Battlefield Contract Worker

Chapter 1900: Obstruction

"Then let's start thinking from the outside. We fell in love with Lewen Novel.com WWW. LWXS520. COM" Lin Rui looked at the map and said, "Although we still don't know how the Octopus' private security team will be arranged, but the outside The South African military and police measures should be traceable. Because there are often important meetings in this place, they must have a security plan to deal with this situation.”

Actuary Jiang Kishi nodded in agreement, "We thought of going together, and I also want to start with the external situation. This is the relevant information I have sorted out. The implementation of various security measures and the scientific deployment of police forces are prerequisites. The first is Traffic control, including air no-fly and ground closures of some key sections.

During large conferences, host cities often opt for public holidays to ease security pressures. Considering the current situation in these countries, there may even be partial martial law, and even supermarkets and restaurants are closed. On the day of the summit, the main streets may be empty, save for police and military personnel on duty. Of course this is only a possibility. "

"What else?" Lin Rui frowned while looking at the map.

Pointing to the map, the South African military and police will partially control the traffic and neighborhoods around the conference venue. During this four-nation summit, several main roads leading to the International Convention Center will be closed, and only those with limited license plates will be closed. Vehicles can only enter the restricted area.”

"The defense is so strict?" Crazy Horse frowned.

"At that time, the neighborhoods around the conference venue will also be closed. To enter and exit this area, you need to go through a background check before you can get an official pass. And even if you wear a certificate, security personnel will come to interrogate and verify documents at a distance. , but also to check whether the photo of the ID is the same as that of the person. In addition, in addition to road patrols, the Air Force will also participate in patrol tasks, and helicopters are hovering over the venue almost all the time.

Security personnel will also use high technology to protect and monitor roads and blocks. Around the main venue, "electronic guardrails" with a height of 3 meters and connected to the high-voltage grid will be set up. Those who attempt to climb over the electronic guardrails will lose consciousness.

The video surveillance system is the "third eye" of security personnel. As these four countries have just experienced serious civil strife, the South African government, in order to ensure the safety of the four-nation summit, set up 350 cameras with face recognition function on the highway from the airport to the venue to strictly prevent terrorist suspects from approaching the venue. "

"Damn it, what about the security check?" Lin Rui frowned.

"Entrance security inspection is the last line of defense for the security of the venue. After a comprehensive clearance and bomb inspection of all conference venues, the organizer will conduct the most stringent security inspections on people entering the venue and their belongings.

Generally speaking, the security lead time of the meeting is at least about 3 hours. At the gate of the expected four-nation summit venue, the security check at the venue will be isolated outside the venue. First, it went through a machine security check, and then went through a very careful unpacking and hand-picking after entering the venue. All the machinery and equipment in the bag even needed to go through the power-on inspection. Under normal circumstances, there are explosion-proof dogs and explosion-proof teams on standby in the venue, and several police dogs patrol the venue.

The security check procedure is carried out in two parts. The first security check is relatively simple. You only need to show your credentials for participating in the meeting or a press card that allows you to enter the interview. The computer needs to be turned on to see if it is functioning properly. "Kishi explained, "These are fixed processes. "

"In this way, it is not difficult to sneak into the venue. The key is the issue of weapons." Sergey frowned. "This can also be done in another way."

"In addition, according to international practice, in order to ensure the safety of these people's travel, there are generally five firewalls.

The last firewall is to contact the hospital along the way of the target, prepare first aid measures, prepare blood of the same blood type as the target, etc., once the target has an accident, it can be rescued in time.

In addition to these three security circles, there are also intelligence and advance preparations. That is, the target person collects and organizes intelligence information before traveling, and then takes corresponding protective measures based on this intelligence. These preparations include that the road that the target travels must be inspected in advance, including the topography and the width of the road.

For example, people who often threaten to make trouble at the scene will be basically positioned, their risk factors will be assessed, and corresponding protective measures will be formulated.

The third layer of security is to detect and monitor any surrounding locations that may pose a threat to the target participating in the meeting within the range of the fixed point, so as to prevent snipers from causing damage to the target from a long distance.

The security measures in South Africa this time also follow the practice of keeping the windows of all nearby high-rise buildings closed while the target convoy passes by.

The second layer is to allow security personnel to have extensive and close contact with the masses, to timely detect any risks that may pose to the target, and to stop abnormal phenomena and signs in time. This level should be the private security personnel under Octopus, with a wider distribution, there is no fixed standard for the distance from the target, and the identity is not easy to identify. If you are not careful, you will think that they are also the public or reporters.

Among the five firewalls, UUkanshu www.uukanshu.com is first a three-layer security circle. The first layer is the personal security circle of the target person, that is, the core security personnel. They must follow the target at all times to prevent accidents. They are responsive, adaptable, and ready to sacrifice themselves. These people may be Octopus' elite security guards, and the target's personal bodyguards. "Circle Kishi on the map.

"This is really troublesome." Sergey said blankly.

"Assassination of this level is never easy, and South Africa is very experienced in such large-scale international conferences, which is why the representatives of the four countries did not hold a conference in their own countries, but chose to hold a conference at the Durban International Conference Center in South Africa. The reason. One is influence, and the other is safety." Jiangan nodded.

"I think there is another reason. These warlord leaders are not at ease with each other and will never go to each other's territory in person. That's why they chose to hold a meeting in South Africa, a fifth party with no obvious bias." Sergei thought thought.

"That's right." Lin Rui nodded, "and it's not so much that they don't trust each other, it's better that they have doubts about the secret society's attitude. Originally they could be their own emperors, but now they have to unite to form a federation. There will be anxiety, that the secret society that organizes everything behind the scenes will be biased towards one of them. This will lead to the loss of their own interests.”

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like