Oscars Brought Heightened Security Like Never Before

Oscars Brought Heightened Security Like Never Before

Movies are a big player in the American culture as people swarm to movie theaters, purchase overpriced tubs of butter-drenched popcorn and sugary soft drinks before entering a twilight-lit room of fluffy chairs. Movie-goers quickly find their seats in great anticipation of seeing their favorite actors and actress on the big screen. The lights dim, sounds of popcorn crunching and slurps of soda can be heard as the flick begins.

Last night, the 2015 Oscar Awards was televised on most major, local television channels for all to see, and from the news this morning, it looks like it went off without any security issues. In most part, this is due to “Operation Oscar,” a state-of-the art, underground bunker with a makeshift command center at a Hollywood soundstage where the Los Angeles Police Department (LAPD) commander and a task force of approximately 1,000 officers from agencies like the FBI and Department of Homeland Security hang out. The area around Hollywood is divided into concentric rings that require progressively higher levels of protection, the closer you get to the inner circle.

Early morning on Sunday, February 22, 2015, the prep work began. LAPD officers performed a block-by-block sweep of the surrounding neighborhood and by 3pm, the streets surrounding Dolby Theater were locked down. Sharpshooters were positioned on top of buildings, and approximately 600 uniformed cops surrounded the perimeter of the facility.

Public modes of transportation were rerouted away from the target area and every vehicle entering the “red zone” were searched for possible bombs and/or guns. As guests arrived, they were ushered into a large tent that was located out of the sight of television cameras and there, celebrities and civilians passed through a metal detector. There were also undercover offices in formal wear mingling among the celebrities while other officers dressed in sneakers and L.A. Clippers hats patrolled the bleachers.

Here are some other tactics used to keep the Oscars ceremony safe and secure:

  • Spotters used power binoculars to scan for suspicious activities.
  • Hazmat unit patrols used sensors to check for radiation levels, and biological and chemical agents.
  • Vapor wake bomb detection dogs were used by LAPD.
  • Manholes were carefully inspected by police.
  • A hazardous materials robot was on standyby, ready to respond if necessary.
  • Concrete barriers were strategically placed across Hollywood Blvd. to slow down any kamikaze drivers.
  • The Bomb Assessment Tactical Counter Assault Tool, BatCat, was on the scene in event an explosive vehicle was near. This machine can pick up these vehicles and relocate them to be detonated.

Ultimately, no security plan is perfect; however, the hope is to have effective contingency plans in place in the event the unexpected occurs.

About the Author

Ginger Hill is Group Social Media Manager.

Featured

  • Evolving Cybersecurity Strategies: Uniting Human Risk Management and Security Awareness Training

    Organizations are increasingly turning their attention to human-focused security approaches, as two out of three (68%) cybersecurity incidents involve people. Threat actors are shifting from targeting networks and systems to hacking humans via social engineering methods, living off human errors as their most prevalent attack vector. Whether manipulated or not, human cyber behavior is leveraged to gain backdoor access into systems. This mainly results from a lack of employee training and awareness about evolving attack techniques employed by malign actors. Read Now

  • Report: 1 in 3 Easily Exploitable Vulnerabilities Found on Cloud Assets

    CyCognito recently released new research highlighting critical security vulnerabilities across cloud-hosted assets, revealing that one in three easily exploitable vulnerabilities or misconfigurations are found on cloud assets. As organizations increasingly shift to multi-cloud strategies, the findings underscore significant security gaps that could provide attackers with potential footholds into networks. Read Now

  • Built for Today, Ready for Tomorrow

    Selecting the right VMS is critical for any organization that depends on video surveillance to ensure safety, security and operational efficiency. While many organizations focus on immediate needs such as budget and deployment size, let us review some of the long-term considerations that can significantly impact a VMS's utility and flexibility. Read Now

  • Paving the Way to Smart Buildings

    In today's rapidly evolving security landscape, the convergence of on-prem, edge and cloud technologies are critical. The physical security landscape is undergoing a profound transformation, driven by the rapid digitalization of buildings and the evolving needs of modern organizations. As the buildings sector pivots towards smart, AI and data-driven operations, the integration of both edge and cloud technology has become crucial. Read Now

  • The Cybersecurity Time Bomb

    If you work in physical security, you have probably seen it: a camera, access control system, or intrusion detection device installed years ago, humming along without a single update. It is a common scenario that security professionals have come to accept as "normal." But here is the reality: this mindset is actively putting organizations at risk. Read Now

New Products

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.