.

Monday, January 21, 2019

Planning And Threat Assesment Essay

Abstract             When one is determining the credibility and distressfulness of a panic, then he is engaged in the process know as Threat estimation. A brat whitenthorn be person security curse, a group security flagellum, a bombing threat or even a fire setting threat. Threat assess workforcet withal investigates the probability of the  peril creation carried forth. Once a latent threat has been assessed and is seen as serious, measure and mitigation steps be carried out. The scene of threat is rattling important when interpreting ventures (Feher, 45).            In order to adjudicate threat, some questions should be addressed. Some of the question is the character of the threat, what is the objective of the threatener, what does the threatener extremity to put across, the victims sensitivity to the threat, how credible is the threat, the threateners aim, is  at that place a secondary gain targeted by the threatener? When addressed the questions give champion in evaluating the threat the threats credibility and chances of its occurring (Dietz, 129).            In threat assessment, planning is imperative because it reduces the chances of the threat occurring. It alike rationalizes the effects of the threat, resolve their implications, and sequester the f every last(predicate)out and builds confidence of the p ruseies involved. Threat assessment is not solely some security bear upons although it is its primary concern (Borum, 335).            A usual framework of threat assessment should incorporate the identification of threat or emergency, estimate of probability, tuition of prevention and mitigation strategies and resource allocation of which should be based on evaluation of likelihood of period and impact.      & nbsp     formulation should be dynamic and contextual since one strategy get out not fit all the threats that may concern an individual feature, planning must reckon with the context. Planning also needs continued evaluation of likelihood of occurrence and effect of prevention and mitigation of the effects and of changing context. Planning is a fact (Boon, 77).Planning and threat assessment Case study of a white supremacist hotshot            When planning the peak of security for the lede, it is imperative to identify the threat at hand. My headland is a white supremacist and has compositiony enemies. He cannot defend himself when confronted with a threat since is confined to a wheelchair 24 hours a day. His security detail must also be inclusive of a nurse who may not know how to handle precarious situations and may be beneath threat herself. She must be protected from harm at all cost because the wind is depen dent on her.            Being a white supremacist, he is under threat of opposite races especially the blacks and Latinos. They both fall in a history of violence especially when racially discriminated against. The have accession to sophisticated weapons and they are capable of planning an ambush on the highways. there have been rumors circulating around Los Angeles that black supremacists have put a figure on the principals head. They are known to experience a lot of money and influence in the Los Angeles Ghettos.            Apart from the Blacks and Latinos, the principal has other enemies as salubrious. Apart from other races that would have all the need to eliminate him, he also has white enemies as well. Some of them are said to be connected to the mafia and so they could attack some(prenominal)where and anytime. They can also use the government officials to accomplish their desires .            One of the other threats is that a rival white supremacist group is suspected of being bed a series of murders and the recent brutal beating of the principals assistant chief. The media has already speculated that they are fighting for political power in the State of California among the white supremacists movement.            The main threat is international the butterflyhouse. He is to defendant to charges of murder and elegant rights violation, especially to the non-whites races. This is because the many of the rival groups and extremists pass on be attending the hearing. These include fundamentalists religious groups, civil rights activists, and other white supremacist groups among others. It is anticipated that the hearing will be very emotional and might spark off anger that could turn out to be violent.            One concern th at the security detail of the principal has is the breakup of police from his security detail. The chief of police has said that his men will not be prudent for the principals security. It is a concern because the principal want to make a grand entry to the tribunal and also want to talk to the press. This is a major threat because the principal might spark off anger before entering the court, confirming putting his numerous enemies on the picture, his life would be at a threat of gunning down by a sharp shooter determined anywhere in the surrounding court environment. It is particularly hazardous because the court is surrounded by skyscraper buildings.Mitigation of threat            In order to mitigate the chance of the threat that is currently facing the principal, it is important to notice what could be done to avoid the threat from occurring at all. It is also important to note that at our disposal we have only eight security me n covering the principal, and this against the very large force of enemies is a very unretentive number of security details.            