 21–34). Aldershot: Ashgate Publishing.

    Google Scholar 

  • Xu, T., & Masys, A. J. (2016). Critical infrastructure vulnerabilities: Embracing a network mindset. In A. J. Masys (Ed.), Exploring the security landscape- non-traditional security challenges. Cham: Springer.

    Google Scholar 

  • Zekulin, M. (2009, Fall) Olympic security: Assessing the risk of terrorism at the 2010 Vancouver Winter Games. Journal of Military and Strategic Studies, 12(1)1–25

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Anthony J. Masys .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Masys, A.J. (2020). Science Informed Major Event Security Planning: From Vulnerability Analysis to Security Design. In: Fox, B., Reid, J., Masys, A. (eds) Science Informed Policing. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-030-41287-6_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-41287-6_12

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-41286-9

  • Online ISBN: 978-3-030-41287-6

  • eBook Packages: Law and CriminologyLaw and Criminology (R0)

Publish with us

Policies and ethics