Criminal Justice - Security Plan Thesis

Total Length: 1270 words ( 4 double-spaced pages)

Total Sources: 2

Page 1 of 4

On the other hand, many sources of environmental threats are somewhat predictable, especially through modern meteorological techniques.

As demonstrated by the tremendous differences between specific localities similarly impacted by Hurricane Katrina in terms of their comparative responses, preparation and advanced planning for the dissemination of essential emergency resources is essential to minimize the effect of environmental disasters (Larson 2007).

Even in the most severe environmental disasters, the degree of impact is largely a function of logistical planning and the prearranged availability of resources whose need is capable of predicting. The extent of damage resulting from Katrina that was attributable specifically to logistical unpreparedness for distributing resources that were actually available illustrates the importance of preparation that far exceeds mere procurement (Larson 2007).

Civil Unrest:

Civil unrest can present direct security threats, (such as where the source of the unrest relates specifically to the protected entities), or indirect security threats, (such as where the source of the unrest is unrelated to protectees). In some respects, the former necessitates some of the same protection agent protocols as terrorist threats while the latter parallels similar considerations to environmental threats. Furthermore, just as meteorological observation provides advanced warning of weather-related environmental security threats, relative awareness of social issues and current events provides valuable information whose vigilant monitoring and analysis enables protection agents to avoid being caught unprepared.

Certainly, human behavior is less predictable than meteorological factors; on the other hand, instances of civil unrest rarely (if ever) occur completely spontaneously without specific triggers. In this regard, protection considerations relating to civil unrest also differ substantially from those arising in connection with terrorism in that the appropriate response to the former may be relative (such as the addition of resources or avoidance of specific areas or routes) rather than absolute, (such as the complete preclusion of normal functions or travel).


Political Threats to Security:

Much like civil unrest in general, political threats to security may or may not relate directly to protectees. Naturally, political unrest that arises in connection to protectees poses more of an imminent threat requiring a heightened proactive response on the part of protection agents than political unrest that is completely unrelated to protectees.

Perhaps the most unique and greatest risk associated with political threats to security is that depending on the circumstances and resources of the host nation, protection agents may not be able to rely on international treaties or the traditional rights and immunities granted to foreigners. Specifically, political threats of sufficient magnitude to compromise municipal functions (including the local police and military) may culminate in a martial law environment that necessitates immediate full-scale evacuation of all protected entities.

Evacuation and Movement Protocol for Protected Individuals: In many ways, evacuation and movement protocols require the coordination of all other facets of personal protection operations. Communications, surveillance, counterintelligence, and route recognizance are crucially important in virtually any conceivable circumstance requiring evacuation. Whether the specific source of the threat is a function of terrorism, environmental danger, civil unrest, or political upheaval, the objective of protection agents is the same: incorporate all available information required to implement pre-planned strategic responses designed to allocate resources optimally, identify the travel route (and mode) that represents the best available option for the expedited transport of protectees from relative danger to relative safety in the shortest time possible......

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Criminal Justice - Security Plan" (2008, August 10) Retrieved May 13, 2024, from
https://www.aceyourpaper.com/essays/criminal-justice-security-plan-28523

Latest MLA Format (8th edition)

Copy Reference
"Criminal Justice - Security Plan" 10 August 2008. Web.13 May. 2024. <
https://www.aceyourpaper.com/essays/criminal-justice-security-plan-28523>

Latest Chicago Format (16th edition)

Copy Reference
"Criminal Justice - Security Plan", 10 August 2008, Accessed.13 May. 2024,
https://www.aceyourpaper.com/essays/criminal-justice-security-plan-28523