Skip to main content

Analysing Mega-Event Security: Looking Inside Operations

  • Chapter
  • First Online:
Securing Mega-Events

Part of the book series: Crime Prevention and Security Management ((CPSM))

  • 302 Accesses

Abstract

This chapter analyses some of the challenges associated with securing mega-events and important considerations shaping how police and security actors go about their task of understanding mega-event security. First, we address some of the similarities and differences between mega-events, ranging from sporting events to political summits, and how these differences are interpreted by security actors. Second, we examine questions concerning perceived threats to mega-events, focusing specifically on the potential for conflicting conceptions of ‘security’ to shape a range of outcomes. Third, we concentrate on the complexities underpinning the operational planning and project management of large-scale logistical operations. We conclude by reflecting on the tensions that emerge in pursuit of mega-event security which, we argue, only begin to become sufficiently visible when we cast our gaze inside security operations.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 109.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 139.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    See, for example, Fong (2010) on the Vancouver 2010 and Press Association (2011) on London 2012, for recent examples. At the time of writing, exact numbers of personnel involved in the Commonwealth Games are not available. However, according to media reports (e.g., Forbes 2018), police numbers extended to approximately 3700, defence 1900 and private security well over 5000 across four companies: MSS Security, Wilson, SecureCorp and SNP Security. Numerous concerns with private security have been reported in the media, including issues pertaining to logistics, standards and training (e.g., Wolfe 2018).

  2. 2.

    The ISU is a multi-agency services team formed to plan and coordinate the secure operation for major events in Canada. ISUs usually comprise federal and local police and security agencies and are led by the Royal Canadian Mounted Police (RCMP).

  3. 3.

    The main difference between the Australian and Canadian experience here is the emphasis placed on cyber-attacks by the RCMP . While cyber security is not explicitly stated here, interviewees did express concerns about the risk of information systems being penetrated by state and non-state actors. We reflect on this later in the book.

  4. 4.

    Australia now has five national terrorism threat levels: not expected, possible, probable, expected and certain (Australian and New Zealand Counter-Terrorism Committee 2017). The threat level has remained at ‘probable’ since the change to this system, which infers that individuals or groups possess the intent and capability to conduct a terrorist attack in Australia.

  5. 5.

    This figure did not include staffing costs, which were provided in-kind by state police. The majority of QPS funding that was invested in physical resources (rather than human capital) included investment in a new operations centre and intelligence facilities, examined in the following chapter.

  6. 6.

    This interviewee continued to give examples of equipment that was not purchased, particularly in relation to public order policing operations. For example, the interviewee described why they decided to borrow a water cannon from New South Wales Police instead of purchase their own: ‘We didn’t make a water cannon or buy a water cannon. I went to New South Wales and borrowed their water cannon so that is two, three million [AUD saved]. … Would I ever use a water cannon down the track? Never. I don’t think New South Wales have ever used it [after acquiring it for APEC 2007]. So it’s those decisions upfront that we made an extraordinary amount of saving and came in under budget’.

  7. 7.

    The interviewee used the term ‘culturally accepted’ to refer to circumstances where such lessons become embedded in the underlying beliefs, values and attitudes of organisation. It is, as such, similar to the properties of ‘organisational culture ’, which one of us has written about elsewhere (Whelan 2016), and which is also a focus of Chapter 4.

References

  • Amoore, L., & de Goede, M. (Eds.). (2008). Risk and the war on terror. London: Routledge.

    Google Scholar 

  • Armstrong, G., Giulianotti, R., & Hobbs, D. (2017). Policing the 2012 London Olympics: Legacy and social exclusion. London: Routledge.

    Google Scholar 

  • Australian and New Zealand Counter-Terrorism Committee. (2017). National counter-terrorism plan (4th ed.). Canberra: Commonwealth of Australia.

    Google Scholar 

  • Bennett, C., & Haggerty, K. (2011). Introduction to security games: Surveillance and control at mega-events. In C. Bennett & K. Haggerty (Eds.), Security games: Surveillance and control at mega-events (pp. 1–19). Hoboken: Routledge.

    Google Scholar 

  • Bernhard, D., & Martin, A. K. (2011). Rethinking security at the Olympics. In C. Bennett & K. Haggerty (Eds.), Security games: Surveillance and control at mega-events (pp. 37–67). Hoboken: Routledge.

    Google Scholar 

  • Best, J. (2008). Ambiguity, uncertainty, and risk: Rethinking indeterminacy. International Political Sociology, 2(4), 355–374.

    Article  Google Scholar 

  • Bigo, D., Bonditti, P., & Olsson, C. (2010). Mapping the European Field of Security Professionals. In D. Bigo, S. Carrera, E. Guild, & R. B. J. Walker (Eds.), Europe’s 21st Century Challenge (pp. 49-64). New York: Routledge.

    Google Scholar 

  • Boyle, P. (2011). Knowledge networks: Mega-events and security expertise. In C. Bennett & K. Haggerty (Eds.), Security games: Surveillance and control at mega-events (pp. 169–184). Hoboken: Routledge.

