Thursday, October 24, 2019

Planning And Threat Assesment Essay

Abstract   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚     When one is determining the credibility and seriousness of a threat, then he is engaged in the process known as Threat assessment. A threat may be individual security threat, a group security threat, a bombing threat or even a fire setting threat. Threat assessment also investigates the probability of the   peril being carried out. Once a potential threat has been assessed and is seen as serious, prevention and mitigation steps are carried out. The context of threat is very important when interpreting risks (Feher, 45).   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   In order to evaluate threat, some questions should be addressed. Some of the question is the character of the threat, what is the objective of the threatener, what does the threatener want to put across, the victim’s sensitivity to the threat, how credible is the threat, the threatener’s aim, is   there a secondary gain targeted by the threatener? When addressed the questions will help in evaluating the threat; the threat’s credibility and chances of its occurring (Dietz, 129).   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   In threat assessment, planning is imperative because it reduces the chances of the threat occurring. It also mitigates the effects of the threat, resolve their implications, and insulate the fallout and builds confidence of the parties involved. Threat assessment is not solely about security concerns although it is its primary concern (Borum, 335).   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   A general framework of threat assessment should incorporate the identification of threat or emergency, estimate of probability, development of prevention and mitigation strategies and resource allocation of which should be based on evaluation of likelihood of occurrence and impact.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Planning should be dynamic and contextual since one strategy will not fit all the threats that may concern an individual detail, planning must reckon with the context. Planning also needs continued evaluation of likelihood of occurrence and effect of prevention and mitigation of the effects and of changing context. Planning is a fact (Boon, 77). Planning and threat assessment: Case study of a white supremacist principal   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   When planning the detail of security for the principal, it is imperative to identify the threat at hand. My principal is a white supremacist and has many enemies. He cannot defend himself when confronted with a threat since is confined to a wheelchair 24 hours a day. His security detail must also be inclusive of a nurse who may not know how to handle precarious situations and may be under threat herself. She must be protected from harm at all cost because the principal is dependent on her.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Being a white supremacist, he is under threat of other races especially the blacks and Latinos. They both have a history of violence especially when racially discriminated against. The have access to sophisticated weapons and they are capable of planning an ambush on the highways. There have been rumors circulating around Los Angeles that black supremacists have put a figure on the principal’s head. They are known to possess a lot of money and influence in the Los Angeles Ghettos.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Apart from the Blacks and Latinos, the principal has other enemies as well. Apart from other races that would have all the motivation to eliminate him, he also has white enemies as well. Some of them are said to be connected to the mafia and so they could attack anywhere and anytime. They can also use the government officials to accomplish their desires.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   One of the other threats is that a rival white supremacist group is suspected of being behind a series of murders and the recent brutal beating of the principal’s assistant chief. The media has already speculated that they are fighting for political power in the State of California among the white supremacists movement.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The main threat is outside the courthouse. He is to defendant to charges of murder and civil rights violation, especially to the non-whites races. This is because the many of the rival groups and extremists will be attending the hearing. These include fundamentalist’s religious groups, civil rights activists, and other white supremacist groups among others. It is anticipated that the hearing will be very emotional and might spark off anger that could turn out to be violent.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   One concern that the security detail of the principal has is the withdrawal of police from his security detail. The chief of police has said that his men will not be responsible for the principal’s security. It is a concern because the principal want to make a grand entry to the court and also want to talk to the press. This is a major threat because the principal might spark off anger before entering the court, plus putting his numerous enemies on the picture, his life would be at a threat of gunning down by a sharp shooter placed anywhere in the surrounding court environment. It is particularly hazardous because the court is surrounded by skyscraper buildings. Mitigation of threat   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   In order to mitigate the chance of the threat that is currently facing the principal, it is important to note what could be done to avoid the threat from occurring at all. It is also important to note that at our disposal we have only eight security men covering the principal, and this against the very large force of enemies is a very little number of security details.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   First we have to avoid the highways whenever possible. This is because the Blacks and Latinos have the tendency to lay an ambush on the highways and this may also be an incentive for other rivals to Lay ambush on the principal’s motorcade. An alternative means of transportation is paramount to evade the risk of the highways. It would be prudent to hire a helicopter for the principal, the nurse another security man and to oversee that the principal travel from home to the courthouse grounds without the necessity to go through the highways.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Since it is not practical for all the security detail to go with the helicopter, prior arrangement must be done so that the rest of the security detail get to court on time. It must be before the principal’s helicopter reaches court. They will be responsible for determining the threat that will be facing the principal and organizing for the general security of the principal when he arrives in court.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   There will also be the need for acquiring vehicles for the rest of the security detail. There will need to be enough vehicles for the transport of the entire security detail so a minimum of three vehicles will be needed. The vehicles should be parked in strategic places for the immediate departure should a necessity occur after the hearing. The same should apply to the helicopter. These vehicles will need to be unmarked and cannot by any chance be linked to the principal as this may compromise the security detail. If possible the vehicles should be new.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Communication should be of high quality so that the security detail on the ground monitoring the situation should in contact with helicopter at all time. The communication gadgets should be free off interference from outside parties and should be very alert of outside parties listening in. State of the art communication systems will be employed when   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   In order to minimize the occurrence of threat, the security detail should be very particular on timing. Regardless of the principal wanting to make a grand entrance to the court, little contact should be encourage between the principal and outside parties particularly the press. More time being afforded to the principal and the outside parties increases the occurrence of threat. The timing should be that the time of arrival of the principal will minimize the time of contact with the outside parties. After hearing all the security detail should be on hand to ensure the minimal contact of the principal to the outside parties. I being the head of the security detail will explain the importance of this to the principal should he need any explanations as to why he was not allowed maximum contact with the outside parties and press.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   More security details need to be hired to help the strained security details. There will be need to look for capable men of handling this assignment and so as to enhance the security of the principal.   Resource Allocation   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   After threat assessment, it is necessary to allocate some resources so that they can be used to avoid the threat from happening.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   In our case of the principal, there will be need to hire a helicopter but it would be more economical to buy one because the principal will need to be traveling so more after the trip to the court. This will reduce the risk of being ambushed by the enemies on the highways.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   There is also the need to invest on new vehicles for the security detail. This is because the vehicles will need not to be linked to the principal as this could jeopardize the safety of the principal and the security detail as well.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   There is also the need for the investment in state of the art communication devices. This will enhance the effective security monitoring and the communication of possible threat from the ground to the helicopter.   Conclusion   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Considering all the threats that face individuals and given the concern for public safety, there is a public wish to establish a threat assessment program for the pubic as well as individuals. Most prone to these threats are public figures, celebrities, leaders of all sorts including fundamentalists and supremacists and witnesses among many more members of the public (Baxter, 194).   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Such programs require preparation, knowledge and deverness in order to be capable of identifying serious threats as well as intervening and addressing them in public. These should be done in such a manner as not to inappropriately heighten public fears and thus causing overreacting of the public. References Baxter, V. Margavio, A. (1996). Assaultive violence in the U.S. post office. Work and Occupation, 177 – 196 Boon, J.C.W. Sheridan, L (2001). Stalker typologies: A law enforcement perspective. Journal of Threat Assessment. 75 – 79 Borum, R, Fein R, Vossekuil, B Berglund, J. (1999). Threat Assessment: Defining an approach for evaluating risk of target violence. Behavioral Sciences and the Law. 323 – 337 Dietz, P. E., Martell, D. A. (1989), â€Å"Mentally Disordered Offenders in Pursuit of Celebrities and Politicians.† National Institute of Justice: Washington D.C. 125 – 150 Feher, B. A., et al.(2002). Studies of U.S./ Navy Air Defense Threat Assessment: Cue, Information Order, and Impact of Conflicting Data. San Diego, U.S. Navy Air Defense. 32 – 57

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.