Security Experts Weigh In on Las Vegas Shooting

Security Experts Weigh In on Las Vegas Shooting

America’s deadliest mass shooting will change security as we know it.

Security as we know it for hotels and concerts is over.

After Stephen Paddock broke two windows out of the 32nd floor of the Mandalay Bay Resort and Casino and fired down upon 22,000 Route 91 festival attendees killing 59 people and injuring 500 more, security staffs, federal agencies and industry experts are already trying to figure out how to evolve solutions so that something like this never happens again.

Security Today spoke with four industry experts, Patrick V. Fiel, President of PVF Security Consulting, Jerry Blanchard, CEO of Protus3 Security Consulting and Rick Amweg and Paul Denton, Consultants with Security Risk Management Consultants about the shooting and how this attack will impact the security industry.

SECURITY TODAY: The most recent reports state that 59 people were killed and over 500 more were injured in the shooting on October 1st. Why do you think the shooting was particularly deadly?

AMWEG: “Deadliness,” which is the “kill rate,” or the number of fatalities during the course of the event is dependent on a couple of factors. First, the amount of time the shooter has to commit the act; second, the efficiency of the shooter (how accurate he is, how efficient he is, etc.); and third, the shooting field, otherwise known as how target-rich the environment is. 

In this case, first and foremost, the shooter had the opportunity to plan his attack. He chose a strategically superior position by gaining high ground from the hotel overlooking the concert venue. His location away from the venue gave him more time to perpetrate his attack before being subdued. The types of weapons he chose provided maximum firepower; and the number of weapons he had gave him additional opportunity to sustain nearly continuous fire.

Overall he was able to achieve a tactical advantage and he had a very target-rich environment.  Additionally, the victims had essentially no place to seek cover from the shooter.

FIEL: Everything was in the shooters favor, location, large crowds, open view, and his type of weapons and ammunition.

STPolice have confirmed that Paddock checked into the Mandalay Bay Resort and Casino on September 28 and stayed at the establishment in the days leading up to the shooting. In your opinion, could the security staff at the hotel have done anything to prevent the attack?

FIEL: We can always Monday night quarterback and try to blame someone. There is no plan that is 100 percent foolproof and that every act of terrorism cannot be prevented; however, the damage inflicted by an attacker can at least be minimized if businesses have proper safeguards.

AMWEG: I think the main question that will evolve from the evaluation of the processes in place at the hotel is, “How could someone get that number of weapons past the desk and to a room within the hotel?” Factors that contribute to that process are that the shooter had been at the hotel for a few days before the shooting; and understanding that some weapons can easily be broken down and carried in in a luggage bag.

BLANCHARD: It would be interesting to know how many trips this person made into and out of the hotel to bring in his weapons and ammunition; if the video system had an analytics program at the edge to make the determination that it might have been an excessive amount of back and forth, he might have been approached before the shooting.

ST: Do you think there were any security measures that the hotel overlooked?

BLANCHARD: I certainly don’t have all the answers, but I don’t know that there is anything that could have been done about this short of the hotel checking all the bags of people who stay at the facility.

FIEL: I can’t speak on what security measures were in place at the hotel, however in my opinion all hotels need to work with security experts to enhance their security measures.

AMWEG: It’s much too early to tell, but likely the answer is “No.” Since we don’t know what security measures were in place, we don’t know if any were overlooked. 

ST: There is a lot of talk in the mainstream media that hotels should be considered soft targets and that they are not usually given proper security due to the hospitality industry’s wish to keep their establishments inviting. Do you believe hotels can be considered soft targets?

FIEL: Let’s discuss what a soft target is:  “A soft target is a relatively unguarded site where people congregate, normally in large numbers, thus offering the potential for mass casualties.” In this case it was an outdoor concert. The shooter utilized the hotel room for his deadly attack. Hotels, schools and hospitals are considered to be soft targets.

AMWEG: First, the hotel was not the target environment. That said, hotels generally have security measures in place that are conducive to a customer-friendly experience. Many security processes that are currently in place are “invisible” to customers, but effective none the less. Because of this incident I think that hotels will be under the microscope concerning how they screen customers, not only at initial check-in, but throughout their stay.     

ST: This isn’t the first time we have seen an attack like this in the U.S. and around the world. Just last year 49 people were killed in a nightclub in Orlando. Just a few months ago a bombing outside a concert in Manchester killed another 22 people. Are we making steps to protect these outdoor venues and hotel spaces or are we slow to adapt hardened procedures?

DENTON: Large event/venue security managers have been well ahead on the issue of protective measures and fan/patron safety. Assessments, operational plans and strategic planning generally occur at these types of events. I can’t comment specifically about this concert venue because I don’t know their processes. More specifically, music events may be a new target.  Outdoor festival areas are more difficult to protect. In some cases, the venue may be not be configured specifically for those types of events. Rather, the venue may be temporarily configured for a restricted access event.  That’s not to say this venue was temporarily configured for the concert. Typically, outside venues may have fewer access points, providing for fewer opportunities for egress. Things like temporary fencing may contribute to a lack of egress opportunities. In this case lack of cover may have also contributed to the number of fatalities. 

Conscientious planners are assessing their overall security operations plans. As the threat paradigm changes, those in charge of event security have to modify their approach to evolving threats. 

FIEL: In my opinion we are not doing enough to protect the visitors of these venues. Unfortunately in the United States we are always reactive, rather than being proactive.

BLANCHARD: There is just not an easy answer; that is the challenge.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Featured Cybersecurity

Webinars

New Products

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3