    Google Scholar 

  • Boyle, P., & Haggerty, K. (2009). Spectacular security: Mega-events and the security complex. International Political Sociology, 3(3), 57–74.

    Article  Google Scholar 

  • Boyle, P., & Haggerty, K. (2012). Planning for the worst: Risk, uncertainty and the Olympic Games. The British Journal of Sociology, 63(2), 241–259.

    Article  Google Scholar 

  • Boyle, P., Clément, D., & Haggerty, K. (2015). Iterations of Olympic security: Montreal and Vancouver. Security Dialogue, 46(2), 109–125.

    Article  Google Scholar 

  • Commonwealth of Australia. (2015). Australia’s counter-terrorism strategy: Strengthening our resilience. Canberra: Council of Australian Governments.

    Google Scholar 

  • Côté-Boucher, K. (2018). Of ‘old’ and ‘new’ ways: Generations, border control and the temporality of security. Theoretical Criminology, 22(2), 149–168.

    Article  Google Scholar 

  • Courier Mail. (2014a, October 28). Anarchists’ G20 corporate chaos threat: Swarm and destroy. Courier Mail (cover).

    Google Scholar 

  • Courier Mail. (2014b, October 29). Welcome to Brisbane, ferals: Special forces troops’ show of muscle ahead of the G20 summit. Courier Mail, 4–5.

    Google Scholar 

  • Decker, S., Greene, J., Webb, V., Rojek, J., McDevitt, J., Bynum, T., et al. (2005). Safety and security at special events: The case of the Salt Lake City Olympic Games. Security Journal, 18(4), 65–74.

    Article  Google Scholar 

  • Douglas, M. (2013). Risk and blame. London: Routledge.

    Book  Google Scholar 

  • Fong, P. (2010). B.C. taxpayers’ Olympic cost: $925 million. The Toronto Star [online]. Retrieved January 10, 2018, from https://www.thestar.com/sports/olympics/2010/07/09/bc_taxpayers_olympic_cost_925_million.html.

  • Forbes, T. (2018). Commonwealth Games: Thousands of cops and soldiers deployed in Qld’s biggest security event. ABC News [online]. Retrieved May 30, 2018, from http://www.abc.net.au/news/2018-04-03/police-soldiers-ready-for-any-commonwealth-games-threat-qld/9597822.

  • Fussey, P., & Coaffee, J. (2011). Olympic rings of steel: Constructing security for 2012 and beyond. In C. Bennett & K. Haggerty (Eds.), Security games: Surveillance and control at mega-events (pp. 36–54). Hoboken: Routledge.

    Google Scholar 

  • Fussey, P., Coaffee, J., Armstrong, G., & Hobbs, D. (2011). Securing and sustaining the Olympic city: Reconfiguring London for 2012 and beyond. Aldershot: Ashgate.

    Google Scholar 

  • G20 Taskforce. (2015). Australia 2014 G20: G20 taskforce report. Canberra: Department of Prime Minister and Cabinet.

    Google Scholar 

  • Giulianotti, R., & Klauser, F. (2012). Sport mega-events and ‘terrorism’: A critical analysis. International Review for the Sociology of Sport, 47(3), 307–323.

    Article  Google Scholar 

  • Gold, J. R., & Gold, M. M. (Eds.). (2016). Olympic cities: City agendas, planning, and the world’s games, 1896–2020. London: Routledge.

    Google Scholar 

  • Goldsworthy, T. (2014). State of anarchy: Policing Queensland for the G20. Brisbane Times [online]. Retrieved October 2, 2016, from http://www.brisbanetimes.com.au/queensland/brisbane-g20/state-of-anarchy-policing-queensland-for-the-g20-20140813-103un4.html.

  • Ironside, R., & Chamberlin, T. (2013). G20 anarchists vow chaos and mayhem for Brisbane’s streets. Courier Mail [online]. Retrieved October 2, 2016, from http://www.couriermail.com.au/news/queensland/g20-anarchists-vow-chaos-and-mayhem-for-brisbanes-streets/story-fnihsrf2-1226778265923.

  • Jennings, W. (2012a). Olympic risks. London: Palgrave.

    Book  Google Scholar 

  • Jennings, W. (2012b). Why costs overrun: Risk, optimism and uncertainty in budgeting for the London 2012 Olympic Games. Construction Management and Economics, 30(6), 455–462.

    Article  Google Scholar 

  • Jennings, W. (2017). Risk management for the Olympics and Football World Cup. In S. Frawley (Ed.), Managing sport mega-events (pp. 37–53). London: Routledge.

    Google Scholar 

  • King, M. (2013). Disruption is not permitted: The policing and social control of occupy Oakland. Critical Criminology, 21(4), 463–475.

    Article  Google Scholar 

  • Kitchen, V., & Rygiel, K. (2014). Privatizing security, securitizing policing: The case of the G20 in Toronto, Canada. International Political Sociology, 8(2), 201–217.

    Article  Google Scholar 

  • Klauser, F. (2013). Spatialities of security and surveillance: Managing spaces, separations and circulations at sport mega events. Geoforum, 49, 289–298.

    Article  Google Scholar 

  • Manning, P. K. (2006). Two case studies of American anti-terrorism. In J. Wood & B. Dupont (Eds.), Democracy, society and the governance of security (pp. 52–85). Cambridge: Cambridge University Press.

    Chapter  Google Scholar 

  • Mercer, B. (2009, November 30). Presentation delivered at Rebook Vancouver International Security Conference.

    Google Scholar 

  • Molnar, A., Whelan, C., & Boyle, P. J. (2018). Securing the Brisbane 2014 G20 in the wake of the Toronto 2010 G20: ‘Failure-inspired’ learning in public order policing. The British Journal of Criminology (online first 12 June 2018).

    Google Scholar 

  • Monaghan, J., & Walby, K. (2012a). Making up ‘terror identities’: Security intelligence, Canada’s Integrated Threat Assessment Centre and social movement suppression. Policing and Society, 22(2), 133–151.

    Article  Google Scholar 

  • Monaghan, J., & Walby, K. (2012b). ‘They attacked the city’: Security intelligence, the sociology of protest policing and the anarchist threat at the 2010 Toronto G20 summit. Current Sociology, 60(5), 653–671.

    Article  Google Scholar 

  • Murray, D. (2014). G20 protestors threaten chaos at Brisbane summit. Courier Mail [online]. Retrieved October 2, 2016, from http://www.couriermail.com.au/news/queensland/g20-protesters-threaten-chaos-at-brisbane-summit/news-story/ec1b24d130c7255e7d60bf9e52436ac5.

  • Mythen, G., & Walklate, S. (2008). Terrorism, risk and international security: The perils of asking ‘what if’? Security Dialogue, 39(2), 221–242.

    Article  Google Scholar 

  • Noakes, J., & Gillham, P. (2007). Police and protester innovation since Seattle. Mobilization: An International Quarterly, 12(4), 335–340.

    Google Scholar 

  • Press Association. (2011). London 2012 Olympics security costs almost double to £553m. The Guardian [online]. Retrieved January 10, 2018, from https://www.theguardian.com/uk/2011/dec/05/olympic-security-costs-rise-553m.

  • Police Executive Research Forum. (2011). Managing major events: Best practices from the field. Washington, DC: Police Executive Research Forum.

    Google Scholar 

  • Queensland Police Service. (2016). G20–2014 Operation southern cross: Post operation report. Brisbane: Queensland Police Service.

    Google Scholar 

  • Richards, A., Fussey, P., & Silke, A. (Eds.). (2011). Terrorism and the Olympics: Major event security and lessons for the future. London: Routledge.

    Google Scholar 

  • Royal Canadian Mounted Police. (2011). G8 and G20 summits Integrated Security Unit: After action report. Royal Canadian Mounted Police.

    Google Scholar 

  • Ryan, P. (2003). Olympic security: The relevance to homeland security. In Oquirrh Institute (Ed.), The 2002 Olympic Winter Games: Security lessons applied to homeland security (pp. 7–23). Salt Lake City: Oquirrh Institute.

    Google Scholar 

  • Salna, K. (2014). Brisbane set to go into lockdown for G20. The Sydney Morning Herald [online]. Retrieved October 2, 2016, from http://news.smh.com.au/breaking-news-national/brisbane-set-to-go-into-lockdown-for-g20-20141107-3jtfs.html.

  • Surborg, B., VanWynsberghe, R., & Wyly, E. (2008). Mapping the Olympic growth machine: Transnational urbanism and the growth machine diaspora. City, 12(3), 341–355.

    Article  Google Scholar 

  • Walklate, S., & Mythen, G. (2015). Contradictions of terrorism: Security, risk and resilience. London: Routledge.

    Google Scholar 

  • Whelan, C. (2016). Organisational culture and cultural change: A network perspective. Australian and New Zealand Journal of Criminology, 49(4), 583–599.

    Article  Google Scholar 

  • Wolfe, N. (2018). Security at the Gold Coast’s Commonwealth Games disorganised, quitting by the hundreds. news.com.au [online]. Retrieved May 24, 2018, from https://www.news.com.au/sport/commonwealth-games/security-at-the-gold-coasts-commonwealth-games-disorganised-quitting-by-the-hundreds/news-story/5c4578b3f28f3cb8d341a41031c6a419.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chad Whelan .

Copyright information

© 2018 The Author(s)

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Whelan, C., Molnar, A. (2018). Analysing Mega-Event Security: Looking Inside Operations. In: Securing Mega-Events. Crime Prevention and Security Management. Palgrave Macmillan, London. https://doi.org/10.1057/978-1-137-59668-0_2

Download citation

  • DOI: https://doi.org/10.1057/978-1-137-59668-0_2

  • Published:

  • Publisher Name: Palgrave Macmillan, London

  • Print ISBN: 978-1-137-59667-3

  • Online ISBN: 978-1-137-59668-0

  • eBook Packages: Law and CriminologyLaw and Criminology (R0)

Publish with us

Policies and ethics