Skip to main content
Top

2018 | OriginalPaper | Chapter

2. Analysing Mega-Event Security: Looking Inside Operations

Authors : Chad Whelan, Adam Molnar

Published in: Securing Mega-Events

Publisher: Palgrave Macmillan UK

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

This chapter analyses some of the challenges associated with securing mega-events and important considerations shaping how police and security actors go about their task of understanding mega-event security. First, we address some of the similarities and differences between mega-events, ranging from sporting events to political summits, and how these differences are interpreted by security actors. Second, we examine questions concerning perceived threats to mega-events, focusing specifically on the potential for conflicting conceptions of ‘security’ to shape a range of outcomes. Third, we concentrate on the complexities underpinning the operational planning and project management of large-scale logistical operations. We conclude by reflecting on the tensions that emerge in pursuit of mega-event security which, we argue, only begin to become sufficiently visible when we cast our gaze inside security operations.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
1
See, for example, Fong (2010) on the Vancouver 2010 and Press Association (2011) on London 2012, for recent examples. At the time of writing, exact numbers of personnel involved in the Commonwealth Games are not available. However, according to media reports (e.g., Forbes 2018), police numbers extended to approximately 3700, defence 1900 and private security well over 5000 across four companies: MSS Security, Wilson, SecureCorp and SNP Security. Numerous concerns with private security have been reported in the media, including issues pertaining to logistics, standards and training (e.g., Wolfe 2018).
 
2
The ISU is a multi-agency services team formed to plan and coordinate the secure operation for major events in Canada. ISUs usually comprise federal and local police and security agencies and are led by the Royal Canadian Mounted Police (RCMP).
 
3
The main difference between the Australian and Canadian experience here is the emphasis placed on cyber-attacks by the RCMP. While cyber security is not explicitly stated here, interviewees did express concerns about the risk of information systems being penetrated by state and non-state actors. We reflect on this later in the book.
 
4
Australia now has five national terrorism threat levels: not expected, possible, probable, expected and certain (Australian and New Zealand Counter-Terrorism Committee 2017). The threat level has remained at ‘probable’ since the change to this system, which infers that individuals or groups possess the intent and capability to conduct a terrorist attack in Australia.
 
5
This figure did not include staffing costs, which were provided in-kind by state police. The majority of QPS funding that was invested in physical resources (rather than human capital) included investment in a new operations centre and intelligence facilities, examined in the following chapter.
 
6
This interviewee continued to give examples of equipment that was not purchased, particularly in relation to public order policing operations. For example, the interviewee described why they decided to borrow a water cannon from New South Wales Police instead of purchase their own: ‘We didn’t make a water cannon or buy a water cannon. I went to New South Wales and borrowed their water cannon so that is two, three million [AUD saved]. … Would I ever use a water cannon down the track? Never. I don’t think New South Wales have ever used it [after acquiring it for APEC 2007]. So it’s those decisions upfront that we made an extraordinary amount of saving and came in under budget’.
 
7
The interviewee used the term ‘culturally accepted’ to refer to circumstances where such lessons become embedded in the underlying beliefs, values and attitudes of organisation. It is, as such, similar to the properties of ‘organisational culture’, which one of us has written about elsewhere (Whelan 2016), and which is also a focus of Chapter 4.
 
Literature
go back to reference Amoore, L., & de Goede, M. (Eds.). (2008). Risk and the war on terror. London: Routledge. Amoore, L., & de Goede, M. (Eds.). (2008). Risk and the war on terror. London: Routledge.
go back to reference Armstrong, G., Giulianotti, R., & Hobbs, D. (2017). Policing the 2012 London Olympics: Legacy and social exclusion. London: Routledge. Armstrong, G., Giulianotti, R., & Hobbs, D. (2017). Policing the 2012 London Olympics: Legacy and social exclusion. London: Routledge.
go back to reference Australian and New Zealand Counter-Terrorism Committee. (2017). National counter-terrorism plan (4th ed.). Canberra: Commonwealth of Australia. Australian and New Zealand Counter-Terrorism Committee. (2017). National counter-terrorism plan (4th ed.). Canberra: Commonwealth of Australia.
go back to reference Bennett, C., & Haggerty, K. (2011). Introduction to security games: Surveillance and control at mega-events. In C. Bennett & K. Haggerty (Eds.), Security games: Surveillance and control at mega-events (pp. 1–19). Hoboken: Routledge. Bennett, C., & Haggerty, K. (2011). Introduction to security games: Surveillance and control at mega-events. In C. Bennett & K. Haggerty (Eds.), Security games: Surveillance and control at mega-events (pp. 1–19). Hoboken: Routledge.
go back to reference Bernhard, D., & Martin, A. K. (2011). Rethinking security at the Olympics. In C. Bennett & K. Haggerty (Eds.), Security games: Surveillance and control at mega-events (pp. 37–67). Hoboken: Routledge. Bernhard, D., & Martin, A. K. (2011). Rethinking security at the Olympics. In C. Bennett & K. Haggerty (Eds.), Security games: Surveillance and control at mega-events (pp. 37–67). Hoboken: Routledge.
go back to reference Best, J. (2008). Ambiguity, uncertainty, and risk: Rethinking indeterminacy. International Political Sociology, 2(4), 355–374.CrossRef Best, J. (2008). Ambiguity, uncertainty, and risk: Rethinking indeterminacy. International Political Sociology, 2(4), 355–374.CrossRef
go back to reference Bigo, D., Bonditti, P., & Olsson, C. (2010). Mapping the European Field of Security Professionals. In D. Bigo, S. Carrera, E. Guild, & R. B. J. Walker (Eds.), Europe’s 21st Century Challenge (pp. 49-64). New York: Routledge. Bigo, D., Bonditti, P., & Olsson, C. (2010). Mapping the European Field of Security Professionals. In D. Bigo, S. Carrera, E. Guild, & R. B. J. Walker (Eds.), Europe’s 21st Century Challenge (pp. 49-64). New York: Routledge.
go back to reference Boyle, P. (2011). Knowledge networks: Mega-events and security expertise. In C. Bennett & K. Haggerty (Eds.), Security games: Surveillance and control at mega-events (pp. 169–184). Hoboken: Routledge. Boyle, P. (2011). Knowledge networks: Mega-events and security expertise. In C. Bennett & K. Haggerty (Eds.), Security games: Surveillance and control at mega-events (pp. 169–184). Hoboken: Routledge.
go back to reference Boyle, P., & Haggerty, K. (2009). Spectacular security: Mega-events and the security complex. International Political Sociology, 3(3), 57–74.CrossRef Boyle, P., & Haggerty, K. (2009). Spectacular security: Mega-events and the security complex. International Political Sociology, 3(3), 57–74.CrossRef
go back to reference Boyle, P., & Haggerty, K. (2012). Planning for the worst: Risk, uncertainty and the Olympic Games. The British Journal of Sociology, 63(2), 241–259.CrossRef Boyle, P., & Haggerty, K. (2012). Planning for the worst: Risk, uncertainty and the Olympic Games. The British Journal of Sociology, 63(2), 241–259.CrossRef
go back to reference Boyle, P., Clément, D., & Haggerty, K. (2015). Iterations of Olympic security: Montreal and Vancouver. Security Dialogue, 46(2), 109–125.CrossRef Boyle, P., Clément, D., & Haggerty, K. (2015). Iterations of Olympic security: Montreal and Vancouver. Security Dialogue, 46(2), 109–125.CrossRef
go back to reference Commonwealth of Australia. (2015). Australia’s counter-terrorism strategy: Strengthening our resilience. Canberra: Council of Australian Governments. Commonwealth of Australia. (2015). Australia’s counter-terrorism strategy: Strengthening our resilience. Canberra: Council of Australian Governments.
go back to reference Côté-Boucher, K. (2018). Of ‘old’ and ‘new’ ways: Generations, border control and the temporality of security. Theoretical Criminology, 22(2), 149–168.CrossRef Côté-Boucher, K. (2018). Of ‘old’ and ‘new’ ways: Generations, border control and the temporality of security. Theoretical Criminology, 22(2), 149–168.CrossRef
go back to reference Courier Mail. (2014a, October 28). Anarchists’ G20 corporate chaos threat: Swarm and destroy. Courier Mail (cover). Courier Mail. (2014a, October 28). Anarchists’ G20 corporate chaos threat: Swarm and destroy. Courier Mail (cover).
go back to reference Courier Mail. (2014b, October 29). Welcome to Brisbane, ferals: Special forces troops’ show of muscle ahead of the G20 summit. Courier Mail, 4–5. Courier Mail. (2014b, October 29). Welcome to Brisbane, ferals: Special forces troops’ show of muscle ahead of the G20 summit. Courier Mail, 4–5.
go back to reference Decker, S., Greene, J., Webb, V., Rojek, J., McDevitt, J., Bynum, T., et al. (2005). Safety and security at special events: The case of the Salt Lake City Olympic Games. Security Journal, 18(4), 65–74.CrossRef Decker, S., Greene, J., Webb, V., Rojek, J., McDevitt, J., Bynum, T., et al. (2005). Safety and security at special events: The case of the Salt Lake City Olympic Games. Security Journal, 18(4), 65–74.CrossRef
go back to reference Fussey, P., & Coaffee, J. (2011). Olympic rings of steel: Constructing security for 2012 and beyond. In C. Bennett & K. Haggerty (Eds.), Security games: Surveillance and control at mega-events (pp. 36–54). Hoboken: Routledge. Fussey, P., & Coaffee, J. (2011). Olympic rings of steel: Constructing security for 2012 and beyond. In C. Bennett & K. Haggerty (Eds.), Security games: Surveillance and control at mega-events (pp. 36–54). Hoboken: Routledge.
go back to reference Fussey, P., Coaffee, J., Armstrong, G., & Hobbs, D. (2011). Securing and sustaining the Olympic city: Reconfiguring London for 2012 and beyond. Aldershot: Ashgate. Fussey, P., Coaffee, J., Armstrong, G., & Hobbs, D. (2011). Securing and sustaining the Olympic city: Reconfiguring London for 2012 and beyond. Aldershot: Ashgate.
go back to reference G20 Taskforce. (2015). Australia 2014 G20: G20 taskforce report. Canberra: Department of Prime Minister and Cabinet. G20 Taskforce. (2015). Australia 2014 G20: G20 taskforce report. Canberra: Department of Prime Minister and Cabinet.
go back to reference Giulianotti, R., & Klauser, F. (2012). Sport mega-events and ‘terrorism’: A critical analysis. International Review for the Sociology of Sport, 47(3), 307–323.CrossRef Giulianotti, R., & Klauser, F. (2012). Sport mega-events and ‘terrorism’: A critical analysis. International Review for the Sociology of Sport, 47(3), 307–323.CrossRef
go back to reference Gold, J. R., & Gold, M. M. (Eds.). (2016). Olympic cities: City agendas, planning, and the world’s games, 1896–2020. London: Routledge. Gold, J. R., & Gold, M. M. (Eds.). (2016). Olympic cities: City agendas, planning, and the world’s games, 1896–2020. London: Routledge.
go back to reference Jennings, W. (2012b). Why costs overrun: Risk, optimism and uncertainty in budgeting for the London 2012 Olympic Games. Construction Management and Economics, 30(6), 455–462.CrossRef Jennings, W. (2012b). Why costs overrun: Risk, optimism and uncertainty in budgeting for the London 2012 Olympic Games. Construction Management and Economics, 30(6), 455–462.CrossRef
go back to reference Jennings, W. (2017). Risk management for the Olympics and Football World Cup. In S. Frawley (Ed.), Managing sport mega-events (pp. 37–53). London: Routledge. Jennings, W. (2017). Risk management for the Olympics and Football World Cup. In S. Frawley (Ed.), Managing sport mega-events (pp. 37–53). London: Routledge.
go back to reference King, M. (2013). Disruption is not permitted: The policing and social control of occupy Oakland. Critical Criminology, 21(4), 463–475.CrossRef King, M. (2013). Disruption is not permitted: The policing and social control of occupy Oakland. Critical Criminology, 21(4), 463–475.CrossRef
go back to reference Kitchen, V., & Rygiel, K. (2014). Privatizing security, securitizing policing: The case of the G20 in Toronto, Canada. International Political Sociology, 8(2), 201–217.CrossRef Kitchen, V., & Rygiel, K. (2014). Privatizing security, securitizing policing: The case of the G20 in Toronto, Canada. International Political Sociology, 8(2), 201–217.CrossRef
go back to reference Klauser, F. (2013). Spatialities of security and surveillance: Managing spaces, separations and circulations at sport mega events. Geoforum, 49, 289–298.CrossRef Klauser, F. (2013). Spatialities of security and surveillance: Managing spaces, separations and circulations at sport mega events. Geoforum, 49, 289–298.CrossRef
go back to reference Manning, P. K. (2006). Two case studies of American anti-terrorism. In J. Wood & B. Dupont (Eds.), Democracy, society and the governance of security (pp. 52–85). Cambridge: Cambridge University Press.CrossRef Manning, P. K. (2006). Two case studies of American anti-terrorism. In J. Wood & B. Dupont (Eds.), Democracy, society and the governance of security (pp. 52–85). Cambridge: Cambridge University Press.CrossRef
go back to reference Mercer, B. (2009, November 30). Presentation delivered at Rebook Vancouver International Security Conference. Mercer, B. (2009, November 30). Presentation delivered at Rebook Vancouver International Security Conference.
