Protecting the Winter Olympics in Sochi

Protecting the Winter Olympics in Sochi

On Friday night from the comfort and safety of Pluckers in Fairview, Texas, with my boneless, parmesan chicken wing in hand, I watched the opening ceremony of the 2014 Winter Olympics in Sochi. It was filled with music, dancing, colorful theatricals, lots of moving parts and yes, of course, as we all know, the snowflake that didn’t open. But hey, if that’s all that goes wrong, who are we to complain?

Protecting the Winter Olympics in SochiLeading up to the Winter Olympics, media was focused on security, and this trend has continued on into the present, up-to-the-minute coverage of the games. From all accounts, security in Sochi seems to be tight and being taken very seriously, just not an “in-your-face” experience as Russian President Vladimir Putin wanted.

The “ring of steel.” The visibility of guns is lacking, with the most-visible guns being those carried on the backs of biathlon racers while mounds of sticks and leaves on a hillside move, indicating a camouflaged army tent guarding the highway from Sochi to the mountains of man-made ski hills and sledding venues. Roads, railways and airport runways around Sochi are laced with police sentries, some of them standing just 100 feet apart as surveillance cameras record movements along these pathways. Military boats are visible off the coast.

Perhaps most peculiar is the fenced-in building that appears to be a part Olympic security, complete with an unmarked surveillance blimp decorated with a colorful mural of a giant green tree and a purple eggplant that lowers into this building’s parking lot at night. (One can only imagine the symbolism of the mural and what the blimp is being used for.)

Within the Olympic venue. Approximately 40,000 Russian security officials are present, checking bags, scanning water bottles and patrolling the area wearing purple pants and athletic jackets adorned with the Sochi 2014 logo and colorful, traditional Russian patterns. During the opening ceremony, fans had to submit to searches and metal detectors, a seemingly normal part of security in this day in age.

People with tickets to the games are required to submit their passport details along with a photo, and at security checkpoints within venues and Olympic Park, all photo badges must be scanned. Journalists entering Olympic Park must partake in an airport-like security check and encounter a device to test if the contents in their water bottles are harmless. “Clear zones” connect venues, allowing people who have already gone through security checks to easily move about.

Overall, Russian security officials are so sure of their security measures that prominent leaders are allowed to mingle close to fans probably also due, at least in part, to using communications interception tools, drones, sonars that identify hostile submarines and CCTV cameras.

Whatever it takes. The 2014 Winter Olympics must go on.

Alexander Mak / Shutterstock.com

About the Author

Ginger Hill is Group Social Media Manager.

Featured

  • Choosing the Right Solution

    Today, there is a strong shift from on-prem installations to cloud or hybrid-cloud deployments. As reported in the 2024 Genetec State of Physical Security report, 66% of end users said they will move to managing or storing more physical security in the cloud over the next two years. Read Now

  • New Report Reveals Top Security Risks for U.S. Retail Chains

    Interface Systems, a provider of security, actionable insights, and purpose-built networks for multi-location businesses, has released its 2024 State of Remote Video Monitoring in Retail Chains report. The detailed study analyzed over 2 million monitoring requests across 4,156 retail locations in the United States from September 2023 to August 2024. Read Now

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

Featured Cybersecurity

Webinars

New Products

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3