First we have to avoid the highways whenever possible. This is because the Blacks and Latinos have the intention to lay an ambush on the highways and this may also be an inducing for other rivals toLay ambush on the principals motorcade. An utility(a) means of transportation is paramount to evade the risk of the highways. It would be wise to accept a helicopter for the principal, the nurse another security man and to oversee that the principal travel from home to the courthouse grounds without the necessity to go through the highways.            Since it is not practical for all the security detail to go with the helicopter, prior arrangement must be done so that the relaxation method of the security detail get to court on time. It must be before the princ ipals helicopter reaches court. They will be responsible for determining the threat that will be facing the principal and organizing for the general security of the principal when he arrives in court.            There will also be the need for acquiring vehicles for the rest of the security detail. There will need to be enough vehicles for the transport of the entire security detail so a minimum of three vehicles will be needed. The vehicles should be parked in strategic places for the immediate departure should a necessity occur after the hearing. The same should apply to the helicopter. These vehicles will need to be unmarked and cannot by any chance be link to the principal as this may compromise the security detail. If possible the vehicles should be new.            communication should be of high quality so that the security detail on the ground observe the situation should in amour with helicopter at all time. The communication gadgets should be free off interference from away parties and should be very alert of orthogonal parties listening in. State of the art communication systems will be employed when            In order to minify the occurrence of threat, the security detail should be very particular on timing. Regardless of the principal wanting to make a grand hoodwink to the court, little contact should be encourage between the principal and outside parties particularly the press. More time being afforded to the principal and the outside parties increases the occurrence of threat.The timing should be that the time of arrival of the principal will play down the time of contact with the outside parties. After hearing all the security detail should be on hand to ensure the minimal contact of the principal to the outside parties. I being the head of the security detail will explain the importance of this to the p rincipal should he need any explanations as to why he was not allowed maximum contact with the outside parties and press.            More security details need to be hired to aid the strained security details. There will be need to work out for capable men of handling this assignment and so as to set up the security of the principal. Resource Allocation            After threat assessment, it is necessary to divvy up some resources so that they can be used to avoid the threat from happening.            In our case of the principal, there will be need to hire a helicopter but it would be more economical to vitiate one because the principal will need to be traveling so more after the trip to the court. This will reduce the risk of being ambushed by the enemies on the highways.            There is also th e need to invest on new vehicles for the security detail. This is because the vehicles will need not to be linked to the principal as this could jeopardize the safety of the principal and the security detail as well.            There is also the need for the investment in stir of the art communication devices. This will enhance the effective security monitoring and the communication of possible threat from the ground to the helicopter. Conclusion            Considering all the threats that event individuals and given the concern for unexclusive safety, there is a public respect to establish a threat assessment program for the pubic as well as individuals. Most prone to these threats are public figures, celebrities, leading of all sorts including fundamentalists and supremacists and witnesses among many more members of the public (Baxter, 194).             Such programs require preparation, knowledge and deverness in order to be capable of identifying serious threats as well as intervening and addressing them in public. These should be done in much(prenominal) a manner as not to inappropriately heighten public fears and thus causing overreacting of the public.ReferencesBaxter, V. Margavio, A. (1996). Assaultive violence in the U.S. post office. pee-pee and Occupation, 177 196Boon, J.C.W. Sheridan, L (2001). Stalker typologies A law enforcement perspective. Journal of Threat Assessment. 75 79Borum, R, Fein R, Vossekuil, B Berglund, J. (1999). Threat Assessment Defining an approach for evaluating risk of target violence. Behavioral Sciences and the Law. 323 337Dietz, P. E., Martell, D. A. (1989), Mentally Disordered Offenders in Pursuit of Celebrities and Politicians. subject area Institute of Justice Washington D.C. 125 150Feher, B. A., et al.(2002). Studies of U.S./ navy crease Defense Threat Assessment Cue, Inform ation Order, and Impact of Conflicting Data. San Diego, U.S. Navy Air Defense. 32 57

No comments:

Post a Comment