Module 7: Access Control and Credentialing Learning Objectives •Identify the basic concepts of access control and credentialing for major special events. •Recognize available methods and technologies for controlling access to major special events. •List available methods and technologies for credentialing at major special events. Purpose of Access Control •Grant access to people who are authorized to enter (ticket holders, performers, staff) •Ensure that they are not bringing in contraband (weapons, drugs) •Exclude persons who are not authorized to enter Key Questions •Do we have clearly specified perimeters: inner, middle, outer? •Do we have adequate and appropriate security for each perimeter? •Do we have enough technical equipment for effective and efficient screening? Key Questions (continued) •Do we have enough staff for timely screening? •Do we have staff trained and experienced in screening? •Do we have proper screening protocols? •Are screening regulations clearly posted for all participants to read? Security Perimeters = Rings of Protection Outer Perimeter Example: NFL Best Practices for Stadium Security: •Establish a secure outer perimeter 100 ft from stadium. •Use barricades (Jersey barriers, concrete planters, bollards, trucks, buses) to protect areas vulnerable to forced entry by vehicles. •Close roads and streets adjacent to the facility, where feasible. Purpose: Deter vehicles, not pedestrians Middle Perimeter •First level of access control for personsand their possessions •No one without a pass/ticket or credential may enter Middle Perimeter Methods Screening persons: •Inspect visually •Require person to open outer clothing •Pat down outer clothing •Use magnetometer wands to scan clothing •X-ray all coats and jackets •Post uniformed officer at each gate to observe suspicious behavior and to back up screeners Middle Perimeter Methods Screening objects: •Prohibit large objects—coolers, backpacks, large bags—that could conceal explosives or weapons. •Inspect and search handbags, binocular cases, briefcases, etc. •Use magnetometers to scan all handbags, binocular cases, briefcases, etc. Publicize List of Prohibited Items •Send notices to season ticket holders. •Post signage and distribute leaflets at the event site, satellite parking areas, and logical transit sites. •Use loop announcements and staff at key locations to provide information on allowable and prohibited items. •For major events, ask the media to help publicize what items are allowed and prohibited. Rose Bowl Search Levels (Based on Threat) •Level A: visual inspection of purses at small events (e.g., swap meets) •Level B: inspection of coats, plus Level A measures •Level C: pat-down searches, plus Level A and Level B measures Other Screening and Access Factors •Time:Arrange enough screening capacity to keep lines short. •Supervision:Use police officers to supervise private security screeners and provide help in case of trouble. •Trouble desk:Establish a place where access problems can be resolved. Other Screening and Access Factors (continued) •Reentry policy:Decide whether patrons may exit and reenter. •Parking inside middle perimeter:Decide on vehicle screening measures. •Remember the tow truck! Inner Perimeter •For VIPs, performers, players, and their guests •Identification and permission required •Area made safe, then kept safe •Bodyguard issues Other Tools and Concerns •Video cameras for both security and logistical support •Personal observation from high points •Delivery screening (off-site and on-site) •Limo drivers and truck rentals •Mail and package screening •Facilities inspection •Cash security Credentialing The mission of major events credentialing is to design and produce badge identification: •To ensure the greatest possible level of security for personnel and property, and •To enhance the ability of law enforcement to control access to secure areas, facilities, and events. --U.S. Secret Service Ticket .Credential NASCAR Credential: Card plus stickers Key Questions Regarding Credentials •Do we have a plan and process to produce credentials? •Do we have adequate technology to produce credentials? •Do we have the database to produce credentials? •If we cannot produce credentials in-house, what agency can we partner with to help us? •Who will be credentialed? Key Questions Regarding Credentials(continued) •Which credentialed persons require background records checks? •Who will conduct the records checks? •What criteria will be used to exclude people from receiving badges? •How and when will credentials be distributed? •Where will the credentialing center be located (must be open before and during the event)? Color Coding Badges Badges may be color-coded to: •Grant access past specific perimeters (e.g., purple may pass middle perimeter) and zones within perimeters •Designate personnel functions (e.g., orange = VIPs) Credentialing Costs •Background checks •Credentialing technology Additional Tips •Provide adequate information on badges to verify wearers’identity and level of access •Make codes easy for security personnel to interpret •Include enough security features to prevent counterfeiting and assist in credential verification Conclusion Tabletop Exercise: Continuation of Module 1 Tabletop Exercise, “Pre-Planning for Major Events” BREAK