Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementSectorsSecurity Enterprise ServicesSecurity Leadership and ManagementArenas / Stadiums / Leagues / Entertainment

Lessons on Entertainment Security and Executive Protection After Manchester

Iconic entertainers will remain attractive targets for terrorist attacks because they attract substantial crowds and promote social norms and values that conflict with terrorists’ worldviews.

By Robin Mackay
Lessons from Manchester and Paris
Robin Mackay

Robin Mackay

Lessons from Manchester and Paris
Robin Mackay
September 1, 2017

If the Islamic State terrorist organization deliberately targeted Ariana Grande or her May 22, 2017, concert, new challenges will be presented for security professionals who provide close quarters protection to entertainment stars. At the least, the bomber’s focus on the crowded venue at the Manchester Stadium will require executive protection executives to sharpen their focus on terrorist threats to the industry and whether to re-assess flight/hide contingencies for their principals.

 

Iconic Entertainers are a Target

While the investigation into the bombing at the Ariana Grande concert at the Manchester Arena continues, the so-called Islamic State (IS) has claimed responsibility for the attack. All indicators at this point in the investigation point to this claim being credible – and likely true. In the ongoing, major international counterterrorism investigation, UK investigators working with Libyan counterparts are likely to uncover important clues about IS’ inspiration, sponsorship or direction of the attack during their continuing efforts in Libya, where the bomber Salman Abeidi appears to have had contact with IS over the past year.

Iconic entertainers have been and will remain attractive targets for IS-directed or -inspired terrorist attacks because they attract substantial crowds and promote social norms and values which conflict with the IS worldview. While the performers will remain the priority target, a secondary, but still attractive target will be their fan base.

The Manchester attack and the November 13, 2015, attack on Stade de France in Paris were conducted outside the venues’ security perimeter. In other words, after initial “casing,” the bombers assessed the venue security operations at both stadiums to be too good to breach. In Paris, after one of the bombers attempted to enter the stadium, an alert venue security team member identified and designated the IS suicide bomber for additional screening – which triggered the bomber to detonate his device. In Manchester, the security perimeter at the stadium, where arriving Tube passengers entered the Arena, was just beyond the point where the bomber detonated his device. On arrival at the stadium, Abedi more than likely quickly ascertained he had no chance of penetrating the security cordon and settled on an attack in the security screening area – still deadly, but likely less so than had he managed to enter the performance venue.

 

Hunker Down Plans are Important

The Manchester and Paris attacks underscore the importance for close quarter’s protection teams having a shelter-in-place (“hunker down”) plan in place at each performance venue. In Paris, the IS suicide bombers detonated their devices during an ongoing soccer match played at France’s largest venue, the Stade de France (SDF). Two of the devices exploded on SDF grounds while the French President and German Foreign Minister were physically in the venue. After the second blast, President Hollande was escorted to the SDF’s security control room inside the Stadium, probably the safest place his security team could identify in the stadium, to monitor the unfolding attacks around Paris and await secure and orderly exfiltration.

Chaos and a heavy law enforcement response in the immediate aftermath of an incident may argue against an attempt to exfiltrate Principal Talent from a venue immediately after an incident. Frantic crowds will defeat a speedy exfiltration, creating other security problems, and security cordons necessary to isolate the crime scene will further complicate egress.

 

Islamic State and al-Qaida Remain Focused on Spectacular Attacks

Reports in early June 2017 linking the Manchester bomber Salman Abedi to contacts with IS in Libya who were connected to the Paris attacks emphasize the relevance of pop culture to terrorist groups seeking high-profile targets for their attacks. As international military forces continue to squeeze IS in Iraq and Syria, the group (or its foreign affiliates) will likely redouble its often threatened efforts to retaliate by attacking the homelands of coalition partners. The large immigrant communities in the UK, France, Belgium and Germany, and so-called lone wolves elsewhere, provide fertile ground for terrorist groups seeking sympathizers and possibly foot soldiers such as Abeidi.

In spite of pressure, IS/AQ remain capable of sophisticated attacks. Manchester bomber Abeidi allgededly used clandestine tradecraft (“burner” cellphones, encrypted messaging apps, personal communications, couriers and rigorous discipline) in his communications with IS in Libya. While the specific involvement of IS in Abedi’s targeting remains unclear (i.e. whether IS or Abedi chose the Ariana Grande concert as his target), the techniques employed indicate a sophisticated capability to conduct lethal terrorist operations across continents. Ongoing forensic examination of Abedi’s explosive device as well as the unabated UK intelligence and law enforcement investigations will provide important clues to the extent of IS’ command-and-control of the operation.

As with the Grande concert, iconic female performers could be a high-priority target for IS. The results of the investigation will ascertain whether and how Abedi chose the Grande concert to attack. It may have only been a target of convenience at which he was certain youthful crowds would be present. However, it could also be that Grande was specifically targeted, or that a western, female, “heretic” was specifically targeted. If Abedi’s IS contacts in Libya influenced (or directed) his decision, it would comport with social mores imposed on territory IS occupied and has ruled in Syria and Iraq, as well as the social dogma espoused by the puritanical Wahabbi movement within Islam which inspires IS and AQ. Western female entertainers, who embody business and financial success and project unabashed sexuality and gender equality, threaten the IS worldview, so could present attractive targets. Whether Grande’s concert was simply a target of convenience or a specific attack directed by IS will have significant implications for executive protection firms supporting iconic performers. Protecting Principal Talent from paparazzi and overzealous fans is one thing; protection against a resilient, sophisticated and lethal terrorist organization is game changing protective challenge.

 

Drones as the Next Generation Attack Vector

If security perimeters are pushed farther from stadiums to protect crowds, determined and well-financed attackers are likely to seek capabilities enabling them to circumvent the perimeters altogether; for instance, using a drone – or a swarm of them – to deliver explosives closer or directly to targets performing on stage. IS has used drones in Iraq to both surveil coalition military positions and to deliver small quantities of high explosive to coalition targets with lethal results. Such stand-off weapons offer dramatically scaled capabilities to a determined terrorist actor for which current security protocols are inadequate.

 

Recommendations

Security professionals in the close-quarters or executive protection fields need to keep abreast of global trends as well as local developments which could adversely impact their principals’  movements.  For those specialists focused on the entertainment sector and iconic performers, the bare minimum recommendations would include:

  • Develop a shelter-in-place contingency plan for each performance venue and movement, coordinating as necessary with local venue security and law enforcement officials.

  • Ensure detailed exfiltration plans – with local law enforcement pre-briefing and real-time support – are negotiated in advance.

  • Cultivate contact (direct or through local venue security) with any local law enforcement in their venue control rooms (“know where to go”).

  • Ensure venue security has a counter-drone plan in place.

  • Keep abreast of terrorist targeting developments and incorporate lessons-learned into ongoing physical security planning.

  • Enhance physical security operations with intelligence to prepare for and ensure appropriate response to any adverse developments.

KEYWORDS: emergency management event security executive protection international security Terrorism

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Robin Mackay is a retired CIA Operations Officer who spent 26 years participating in U.S. national security missions worldwide. He was also briefly a commissioned Foreign Service Officer with the U.S. Department of State and a Manager in PricewaterhouseCoopers’ Corporate Intelligence Practice. In the summer of 2016, he provided real time intelligence support to the European tours of American entertainment megastars through 11 countries.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Coding on screen

Research reveals mass scanning and exploitation campaigns

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • SEC0321-Edu-Feat-slide1_900px

    The exposure in traditional executive protection

    See More
  • Security Talk Default

    Executive Protection Success Hinges on Investigative Talents

    See More
  • What to Look for in Travel Security and Executive Protection Services - Security Magazine

    What to Look for in Travel Security and Executive Protection Services

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing