Important Announcement
PubHTML5 Scheduled Server Maintenance on (GMT) Sunday, June 26th, 2:00 am - 8:00 am.
PubHTML5 site will be inoperative during the times indicated!

Home Explore Inner Circle Solutions_ESports Event Standards 2022

Inner Circle Solutions_ESports Event Standards 2022

Published by IIFX, 2022-11-12 23:30:01

Description: COPYRIGHT 2022 BY
INNER CIRCLE SOLUTIONS
ALL RIGHTS RESERVED

According to Straits Research, the global eSports market will grow from $1.384 billion in revenue in 2022 to more than $ 5.7 billion in 2030 with a projected compound annual growth rate of 21.92%. The number of eSports fans is predicted to grow from 465.1 million (229.6 million enthusiasts and 235.5 million occasional viewers) in 2021 to 577.8 million (285.7 million enthusiasts and 292.2 million occasional viewers) in 2024. Whether a tournament features a few players in a sports bar setting or is a major eSports event like the League of Legends World Championship with thousands of people attending in-person and millions viewing online, the logistics, safety, security, and the overall fan experience requires systematic planning.
Event planners and managers must consider the needs of players and their families attending the event and those viewing online when creating their event plan. Risk, communications, crowd manage

Keywords: eSports,Inner Circle Solutions,Standards,event,planning,risk,risk management

Search

Read the Text Version

ESPORTS EVENT PLANNING GUIDE In Association with Planning Considerations to Strengthen Safety and Security and Enhance the eSports Fan Experience Copyright 2022 by Inner Circle Solutions All Rights Reserved

DISCLAIMER As part of its overall mission, Inner Circle Solutions, LLC, and the Innovation Institute for Fan Experiences (IIFX) provides information to those in the sports & entertainment industry and other interested parties to assist in operating events. However, this Guidance Document (Guidance) is not intended and is not designed to serve as an industry best practice and should not in any manner be considered a best practice for the sports &/or entertainment industries, including eSports. While Inner Circle Solutions, LLC and IIFX makes every effort to present accurate and reliable information, information provided in the Guidance is “as is” without any warranty of accuracy, reliability, or otherwise, either express or implied, including but not limited to the implied warranties of merchantability, fitness for a particular purpose or compliance with government regulations, or freedom from infringement. Neither Inner Circle Solutions, LLC or IIFX nor its officers, directors, members, employees, volunteers, or agents will be liable for any loss, damage, or claim with respect to any liabilities, including direct, special, indirect, or consequential damages, incurred in connection with the Guidance or reliance on the information presented. Users of this Guidance should not in any manner rely upon or construe the information or resource materials in this Guidance as legal, or other professional advice and should not act or fail to act based upon the information in this Guidance without seeking the services of a competent legal or other professional. The document is the sole and exclusive property of Inner Circle Solutions, LLC, in association with IIFX. Reproduction or redistribution of the document is prohibited without the prior written permission of Inner Circle Solutions, LLC or IIFX. COPYRIGHT INFORMATION eSports Event Planning Guide Planning Considerations to Strengthen Safety and Security and Enhance the eSports Fan Experience Inner Circle Solutions, LLC 342 Woodland Path Dallas, GA, 30132, US Copyright 2022 by Inner Circle Solutions, LLC This publication is informed and made possible by the contributions In Partnership with All Rights Reserved Northeastern University First Edition 2022 June 2022 Published in Association with Contributors: Cory Allen, Emily Blackburn, Tessa Boyea, Brandi Brown, Raekwan Brown, The Innovation Institute for Fan Experience (IIFX) Caitlin Brincklow, Chelsea Caselden, Alecea Damron, Kayla Denison, Morgan Fielding, 4780 I-55 N Katholiki Fillindarakis, Madison Garten, Andre Gossop, Heather Hughes, Enriquie Incle, Suite 100 Rachel Jolliffe, Rita Johnson, Tyler Lindsey, Carmen Marcon, Jennifer Melfi, Ashley Jackson, MS 39211 Ruggieri, John Connor Tampoya, Angela Truex, Nick Vaughn, and Kory William PUBLICATION DATE: 1 October 2022 (Original) Printed in the United States of America Inner Circle Solutions Website: www.1innercircle.com Innovation Institute for Fan Experience Website: www.iifx.org i|Page Copyright 2022 by Inner Circle Solutions All Rights Reserved

TABLE OF CONTENTS PREFACE ........................................................................................... 1 EXECUTIVE SUMMARY...................................................................... 2 CHAPTER 1: PRE-EVENT PLANNING ................................................ 3 Section 1: Family and Player Considerations...................................................4 Section 2: Venue Selection and Liaison Establishment.................................16 Section 3: Plans and Strategies .......................................................................19 Section 4: Risk Factors and Threat Assessments.............................................25 ii | P a g e Copyright 2022 by Inner Circle Solutions All Rights Reserved

CHAPTER 2: EVENT COMMUNICATION AND CROWD MANAGEMENT............................................................................... 39 Section 1: Privacy and Security.......................................................................40 Section 2: Command Center and Communication Flow ............................41 Section 3: Spectator Management and Crowd Control .............................44 Section 4: Post Event Debriefs and AFTER-ACTION Reports..........................46 CHAPTER 3: CRISIS MANAGEMENT .............................................. 47 Section 1: Overview and Coordinating Guidance.......................................48 Section 2: Risk Analysis .....................................................................................52 Section 3: Emergency Response – All-Inclusive Actions ...............................54 Section 4: Response Plan – Natural.................................................................58 Section 5: Response Plan – Man-Made..........................................................64 Section 6: Response Plan – Technology .........................................................76 Section 7: Response Plan – Accidental ..........................................................86 Section 8: Post Event and Recovery Actions .................................................88 ANNEXES: ....................................................................................... 90 Annex a: Inner circle incident management patform .................................91 Annex b: Family and Player Pamphlet Briefing .............................................93 Annex c: Command Center ...........................................................................95 Annex d: PACE Plan .........................................................................................96 Annex e: After Action Report ..........................................................................97 Annex f: Crisis Management Team Chart ......................................................98 Annex g: Crisis Management Flow Chart ......................................................99 iii | P a g e Copyright 2022 by Inner Circle Solutions All Rights Reserved

Annex h: Risk Assessment Matrix ...................................................................100 Annex i: Communication Guidance During Crisis.......................................101 Annex j: Threat Assessment Template ..........................................................102 Annex k: References ......................................................................................105 iv | P a g e Copyright 2022 by Inner Circle Solutions All Rights Reserved

PREFACE According to Straits Research, the global eSports market will grow from $1.384 billion in revenue in 2022 to more than $ 5.7 billion in 2030 with a projected compound annual growth rate of 21.92%. The number of eSports fans is predicted to grow from 465.1 million (229.6 million enthusiasts and 235.5 million occasional viewers) in 2021 to 577.8 million (285.7 million enthusiasts and 292.2 million occasional viewers) in 2024. Whether a tournament features a few players in a sports bar setting or is a major eSports event like the League of Legends World Championship with thousands of people attending in-person and millions viewing online, the logistics, safety, security, and the overall fan experience requires systematic planning. Event planners and managers must consider the needs of players and their families attending the event and those viewing online when creating their event plan. Risk, communications, crowd management, contingencies, and crisis response are major elements of any eSports event plan. The eSports Event Planning Guide - Planning Considerations to Strengthen Safety and Security and Enhance the eSports Fan Experience provides considerations that planners need to help create a memory-making eSports event. Copyright 2022 by Inner Circle Solutions 1|P a g e All Rights Reserved

EXECUTIVE SUMMARY Inner Circle Solutions continues to be an integral planning component of venue and event management, relying on a best practices approach informed by risk management. The eSports event plan will focus on limiting liability and risk related to personnel and property, both physical and intellectual. Best practices in the plan can act as a catalyst for strengthening approaches to safety and security while enhancing the fan experience and sense of community that eSports events generate. The plan covers several significant areas, which singularly or jointly can determine the success and safety of an eSports event, including family and player considerations, venue selection, communication strategies, and contingency plans. The approach seeks to preserve the enjoyment and dignity of attending the venue and the surrounding community while maximizing safety and security. The plan provides a clear understanding of potential problems in future eSports events and how these problems can and should be addressed to ensure a more standardized and holistic security management approach. Copyright 2022 by Inner Circle Solutions 2|P a g e All Rights Reserved