go back to reference Molnar, A., Whelan, C., & Boyle, P. J. (2018). Securing the Brisbane 2014 G20 in the wake of the Toronto 2010 G20: ‘Failure-inspired’ learning in public order policing. The British Journal of Criminology (online first 12 June 2018). Molnar, A., Whelan, C., & Boyle, P. J. (2018). Securing the Brisbane 2014 G20 in the wake of the Toronto 2010 G20: ‘Failure-inspired’ learning in public order policing. The British Journal of Criminology (online first 12 June 2018).
go back to reference Monaghan, J., & Walby, K. (2012a). Making up ‘terror identities’: Security intelligence, Canada’s Integrated Threat Assessment Centre and social movement suppression. Policing and Society, 22(2), 133–151.CrossRef Monaghan, J., & Walby, K. (2012a). Making up ‘terror identities’: Security intelligence, Canada’s Integrated Threat Assessment Centre and social movement suppression. Policing and Society, 22(2), 133–151.CrossRef
go back to reference Monaghan, J., & Walby, K. (2012b). ‘They attacked the city’: Security intelligence, the sociology of protest policing and the anarchist threat at the 2010 Toronto G20 summit. Current Sociology, 60(5), 653–671.CrossRef Monaghan, J., & Walby, K. (2012b). ‘They attacked the city’: Security intelligence, the sociology of protest policing and the anarchist threat at the 2010 Toronto G20 summit. Current Sociology, 60(5), 653–671.CrossRef
go back to reference Mythen, G., & Walklate, S. (2008). Terrorism, risk and international security: The perils of asking ‘what if’? Security Dialogue, 39(2), 221–242.CrossRef Mythen, G., & Walklate, S. (2008). Terrorism, risk and international security: The perils of asking ‘what if’? Security Dialogue, 39(2), 221–242.CrossRef
go back to reference Noakes, J., & Gillham, P. (2007). Police and protester innovation since Seattle. Mobilization: An International Quarterly, 12(4), 335–340. Noakes, J., & Gillham, P. (2007). Police and protester innovation since Seattle. Mobilization: An International Quarterly, 12(4), 335–340.
go back to reference Police Executive Research Forum. (2011). Managing major events: Best practices from the field. Washington, DC: Police Executive Research Forum. Police Executive Research Forum. (2011). Managing major events: Best practices from the field. Washington, DC: Police Executive Research Forum.
go back to reference Queensland Police Service. (2016). G20–2014 Operation southern cross: Post operation report. Brisbane: Queensland Police Service. Queensland Police Service. (2016). G20–2014 Operation southern cross: Post operation report. Brisbane: Queensland Police Service.
go back to reference Richards, A., Fussey, P., & Silke, A. (Eds.). (2011). Terrorism and the Olympics: Major event security and lessons for the future. London: Routledge. Richards, A., Fussey, P., & Silke, A. (Eds.). (2011). Terrorism and the Olympics: Major event security and lessons for the future. London: Routledge.
go back to reference Royal Canadian Mounted Police. (2011). G8 and G20 summits Integrated Security Unit: After action report. Royal Canadian Mounted Police. Royal Canadian Mounted Police. (2011). G8 and G20 summits Integrated Security Unit: After action report. Royal Canadian Mounted Police.
go back to reference Ryan, P. (2003). Olympic security: The relevance to homeland security. In Oquirrh Institute (Ed.), The 2002 Olympic Winter Games: Security lessons applied to homeland security (pp. 7–23). Salt Lake City: Oquirrh Institute. Ryan, P. (2003). Olympic security: The relevance to homeland security. In Oquirrh Institute (Ed.), The 2002 Olympic Winter Games: Security lessons applied to homeland security (pp. 7–23). Salt Lake City: Oquirrh Institute.
go back to reference Surborg, B., VanWynsberghe, R., & Wyly, E. (2008). Mapping the Olympic growth machine: Transnational urbanism and the growth machine diaspora. City, 12(3), 341–355.CrossRef Surborg, B., VanWynsberghe, R., & Wyly, E. (2008). Mapping the Olympic growth machine: Transnational urbanism and the growth machine diaspora. City, 12(3), 341–355.CrossRef
go back to reference Walklate, S., & Mythen, G. (2015). Contradictions of terrorism: Security, risk and resilience. London: Routledge. Walklate, S., & Mythen, G. (2015). Contradictions of terrorism: Security, risk and resilience. London: Routledge.
go back to reference Whelan, C. (2016). Organisational culture and cultural change: A network perspective. Australian and New Zealand Journal of Criminology, 49(4), 583–599.CrossRef Whelan, C. (2016). Organisational culture and cultural change: A network perspective. Australian and New Zealand Journal of Criminology, 49(4), 583–599.CrossRef
Metadata
Title
Analysing Mega-Event Security: Looking Inside Operations
Authors
Chad Whelan
Adam Molnar
Copyright Year
2018
DOI
https://doi.org/10.1057/978-1-137-59668-0_2

Premium Partner