This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies
By closing this message or continuing to use our site, you agree to our cookie policy. Learn More
This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • Home
  • News
    • Security Newswire
    • Technologies
    • Security Blog
    • Newsletter
    • Web Exclusives
  • Columns
    • Career Intelligence
    • Security Talk
    • The Corner Office
    • Leadership & Management
    • Cyber Tactics
    • Overseas and Secure
    • The Risk Matrix
  • Management
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • More
  • Physical
    • Access Management
    • Video Surveillance
    • Identity Management
    • More
  • Cyber
  • Sectors
    • Education: University
    • Hospitals & Medical Centers
    • Critical Infrastructure
    • More
  • Exclusives
    • Security 500 Report
    • Most Influential People in Security
    • Top Guard and Security Officer Companies
    • The Security Leadership Issue
    • Annual Innovations, Technology, & Services Report
  • Events
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
    • Security 500 West
  • Resources
    • The Magazine
      • This Month's Issue
      • Digital Edition
      • Archives
      • Professional Security Canada
    • Videos
      • ISC West 2019
    • Photo Galleries
    • Polls
    • Classifieds & Job Listings
    • White Papers
    • Mobile App
    • Store
    • Sponsor Insights
    • Continuing Education
  • InfoCenters
    • Break-in Prevention
    • Building AppSec in Enterprises
    • Video Management Systems
  • Contact
    • Editorial Guidelines
  • Advertise
Home » 3 Factors for Explosive-Detection Canine Use in Stadium Security
Arenas / Stadiums / Leagues / EntertainmentSecurity Enterprise ServicesPhysical Security

3 Factors for Explosive-Detection Canine Use in Stadium Security

k9-enews
April 25, 2017
Jeffrey B. Miller
KEYWORDS counterterrorism / explosive detection / K9 Security services / security canine / Stadium Security
Reprints
One Comment

Modern day sports venue security is uncompromising and ever-evolving. Sports venues require a robust security posture to protect fans, players, staff and venue. Explosive threats, specifically Vehicle Borne IED (VBIED) and Person Borne IED (PBIED), have become prevalent, requiring an effective security solution. Franchise owners, chief security officers and professional and collegiate sports leagues must recognize vulnerabilities and combat risks. Explosive Detection Canine (EDC) teams are immensely valuable when combatting these explosive threats, specifically within the stadium environment – an acknowledgement made by current professional sports league mandates requiring EDC teams at stadiums nationwide.

When evaluating the role of EDC within an overarching security program, let’s look at three primary considerations for EDC rollout or expansion.

 

Perform a Comprehensive Vulnerability Assessment

The value of an independent, comprehensive threat assessment is enormous. It is the only way to understand the true threats that exist in a stadium environment. All too often, working the stadium everyday can make certain vulnerabilities seem invisible. A fresh outside perspective is vital. Best conducted by an independent consultant with risk assessment experience, this process will identify security gaps and serious risk and outline recommended mitigation strategies. The best assessment will start well beyond the secondary perimeter and work its way in to cover every area, including vehicle screening, gate access control, credentialing, emergency planning and integrated operations.

An initial assessment will establish a baseline for understanding vulnerabilities and required mitigation steps. However, the rapid evolution of today’s threats requires assessments be conducted at least annually – even for an organization with a robust program. Following the baseline, subsequent assessments can be managed by an outside contractor – or, with the right internal personnel, a thorough self-assessment could successfully address new gaps.

 

Deploy the Right Canines

It is a big miss if an organization is not considering the PBIED threat, because it is one of the most likely threats facing the stadium environment. EDCs are a proven tool for addressing and preventing the threat of IEDs – but not just any canine will do. It is critical to utilize an EDC that is properly imprinted and trained specifically to conduct explosive odor tracking sweeps in stadium crowds. These EDC teams are unobtrusive and versatile tools for addressing this threat in a populated area not requiring individual screening. This team’s imprint and training specificity will allow for the identification and tracking of today’s frequently-used explosive odors, such as TATP or Homemade Explosives.

Most sports venues have screening measures in place at the facility entrance. EDC teams may be deployed here, or within the stadium premises, but the threat to the back of checkpoint lines is all too often overlooked. Without a qualified EDC team, it is much easier for a PBIED to get past the secondary perimeter and close to your facility while wearing or carrying an explosive device. Once they are able to do that, it might be too late to prevent loss of life and facility damage.

SAFETY Act Certification

The most successful EDC teams will be DHS SAFETY Act Certified, which extends liability limitations for damages resulting from an act of terror. It is key to understand the three different levels of coverage and protection offered under the SAFETY Act – Certification, Designation and Developmental Test & Evaluation. Not every EDC program achieves DHS SAFETY Act Certification. The highest level of protection, Certification, is a clear indication of the degree to which the company has been able to pass incredibly stringent DHS requirements. It is not easy to achieve DHS SAFETY Act Certification and should be a non-negotiable pre-qualifier when choosing an EDC vendor.

An organization is only as good as its weakest link. From today’s security standpoint, the best sports organizations are active, rigorous and vigilant. They are committed to recurrent assessments and improved security processes consistently applied across all venues within a given league or collegiate conference.

The best security model? It is one that uses proven tools – like an EDC – to address today’s predominant threats. It is a model that is tested and probed at regular intervals and understood by everyone in the organization. It holds all members of the security team accountable for compliance and enforcement of established policies. This ensures that everyone is working toward the ultimate goal of zero security defects.

The reality is that security must always evolve to stay ahead of emerging threats. Regardless of an organization’s current EDC program status, there are always meaningful measures that can and should be implemented to improve your security posture. 

Subscribe to Security Magazine

Recent Articles by Jeffrey Miller

What’s Changed in Open-Air Venue Security?

Keeping Fans Safe

Jeffrey Miller, Senior Vice President with MSA Security, is responsible for strategic growth and business development within the sports and entertainment vertical. Prior to joining MSA, Mr. Miller served as Senior Vice President and Chief Security Officer for the National Football League (NFL) where he led and supervised all facets of security, overseeing and conducting sensitive investigations and managing a network of security directors and contractors in the U.S. and abroad. Mr. Miller served for 24 years with the Pennsylvania State Police, the nation’s 9th largest police agency, advancing in the ranks from Trooper to Commissioner.

Related Articles

What’s Changed in Open-Air Venue Security?

3 Steps for Managing Scope Creep in Security Operations

Related Events

Drones and Surveillance at MetLife Stadium

You must login or register in order to post a comment.

Report Abusive Comment

Subscribe For Free!
  • Print & Digital Edition Subscriptions
  • Security eNewsletter & Other eNews Alerts
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Dispelling the Dangerous Myth of Data Breach Fatigue; cyber security news

Major Retailer Macy's Is Hacked

server room, cybersecurity, penetration testing,

Explained: Firewalls, Vulnerability Scans and Penetration Tests

ransomware-enews

British American Tobacco Suffers Data Breach and Ransomware Attack

cyber network

How to Achieve Cybersecurity with Patience, Love and Bribery

cybersecurity-blog

European Hotel Group Suffers Data Breach Impacting 600,000 Hotels Worldwide

SEC2019_Everbridge_1119_360x184customcontent

Events

December 17, 2019

Conducting a Workplace Violence Threat Analysis and Developing a Response Plan

There are few situations a security professional will face that is more serious than a potential workplace violence threat. Every security professional knows and understands that all employers have a legal, ethical and moral duty to take reasonable steps to prevent and respond to threats of violence in their workplace.
January 23, 2020

The Value of a Unified Approach to Critical Event Management

From extreme weather to cyberattacks to workplace violence, every organization will experience at least one, if not multiple, critical events per year. And in today’s interconnected digital and physical world, the cascading safety, brand, and revenue impacts of critical events are more severe.
View All Submit An Event

Poll

Emergency Communications

What does your enterprise use to communicate emergencies to company employees?
View Results Poll Archive

Products

Effective Security Management, 6th Edition

Effective Security Management, 6th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

See More Products
SEC500_250x180 clear

Security Magazine

SEC-December-2019-Cover_144px

2019 December

This month, Security magazine brings you the 2019 Guarding Report, featuring David Komendat, Boeing CSO, and many other public safety leaders to discuss threats and solutions for 2020 and security officer training. Also, we highlight Hector Rodriguez, Director of Public Safety and Security at Marymount California University, CCPA regulations, NIST standards, VMS and much more.

View More Create Account
  • More
    • Market Research
    • Custom Content & Marketing Services
    • Security Group
    • Editorial Guidelines
    • Privacy Policy
    • Survey And Sample
  • Want More
    • Subscribe
    • Connect
    • Partners

Copyright ©2019. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing