"Then let's start thinking about the periphery first." Lin Rui looked at the map and said, "Although we still don't know how Octopus's private security team will be arranged, there should be traces of the South African military and police measures on the periphery. .Since important meetings are often held in this place, they must have a security plan to deal with this situation.¡±
Actuary Majiang nodded in agreement, "We thought of going together, and I also wanted to start with the peripheral situation first. This is the relevant information I compiled. Implementing various security measures and scientifically deploying police forces are prerequisites. The first is Traffic control, including air no-fly and ground closure of some key road sections.
During large-scale conferences, the host city usually chooses to give people a holiday to relieve security pressure. Considering the current situation in these countries, there may even be partial martial law, with even supermarkets and restaurants closed. On the day of the summit, the main streets may be deserted except for police and military personnel on duty. Of course this is just a possibility. "
"What else?" Lin Rui looked at the map and frowned.
Shogan pointed to the map and said, "The South African military police will implement partial control of traffic and neighborhoods around the conference venue. During this four-nation summit, several main roads leading to the International Conference Center will be closed, and only those with limited license plates will be closed." Only vehicles can enter the controlled area.¡±
"The defense is so strict?" Crazy Horse frowned.
"At that time, all the neighborhoods around the conference venue will also be closed. To enter or exit this area, you need to go through a background check before you can get an official pass. And even if you wear your ID, security personnel will come at a distance to question and check the ID. , and also check whether the ID photo is consistent with the person. In addition, in addition to road patrols, the Air Force will also participate in patrol tasks, and helicopters will hover over the venue almost all the time.
Security personnel will also use high technology to protect and monitor roads and neighborhoods. An "electronic guardrail" with a height of 3 meters and connected to the high-voltage power grid will be set up around the main venue. People who try to climb over the electronic guardrail will lose consciousness.
The video surveillance system is the ¡°third eye¡± for security personnel. Since these four countries have just experienced serious civil strife, in order to ensure the safety of this four-nation summit, the South African government installed 350 cameras with facial recognition functions on the highway from the airport to the venue to strictly prevent terrorist suspects from approaching the venue. "
"Damn it, where are the security procedures?" Lin Rui frowned.
¡°Entrance security inspection is the last line of defense for venue security. After a comprehensive clearance and bomb inspection of all conference venues, the organizer will conduct the most stringent security checks on people entering the venue and their belongings.
Generally speaking, the security lead time for a meeting is at least 3 hours. At the entrance of the expected Four-Nation Summit venue, the security check at the venue will be separated from the venue. First, they went through a machine security inspection, and after entering the venue, they went through a very careful hand-opening of the bag. All the machines and equipment in the bag even needed to go through a power-on test. Under normal circumstances, there are explosion-proof dogs and explosion-proof teams on standby at the venue, and several police dogs patrol the venue.
The security check process is divided into two parts. The first security check is relatively simple. You only need to show the certificate to attend the conference or the press card that allows access to the interview. The second security check requires all the items you carry with you to pass through the security inspection machine, cameras and The computer needs to be turned on to make sure it is functioning properly. "Masagishi explained, "These are fixed processes. "
"So, it's not that difficult to sneak into the venue. The key is the issue of weapons." Sergey frowned, "We can also find another way to do this."
¡°In addition, according to international practice, in order to ensure the travel safety of these people, there are generally five firewalls.
The last firewall is to contact the hospitals along the target's journey, prepare first aid measures, and prepare blood of the same blood type as the target, so that if something happens to the target, rescue can be carried out in time.
In addition to these three security circles, there are also intelligence and advance preparation. That is, the target person collects and organizes intelligence information before traveling, and then takes corresponding protective measures based on this intelligence. These preparations include prior investigation of the target road, including topography and road width.
For example, we will conduct a basic positioning of people who often threaten to go to the scene to cause trouble, evaluate their risk factors, and then formulate corresponding protective measures.
The third layer of security is to detect and monitor any surrounding locations that may pose a threat to the targets participating in the meeting within a fixed-point range to prevent snipers from causing damage to targets from long distances.
South Africa¡¯s security measures this time also follow this practice, that is, the windows of all nearby high-rise buildings remain closed while the target convoy passes.
The second level is to allow security personnel to have extensive and close contact with the masses to promptly detect possible threats to the target.?Any risks shall be avoided and abnormal phenomena and signs shall be promptly stopped. At this level, they should be the private security personnel under Octopus. They are distributed over a wider area. There is no fixed standard for the distance from the target. Their identities are not easy to identify. If you are not careful, you will think that they are also members of the public or reporters.
Among the five firewalls, the first is a three-layer security circle. The first layer is the target's personal security circle, that is, the core security personnel. They must stay close to the target at all times to prevent accidents. They are quick to react, adaptable, and ready to sacrifice themselves at any time. These people may be Octopus's elite security personnel and the target's personal bodyguards. "Jiang'an drew a circle on the picture.
"This is really troublesome." Sergey said blankly.
"An assassination of this level is never easy, and South Africa is very experienced in such large-scale international conferences. This is why the representatives of these four countries did not hold the conference in their own countries, but chose to hold the conference at the Durban International Conference Center in South Africa. Reasons. One is the impact, and the other is safety." Jiang An nodded.
"I think there is another reason. These warlord leaders are not trusting each other and will never go to each other's territory in person. That's why they chose to hold the meeting in South Africa, a fifth party with no obvious bias." Sergey thought. thought for a while.
"That's right." Lin Rui nodded, "And rather than saying that they don't trust each other, it's better to say that they have doubts about the attitude of the secret society. Originally, they could each be their own emperors, but now they have to unite to form a federation. It is inevitable in their hearts There will be worries that the secret society that organizes everything behind the scenes will be biased towards one of them, resulting in the loss of its own interests."
If you like battlefield contractors, please collect them: battlefield contractors are updated the fastest. (Remember the website address: www.hlnovel.com