Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Ensuring business continuity amid social unrest and demonstrations

By Joshua Skule
planning for protests and unrests at the enterprise
January 19, 2021

The advent of the pandemic and societal unrest has businesses facing evolving threats like never before. In the wake of widespread demonstrations in the summer of 2020, many small business owners hired local private security contractors to provide armed guards to protect their businesses.

Especially today, risk is constantly evolving. Understanding risk and vulnerabilities and proactively planning to minimize these risks is crucial to business continuity and employee and community safety.

Throughout the better part of the past 70 years, the United States has seen numerous demonstrations stemming from social justice issues, anti & pro-war sentiments and the role of local police departments. While these demonstrations often occur in the form of a peaceful march or rally, some gatherings have seen violent outbreaks and rioting.

Washington DC, New York, Chicago, Los Angeles, Seattle, and Portland were cities that saw the most violent demonstrations per capita and the most sustained demonstration activity. Private security firms in these and other cities report having to turn potential clients away due to the high demand for services.

Demand has increased not only due to the desire for a crime deterrent amid a riot, but also due to decreased response times of many overwhelmed police departments. Given the police focus with demonstrations in major cities, local business establishments have reported up to an hour wait time before police are able to respond to emergency calls for assistance in dealing with opportunistic looting or vandalism stemming from the riots.

Some of the most prevalent risks in these areas to a business share three common trends:

  • PERSONNEL AND PROPERTY: Criminal activity - such as theft, looting, and arson - is more likely to occur after dark, particularly in urban environments where there is easier movement between areas. Response limitations on law enforcement personnel have the potential to exacerbate this situation. 

  • INFRASTRUCTURE: The biggest infrastructure risks will likely be to private property and retail storefronts which are in or near protest areas and not necessarily a focus of law enforcement.

  • REPUTATIONAL: Recent trends indicate that reputational risk, with financial impact, can be caused when a business or its key leadership is associated with a political party. Some specific threats are social media calls for boycotts which have proven to be fairly effective (ex. Goodyear and Goya).

It is important for businesses to minimize presenting their facilities as a soft target for opportunistic criminal activity. Having a proactive plan in place to deter criminal activity will aid in protecting employees and assets.

Security planning considerations include:

Review your current crisis plan.  Review current crisis planning documentation including closing procedures, evacuation procedures, communication protocols and consider conducting exercises or drills to ensure that all relevant personnel are fully aware of current policies for emergency preparedness and business continuity, especially as it relates to closing and evacuation procedures.

Establish and maintain communication. Ensure there is an established communications plan that provides positive communication processes for use during critical incidents. This will facilitate effective emergency notifications and responses among employees, executives and clients.

  • A reliable means of information dissemination is critical during times of crises.
  • Communication should occur at regular intervals to ensure a consistent flow of information is maintained.
  • A formalized plan should include built in redundancies for primary and alternate communication methods if various digital and cellular systems are disrupted.

Conduct social media/local media/open source intelligence monitoring for location and brand threats. Opportunists, criminals, and influencers have continued to use social media to communicate, coordinate, and disseminate information. These individuals use simple words or phrases to create a “trending” topic that allow others the ease of access to current information ranging from demonstration locations to police responses.

Monitoring social media or online forums and acting upon credible threats and trends, will allow security details and site managers to adequately prepare to deter any threats.  Companies or their security partners should subscribe to local, state, and federal governmental outreach programs and intelligence products such as OSAC, DSAC, State Intelligence Fusion Centers, etc., and meet with local, state, and federal law enforcement personnel for intelligence and information sharing.  It is important to participate in Business Alliance Groups for intelligence and Information sharing.

Monitoring for the following will provide advanced warning and the time needed to mitigate the threats and risk to your people, facilities, assets, operations and reputation:

  • Public sentiment,
  • Brand, company, facility, locations, and personnel mentions,
  • Known and evolving influencer hashtags,
  • Protest announcements and/or updates,
  • Trending social and/or racial injustice mentions and hashtags,
  • Local news coverage should also be monitored to stay up to date on protests and any breaking events.

Prioritize historical and known threats. Businesses should consider ranking their locations in terms of risk regarding possible demonstrations, both in terms of facilities near probable demonstration hot-spots and potential risks faced should demonstrations occur. The highest-risk locations should consider preemptively securing their premises to minimize property damage – including the potential of boarding up windows and doors.

Contingency planning for unanticipated threats. Businesses should also consider including intelligence inputs into their crisis management plans and providing a feedback loop to ensure intelligence is disseminated timely and that analysts’ focus is evolving to the priorities of the moment which allows for more time to mitigate the threats. 

Transportation routes should be reviewed, and contingency plans made with alternative routes, particularly if the primary route travels through areas likely to encounter civil unrest. This is especially the case when moving people or assets after dark.

Companies should assess the outside of their critical infrastructure to see if there are any unsecured objects that could be used by individuals for blockades or projectiles. These items should be removed and secured. If renting, work with the landlord to secure items or mitigate access to them.

Secure your resources. During times of crisis, security resources are likely to become constrained.

Securing resources prior to crisis events will be critical to success. When planning for coverage, a minimum of two security personnel should be stationed at a location where security will be needed.

Conduct security system tests. Confirm that all CCTV, security, fire and alarm systems are operational.  Ensure process for either mechanical or electronic lockdown of perimeter doors is in place and tested. Companies should also consider retaining video footage for a minimum of 30 days.

Review and enforce the company’s social media policy regarding political commentary from employees. With high political tensions still brewing, personnel should be aware that any comment, for or against, may be used by the opposite site to bring unwanted attention to the individual and the company.  As seen in other incidents, social media comments may be used to incite boycotts, targeted protests the company, harassment, property damage and even potential violence.  Companies should consider forewarning that references to political statements in car bumper stickers, shirts, caps, backpacks, and other personal items may draw unwanted attention.

Plan for recovery. Make necessary arrangements in advance for repair and recovery resources to clean up and restore damaged sites and bring them back to full operation quickly.

Businesses in cities that have to-date seen the most robust protest activity should have a robust intelligence capability and crisis plan in place. Intelligence support during a time of unrest offers local operations and security managers access to a near real-time overview of the local climate and operating environment should tensions rapidly escalate.  Ensuring a crisis plan is in place provides immense peace of mind to all businesses so that they can be ready for the unexpected.

KEYWORDS: crisis response critical response plan political unrest political violence social unrest

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Jskule

Joshua Skule is Senior Vice President of the Risk Advisory and Consulting Services division at Allied Universal. He joined Allied Universal after a distinguished 21-year career in the FBI, where he was recently the Executive Assistant Director for Intelligence leading the organization’s Intelligence Branch. He can be reached at Joshua.Skule@aus.com. 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cybersecurity
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Security leaders securing the enterprise for social unrest

    Rethinking your corporate response plans for social unrest

    See More
  • Globe

    75% of organizations view social unrest as the greatest risk

    See More
  • rethink your enterprise response to social unrest amid COVID-19

    Whitepaper urges your enterprise to rethink corporate response to social unrest

    See More

Events

View AllSubmit An Event
  • June 24, 2025

    Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

    For today's security teams, making informed decisions in the first moments of a crisis is critical.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!