CHAPTER 1: PRE-EVENT PLANNING This chapter provides an overview of pre-event planning for Inner Circle Solutions. The chapter considers details about sections named Family and Player Considerations, Venue Selection, Liaison Establishment; Plans and Strategies; and Risk Factors and Threat Assessments, respectively. Each section provides an overview of the components required to successfully guide event planning and procedures for all entities involved in Inner Circle Solutions’ client events. This chapter considers the organization of arrangements and gathering information in collaboration and cooperation with others. Additionally, the chapter covers sharing these arrangements in partnership and coordination with others (including contractors and staff working the events). This chapter of the plan is crucial to the client, event management staff, venue management, local law enforcement agencies, and emergency and public safety services. The intended audience for the section titled Family and Player Considerations and its referenced annexes are players and their families. Outside of the section titled Family and Player Considerations, Guidance is intended for Inner Circle Solutions and should be read as a security plan guideline for eSports events. Copyright 2022 by Inner Circle Solutions 3|P a g e All Rights Reserved

Inner Circle Incident Management (ICIM) Platform The Inner Circle Incident Management (ICIM) Platform [41]www.1innercircle.com should be used to house and contain all emergency response plans, crisis management plans and critical contacts. The platform contains a secure chat feature, allows for team reporting and the ability to alert the team on any urgent issue. Additionally, all incidents should be worked through the ICIM issues portion of the platform. All artifacts should be uploaded and maintained within the issue. Inner Circle Solutions has partnered with Swan Island for their TX360 Global situation intelligence platform. This feature offers over 15,000 intelligence analyst curated channels to feed vital intelligence into the ICIM platform. For further information refer to the ICIM information in the Appendix. SECTION 1: FAMILY AND PLAYER CONSIDERATIONS Before the event, staff should effectively communicate with attendees on event expectations. Security, safety practices, and communications (I.e., social media, app, email, messaging, etc.) are essential. Staff should provide digital security pamphlets and/or event specifics (I.e., key individuals, the event's timeline, food, parking security, cash/debit requirements, age considerations for alcoholic beverage consumption, etc.). Additional information provided to the family and players should include network access information (if provided by the host), hotel, medical, emergency information, and any other pertinent information to ensure the safety of the attendees. For additional information on pre-travel security requirements for attendees, see Annex A: Family and Player Pamphlet Briefing. Travel and Security Before You Go: Travel Documents VISA Requirements - For information on VISA requirements, check the State Department’s country information page [1] and contact the country's embassy to be visited or transited for current entry requirements. [2] In the search box titled, Learn About Your Destination, enter the country of travel. Copyright 2022 by Inner Circle Solutions 4|P a g e All Rights Reserved

Passports - Make a copy of your passport. Photocopies should be kept in a location other than the actual passport in case something happens to the original document. [3] To replace a passport, you must visit an embassy or consulate. You can find more information regarding lost or stolen passports from the State Department website. [4] European Travel Information and Authorization System (E.T.I.A.S.) - E.T.I.A.S. [5] is a form of electronic travel authorization. Starting May 2023, visitors traveling to the Schengen Area will need an E.T.I.A.S. travel authorization before their trip. [5] Health Information / Vaccines Vaccines - Be aware that some countries require foreign visitors to carry an International Certificate of Vaccination, also known as a Yellow Card, or other proof that they have had specific inoculations or medical tests before entering or transiting their country. [2] Check out vaccination recommendations and other health considerations from the U.S. Centers for Disease Control (C.D.C.) and World Health Organization (WHO). These agencies guide vaccinations, malaria prevention, and other travel health precautions for travel abroad Health Insurance - Check your health insurance to ensure you are covered abroad. You have the option to purchase supplemental insurance. See additional details below in the Practicalities section under Insurance. Illness / Injury - If you become seriously ill or injured abroad, the State Department can assist in locating appropriate medical services, informing your family or friends (with your permission), and helping transfer funds to U.S. citizens overseas. [6] Doctors / Hospitals - You can find lists of doctors and hospitals in the country you are visiting on the U.S. embassy or consulate websites. [7] First, select the country, then choose the embassy or consulate, and under the U.S. Citizen Services tab, you will find a Medical Assistance section. Safety and Security Consulates and Embassies Write down contact details for the nearest U.S. embassy or consulate to carry with you in case of emergency while traveling. To locate this information, check the State Department’s country information page. [8] Copyright 2022 by Inner Circle Solutions 5|P a g e All Rights Reserved

Smart Traveler Enrollment Program (STEP) - A free service to allow U.S. citizens and nationals traveling and living abroad to enroll in their trip with the nearest U.S. Embassy or Consulate. Enrolling via this link [9], the STEP program allows U.S. citizens traveling or living abroad to receive the latest security updates from the nearest U.S. embassy or consulate. You’ll receive the latest safety and security information for your destination country to make informed decisions about your travel. The information you provide enables the U.S. embassy or consulate to contact you in an emergency. [9] Travel Advisories - Read the Travel Advisory and Alerts [10] for the countries you visit. In the search box titled, Learn About Your Destination, enter the country of travel. Theft or Loss • Beware of pickpockets. Use specially designed bags or zippers and carry minimal things. • Watch out for card-skimming devices. Carry an RFID wallet. • Know local emergency services information (police, hospital, etc.). • Only use licensed vendors for taxis, hotels, etc. Airport Security Prohibited Items in Air Travel - Review the prohibited items [11] list for carry- on and checked baggage. Import and Customs Regulations - Many countries have restrictions on what you can bring into that country, including food, pets, and medications. Even over-the-counter medications may be prohibited in some countries. Check with the foreign embassies and consulates in the U.S. for your destination country to find out what is prohibited. [12] Trusted Traveler Programs - The Trusted Traveler Programs [13] (Global Entry, T.S.A. PreCheck®, S.E.N.T.R.I., NEXUS, and FAST) are risk-based programs to facilitate the entry of pre-approved travelers. All applicants are vetted to ensure they meet the qualifications for the program to which they apply. [13] Copyright 2022 by Inner Circle Solutions 6|P a g e All Rights Reserved

Practicalities Money Banks - While not required, it is recommended to notify your bank before traveling where you are going and for how long. In some cases, failure to do so will result in a fraud alert preventing you from completing a transaction outside your normal geographical area. Currency Conversion - There are several methods of currency conversion. You can use an in-country A.T.M. to withdraw local currency, and be sure to understand your bank's international transaction fees before using this method. Or you can order foreign currency through your bank before travel. Online tools, such as Xe Currency Converter, allow you to check live foreign currency exchange rates for informational purposes. The mobile app can also be used for wire transfers. Insurance Travel Insurance insures your financial investment in your trip. Typically, it covers the cost of lost baggage and canceled flights, but it may or may not cover the costs of medical attention you may need while abroad. Travel Medical Insurance covers the cost of medical attention you may need while abroad. [14] Travelers with Disabilities Be sure to request accessible hotel accommodation. You can work with the hotel to answer any questions. T.S.A. Cares – T.S.A. Cares is a helpline that provides additional assistance to travelers with disabilities, medical conditions, and other special circumstances during the security screening process. Passengers with a disability or medical condition may call ahead to the T.S.A. Cares toll-free helpline at (855) 787-2227. [15] You may also request assistance through the T.S.A. screening checkpoint online [16] • Mobility International U.S.A. - Mobility International U.S.A. (M.I.U.S.A.) is a disability-led non-profit organization advancing disability rights and leadership globally. Offers a publication called Survival Strategies for Going Abroad: A Guide for People with Disabilities. • Society for Accessible Travel and Hospitality – S.A.T.H. offers an online travel magazine and travel advice. Copyright 2022 by Inner Circle Solutions 7|P a g e All Rights Reserved

• Overseas Interpreting Company - Overseas Interpreting provides tailor-made communication solutions for deaf academics and professionals. Social Media Awareness Before You Go Travel and Itinerary Security • Travel plans should not be publicized for you and your travel party's security. Travel documents, such as passports and plane tickets, should not be posted on social media. • Posting pictures of passports online creates the potential for identity theft, and announcements of travel plans alert people that your home may be unoccupied. • Advertisement of travel plans also informs malign actors of potential opportunities to act against your best interest. During Travel Social Media While Traveling Abroad • To ensure that you're maintaining your security while traveling, limit your posting activities, including live streaming. • Deactivate your geolocation capabilities during your travels to avoid being tracked or monitored enroute to your destination. • Be wary of communicating with new and unknown contacts. Do not provide the event, venue, or personal information about yourself or others at the event to any individual who is not known to you. Additional Considerations • Be mindful of international advertising, posting, and copywriting laws to avoid any complications with publishing your pictures and videos of the event. • Social media posts related to the event, venue, and other people should only be done with the consent of the subjects of the imagery. Additional information can be found here. [17]. • Any posts that violate local laws incite/encourage violence or potentially cause harm or risks to security are prohibited. Copyright 2022 by Inner Circle Solutions 8|P a g e All Rights Reserved

• In the event of an emergency, security should be notified. Personal devices should not be used to record or take pictures of emergencies, and pathways should remain open for emergency responders to attend to patients or other people in distress. Cyber Security Mobile Devices – Cellular/Smartphone use is widespread. It is recommended that prior to traveling, the following measures should be taken to ensure devices remain secure: • Implement security measures for your device. • Biometrics (FaceID, retina scanner, fingerprints). • Passcode/password. • Pattern lock (Android only). Network Protection – Free-Wi-Fi access is common. You must be very cautious when connecting to a network. To ensure you are protected during the event by cybersecurity experts, connect to the Wi-Fi network provided by the event venue. Personal cybersecurity protection step include: Purchase a VPN (Virtual Private Network) • A VPN protects your data on the network by encrypting it first and then sending it out. You can read more about one here. [18] Connection Types: • Wi-Fi - Attacks using public Wi-Fi connections are common. Caution should be taken when choosing to connect to a public and unprotected Wi-Fi network. Please note: The event will provide a complimentary Wi-Fi connection. • Bluetooth - Bluetooth connections are secure but aren’t impenetrable. Connecting to any unknown devices during periods of travel is not recommended. Copyright 2022 by Inner Circle Solutions 9|P a g e All Rights Reserved

Common Attacks Phishing • Phishing is a form of social engineering; it relies on creating accounts posing as an official organization asking for personal information. You can read more about phishing here. [19] Identifying Common Phishing Attacks • Suspicious sender’s address. • Generic greetings and signatures. • Spoofed hyperlinks and websites. • Spelling and layout. • Suspicious attachments. Malware Attack - A malware attack is a typical cyberattack where malware (usually malicious software) executes unauthorized actions on the victim’s system. Malicious software (a.k.a. virus) encompasses many specific attacks such as ransomware, spyware, command and control, and more. How to detect malware: • Random slowness in applications or basic computer tasks. • The inability to remove software that was able to be removed before. • Failure to shut down or restart the computer. • The appearance of an altered taskbar or search engine. • Webpages now have ads that weren't present before. Types of Malware • Adware automatically delivers advertisements to generate revenue for its creator or a third party. • Ransomware restricts users from accessing a system or its data and often threatens to publish or delete data until a ransom is paid. • Spyware is designed to gather information about a user or business. Once installed, it can log keystrokes and extract sensitive data. Copyright 2022 by Inner Circle Solutions 10 | P a g e All Rights Reserved

• Virus - the oldest type of malware, viruses alter how a computer operates. • Worms are the most common type of malware and the most dangerous because they can replicate themselves without being attached to a program or run by a user. Q.R. Codes • QR codes are unique, but they can also be dangerous. When exploring the event, Q.R. codes may seem harmless, but they can lead to malicious attacks on your phone. Here are some steps to ensure your phone's safety: • Do not download an app from a Q.R. code, and do not download a Q.R. scanner app. • Avoid making payments through a site navigated from a Q.R. code. • A more detailed list can be found here. [20] Personal Privacy Personal Identifiable Information (PII) is any information that “directly identifies an individual (e.g., names, address, social security number or other identifying number or code, telephone number, email address, etc.)” (D.O.L., 2022 [40]). It is essential to take measures before and while traveling to protect PII. • Back up electronic files o 3-2-1 rule of thumb: 3 copies of data, store backups in 2 types of media (local and external hard drives), and store one backup in an off-site location (cloud storage) o Remove sensitive data from automatic cloud storage  Google, Box.com, and iCloud may be backing up sensitive data you may not want accessible through a public cloud domain. o Install strong passwords  Recommendation: at least 12 characters using one uppercase, one lowercase, 1 number, and a unique personality. Copyright 2022 by Inner Circle Solutions 11 | P a g e All Rights Reserved

• Confirm all devices you are traveling with have antivirus and antimalware software installed and up-to-date before travel. Norton has a free 30-day trial if devices are unprotected. [30]. • Make two copies / take pics of essential documents: I.D.'s, passports, medical cards, social security cards, etc. Leave one copy at home and bring the second copy as a backup while traveling. • Save essential numbers on your phone: medical facilities, credit card companies, etc. • Notify bank companies (including credit card companies) that you are going on travel, when, and where. Then, they can flag any suspicious activity if charges fall outside your location during those dates. Privacy Before traveling, it is vital to understand the various privacy laws [31] within the United States (it varies state-to-state). When traveling internationally, it is essential to look up and understand their laws and regulations. Some countries may inhibit devices from having encryption; government officials might have the right/ authority to review devices and duplicate information stored on them; surveillance might monitor phone conversations, etc. • Book trips on secure websites (including checking for HTTPS and not clicking on website addresses that are not formatted correctly; only use trusted websites. Websites should end in .com, .org, .gov, etc.). • Disable autoconnection of Bluetooth on devices. • Delete sensitive information on the phone before travel, including applications including automatic passwords that are saved on the devices. • Install and utilize lock features on devices (phones, laptops, tablets, etc.)- pin, facial recognition, thumbprint, password. • Clear cookies from all devices. • Don’t put electronic devices in checked luggage. • Install a device finder on electronic devices if they get lost or stolen. • Clear cookies on devices [32]. • Download a VPN application [33] on devices before travel (an added security authentication layer). Copyright 2022 by Inner Circle Solutions 12 | P a g e All Rights Reserved

• Optional: travel with a pre-paid phone. Additional International travel considerations • Travel with a pre-paid phone. • Tape over, cover, or disable laptops, USB ports, and microphones. Microphones can be tapped into. As an added precaution, removing the battery from devices might be necessary while not in use. • Avoid using public computers to check personal accounts. • As a note, if you don’t want information controlled by a foreign entity, don’t bring it. Disaster and Evacuation Preparedness Pre-Departure - You can take four steps to ensure travel preparedness in an emergency. For more information, see here. [21] Identify the hazards: Know your location [22]. Where you are going determines the types of risks. For example: • Mother Nature: o West Coast: Fire hazards, Mudslides. o South/Southeast/Southwest: Hurricanes, Fire hazards, and Tornados. o Midwest: Tornados. o East Coast: Hurricanes. o Northeast/East Coast: Avalanches, Hurricanes, Blizzards. • Man-Made: o Terrorism. o Active shooter. *While many of these are unlikely, be knowledgeable about the various ways to seek shelter and safety. *If English is not your first language, click here [23]. Conduct a family meeting. Copyright 2022 by Inner Circle Solutions 13 | P a g e All Rights Reserved

• Once you have identified the possible hazards, have a pre- departure family meeting to discuss the travel plan. Things to consider in this meeting are: o How will you receive emergency alerts? o What is the shelter plan or evacuation route? Where is the nearest shelter? [24] o Where is the nearest hospital? o Will you be using travel insurance? [25] o Where is the nearest embassy or consulate? o Where should family members rally in case of emergency? Preparation: This can happen in tandem with the family meeting. • As you and your loved ones answer these questions, think of other scenarios, and create an action plan. Practice: • Lastly, you will want to take a moment and practice any events with your traveling partners and loved ones. • Make sure everyone is on board and understands the instructions. *Enroll in STEP- the United States State Department's travel and security updates program. After Arrival • By now, you should have a good idea of the risks of your stay. • For international travel, verify the location of the nearest embassy or consulate. [26] • Ensure you have all the pertinent contact information for hotel staff, local authorities, and hospitals. • Take a picture of the evacuation routes in the hotel. • Always maintain your passport (for international travelers). Copyright 2022 by Inner Circle Solutions 14 | P a g e All Rights Reserved

Before an Evacuation: • Plan how you will leave and where you will go in the event of an evacuation. Venue-specific guidance may be available for evacuation plans from venue sponsors. • Identify local shelter spaces available. • Become familiar with alternate routes and other methods of transportation. • Download the F.E.M.A. app. [27] • Locate battery-powered radios for instruction or ensure you have registered STEP program in the United States. • Make sure the phone is always charged. During an Evacuation: • Utilize the battery-powered radio for instructions or, if enrolled in STEP in the U.S., watch for notifications on the phone. [28] • If you have the time, unplug electrical equipment, and shut off gas and water if instructed. • Make sure others know your whereabouts. • Follow hotel staff and local authorities on recommended evacuation routes. See Chapter 3, Crisis Management for further details. After an evacuation: • If returning to the disaster area, prepare for daily life disruption. • Avoid downed lines and report to the power or utility company as soon as possible. • Only use outside generators or battery-operated items until further notified. For those with disabilities: [29] • Evacuation insurance is always a great idea, even if you do not have a disability. • If you have a disability that requires medical equipment relying on electricity, consult with a doctor before traveling on the methods to keep your machine running during a power outage. Copyright 2022 by Inner Circle Solutions 15 | P a g e All Rights Reserved

• Call your power provider to be on the priority list for power restoration. • Know the locations of life-sustaining medical treatment and the availability of more than one facility. • Stay in contact with the hotel staff about who to call in case of an emergency. Please see Chapter 3, Crisis Management, for additional information. SECTION 2: VENUE SELECTION AND LIAISON ESTABLISHMENT Venue Selection Selecting an event's location and venue is critical to planning and preparing eSports events. There are location-specific requirements that the event host may require, combined with an array of factors that can influence where the event is hosted. From the start of collaboration with the host company, there should be clear objectives for the client's wants and requirements. This may include the proposed date(s), budget, and must-have needs for the venue and location. This will aid in picking the initial location of the event. The budget for the venue is vital; it is typically the venue that takes up a large part of the budget. All Events do not need to be held in popular major cities; other opportunities exist in smaller cities if they fit the client's needs and the event's vision. The host company and team should establish a definite date as soon as possible. This will allow other planning processes to take place. Factors to take into consideration when assessing possible locations are:    • The host company may require an event near a sponsor or industry leader. • Look at other significant events occurring in the possible locations during the proposed date(s) (I.e., marathons, major sporting events, festivals, and other large conventions). Other events may deter a client from a location option due to overcrowding, the possible shutdown of areas within the city, and increased costs. • A critical part that should be assessed is whether the location offers the venue the client wants. Things to look at are the requirements - capacity, the overall feel, inside layout, access to technology and Wi-Fi connections, and local laws and regulations. Copyright 2022 by Inner Circle Solutions 16 | P a g e All Rights Reserved

• Look at location-specific statutory and religious holidays that may coincide with the proposed dates. This may reduce local services. • Also, take into consideration the location’s ability to host an event. Assess the lodgings’ proximity to the venue. How accessible is accommodation to major travel hubs? These factors can affect the attendees’ experience and even have the potential to impact if they choose to attend. • Some locations require insurance. Check if the proposed locations require insurance; if applicable, ensure the host company has it. If the host company does not have it, ask if they are interested in obtaining it. Make sure that attaining the insurance fits into the timeline for the event. • What vulnerabilities does the location pose? This is further explained in Chapter 1, Section 4: Risk factors and Threat Assessment. It may be beneficial to perform a quick risk assessment for each proposed location to understand the threat environments. It could influence the final location decision. Once the more prominent concerns are addressed, the next step will look at more specific location factors. These items will increase the marketing ability, likely attendance, and safety of attendees during and while they are away from the event. The surrounding area. Some questions to consider: Is there public transport? What is the parking situation at the possible venues? Attendees will not want to pay a lot to park each event day. Is the surrounding area safe for attendees to walk around? Does it offer food and other possible activities for the guest to enjoy when the event is done for the day? For marketing purposes, it is much easier to sell a place to attendees when it has a desirable surrounding area that is aimed at the audience you seek.    Local emergency services. Examine if they have the capacity (hospitals, E.M.S. crews, police, and fire) to handle a large-scale incident should one occur? Does local law enforcement have a history and understanding of working with large-scale events? Some local agencies have experience working with extensive private sector events. Cooperation with local agencies will be vital further down in the planning process. The host company may want to consider a location with a strong and proven connection to assist with price sector events. Copyright 2022 by Inner Circle Solutions 17 | P a g e All Rights Reserved

Once a venue is selected, identifying and/or establishing a venue security team should take priority. Some venues have security teams on-site that are hired on the venue’s team. If the venue does not have a security team, establishing one in partnership with all involved parties should be one of the first steps taken once a venue is selected. The venue security team will aid event planning and create a clear command structure. Liaison Establishment Liaison establishment should begin when an event is identified and continue even after the event is over. As soon as a venue is chosen or if there are a few potential venues, liaison with the venue should begin. Liaison meetings should begin 6 to 9 months ahead of time. The following is a list of typical points of contact to look for in each group: Host Company: Event Lead/Security Chief  • Identify any security/intel resources they have • Identify security requirements for the event • Does the company have a Community Team? Venue: Chief of Security and/or Manager  • Identify security resources/infrastructure of the event Security: Lead/Supervisor  • Players and Families: o Communicate security information from the moment of registration through the event. • Emergency Teams o Identify emergency teams as early as possible and begin meetings to establish and rehearse emergency action plans Law Enforcement – local intel cells/analysts   • International Events: Embassy R.S.O. will be able to facilitate Host Nation Law Enforcement coordination and contacts Embassy (if international)  • Legal Attaché (Legat) - FBI representative Copyright 2022 by Inner Circle Solutions 18 | P a g e All Rights Reserved

• Regional Security Officer (R.S.O.) - State Department lead for security/law enforcement • Consular affairs – Visa requirements, U.S. citizen services while in- country Vendors: Lead   • Ensure vendors know and understand security requirements well before the event o Banned items/equipment, show times, screening procedures, personnel rosters Liaison relationships should continue after an event is over to receive feedback on the security of the event, “hotwash” policies and procedures to evaluate if they could be done better or differently in the future and maintain those liaison contacts for future events. SECTION 3: PLANS AND STRATEGIES Social Media Strategy A social media strategy is used to adapt and react quickly, gain proactive situational awareness, and locate potential threats accurately. Incorporating social media monitoring, open-source intelligence, and threat intelligence provide a platform to listen, track, and gather relevant content across various social media. Once a social media strategy is formed, it must be reevaluated and adapted to the changing needs of the event and audience. A solid approach is scalable and repeatable, allowing real-time social media monitoring to increase sales, marketing, operations, and security. Creating a Social Media Strategy Step 1: Define clear goals. What data do you want to capture, and how will you use that information? Set specific, measurable, attainable, relevant, and time-bound goals. Step 2: Know your audience. Learn everything you can about your audience. Understanding your audience and their needs, including players, parents, spectators, and sponsors, will help you adapt to your venue while ensuring the event is safe and enjoyable. Copyright 2022 by Inner Circle Solutions 19 | P a g e All Rights Reserved

Step 3: Conduct a social media audit. What’s working, what’s not, what platform does most of your audience use, and how can you reach them better? Step 4: Identify keywords and influencers. Set up accounts and improve existing profiles. Determine what networks to use, who the influencers are, and keywords you want to use to keep your venue safe. Step 5: Set up social tools. Everyone will prefer different tools; you can outsource web monitoring software to create a common operational/intelligence picture (COP/CIP). Ensure to integrate the COP/CIP into the Command Center. The COP/CIP must: • Listen for specific mentions or players across social media (with adaptability to include or exclude data points). • Identify trending topics or phrases (with alerts to trigger security forces, inform players, or manage crowds as required). • Detail customer information and cater to venue specifics and event needs (geofencing and A.I. learning to keep the event safe). • Identify thought leaders and influencers (to protect players and mitigate swatting or cyber-attacks during or after the event occurs). Step 6: Analytics and Communication. Ensure you have trained individuals in your team or outsource analysts to analyze the alerts specific to the event and the goal of the company and security team. Clear and direct communication must be identified to ensure that alters handled appropriately. Step 7: Test, evaluate, and adjust your strategy to serve the following function better. Social Media Monitoring Categories For an effective social media strategy, the company or venue needs to identify what they want to track, then adapt the skills and software as appropriate. ESport events can make monitoring filters challenging; a game specialist must filter through the noise to differentiate between game language and potential threats. Focusing on three main themes, sales and marketing, operations, and security, will help streamline and categorize the social media monitoring strategy. Sales and Marketing. The power of social media can drive attendance, mobilizing registered attendees to reach out to their social networks and Copyright 2022 by Inner Circle Solutions 20 | P a g e All Rights Reserved

inviting their friends and colleagues. Social media can also target ideal attendees based on their interests while attracting the right sponsors and businesses for the event. Social media can shape the reputation of gaming events and the overall eSports organization. Analyzing and responding to social media creates space for eSports to respond rapidly and effectively to the community’s needs and wants. Operations. Monitoring the project management, real-time events, and venue environment provides safety and networking opportunities. Taking action within those networking opportunities encourages the eSports community to engage and participate with pro players, gameplay, and sponsors. The advancement of technology and mobile applications made social media sites and blogs easily accessible during live events. An effective social media strategy and action increase the social participation of the live audience while allowing viewers to follow live updates and engage even if they could not attend the live event. Command and control operations are necessary for a successful event, and a social media monitoring strategy must be incorporated into the Command Center. Security. Identify critical threats or potential hazards pre, post, and during events. Security teams attempt to spread as far as possible to identify and mitigate any threat to the event, players, or attendees. The online network can provide tipping and cueing to the Command Center, allowing security to be one step ahead of any danger. With the ease of smartphones and social media monitoring, everyone can become a sensor, collecting and reporting data on the event. Attendees are now empowered to identify issues or potential threats. With a social media strategy and game specialists, rapidly placing key mentions and trends leads to safer and more controlled eSports events. Recommendation Ensure personnel are trained to employ social media monitoring technology deliberately. Analysts intimate with the game event will need to provide quick assessments to the Command Center. If not outsourced, annual training will ensure personnel are trained to analyze and identify potential threats while building procedures for real-time web monitoring. Set up a social media tool for gamers or spectators to alert the event and security staff to address possible emergencies. An example is a # known to all personnel at the event as a request for help that will trigger a geofence or targeted monitor in the location of the person requesting help. Depending on the request, this # could signal assistance or security support. Copyright 2022 by Inner Circle Solutions 21 | P a g e All Rights Reserved

Intelligence Collection Intelligence collection is a critical component of the event planning process because it can provide a near-comprehensive picture that anticipates risks, offers continuous assessments, identifies and locates incidents, and uncover information gaps through periodic and timely situational reporting. While intelligence collection should begin as early as possible in the planning process, it is most valuable following the completion of a threat assessment. Intelligence collection should consider what risks and areas of vulnerability are identified in the threat assessment to inform the prioritization of resources. The following section outlines best practices for effective intelligence collection during the planning process.  Setting Goals and Objectives   The intelligence collection process begins as soon as possible in the planning stages of an event, but only after specific goals and objectives are set to be accomplished in securing the event. Clear goals and objectives will increase the understanding of what tools and resources are required to address any challenges identified in the threat assessments. Goals and objectives will differ from event to event since each requires a tailored approach.  Setting goals and objectives early in the planning process offer several benefits:  • Provides a roadmap to form specific benchmarks to achieve • Provides accountability to ensure resources are not being wasted • Facilitates measures for feedback Leveraging Intelligence Collection Intelligence collection efforts can help support established goals and objectives in many ways:  • Routinely monitor geopolitical events that may impact event operations or travel o Examples: Political instability, civil unrest, economic uncertainty, terrorist attacks, public health-related incidents, etc. • Conduct open-source research and social media monitoring to identify threats and contextualize the threat environment Copyright 2022 by Inner Circle Solutions 22 | P a g e All Rights Reserved

• Provide timely reporting of tactical and strategic importance • Identify how other stakeholders like local law enforcement, venue security, and others will help close and monitor information gaps Tools and Methods of Data Collection  Several tools and methods can help reveal and understand trends during the intelligence collection process. These tools are helpful in the collection process, given the amount of data, and can also be used to help validate the information. Those involved in the intelligence collection process should know the advantages and limitations of intelligence collection and how to integrate assessments to inform their decision-making.  Commercially available data analytics platforms and applications can monitor online activities, analyze data at scale, and identify trends. While many platforms exist, some are more useful than others and offer a more comprehensive range of capabilities.   Consider the following when researching what platform to use:   • Data aggregation capabilities • Access to social media platforms and other websites • Threat intelligence monitoring capabilities • Situational awareness tools • Functionality Moving from Collection to Application  The information gathered during the intelligence collection process must be analyzed appropriately to inform the decision-making on how to bolster the event's security. In addition, sharing information across all security partners and stakeholders is critical during the application stages of the intelligence process and to enhance incident response (See Chapter 2, Section 2, Command Center and Communication Flow). Utilizing Social Media for Security Anticipating Threats - Effective protection comes from proper planning. Organizations must accurately predict potential threats to disperse resources appropriately. Monitoring social media via Boolean searches, location tags, keyword triggers, and designated hashtags and trending topics will give event security and the Command Center a better idea of what threats may exist before the event occurs. Copyright 2022 by Inner Circle Solutions 23 | P a g e All Rights Reserved

Maintaining Situational Awareness - Even with a Command Center and security posts throughout the event, it is impossible to always monitor every situation. Several events that require a response could happen before any security team member notices, such as: • A fight breaks out • An attendee leaking the location of a V.I.P. • An unattended bag These situations could pose a significant security risk and, if unmanaged, be hard to control. Players/attendees should be encouraged to utilize social media throughout the event to alert staff of anything going on. The Command Center should be monitoring social media throughout the events to alert and dispatch security wherever necessary. This will allow event security to manage and investigate situations before they escalate into a larger, more significant issue. Pinpointing Locations of Threats - To promote effective event security, you must create a perimeter via geofences around the venue. This will allow the Command Center and security teams to see what is happening within the perimeter and act within those boundaries. A geofence represents a virtual perimeter that will enable the Command Center and security to view and monitor all social media posts within those boundaries. At large venues, it is tough to pinpoint where threats come from, but staff can tune into threats quickly by utilizing place-based data in conjunction with keyword triggers. • Communicating with attendees - Social media will also be a valuable tool in communication with players, families, and attendees. Event-specific hashtags should be created before each event, and players and attendees should be encouraged to utilize them. Additionally, players, families, and attendees should be told upon registration and at the event that significant announcements may be disseminated via social media. Monitor any correspondence from verified accounts with those hashtags. These strategies should be implemented before the event and necessitate proper planning; however, they will continue to be used throughout the event. Copyright 2022 by Inner Circle Solutions 24 | P a g e All Rights Reserved

SECTION 4: RISK FACTORS AND THREAT ASSESSMENTS Situational Awareness Absent or insufficient situational awareness is one main reason for human error. An isolated issue can become world news and brand-destroying in minutes. A significant issue can destroy an organization, causing the loss of life, property, reputation, and continuity. Without a robust set of situational awareness strategies and policies, you face a tsunami of disorganized information that can cause you to miss essential indicators and mismanage your response. It’s vital to be informed, aware, and prepared for anything. What you don’t know can hurt you. This situational awareness strategy will help identify threats, understand their importance and possible effects, and organize possible responses. Information Sources to Increase Situational Awareness Open-Source News: Internet, broadcasting by radio and television, publishing, and other media. Cyberspace is lightning fast, updated incessantly, and makes intelligence collecting easier. Social Media – Official: Local, State, and federal law enforcement networks have at least one social media platform as an authenticated source. Government Official Sources: Weather-related emergencies and other significant events are swiftly available on the internet, television, and radio. Internal Personnel: Internal staff are a valuable tool for intelligence. Implement a “See Something, Say Something” policy and procedure, and train personnel to report information through different communication channels, such as portable radios, email, text, phone, apps, etc. Social Media – Unofficial: Raw social media can offer some of the earliest signs of an incident available to everyone on social media platforms, so distribution concerns are minimized. Social media can also be inaccurate, so validating and correlating the information is imperative. Partners And Contractors: Generate ways for your external connections to send you intelligence that integrates into your situational awareness plan. Partners and contractors can be security, police, intelligence analysts, and gaming community groups. Upcoming Event Locations: Future demonstrations, protests, and other significant events such as road races, concerts, sporting events, and parades can have a massive effect on traffic and security. Knowing when Copyright 2022 by Inner Circle Solutions 25 | P a g e All Rights Reserved

and where significant events are occurring can provide valuable awareness to your event. Internal Security Systems: Your internal database systems for alarms, video monitoring, identification many other security concerns can be incorporated to alert your central situational awareness system. Best Practices Justification and Understanding Your Risk Appetite: It is vital to understand how significant it is to manage threats and weigh the costs of threat assessments against the potential impacts. Risk Management: Conducting a robust assessment of the threats you may experience will aid in organizing your efforts. This assessment utilizes internal and external partners and consultants such as risk management, security, and continuity personnel. Evaluating Return on Investment Elements: Situational awareness incurs short-term and long-term expenses. Understanding the long-term savings of risk reduction, situational awareness, monitoring, and proper response will impact the outcome. Integrating Security Systems When contemplating potential threats, it’s wise to develop response scenarios. You should look at various functions and tools that can work together simultaneously during an event and avert or alleviate developing problems. Alarm And Video Monitoring: Internal systems can send alerts to your situational awareness tools. Imagine that you get a warning that a former disgruntled player with ill intentions is attending your upcoming gaming event; this alert would give you far more reaction time. Mobile Phones: All event personnel and security can provide real-time situational awareness reports using their mobile phones. Send your see something, say something strategy to central situational awareness efforts. Email: Email can be an additional way of leveraging everybody to assist with situational awareness. Situational awareness systems can have a direct email integration capability that allows information from many places to consolidate into a more substantial, central picture. Copyright 2022 by Inner Circle Solutions 26 | P a g e All Rights Reserved

Response Systems: Situational awareness should go into overdrive during an incident, gathering precise information that responders can utilize during an incident. Incident Response: The most up-to-date information is critical when responding to an incident, and situational awareness solutions can help deliver that information to decisions made in real-time Mass Notification: Situational awareness can provide intelligence that can be repurposed to send to everyone at the event. Crisis Communications: Crisis communications systems permit distinct groups to respond to an incident with centralized coordination. Situational awareness can provide external and collated information to be folded into the response. Recommendation A leader and innovator in situational intelligence is Swan Island Networks. Their highly recommended program, TX360, provides rapid situational awareness solutions and services. TX360’s platform helps make faster, better-informed decisions with relevant real-time alerts and a comprehensive common operating picture. Swan’s cloud-based software is ideal for public/private resilience and information sharing initiatives and integrates easily with other platforms. Crowd Screening Mass gatherings attract all types of people, and without proper screening, it could put public safety at risk. Crowd screening intends to identify or assess potential hazards or risks resulting from a large crowd within a venue. This is screening an individual at the start of an event to ensure that the individual does not have prohibited items. Any person who enters a venue is screened. Venues that attract a large audience have an increased chance of enticing terrorist attacks, exploitation, or violent behavior, jeopardizing public safety. Furthermore, crowd screening should take both a private and public sector effort. [1] Crowd screening is a joint effort that involves predicting how many individuals are expected at an event, monitoring social media for potential risk factors, and understanding the venue's location and the person hired to work at the event. This may include law enforcement personnel, E.M.T.s, event security, and volunteers. Copyright 2022 by Inner Circle Solutions 27 | P a g e All Rights Reserved

Crowd Screening Utilizing social media: Along with physical security - social media can be a tool used for pre- event crowd screening – and is a proven factor that enhances awareness of events. The various platforms include Facebook, Instagram, TikTok, business webpages, etc. This creates publicity for events that may act as a profitable strategy by enhancing awareness of events happening worldwide in a publicized manner. Social media is not only a broadcasting tool but can serve to screen individuals or potentially harmful behavior that may put the public in harm’s way during the event. Social media should be monitored and screened for threats, potential riots, comments that may entice a negative response at the event or other factors that may include suspicious behaviors. Digital marketing allows a person to create a relationship between the brand and a customer. Social media intelligence is “the ability to learn or understand things or deal with new or tricky situations.” [2] Digital marketing allows users to click on an event venue, pop up on a map that can provide directions and a clear view of the event's location, and encourage people to check them out. This allows potential perpetrators to plan an attack due to the oversight of an event and its location. Crowd Screening Before the Event A method that can screen crowds before their arrival utilizing social media is Facebook’s analytics platform, which monitors many insights into customer behaviors and audience demographics. Social media has become a significant source of intelligence collection for law enforcement and agencies who wish to maintain the safety of a crowd. [3] Open-source intelligence collection is a vital source for crowd screening behaviors. For example, large crowds have the potential to attract or entice a riot. Social media may be a helpful tool for event security and contractors to predict whether the preparation is for law enforcement personnel. For example, if law enforcement may need riot protection gear or an increased amount of law enforcement is required for the event – helping to plan and prepare necessary resources. Crowd Screening the Day of the Event: Once social media and open-source intelligence collection on the size and the expected audience is established– the next step in crowd screening is to plan according to the event of the location and the size of the infrastructure by analyzing the site's blueprint. Crucial questions to be addressed: Copyright 2022 by Inner Circle Solutions 28 | P a g e All Rights Reserved

• Where is the event located, and what is the venue's layout? • Where are the entrances and exits of the event? • Location of parking? • How are the vehicles entering and exiting the event monitored and directed? • During the screening of individual(s), are there guidelines on how to best interact with them? • Defining criteria used to identify prohibited, illegal, or suspicious items during screening. • What procedures are used to handle and discard items discovered and identified during screening? The following recommendation is before the day of the event, personnel working at the venue should ensure that the screening technology is functioning and working, checking for any vulnerabilities on site, which include ensuring that the entrances and exits are up to date with the event standard. Crowd Management Crowd management is the organizing and planning based on verified techniques that provide direction to those organizing events for large groups of people gathering. Crowd management/control intends to prevent the outbreak of crowd crushes, affrays, fights, or riots [1]. With large venues and mass gatherings of spectators, organizers must be able to manage expected and unexpected crowd occurrences. Once the venue has been selected, crowd management must thoroughly navigate a series of checklists to set up a safe area for its spectators. Know Your Audience - It is imperative that crowd management know their audience and what to expect from their attendees. Three key areas must be factored into: Age: 6-45 - Age can influence behavior; therefore, knowing the age demographic will assist in the preparation Gender: ESports are predominantly male; knowing this, it may be beneficial to provide additional security in the event of an emergency or hostile crowd Copyright 2022 by Inner Circle Solutions 29 | P a g e All Rights Reserved

Location of Event: The event's location will help determine and predict where the attendees are coming from. The three locations to factor in are: • Resident: Attendees living in the same city or town as the event • Local: Those living in the same country but another city, town, or state • Foreign: Travelers from a foreign country In addition to knowing your audience, you must examine who is performing during the event. Certain entertainers attract a particular/unique type of fan. If an eSports player is aggressive and feeds off the crowd, their crowd is more likely to mirror the same energy, creating a hostile environment. This can be a fun experience for the attendee; however, it is something crowd management must be prepared for and have desolation procedures in place. Inform Relevant Parties - Before the event, crowd management must contact all necessary parties that will participate in the event. Below is a list of essential personnel/organizations who will need to know the type of crowd to expect. Emergency Services – Law enforcement, Fire department, Emergency Medical Technician (E.M.T.), Third-party services. See Chapter 3, Crisis Management for more details Event Contractors – All vendors and contractors are aware of an emergency plan Neighboring Businesses – Understanding the surrounding businesses. This will impact emergency evacuations traffic routes Venue Management – Full transparency with stage setup, staff, and venue security. Managing Risks - Crowd management needs to control the flow of traffic. Employing safety measures from the time the attendee enters to the time they depart is crucial to overall safety. The Command Center team is responsible for mitigating risks and managing how to respond. • Make sure entrances and exits are visibly marked • Once inside the event, staff will be able to guide attendees on where to go Copyright 2022 by Inner Circle Solutions 30 | P a g e All Rights Reserved

• Keep the crowd from forming groups that may block entrances, exits, and other walkways • In the event of an emergency, the use of a P.A. system will be essential to provide safety procedures Create Obstacles - Strategically place barricades, cones, ropes, or sanctions to show where people should queue up for tickets and where they may access during the event. Make it clear to event staff and attendees where they are allowed and what is off-limits. The venue management, along with the venue security team, are responsible for creating obstacles. Signage - In addition to strategic barriers, having proper signage will allow a precise crowd flow and enable security to predict where a bottleneck may occur. Using portable walls will allow crowd management to move information around the event as issues arise. Potential signage will include: • Registration Areas • Restrooms • Smoking Areas • Staff-Only Rooms • Potential hazards • Food/Drink Vendors In addition to signage, having a customer service desk where staff can assist attendees with information. Venue management and the venue security team are responsible for posting appropriate signage and staffing a customer service desk that was lost and found. Rally point for lost and found – Ensure designated areas are created and appropriately marked for lost and found, such as a lost child or an incident in which staff or security members could support attendees. Wheelchair Accessible - In addition to standard seating, crowd management must accommodate sections and/or rows that will be reserved for handicap seating. Due to The Americans with Disabilities act of 1990, A.D.A. necessitates the differentiation between a non-accessible and an accessible seat... The A.D.A. requires that venues have about 1% of their seats reserved for individuals with disabilities [2]. The venue and crowd management will need to ensure these designated areas are either group-level or have access to a ramp. There needs to be staff or volunteers that have a basic awareness of the attendees' disabilities. Copyright 2022 by Inner Circle Solutions 31 | P a g e All Rights Reserved

These areas must be easily accessible; to comply with A.D.A. regulations, venues must have equal access to food, drink, merchandise, and other services offered at the event [3]. Staffing - To ensure safety at the event, crowd management will recommend additional staffing of event security, law enforcement, E.M.T., and third-party services. These areas will include the following: • Front and Rear Entrances • Check-in lines • Ticket purchase windows • Seated areas • Guest service desks • Presentation rooms Radio-Frequency Identification (RFID) - One popular method for purchasing food and drinks and accessing venue sections is using RFID wristbands. These RFIDs allow attendees to access their wallets without taking them out. In addition to convenience, RFIDs in an emergency will have the ability to provide clues and information about a person’s last whereabouts. In the event of a lost child, RFIDs can help law enforcement and security with their last known location. This information will be strictly used for emergency situations. Behavioral Monitoring - Behavioral Monitoring will build on the work done to plan and prepare within the infrastructure designed for event procedures. Each event is recommended to integrate a third-party behavioral specialist trained in behavioral analytics to detect better and track possible triggers. The behavioral specialists should provide training and tactics to the venue security team. Problems are rooted in fear of poor identification. It will always be a fine line between normal and not, especially for eSports tournaments which can oscillate between a sporting event and a theatrical performance. By incorporating a professional capacity to judge that behavior, the process of real-time monitoring can have a higher percentage of reliability and validity for outside parties. Understanding that every event might not have the resources or capacity for full integration, there are three options when considering a behavioral specialist: Full involvement: • Incorporate them into planning work. • Introduce them to lessons learned and current threats Copyright 2022 by Inner Circle Solutions 32 | P a g e All Rights Reserved

• Have them brief all relevant parties • Integrate them into event activities • Decide whether they’ll be roving or rooted at the Command Center Limited involvement: • Incorporate them into planning work • Introduce them to lessons learned and current threats • Host more specific briefings with those team leaders who will be running the ‘department’ during the event • Have them help to brief all relevant parties, supporting event management No involvement: • Utilize past practice and lessons learned to build behavioral monitoring strategies into event planning. After making that decision, the focus should be on information sharing and briefing. These are not mutually exclusive, but when utilized correctly, they build off each other to create the foundation for successful actions during the event. Information sharing should focus on: • Working with the other event procedure teams to work outwards from the leads found in the venue selection research. Identify concerns - have there been previous similar incidents, or are these hypothesized? What should staff on the ground be looking for? • Working with player management encourages players to share their concerns and ‘to see something, say something.’ Players should be comfortable with that concept and encouraged to share previous and current concerns. Based on the above answers, the behavioral monitoring team must utilize the Command Center logically and to its intended purpose. Decide how many team members need to be within the center. Will this decision depend on venue size, event size, or something else? Lastly, the behavioral management team should facilitate a threat assessment briefing for all involved parties on current local threats, player concerns, and general tips. Event management should discuss the following in some capacity: Copyright 2022 by Inner Circle Solutions 33 | P a g e All Rights Reserved

• What to expect from the players and the clientele. • What constitutes ‘odd’ behaviors? • Pre-existing threats or concerns. • ‘See something, say something.’ • The communication hierarchy – see PACE plan/communication tree. • Who are the primary contacts. • Radio procedure. • Anything else deemed relevant from past practices, staff or lessons learned. Recommendation: Integrate a behavioral specialist for training and briefing purposes as a bare minimum. Threat Assessments Threat assessments are vital in an eSports event's planning and preparation stages. While it is beneficial to include and conduct preliminary threat assessments during the venue selection process of event planning, additional threat assessments should be conducted following venue selection to best understand the risks to physical and operational security specific to the selected venue. At this stage in planning, it is strongly recommended that the event’s security team should actively involve the Risk Management or Security Departments of their clientele's companies. A threat (risk/vulnerability) assessment is composed of three core components: (1) the identification of probable and/or highly impactful threats, (2) the designation of key processes and operational aspects that must be protected, and (3) the assessment of the overall vulnerability of said processes and operational aspects to these threats. NOTE: Open communication between the security team, event, and company stakeholder(s) is critical during this time. For the threat assessment to be effective and applicable, the threat assessment team (T.A.T.) must be privy to the risk tolerance of the stakeholder(s). Risk matrices (see Figure 1) are based on both frequency (or probability) and impact. During identification and assessment of the frequency and impact of threats, the T.A.T. should consider the following: • History - analyze past event experiences, demographics, and regional crime at or close to the venue and community. Copyright 2022 by Inner Circle Solutions 34 | P a g e All Rights Reserved

• Technology - assess what technological processes, systems, and equipment are capable of exploitation or failure. • Human Error - identify potential human errors capable of mitigation with proper training and integration of policy and procedure manuals. • Physical Risks - pinpoint how specific design and construction aspects of the venue, its utilities, facilities, staging, etc., create spaces for risk. • Regulation Adherence - Review adherence to O.S.H.A., N.F.P.A., and A.D.A. regulations. • Environmental Risks - i.e., inclement weather, flooding, etc. • Business-Specific Risks - i.e., brand reputation, consumer satisfaction. Figure 1. Risk Probability and Impact Matrix. Additionally, the T.A.T. should distinguish the aspects of the event that are static, joint, and dynamic: • Static - fixed components within the short timeframe of the event, i.e., the venue, the venue's surrounding area, and attendee demographics. • Joint - cooperative and collaborative components between the event/security staff and the community, local government and law enforcement, and additional stakeholders to the business. • Dynamic - components liable to change or emerge and rapidly shift the operative risks and risk calculations needed for an event, i.e., adverse weather, demonstrations, criminal acts, and terrorism. There is a specific need to liaise with the local D.H.S for dynamic components. Protective Security Advisor. (see Chapter 3: Crisis Management) To conduct High Impact/Low Probability Analysis (HI/LP Analysis), reverse engineering risk matrices may enhance downstream threat detection and mitigation capabilities. HI/LP Analysis takes the high-impact, low- probability risks identified and defines pathways to the occurrence of the Copyright 2022 by Inner Circle Solutions 35 | P a g e All Rights Reserved

noted threat. Through early identification of indicators, security teams may be better capable of lowering the impacts of HI/LP events.  When establishing a threat assessment team, consider the internal and external stakeholder(s) in the event's security. At a minimum, the T.A.T. should liaise with venue and event personnel and stakeholders, federal and local law enforcement, local E.M.S. and Fire Departments, and the security staff for lodging accommodation and transportation/parking locations. Depending on the size and location of the event, additional stakeholders may be required to be included in the T.A.T. Threat assessments can and should be utilized at various points of the event's planning and preparation phases, regardless of event size or location. At a minimum, threat assessments should be conducted (1) when considering locations (see venue selection), (2) following the selection of a venue, and (3) following the implementation of control measures to address initially identified threats. First Responder Collaboration and connectivity – starting at the earliest planning stages – is key to successful emergency response during an eSports event. Engage the eSports host, first responders, and venue security in meetings beginning soon after venue selection and as soon as liaisons are established. First responders include local law enforcement, fire, and emergency medical services (E.M.S.). Other agencies may be included in certain jurisdictions or international venues. Engage first responders per venue contracts and permitting procedures. In addition to establishing a Command Center (see Annex B), engaging first responders benefits eSports events and provides a high standard of guest safety by: • Ensuring communications across different groups and agencies in an emergency or crisis. • Confirming who is in charge, including backup personnel, should an event need to be postponed or canceled. • Practicing for high probability emergencies so that everyone knows their role. The timeline below provides planning and preparation steps for engaging first responders and security personnel. It focuses on collaborating to ensure communications and emergency plans are understood by all Copyright 2022 by Inner Circle Solutions 36 | P a g e All Rights Reserved

agencies, roles and authority are clearly defined, and documentation is accessible to all agencies in hardcopy and digital formats. Meetings can be virtual, hybrid, or in-person, except for the final walkthrough. Timeline: After venue selection (6-9 months before the event)  • Establish primary contacts with local law enforcement, fire, E.M.S. • Contract with law enforcement, fire, and E.M.S. for traffic, medical response, and other details as needed • Set number of personnel, hours, and define duties • ESports host, first responders, and security personnel meeting to review: o Risk assessments o Traffic and transit safety o Venue security plans o Other emergency response protocols (ex: local requirements) o Permitting considerations (ex: occupancy and exits) Within one month before the event • First responder and security personnel check-in meeting • Provide documents to all first responder agencies, including digital and hard copies of venue set up for the esports event, map of the area, evacuation routes, phone trees, and contact lists • For large events: tabletop exercise to practice for a high probability emergency with liaisons (see Annex G for risk assessment matrix) • Focus on top priority threats from risk assessment Week of the event • Final venue walkthrough • First responder meeting for security environment updates and communications equipment testing Day-of-event  • Schedule and implement security briefings Copyright 2022 by Inner Circle Solutions 37 | P a g e All Rights Reserved

• Communications equipment testing • Security systems testing Additional considerations for engaging with first responders: Communications and Intelligence Sharing • Incorporate social media monitoring into data sharing for situational awareness • Utilize command center for intelligence sharing • Establish redundant communications channels (ex: text messaging, landlines, walkie-talkies) • Establish an emergency-only dedicated communications channel for the incident management team • Ensure that the eSports host is always in the “first to know” category, along with first responder liaisons and incident management team Incident Management / Unified Command  • Identify incident management team. • Clear chain of command documentation, circulated to each agency. • Includes triggers and authorization levels for pausing or canceling an event. • See Chapter 3: Crisis Management for details on response plans. Copyright 2022 by Inner Circle Solutions 38 | P a g e All Rights Reserved

CHAPTER 2: EVENT COMMUNICATION AND CROWD MANAGEMENT Chapter 2 provides an overview of recommended event operations. This chapter outlines guidelines in four sections: Family and Player Considerations, Command Center and Communication Flow, Spectator Management and Crowd Control, and Post Event Debriefs and After Action Reports, respectively. This chapter and its corresponding sections include the necessary details for establishing a communication strategy, building a Primary, Alternate, Contingency, and Emergency (PACE) communication plan, and planning for strategic behavioral monitoring. This chapter considers the personnel required to effectively staff and secure large-scale eSports events and a recommended timeline for establishing a Command Center and its staff. The intended audience for the family and player considerations section and its attached annexes are players and their families. Guidance outside of this section is intended for Inner Circle Solutions and should be read as a security plan guideline for eSports events. Copyright 2022 by Inner Circle Solutions 39 | P a g e All Rights Reserved

SECTION 1: PRIVACY AND SECURITY Family and Player Protection Protecting PII • Secure personal documents, files, laptops, thumb drives, jewelry, etc., in a hotel safe. This includes your social security card if you are a United States citizen. • Keep all personal information and devices secure in airports, hotels, restaurants, etc. See the travel/ security section regarding pickpocketing and how to keep your information secure. • If you are worried about information/ items getting stolen while traveling, it is best to leave it at home. • During travel, ensure the web address starts with \"HTTPS\" at the top when browsing the internet. The 's' stands for secure. Some websites will have HTTP, and plain HTTP sites can expose PII information to people who monitor such sites on unsecured connections. • Check bank and personal accounts regularly to ensure they haven’t been compromised. • Utilize a privacy screen on devices to avoid people gazing at the information you are looking up. Protecting privacy • Don't use A.T.M.s unless necessary. Instead, withdraw cash inside the bank using a teller. • Only connect to reliable Wi-Fi networks with password protection. • Use VPN as another layer of security when logging into websites. • Disable auto-connect features on websites and applications. • Don’t use public USB ports to charge devices. • Don't open unrecognized attachments on devices. For more information on phishing scams, see the cybersecurity section. Event • When you arrive at the event, designate a specific meeting point in the event of an emergency evacuation, inclement weather, or if a family member becomes separated. For more information, click here. Copyright 2022 by Inner Circle Solutions 40 | P a g e All Rights Reserved

• Be mindful of established evacuation routes, i.e., location, the direction of travel, road blockages, bridges, etc. • Elderly and disabled: Locate on-site emergency handicap- accessible transportation methods before attending the event. Alert staff/security officials of necessary medical requirements. • Follow event staff/security directions during an emergency to mitigate injuries or separations while being evacuated. SECTION 2: COMMAND CENTER AND COMMUNICATION FLOW Communication Strategy A communication strategy is required to identify potential hazards or indications, and warnings for an adverse event must pass to personnel (internal staff, security, or outside entities) who will handle the issue appropriately. The communication strategy will incorporate internal and external communication modes for relaying information to and from the Command Center. Establishing a Command Center will be vital to ensuring the event’s security. A Command Center is a group that maintains communication with each other quickly and easily. The Command Center should constitute event staff that can stay connected via walkie-talkie or radio communications. The group should have a physical location where players, families, and event staff can gather in emergencies and share information. Command Center staff should be stationed at various checkpoints throughout the venue. Each person should have periodic check-ins to ensure that the event meets all safety requirements. Command Center Event Priorities: • Gather and communicate important event information - The information must be received and communicated effectively to all interested parties of the event, the event management team, the communication team, venue staff, and attendees. The information must be collected on incidents so that the proper authorities and response teams can be notified and informed quickly. • Maintain command control - The Command Center must be able to launch multiple incident management plans at once, help Copyright 2022 by Inner Circle Solutions 41 | P a g e All Rights Reserved

provide structure for allocating resources and personnel, and ensure the effective direction of response operations. • Coordinate and document all incident responses - The Command Center staff must be able to create records of incidents and document all information to assist in reporting events. This documentation and records maintenance will not only help ensure that incidents are settled at the event but will also apply to Inner Circle Solutions in anticipating what may be an issue at future events. Recommended Command Center Staff: • Inner Circle Solutions Representative • Head of Facilities • Head of Security • Communications Lead • Law Enforcement Liaising Lead • First Responder Liaising Lead Recommended Communication Flow Organization: • Tier 1: Triage for initial incoming issues as they emerge. This framework recommends that the Command Center Staff/management provide Tier 1 staff with a reference/response book or manual for handling general high probability/low impact issues. If emerging issues require advanced assistance, direction, or deliberation – Tier 1 staff will direct the communication to Tier 2. • Tier 2: This framework recommends that this tier consists of the Inner Circle Solutions Representative, Communications Lead, and the Law Enforcement/First Responder Liaising Leads. Resolution, direction, and advice will be contingent upon the nature of the issue. If the case scope requires further escalation, the matter will be directed to Tier 3. • Tier 3: This framework recommends that the highest tier consists of the Head of Facilities and Head of Security. Tier 3 will advise, direct, and deliberate the concerns directly impacting the event at a strategic level. Copyright 2022 by Inner Circle Solutions 42 | P a g e All Rights Reserved

Recommended Timeline for Command Center Establishment: Timeframe: Recommended Action: Time of Venue Selection Define members of Command Center Staff (see recommendations above). 3 Weeks Prior Conduct Command Center Staff meetings to organize staff, set communication standards, establish technical communication requirements, etc. 1 Week Prior Physical walkthrough of Command Center location and location for communication points. 24 Hours Prior Secondary physical walkthrough of Command Center and pre-event check-in with staff. 4 Hours Prior Conduct pre-event meetings with Command Center Staff and all communications- relevant staff. Primary communications check. 1 Hour Secondary communications check. Figure 2: Timeline for Command Center establishment PACE plan PACE is an acronym and methodology used to build a communication plan. PACE stands for Primary, Alternate, Contingency, and Emergency means of communication. The method requires the author to determine the different parties that need to communicate and then decide, if possible, the best four forms of communication between each of those parties. PACE also designates the order in which an element will move through available communications systems until contact can be established with the desired distant element(s). Ideally, each method will be separate and independent of the other communication systems. The receiver must first sense which one the sender is using for each method Copyright 2022 by Inner Circle Solutions 43 | P a g e All Rights Reserved

and then respond. Use Annex C, the PACE plan template, to establish a PACE plan for each event. A PACE-based Communication Plan exists for a specific mission or task, not a specific unit, because the plan must consider both intra- and inter- unit sharing of information. Organizations may have multiple plans for different situations, activities, and/or partners. Primary: The best and intended method of communication between parties. Alternate: Another common but less-optimal method of accomplishing the task is often monitored concurrently with primary means. Contingency: Method will not be as fast/easy/inexpensive/convenient as the first two methods but is capable of accomplishing the task. Often (but undesirable), the receiver rarely monitors this method. Emergency: Method of last resort typically has significant delays, costs, and/or impacts. Often only monitored when the other means fail. SECTION 3: SPECTATOR MANAGEMENT AND CROWD CONTROL Crowd Screening Crowd screening ensures the safety and well-being of all involved. Law enforcement officials and event contractors conduct crowd screening. Anyone who enters the facility during the event goes through screening and all individuals who participated in the event. This also includes individuals working at the event, both part-time and full-time personnel, contractors, and media personnel. This is because the more thorough the screening at the event's start, the less likely unknown circumstances will occur. Security personnel should have the proper equipment on hand to conduct crowd screening. This includes metal detectors and K-9s to detect explosives or any paraphernalia. It is also important to note that the venue should have signs that list prohibited and suspicious items during crowd screening. Not all individuals who have prohibited items know they are a threat – it is common for pedestrians to have a thing in their possession that they did not realize was a prohibited item. Posting signs to raise awareness also acts as a self- screening mechanism and raises awareness among the attendees. During the event screening, periodic announcements should inform visitors of security procedures so that it does not raise any alarm when they enter the venue Copyright 2022 by Inner Circle Solutions 44 | P a g e All Rights Reserved

With large events, there is the possibility that an individual refuses to be screened – if this is the case, deny the individual's entrance. This could result in a confrontation or threat, depending on the circumstance. If this is the case, law enforcement personnel detailing the event should be informed – to maintain the peace. Screening before the event is just as important as screening during the event. Thankfully, technological advances help aid in this process. Drones are in use to help with event screening and monitoring any suspicious behavior. This allows for information collection.[4] In conclusion, the best practice for crowd screening is to understand the venue's layout, inform personnel of event screening procedures and prohibited items, and collect information from the open-source collection for crowd screening before the event. Ensure proper technology, such as metal detectors, necessary security personnel, K-9 units, and communications posted about banned items. Crowd Monitoring During the event, synergy is necessary, especially between the elements of the event procedures. To be well done, behavioral monitoring must be a multi-disciplinary practice, focusing on real-time updates informed by past actions. Based on the instruction and training provided by the behavioral specialist, event staff should maintain vigilance for key identifiers. Event-specific adaptations are heavily encouraged, but the following should be standardized: • Pay particular attention to earlier identified areas of concern. • Be aware of event-sanctioned obstacles vs. new ones (see crowd management). • Establish roving patrols of event staff to facilitate continued observation. • Facilitate clear communication and a clear hierarchy to follow. • Event staff should remain in constant contact with the Command Center and the social media team relaying indicators of emerging threats. Recommendation: The venue should be divided into security quadrants. Each quadrant should be staffed with specific personnel. However, the event should utilize additional roving patrols. Utilize that 1:1 division to facilitate better and more straightforward communication with other team members and the Command Center. Copyright 2022 by Inner Circle Solutions 45 | P a g e All Rights Reserved


Like this book? You can publish your book online for free in a few minutes!
Create your own flipbook