Security Planning Threat Assessment Controversy Essay

Pages: 2 (945 words)  ·  Bibliography Sources: 2  ·  File: .docx  ·  Level: College Senior  ·  Topic: Transportation

It is important to have all security members able to carry arms because of the incredibly violent threat they potentially face (Vellani, 2010). It will also be crucial to provide the security team with reports of potentially dangerous individuals who pose the biggest threat to the client and his estate. This will be the rival white supremacist gang members. Reports should be made of all rival gang members, including their whereabouts, acquaintances, and physical characteristics (Vellani, 2010). This will empower the security team to catch a threat before it becomes too serious because they will be well aware of the usual suspects.

Eight is enough to split the team into two teams of four men each, one which will follow the client to the courthouse, and the other which will stay behind and ensure that the estate is not breached by intruders. For transportation of the client, it is crucial to ensure a security clearance of all drivers and medical staff involved in transporting him from his home to the courthouse. This adds an additional parameter of security needed, since driving is one of the most vulnerable times for security strategies (Fennelly, 2004).

Buy full Download Microsoft Word File paper
for $19.77
The medical transportation service will need to be cleared, with all drivers and vehicles thoroughly checked before the day of the trip. One of the security team that will go with the client to the courthouse will stay with the driver in the medical transport vehicle to ensure that it is not tampered with during the client's time in court. Meanwhile, another security team will remain at the client's home and walk the grounds.

Resources and Strengths

Essay on Security Planning Threat Assessment Controversy Assignment

The client has long been part of the white supremacist movement, and as such has experience with controversy and danger. The security plan would not need to spend time and effort explaining the dire nature of the situation and how inconvenient increased security will be, because the client and his family are most likely already familiar with the need for high security and all the things, both positive and negative, that come with it (Fennelly, 2004). He will also likely want to be highly involved in the planning and exaction of any security procedures increases the level of compliance and ease of implanting such procedures. Moreover, the client will be already aware of the nature of increased security, and has probably already invested in security systems and strategies that the team can work to their benefit. Thus, the budget will not be the larger concern, but rather the success of security strategies. All these resources will help strengthen the security team's efforts.


Fennelly L.J., (2004). Handbook of Loss Prevention and Crime Prevention. Elsevier Butterworth. Oxford:UK.

Vellani, Karim H. (2010). Crime Analysis for Problem Solving Security Professionals in 25 Small Steps. Center for Problem-Oriented Policing. Web. [END OF PREVIEW] . . . READ MORE

Two Ordering Options:

Which Option Should I Choose?
1.  Buy full paper (2 pages)Download Microsoft Word File

Download the perfectly formatted MS Word file!

- or -

2.  Write a NEW paper for me!✍🏻

We'll follow your exact instructions!
Chat with the writer 24/7.

Security Planning and Assessment Thesis

Threat Assessment Essay

Security Risk Management Process Microsoft Company Term Paper

Security Policy Dr. Fossett's Dental Office Term Paper

Security Roles Research Paper

View 200+ other related papers  >>

How to Cite "Security Planning Threat Assessment Controversy" Essay in a Bibliography:

APA Style

Security Planning Threat Assessment Controversy.  (2013, November 6).  Retrieved March 30, 2020, from

MLA Format

"Security Planning Threat Assessment Controversy."  6 November 2013.  Web.  30 March 2020. <>.

Chicago Style

"Security Planning Threat Assessment Controversy."  November 6, 2013.  Accessed March 30, 2020.