Editor's Note

Olympic Lessons Learned in Munich

IT was a dark day in Munich when eight Palestinian terrorists took 11 Israeli hostages, marring the 1972 Olympics by bloodshed and terror. That year, the games returned to Germany for the first time since 1936 when Nazism was hitting its stride, the country was festooned with swastikas and Hitler hoped to showcase the "superiority" of his Aryan race.

Hilter's 1936 dream failed, and the last six days of the 1972 Olympics were a nightmare.

Security at a venue such as the Olympics isn't easy in the first place, and this is the worst recorded tragedy in Olympic history. The Arab terrorists stormed the Olympic village, raiding the apartment building that housed the Israeli contingent. Two Israeli athletes were killed in that building; nine more were seized as hostages.


It's all about security, and it has been since the 1972 Olympic Games. This year's Winter Olympics in Torino, Italy, is no exception.

After negotiations failed, the terrorists -- all members of Yassar Arafat's Fatah of the Palestine Liberation Organization -- herded the hostages to a military airport for a flight back to the Middle East. German sharpshooters made a mess of picking off the terrorists, and the terrorists made a mockery of the Olympic Games by killing their hostages.

Do you see a similarity between Hilter's failed dream and Arafat's murderous plot?

It's all about security, and it has been since the 1972 Olympic Games.

This year's Winter Olympics in Torino, Italy, is no exception. Providing security is paramount in a world rife with terrorism and terrorists, who will stop at nothing to upset the balance of peace and prosperity under the guise of jihad.

"The 2006 Olympic Winter Games present a unique set of risks and security challenges compared to previous games," said Robert Sikellis, managing director and associate general counsel of Vance International. "With Italy's upcoming national elections, coupled with its strong military alliance with the United States in the war on terror, the Olympic Games present a significant target for terrorist acts."

The Olympic Games have become a risky business, and it takes a security firm well acquainted with managing those risks to provide security consulting, crisis planning, physical protection and threat monitoring.

It would be no stretch of the imagination that the Winter Games are being used as a platform by social protest organizations hostile to American corporate sponsors and participants. Sikellis said that a few organizations have already boycotted some key products known to be sold or promoted during or around the games, putting attendees and employees in uncomfortable and potentially unsafe situations.

"Companies sponsoring or attending the Torino Games need to actively understand and plan for these kinds of security threats," Sikellis said.

Providing security at the Olympics is not new for Vance. The company began security services for the Olympics during the 1988 Games in Seoul, successfully protecting major corporate sponsors through seven Olympic Games. Corporations must be prepared for high-risk contingencies during the 17-day Winter Olympics.

The games host an estimated 5,000 athletes, thousands of guests and executives of official sponsor companies, and more than 1.5 million spectators. Even Sikellis said there is a degree of complacency about the games, but he also believes that it is unwarranted.

The Winter Games have fewer events and less participants overall. Activities are dispersed over a wider geographical area and in mountainous areas that demand greater security and logistical measures. Vance has forewarned clients to plan for serious contingencies, from natural disasters like avalanches and severe weather, to terrorists acts and violent protect demonstrations.

Part of good security is understanding local laws, government policies and social conventions, as well as realistically assessing specific risks that may vary from company to company. Hard to understand, but one sponsoring organization might spark anti-globalization protests, while another might attract animal rights activists.

"Security planning has to take these variables into account and respond accordingly," Sikellis said.

Vance officials said the way they plan security by working closely with companies' internal security departments, Olympic security personnel and law enforcement organizations to monitor and address specific threat concerns. Vance recommends actions like training attendees on cultural nuances and personal safety techniques, and monitoring threats using innovative online tools and local intelligence.

The Olympic Games should serve as the world's venue for diplomacy and peace. Security should be able to take a holiday, though it won't. There's nothing more predictable than the unpredictable, or in this case, preventing terror on the Olympic stage.

The 1972 games were meant as a sporting jubilee to repudiate the last Olympics on German soil. The Munich games were to be carefree. There would be no place for barbed wire, troops or police bristling with sidearms. Where Hitler's Olympics had opened and closed with cannon salutes and der Fuhrer presiding, the 1972 games would showcase a new forward-looking Germany. Security personnel, called Olys, were to be inconspicuous, prepared for little more than ticket fraud and drunkenness.

With security tossed aside, the Olympics became one big party. After late-night runs to the Hofbrauhaus, virile young athletes would detour the official entrance by scaling a chain-link fence. The Olys learned to look the other way. The Black September commandos did likewise. Munich organizers spent less than $2 million to make the games secure, and Munich has served as a model of what not to do in every conceivable way.

The lessons learned came in the form of the security at the 1980 Winter Games in Lake Placid, where the village was built so secure, it was eventually converted into a prison. Several years later, the International Olympic Committee began to collect and share information related to security -- everything from food tasters for athletes in Seoul to the palm-print recognition technology in Atlanta.

Proper planning and effective security measures will ensure the success of the Torino Games, though take nothing for granted. Vigilance remains the watch word of this month's sporting events.

This article originally appeared in the February 2006 issue of Security Products, pg. 6.

Featured

  • Security Industry Association Announces the 2026 Security Megatrends

    The Security Industry Association (SIA) has identified and forecasted the 2026 Security Megatrends, which form the basis of SIA’s signature annual Security Megatrends report defining the top 10 factors influencing both near- and long-term change in the global security industry. Read Now

  • The Future of Access Control: Cloud-Based Solutions for Safer Workplaces

    Access controls have revolutionized the way we protect our people, assets and operations. Gone are the days of cumbersome keychains and the security liabilities they introduced, but it’s a mistake to think that their evolution has reached its peak. Read Now

  • A Look at AI

    Large language models (LLMs) have taken the world by storm. Within months of OpenAI launching its AI chatbot, ChatGPT, it amassed more than 100 million users, making it the fastest-growing consumer application in history. Read Now

  • First, Do No Harm: Responsibly Applying Artificial Intelligence

    It was 2022 when early LLMs (Large Language Models) brought the term “AI” into mainstream public consciousness and since then, we’ve seen security corporations and integrators attempt to develop their solutions and sales pitches around the biggest tech boom of the 21st century. However, not all “artificial intelligence” is equally suitable for security applications, and it’s essential for end users to remain vigilant in understanding how their solutions are utilizing AI. Read Now

  • Improve Incident Response With Intelligent Cloud Video Surveillance

    Video surveillance is a vital part of business security, helping institutions protect against everyday threats for increased employee, customer, and student safety. However, many outdated surveillance solutions lack the ability to offer immediate insights into critical incidents. This slows down investigations and limits how effectively teams can respond to situations, creating greater risks for the organization. Read Now

New Products

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities