Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security NewswireAccess ManagementIdentity ManagementPhysical SecurityVideo SurveillanceHospitality & Casinos

Security After the Las Vegas Incident

By Peter D. Yachmetz
Security newswire default
October 7, 2017

After Stephen Paddock killed 58 people and wounded 489 in Las Vegas, the question will be asked: What can be done to mitigate the possibility of another Las Vegas incident?

From what I have observed to date, this incident was premeditated, and was a thoroughly planned event over time. Paddock knew exactly what he was going to do. He amassed a huge cache of high-powered weapons. He maintained a low profile and thought the incident out to the finest detail. And he may not have been on anyone’s radar.

Total and complete security of a “soft target” within a high-target destination is virtually impossible. But we can mitigate by forming a strategy. We all must be aware of our surroundings. Know where the exits are. Locate hard cover. Have a place to meet if separated. I have been retired for eight years, and when I am out for an evening in a public place, I still do not sit with my back to any door.

This incident also is a wake up call for the hospitality industry. Changes to US hospitality security will occur very quickly in an effort to prevent another tragedy. Count on it. As Warren Buffett once said, “It takes 20 years to build up a reputation and less than 5 minutes to destroy it. If you think about that, everyone will do many things differently.” In this instance it took 9-11 minutes. A single act of violence placed hotel guests, the property and the brand reputation at risk. The hotel could be held liable for inadequacies and for criminal acts committed on, or from their property.

The hospitality industry must work to provide safety and security in addition to privacy and comfort of guests. They must examine:

  • Event security. Security for all large events at huge venues should be planned and initiated well in advance of the event. Some event planning begins 12+ months prior to the event. And outdoor events obviously present a different security challenge than indoor events. Those planning major and special events should consider hiring a security expert to conduct an unbiased and detailed risk assessment across the entire venue. The assessment will identify risk, suggest how to mitigate the risk and provide comprehensive recommendations to secure the venue. Those planning future events must re-evaluate, update and develop a staggered and multi-layer security process, employing deterrence methods. Consider a venue change away from tall buildings for major/special events. And there must be a heightened sense of security for all soft targets.
  • Comprehensive Threat & Risk Assessment. Quantify potential risks. Examine the event location. Determine its size, inside and out. Determine the event’s duration. Conduct crime analysis for the venue. Collect/analyze intelligence regarding any potential threat and the likelihood of an incident. Consider conducting interviews, site surveys and making personal site observations. Liaise with law enforcement.
  • Hotel security. Security personnel at all hotels need to immediately initiate a complete review of every aspect of their security apparatus, which includes updating and strengthening each facet of security policies, procedures, hiring and training.
  • “Do Not Disturb”. This is a touchy matter for a hospitality legal department and executive management. At any hotel, as long as you do not create a disturbance or there is not an engineering issue, you have a limited expectation of privacy within your room. From published news reports, Paddock placed a Do Not Disburb sign on the door of his room upon check in and left it there for almost four days. Do hotels need to rethink this policy and limit a DND sign to a shorter amount of time? This would also allow housekeeping to apply awareness training and report any concerns to hotel security.  A tough issue, but it should at least be discussed and considered.  
  • Transport. Attention and intense scrutiny is certain to focus upon transportation of so many pieces of luggage and personal effects. How did Paddock transport so many long weapons and thousands of rounds of very heavy ammo, all of the other equipment and 10 large pieces of luggage, into the hotel and up to a room on the 32nd floor? No one observed or believed that it was peculiar to see the same individual struggling with heavy bag(s) into an elevator?  
  • Security staffing. The hospitality industry must employ sufficient numbers of quality security personnel who are paid fairly and trained  in more than just asset protection procedures. Scheduled shifts for security personnel should be staggered (8-4pm, 10-6pm, etc.,) so presence is constant and there is no gap in coverage. Competent and trained security personnel must be employed.
  • General Hotel Personnel. All employees must receive specialized awareness training to identify, recognize and report suspicious activity. They must be comfortable reporting suspicious behavior such as a nervous or evasive attitude, a severe concern with privacy, denial of entry to a room, and more. Specific indicators may include: did a guest ask for a specific room, arrive with large amounts of luggage and then refuse bellman assistance, use cash only or a credit card in another person’s name, refuse housekeeping services?

In the future, hotel security may employ (or increase it, if it's already being used):

  • Plainclothes Surveillance Operatives. Plainclothes security personnel walking the hotel premises who can maintain a covert posture, who are trained in behavior and situational awareness and who have knowledge of indicators of suspicion and terrorist activity.
  • Bag Checks and Luggage Screening. This policy is coming, I believe. And initially, hotels and guests will complain that is is intrusive. Remember the reaction to new airport security after 9/11? Some guests will openly complain this is a violation of Fourth Amendment rights. Both are wrong. The Fourth Amendment does not apply to private locations and businesses: it only applies to governments. Private businesses have the right to require a bag search. If you decline you have the right to take your business elsewhere. Professionals who believe this will not happen, simply do not understand.
  • Magnetometers. Many say magnetometers are not a viable solution for hotels. Unfortunately, our open society mandates this necessity.  Similar to bag checks and luggage screening, the use of magnetometers and hand-held wands will be used.

Finally, the American public is impatient and very slow to accept increased security procedures that create inconvenience. I see it each time I travel through US airports. Yet, we all need to be patient, because significant changes and increases to current hospitality security measures are coming.

Peter D. Yachmetz is a a 29-year veteran, retired FBI Agent with both private and corporate sector security experience. He is classified as a subject matter expert in Physical Security & Access Control. He is also a trained and experienced Behavioral Assessment Specialist.

KEYWORDS: hotel security Las Vegas security workplace violence

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security’s 2025 Women in Security

Security’s 2025 Women in Security

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

Half closed laptop

Sudo Vulnerability Discovered, May Exposes Linux Systems

Person holding cellphone

Millions of Android, iPhone Users Could Be Sending Data to China

Events

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Security blog default

    The Las Vegas Massacre: The Anatomy of a Catastrophic Security Failure

    See More
  • Las Vegas High School Installs Incident Warning and Management

    See More
  • casino

    Casino security on the Las Vegas Strip

    See More

Related Products

See More Products
  • 9780367030407.jpg

    National Security, Personal Privacy and the Law

  • facility manager.jpg

    The Facility Manager's Guide to Safety and Security

  • The-Complete-Guide-to-Physi.gif

    The Complete Guide to Physical Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!