Security at Tourist Icons

Tourists and security at one of the nation’s most visible icons seems to be pretty relaxed. The Golden Gate Bridge in San Francisco is one of the most famous landmarks in the country. And if terrorists were to pick a landmark, it could be the place.

Or, it could be the statue of Liberty. No matter, as vacationers travel the great expanse that is the United States, security is well established, -- though it may seem relaxed.

There have been a few credible threats over the years, but most of them have been pranks and isolated incidents. In 2008, a group of pro-Tibet protesters tried to climb up the Golden Gate, and in 2009, members of Greenpeace unfurled a banner atop Mount Rushmore.

At other icons in the United States, security is as serious as airport security. Among the most secure are the the White House, Washington Monument, Liberty Bell and Gateway Arch in St. Louis.

The Government Accounting Office hit the nail on the head when officials released a report in 2009, saying that security at the nation’s monuments needed improvement. The U.S. Park Police said something similar a year earlier.

It is tourism season nationwide. Don’t be surprised that security has stepped up a bit from a year ago, and there could be single access points at some monuments. Gone are the days when a tourist could walk up to the Washington Monument from any direction.

More could probably be done to make the American icons safer, but there is a delicate balance to protecting the sites and the public’s right to have them be free and open.

About the Author

Ralph C. Jensen is the Publisher of Security Today magazine.

Featured

  • Maximizing Your Security Budget This Year

    7 Ways You Can Secure a High-Traffic Commercial Security Gate  

    Your commercial security gate is one of your most powerful tools to keep thieves off your property. Without a security gate, your commercial perimeter security plan is all for nothing. Read Now

  • New Report Says Vulnerability Exploitation Boom Threatens Cybersecurity

    Verizon Business recently released the findings of its 17th-annual Data Breach Investigations Report (DBIR), which analyzed a record-high 30,458 security incidents and 10,626 confirmed breaches in 2023—a two-fold increase over 2022. Read Now

  • In The Clouds

    Video data storage in the cloud was a novel concept when Dean Drako founded Eagle Eye Networks back in 2012. While cloud was being used for almost all other business systems at that time, the physical security industry took a cautious and measured approach to cloud adoption. Read Now

  • Surveillance Cameras Provide Peace of Mind for New Florida Homeowners

    Managing a large estate is never easy. Tack on 2 acres of property and keeping track of the comings and goings of family and visitors becomes nearly impossible. Needless to say, the new owner of a $10 million spec home in Florida was eager for a simple way to monitor and manage his 15,000-square-foot residence, 2,800-square-foot clubhouse and expansive outdoor areas. Read Now

Featured Cybersecurity

Webinars

New Products

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction. 3

  • Hanwha QNO-7012R

    Hanwha QNO-7012R

    The Q Series cameras are equipped with an Open Platform chipset for easy and seamless integration with third-party systems and solutions, and analog video output (CVBS) support for easy camera positioning during installation. A suite of on-board intelligent video analytics covers tampering, directional/virtual line detection, defocus detection, enter/exit, and motion detection. 3