Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security NewswireAccess ManagementIdentity ManagementPhysical SecurityVideo SurveillanceHospitality & Casinos

Security After the Las Vegas Incident

By Peter D. Yachmetz
October 7, 2017

After Stephen Paddock killed 58 people and wounded 489 in Las Vegas, the question will be asked: What can be done to mitigate the possibility of another Las Vegas incident?

From what I have observed to date, this incident was premeditated, and was a thoroughly planned event over time. Paddock knew exactly what he was going to do. He amassed a huge cache of high-powered weapons. He maintained a low profile and thought the incident out to the finest detail. And he may not have been on anyone’s radar.

Total and complete security of a “soft target” within a high-target destination is virtually impossible. But we can mitigate by forming a strategy. We all must be aware of our surroundings. Know where the exits are. Locate hard cover. Have a place to meet if separated. I have been retired for eight years, and when I am out for an evening in a public place, I still do not sit with my back to any door.

This incident also is a wake up call for the hospitality industry. Changes to US hospitality security will occur very quickly in an effort to prevent another tragedy. Count on it. As Warren Buffett once said, “It takes 20 years to build up a reputation and less than 5 minutes to destroy it. If you think about that, everyone will do many things differently.” In this instance it took 9-11 minutes. A single act of violence placed hotel guests, the property and the brand reputation at risk. The hotel could be held liable for inadequacies and for criminal acts committed on, or from their property.

The hospitality industry must work to provide safety and security in addition to privacy and comfort of guests. They must examine:

  • Event security. Security for all large events at huge venues should be planned and initiated well in advance of the event. Some event planning begins 12+ months prior to the event. And outdoor events obviously present a different security challenge than indoor events. Those planning major and special events should consider hiring a security expert to conduct an unbiased and detailed risk assessment across the entire venue. The assessment will identify risk, suggest how to mitigate the risk and provide comprehensive recommendations to secure the venue. Those planning future events must re-evaluate, update and develop a staggered and multi-layer security process, employing deterrence methods. Consider a venue change away from tall buildings for major/special events. And there must be a heightened sense of security for all soft targets.
  • Comprehensive Threat & Risk Assessment. Quantify potential risks. Examine the event location. Determine its size, inside and out. Determine the event’s duration. Conduct crime analysis for the venue. Collect/analyze intelligence regarding any potential threat and the likelihood of an incident. Consider conducting interviews, site surveys and making personal site observations. Liaise with law enforcement.
  • Hotel security. Security personnel at all hotels need to immediately initiate a complete review of every aspect of their security apparatus, which includes updating and strengthening each facet of security policies, procedures, hiring and training.
  • “Do Not Disturb”. This is a touchy matter for a hospitality legal department and executive management. At any hotel, as long as you do not create a disturbance or there is not an engineering issue, you have a limited expectation of privacy within your room. From published news reports, Paddock placed a Do Not Disburb sign on the door of his room upon check in and left it there for almost four days. Do hotels need to rethink this policy and limit a DND sign to a shorter amount of time? This would also allow housekeeping to apply awareness training and report any concerns to hotel security.  A tough issue, but it should at least be discussed and considered.  
  • Transport. Attention and intense scrutiny is certain to focus upon transportation of so many pieces of luggage and personal effects. How did Paddock transport so many long weapons and thousands of rounds of very heavy ammo, all of the other equipment and 10 large pieces of luggage, into the hotel and up to a room on the 32nd floor? No one observed or believed that it was peculiar to see the same individual struggling with heavy bag(s) into an elevator?  
  • Security staffing. The hospitality industry must employ sufficient numbers of quality security personnel who are paid fairly and trained  in more than just asset protection procedures. Scheduled shifts for security personnel should be staggered (8-4pm, 10-6pm, etc.,) so presence is constant and there is no gap in coverage. Competent and trained security personnel must be employed.
  • General Hotel Personnel. All employees must receive specialized awareness training to identify, recognize and report suspicious activity. They must be comfortable reporting suspicious behavior such as a nervous or evasive attitude, a severe concern with privacy, denial of entry to a room, and more. Specific indicators may include: did a guest ask for a specific room, arrive with large amounts of luggage and then refuse bellman assistance, use cash only or a credit card in another person’s name, refuse housekeeping services?

In the future, hotel security may employ (or increase it, if it's already being used):

  • Plainclothes Surveillance Operatives. Plainclothes security personnel walking the hotel premises who can maintain a covert posture, who are trained in behavior and situational awareness and who have knowledge of indicators of suspicion and terrorist activity.
  • Bag Checks and Luggage Screening. This policy is coming, I believe. And initially, hotels and guests will complain that is is intrusive. Remember the reaction to new airport security after 9/11? Some guests will openly complain this is a violation of Fourth Amendment rights. Both are wrong. The Fourth Amendment does not apply to private locations and businesses: it only applies to governments. Private businesses have the right to require a bag search. If you decline you have the right to take your business elsewhere. Professionals who believe this will not happen, simply do not understand.
  • Magnetometers. Many say magnetometers are not a viable solution for hotels. Unfortunately, our open society mandates this necessity.  Similar to bag checks and luggage screening, the use of magnetometers and hand-held wands will be used.

Finally, the American public is impatient and very slow to accept increased security procedures that create inconvenience. I see it each time I travel through US airports. Yet, we all need to be patient, because significant changes and increases to current hospitality security measures are coming.

Peter D. Yachmetz is a a 29-year veteran, retired FBI Agent with both private and corporate sector security experience. He is classified as a subject matter expert in Physical Security & Access Control. He is also a trained and experienced Behavioral Assessment Specialist.

KEYWORDS: hotel security Las Vegas security workplace violence

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

University lecture

1.2M Individuals’ Data Stolen In University Hacking

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • The Las Vegas Massacre: The Anatomy of a Catastrophic Security Failure

    See More
  • Las Vegas High School Installs Incident Warning and Management

    See More
  • casino

    Casino security on the Las Vegas Strip

    See More

Related Products

See More Products
  • 9780367030407.jpg

    National Security, Personal Privacy and the Law

  • The Complete Guide to Physical Security

  • facility manager.jpg

    The Facility Manager's Guide to Safety and Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing