Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
PhysicalPhysical SecurityVideo Surveillance

Surveillance's Role in Controlling Crowds

How are security enterprises leveraging video to secure temporary events?

By Adam Stone
SEC0319-Events-Feat-slide1_900px

The crowds at Lollapalooza 2018 in Grant Park in Chicago.

Photo courtesy of Katrina Barber (C3 Photo).

SEC0319-Events-slide2_900px

As former security director at the Hard Rock Hotel in Las Vegas, Douglas Florence has seen firsthand the impact of video surveillance at a temporary event.

Photo courtesy of Douglas Investigative Group

SEC0319-Events-slide3_900px

Thanks to technological innovations, “we are seeing video used in much more creative ways than in the past,” says Steve Kaufer, a co-founder of the Workplace Violence Research Institute and former president of the International Association of Professional Security Consultants.

Photo courtesy of Inter/Action Associates

SEC0319-Events-slide4_900px

“One of the big concerns on a college campus is around privacy issues. There is this perception that cameras are invasive,” says Josh Bronson, Director of Training at the International Association of Campus Law Enforcement Administrators.

Photo courtesy of International Association of Campus Law Enforcement Administrators

SEC0319-Events-Feat-slide1_900px
SEC0319-Events-slide2_900px
SEC0319-Events-slide3_900px
SEC0319-Events-slide4_900px
March 12, 2019

As security director at the Hard Rock Hotel in Las Vegas, Douglas Florence had the helm when that hotel hosted a weekly filming of the reality show Rehab – basically, a massive pool party. He saw firsthand the impact of video surveillance at a temporary event.

“With 3,000 to 5,000 people poolside, we used it for risk management, for life safety issues. You need to be able to observe the areas of egress. You need to observe the crowd,” says Florence, a past ASIS vice president and head of Douglas Investigative Group in Las Vegas. “The cameras are always working in tandem with your front-line security. When the person watching the screen sees something that doesn’t look right, any kind of behavior that doesn’t seem to fit, they are on the radio.”

Video can play a key security function at concerts, sporting events, political rallies and other temporary gatherings. Here, we look at the evolving role of video in event security, including best practices as experienced by those in the field, in addition to emerging technologies supporting event security.

 

The Big Picture

Greg Guzzetta has helped to secure massive events like Lollapalooza, Coachella and the Chicago Marathon. Given the unique security needs of temporary gatherings, he’s found video surveillance to be an invaluable tool, but one that must be wielded with some care.

“You have to understand the way sites are laid out and the way they operate,” says Guzzzetta, who serves on the advisory panel of the Event Safety Alliance. “I will look at a CAD drawing of a festival to know where the crowds will be and how things will flow. Then we work with festival directors to highlight areas of interest that might be unique to the site.”

All this back-end work is integral to a successful video deployment. “It’s not about just throwing up a bunch of cameras,” says Guzzetta, who heads up Event Intelligence Group in Culver City, Calif.

To deploy video successfully at temporary events, some suggest taking a step back to consider the big picture before jumping into a full-scale deployment. Video requires a strategy. It should be “a component of a layered defense, not just something put up in an ad hoc fashion,” says ASIS past president Tim Williams.

A simple starting point: What are you defending, and why? “Securing a senior management meeting off site will be much more delicate than securing a sporting event,” said Williams, now vice chairman of Pinkerton. “In one you have confidential information being exchanged, or you have visitors who the client doesn’t want identified for competitive reasons. In the other you have alcohol, or you might have a camera over the cashier’s office. The nature of the event defines the risk, and that determines your security strategy, including the use of video.”

In some cases, the context of the event can have a profound impact on the way in which video gets implemented.

Take for instance the academic world. “One of the big concerns on a college campus is around privacy issues. There is this perception that cameras are invasive,” says Josh Bronson, Director of Training at the International Association of Campus Law Enforcement Administrators.

Those privacy concerns should factor in for any security professional looking to incorporate video. “A lot of it is in the messaging. At an event, you can put out signs indicating the area is under surveillance for protection,” Bronson says. “Technology also helps with this. The University of Maryland, for instance, has technology where if you zoom in too close to a window, the technology actually prevents you from seeing into that window. That’s a nice kind of compromise.”

In fact, technology is playing a big part in driving the ever-expanding role of video in event security.

 

Evolving Role

Thanks to technological innovations, “we are seeing video used in much more creative ways than in the past,” says Steve Kaufer, a co-founder of the Workplace Violence Research Institute and former president of the International Association of Professional Security Consultants.

In the past, video surveillance at a temporary event typically came in the form of a mobile trailer provided by local law enforcement, whose officers would operate and observe a scattering of pan-tilt-zoom cameras, which had to be hard-wired together.               

“Now we are seeing a different twist,” says Kaufer, who is president of Inter/Action Associates in Palm Springs, Calif.

The mass shooting in Las Vegas in October 2017 turned eyes toward the sky, as the gunman fired from the 32nd floor of a hotel. Since then, event security professionals have increasingly been looking to deploy drones as part of their video apparatus.

At the same time, the advent of WiFi-enabled cameras has also been a game changer. “Think about a large parking lot that’s been turned into an event space,” Kaufer says. “You can’t run wires across that large expanse of asphalt – and now you don’t have to. You can put the cameras on the light poles and send the signal wireless. It makes the addition of video easier and more affordable.”

Facial recognition may be the next step in the evolution of event video. Taylor Swift used it on her latest concert tour, deploying hidden video cameras to watch the crowd for known stalkers.

With or without the tech upgrades, the essence of event video remains the same: To watch for something. Security pros describe the nature of that something as being more art than science.

“We’re not necessarily looking for things to go down. We’re looking for ‘disturbances in the Force’ – that feeling when something is not right,” Guzzetta says. “All our operators understand the way events flow. If a big act is finishing here, a good chunk of the crowd should flow from here to there. We watch to make sure people aren’t getting trapped between the stages. We watch for crowd sway.”

               

Making it Work

In the effort to leverage video against that suspicious “something” at a temporary event, some long-time challenges persist. Logistics, for instance, are an ongoing concern.

“Time is always an issue,” Guzzetta says. “We hang our cameras off of infrastructure that they assemble for the event. So we can’t go in two weeks before, because there is nothing to hang from. For a big festival we may have just four or five days, and there are hard deadlines.”

Success depends on tight coordination between security professionals and the event producers. “We have to cooperate closely with them,” he adds. “You need to understand who to go to when you need something, and we do as much advance work as possible,” Guzzetta adds.

At the same time, the tech enhancements themselves have introduced some new logistical demands. If you’re going to deploy a few dozen Wi-Fi enabled cameras, “then you have to plan for the bandwidth that you will need,” Florence notes. “These networking requirements can be dealt with, but you do have to think them through,” he says. “With cameras that I am not looking at right at this moment, we might go to half real-time to save bandwidth, or we might drop resolution. Then I can increase the bandwidth on the camera that I am most interested in.”

Bandwidth is just the tip of the iceberg when it comes to the complexity surrounding a video deployment. Security at a temporary event will have to take into account the physical layout of the site; patterns of crowd movement; points of entry and egress; as well as with a range of other factors, in order to effectively deploy a video feed.

In spite of such complexities, those who have successfully deployed video for security at temporary events say the reward can more than justify the effort.

Guzzetta saw the value of this when a sudden turn in the weather forced concert organizers to evacuate some 65,000 attendees from Chicago’s Grant Park.

“Kids don’t want to leave. They have their place right in front of the main stage, and they don’t want to give it up. Bartenders don’t want to leave their stock unsecured,” he says. Boots on the ground aren’t enough at a time like this. “When everyone else thought the site was empty, we found a group of some 200 kids who were hiding in a corner because they didn’t want to leave. We couldn’t have found them without the cameras.”

KEYWORDS: crowd control facial recognition physical security security technology video surveilllance

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Adam Stone is a contributing writer for Security magazine. He has covered IT issues in the public and private sectors for more than 20 years. In addition to following security trends, he writes on military technology, education-tech, government IT and diverse others issues.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Enterprise Services
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • SEC0320-rugged-feat-slide1_900px

    Resilient Surveillance in Rugged Environments

    See More
  • SEC0619-Ports-Feat-slide1_900px

    Security Risk Management in Maryland's Seaports

    See More
  • Crowd of people entering a large event

    Big events, bigger risks: How teams keep large events safe

    See More

Related Products

See More Products
  • 9780367667887.jpg

    Surveillance, Privacy and Security

  • 9781138378339.jpg

    Surveillance, Crime and Social Control

  • Photonic-Sensing.gif

    Photonic Sensing: Principles and Applications for Safety and Security Monitoring

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing