Security Experts Weigh In on Las Vegas Shooting

Security Experts Weigh In on Las Vegas Shooting

America’s deadliest mass shooting will change security as we know it.

Security as we know it for hotels and concerts is over.

After Stephen Paddock broke two windows out of the 32nd floor of the Mandalay Bay Resort and Casino and fired down upon 22,000 Route 91 festival attendees killing 59 people and injuring 500 more, security staffs, federal agencies and industry experts are already trying to figure out how to evolve solutions so that something like this never happens again.

Security Today spoke with four industry experts, Patrick V. Fiel, President of PVF Security Consulting, Jerry Blanchard, CEO of Protus3 Security Consulting and Rick Amweg and Paul Denton, Consultants with Security Risk Management Consultants about the shooting and how this attack will impact the security industry.

SECURITY TODAY: The most recent reports state that 59 people were killed and over 500 more were injured in the shooting on October 1st. Why do you think the shooting was particularly deadly?

AMWEG: “Deadliness,” which is the “kill rate,” or the number of fatalities during the course of the event is dependent on a couple of factors. First, the amount of time the shooter has to commit the act; second, the efficiency of the shooter (how accurate he is, how efficient he is, etc.); and third, the shooting field, otherwise known as how target-rich the environment is. 

In this case, first and foremost, the shooter had the opportunity to plan his attack. He chose a strategically superior position by gaining high ground from the hotel overlooking the concert venue. His location away from the venue gave him more time to perpetrate his attack before being subdued. The types of weapons he chose provided maximum firepower; and the number of weapons he had gave him additional opportunity to sustain nearly continuous fire.

Overall he was able to achieve a tactical advantage and he had a very target-rich environment.  Additionally, the victims had essentially no place to seek cover from the shooter.

FIEL: Everything was in the shooters favor, location, large crowds, open view, and his type of weapons and ammunition.

STPolice have confirmed that Paddock checked into the Mandalay Bay Resort and Casino on September 28 and stayed at the establishment in the days leading up to the shooting. In your opinion, could the security staff at the hotel have done anything to prevent the attack?

FIEL: We can always Monday night quarterback and try to blame someone. There is no plan that is 100 percent foolproof and that every act of terrorism cannot be prevented; however, the damage inflicted by an attacker can at least be minimized if businesses have proper safeguards.

AMWEG: I think the main question that will evolve from the evaluation of the processes in place at the hotel is, “How could someone get that number of weapons past the desk and to a room within the hotel?” Factors that contribute to that process are that the shooter had been at the hotel for a few days before the shooting; and understanding that some weapons can easily be broken down and carried in in a luggage bag.

BLANCHARD: It would be interesting to know how many trips this person made into and out of the hotel to bring in his weapons and ammunition; if the video system had an analytics program at the edge to make the determination that it might have been an excessive amount of back and forth, he might have been approached before the shooting.

ST: Do you think there were any security measures that the hotel overlooked?

BLANCHARD: I certainly don’t have all the answers, but I don’t know that there is anything that could have been done about this short of the hotel checking all the bags of people who stay at the facility.

FIEL: I can’t speak on what security measures were in place at the hotel, however in my opinion all hotels need to work with security experts to enhance their security measures.

AMWEG: It’s much too early to tell, but likely the answer is “No.” Since we don’t know what security measures were in place, we don’t know if any were overlooked. 

ST: There is a lot of talk in the mainstream media that hotels should be considered soft targets and that they are not usually given proper security due to the hospitality industry’s wish to keep their establishments inviting. Do you believe hotels can be considered soft targets?

FIEL: Let’s discuss what a soft target is:  “A soft target is a relatively unguarded site where people congregate, normally in large numbers, thus offering the potential for mass casualties.” In this case it was an outdoor concert. The shooter utilized the hotel room for his deadly attack. Hotels, schools and hospitals are considered to be soft targets.

AMWEG: First, the hotel was not the target environment. That said, hotels generally have security measures in place that are conducive to a customer-friendly experience. Many security processes that are currently in place are “invisible” to customers, but effective none the less. Because of this incident I think that hotels will be under the microscope concerning how they screen customers, not only at initial check-in, but throughout their stay.     

ST: This isn’t the first time we have seen an attack like this in the U.S. and around the world. Just last year 49 people were killed in a nightclub in Orlando. Just a few months ago a bombing outside a concert in Manchester killed another 22 people. Are we making steps to protect these outdoor venues and hotel spaces or are we slow to adapt hardened procedures?

DENTON: Large event/venue security managers have been well ahead on the issue of protective measures and fan/patron safety. Assessments, operational plans and strategic planning generally occur at these types of events. I can’t comment specifically about this concert venue because I don’t know their processes. More specifically, music events may be a new target.  Outdoor festival areas are more difficult to protect. In some cases, the venue may be not be configured specifically for those types of events. Rather, the venue may be temporarily configured for a restricted access event.  That’s not to say this venue was temporarily configured for the concert. Typically, outside venues may have fewer access points, providing for fewer opportunities for egress. Things like temporary fencing may contribute to a lack of egress opportunities. In this case lack of cover may have also contributed to the number of fatalities. 

Conscientious planners are assessing their overall security operations plans. As the threat paradigm changes, those in charge of event security have to modify their approach to evolving threats. 

FIEL: In my opinion we are not doing enough to protect the visitors of these venues. Unfortunately in the United States we are always reactive, rather than being proactive.

BLANCHARD: There is just not an easy answer; that is the challenge.

Featured

  • The Evolution of IP Camera Intelligence

    As the 30th anniversary of the IP camera approaches in 2026, it is worth reflecting on how far we have come. The first network camera, launched in 1996, delivered one frame every 17 seconds—not impressive by today’s standards, but groundbreaking at the time. It did something that no analog system could: transmit video over a standard IP network. Read Now

  • From Surveillance to Intelligence

    Years ago, it would have been significantly more expensive to run an analytic like that — requiring a custom-built solution with burdensome infrastructure demands — but modern edge devices have made it accessible to everyone. It also saves time, which is a critical factor if a missing child is involved. Video compression technology has played a critical role as well. Over the years, significant advancements have been made in video coding standards — including H.263, MPEG formats, and H.264—alongside compression optimization technologies developed by IP video manufacturers to improve efficiency without sacrificing quality. The open-source AV1 codec developed by the Alliance for Open Media—a consortium including Google, Netflix, Microsoft, Amazon and others — is already the preferred decoder for cloud-based applications, and is quickly becoming the standard for video compression of all types. Read Now

  • Cost: Reactive vs. Proactive Security

    Security breaches often happen despite the availability of tools to prevent them. To combat this problem, the industry is shifting from reactive correction to proactive protection. This article will examine why so many security leaders have realized they must “lead before the breach” – not after. Read Now

  • Achieving Clear Audio

    In today’s ever-changing world of security and risk management, effective communication via an intercom and door entry communication system is a critical communication tool to keep a facility’s staff, visitors and vendors safe. Read Now

  • Beyond Apps: Access Control for Today’s Residents

    The modern resident lives in an app-saturated world. From banking to grocery delivery, fitness tracking to ridesharing, nearly every service demands another download. But when it comes to accessing the place you live, most people do not want to clutter their phone with yet another app, especially if its only purpose is to open a door. Read Now

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation.

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings.