Securing Mega-Events
eBook - ePub

Securing Mega-Events

Networks, Strategies and Tensions

  1. English
  2. ePUB (mobile friendly)
  3. Available on iOS & Android
eBook - ePub

Securing Mega-Events

Networks, Strategies and Tensions

About this book

Mega-events such as the Olympic Games, World Cup finals and international political summits are occasions of almost unparalleled economic, political and social significance for host nations and cities. The scale and scope of mega-event security has continued to grow enormously since 11 September 2001, consistently involving the largest policing and security operations for event hosts outside of wartime. This book is the first to focus exclusively on the organisational dynamics underpinning the design and delivery of mega-event security.

Using the G20 Summit in Brisbane, Australia in November 2014 as a case study, in conjunction with comparisons with events such as the Toronto 2010 G20, the authors engage in a comprehensive assessment of the networks, strategies and tensions involved in mega-event security. By drawing on the insightful experiences of those responsible for securing the Brisbane 2014 G20, the authors look behind-the-scenes to capture the complexity of mega-eventsecurity. The authors argue that such an approach is essential to better appreciate how different conceptions of security, ways of thinking and acting, impact a range of security ideals and outcomes.

Frequently asked questions

Yes, you can cancel anytime from the Subscription tab in your account settings on the Perlego website. Your subscription will stay active until the end of your current billing period. Learn how to cancel your subscription.
No, books cannot be downloaded as external files, such as PDFs, for use outside of Perlego. However, you can download books within the Perlego app for offline reading on mobile or tablet. Learn more here.
Perlego offers two plans: Essential and Complete
  • Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
  • Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Both plans are available with monthly, semester, or annual billing cycles.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes! You can use the Perlego app on both iOS or Android devices to read anytime, anywhere — even offline. Perfect for commutes or when you’re on the go.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Yes, you can access Securing Mega-Events by Chad Whelan,Adam Molnar in PDF and/or ePUB format, as well as other popular books in Social Sciences & National Security. We have over one million books available in our catalogue for you to explore.
© The Author(s) 2018
Chad Whelan and Adam MolnarSecuring Mega-EventsCrime Prevention and Security Managementhttps://doi.org/10.1057/978-1-137-59668-0_1
Begin Abstract

1. Introduction

Chad Whelan1 and Adam Molnar2
(1)
School of Humanities and Social Sciences, Faculty of Arts and Education, Deakin University, Geelong, Australia
(2)
School of Humanities and Social Sciences, Faculty of Arts and Education, Deakin University, Melbourne, Australia
Chad Whelan (Corresponding author)
Adam Molnar
End Abstract
Mega-events such as the Olympic Games, FĂ©dĂ©ration Internationale de Football Association World Cup finals and Group of eight/20 (G8 /20 ) international political summits are occasions of almost unparalleled economic, political and social significance for host nations. In recent years, much attention has been placed on securing mega-events, particularly sporting mega-events , which consistently involve the largest security operation for host nations or cities outside of wartime. As others have noted, the costs of the security operation and numbers of personnel have increased exponentially since 11 September 2001 and budget forecasts are consistently overrun (Bennett and Haggerty 2011b; Fussey et al. 2011; Jennings 2012b). The London 2012 Olympic Games , for example, involved over 80,000 police , military and private security personnel in an operation that is believed to have cost well over $1 billion United States dollar (Armstrong et al. 2017). With the event host being on the world stage, risk-based mentalities underpinned by worst-case scenarios have precipitated an ever-increasing number of new risks being imagined that then require some form of mitigation (Boyle and Haggerty 2009b; Jennings 2012a, 2017). The resulting constructions of mega-event ‘security’ are amongst the most complex and far-reaching imaginable (Boyle et al. 2015; Coaffee et al. 2011), involving unprecedented coordination across multiple agencies and jurisdictions (Boyle 2012; Reese 2008), legal, technological and institutional transformations (Bennett and Haggerty 2011b; Monaghan and Walby 2012b; Poynter 2009), crowd management operations (Boykoff and Fussey 2014; Police Executive Research Forum 2011) and militarised public safety initiatives (Graham 2011).
This book examines in-depth the task of securing mega-events from the perspective of security actors involved across the planning lifecycle. Using the Group of Twenty (G20) Summit in Brisbane, Australia, November 2014 as a case study, along with international comparisons with sporting mega-events and other political summits , the principal objective of the book is to call attention to the various tensions that ensue within mega-event security networks as police and security actors interpret and approach ‘security’. In a similar way to others (e.g., Boyle and Haggerty 2009b; Coaffee and Wood 2006; Fussey et al. 2011), we suggest that security is an amorphous, ‘liquid’ (Zedner 2006) concept that can be imagined in quite different ways (Valverde 2011; Wood and Dupont 2006; Wood and Shearing 2007; Zedner 2009). By drawing on qualitative interviews with members of key agencies such as the Queensland Police Service (QPS) and Commonwealth G20 Taskforce —the two main actors involved in securing Brisbane 2014—as well as a series of internal documents made available to the researchers, we focus on the internal properties and organisational dynamics underlying the security operation. We examine how these dynamics influence the design and operations of mega-event security networks and how different conceptions of security , ways of thinking and acting, impact security outcomes. We focus particularly on the underlying tensions involved in the design and implementation of mega-event security.
In this Introductory chapter, we focus on the question of how to interpret mega-event security and outline how our approach contributes to the extant literature. We then introduce the internal properties of security networks (Whelan and Dupont 2017) and argue for the need to better understand the tensions that emerge as police and security actors are brought together to design mega-event security. As large numbers of actors form networks, each with potentially quite different dispositions and imaginations of security , mega-event security is a contested construct. The ‘pursuit’ (Zedner 2009) of mega-event security, we suggest, is underpinned by tensions within a complex web of overlapping relationships that have a significant impact on security outcomes. We then outline our data and methods, incorporating a brief overview of the Brisbane 2014 G20 . Finally, we outline the structure of the book as we move from our analysis of the design and operations of new security nodes and networks, to questions of how these nodes and networks sought to construct mega-event security, including securing people and places. We should note at the outset that the approach we take in the book is to let our interviewees speak for themselves as much as possible, drawing heavily on their reflections regarding the construction of mega-event security .

Securing Mega-Events

While mega-events are widely recognised as monumental cultural spectacles that come with significant economic costs for host cities and nations, it is only recently that literature has attempted to clarify what constitutes a proper ‘mega-event’. In general, the term refers to fixed duration events that: (a) attract a large number of visitors; (b) have a large mediated reach; and (c) generate large amount of expenses and impacts on the built environment and population (Muller 2014; Roche 2000). Based on the size, scale , mediated reach and transformational impacts for institutions and host cities, a range of events can be included under this definition, including Olympic Games, World Cups , Commonwealth Games and international political summits . Mega-events are therefore differentiated from more regular large-scale events that routinely occur in most major cities and which are usually the responsibility of the relevant local police in conjunction with event promoters and operators (Muller 2014). Many similar one-off events may be referred to in different ways—such as ‘mega’ or ‘major’—but we use the term mega-event throughout the book in line with existing literature (e.g., Bennett and Haggerty 2011b), and because we believe the term more accurately reflects the complex dynamics of large-scale international events.
Mega-events of all types have come to be recognised for their exceptional displays of security. With a premium placed by event hosts on ‘destination marketing’, untowar...

Table of contents

  1. Cover
  2. Front Matter
  3. 1. Introduction
  4. 2. Analysing Mega-Event Security: Looking Inside Operations
  5. 3. Organising Security Actors: Designing New Nodes and Networks
  6. 4. Organising Across Boundaries: Communication, Coordination and Conflict
  7. 5. Securing Places: Security Risks, Techniques and Technologies
  8. 6. Securing Populations: Protests, Residents and Spectators
  9. 7. Conclusion
  10. Back Matter