Battlefield Contractor

Chapter 1873: Obstacles 2

"Then let's start thinking from the periphery first.??" Lin Rui looked at the map and said, "Although we still don't know how the octopus's private security team will be arranged, there should be traces of the South African military and police measures in the periphery. Follow. Because this place often holds important meetings, they must have a safety plan to deal with this situation."

The actuary nodded in agreement, "We thought of going together, I also want to start with the peripheral situation first. This is the relevant information I compiled. The implementation of various security measures, scientific deployment of police is a prerequisite. First is transportation. Control, including air no-fly and ground blockade of some key road sections.

During large conferences, the host city usually chooses to let people take a holiday to relieve security pressure. Taking into account the current situation in these countries, there may even be some martial law, and even cities and restaurants will be closed. On the day of the summit, the main streets may be empty, only police and military personnel on duty. Of course this is only a possibility. "

"What else?" Lin Rui frowned as he looked at the map.

Jiang Jian pointed to the map road, "The South African military police will implement partial control of traffic and neighborhoods around the conference venue. During the four-nation summit, several major roads leading to the International Conference Center will be closed, and only those with limited license plates will be closed. Only vehicles can enter the control zone."

"So defense is so strict?" Crazy Horse frowned.

"At that time, all the blocks around the conference venue will also be closed. To enter and exit this area, you need to go through a background check before you can get an official pass. And even if you wear your ID, security personnel will come to interrogate and check the verification documents some distance away. It is also necessary to check whether the photo of the certificate is consistent with that of the person. In addition, in addition to road patrols, the Air Force will also participate in patrol missions, and helicopters hover over the venue almost all the time.

Security personnel will also use high technology to protect and monitor roads and blocks. "Electronic guardrails" up to 3 meters high and connected to the high-voltage power grid will be installed around the main venue. People who attempt to climb over the electronic guardrail will lose consciousness.

The video surveillance system is the "third eye" of security personnel. Since these four countries have just gone through serious civil strife, the South African government has set up 35o cameras with facial recognition functions on the highway from the airport to the venue in order to ensure the safety of the four-nation summit to prevent terrorist suspects from approaching the venue. "

"Damn it, what about the security procedures?" Lin Rui frowned.

“Entrance security is the last line of defense for the venue’s security. After a comprehensive clearance and bomb screening of all conference venues, the organizer will conduct the most stringent security checks on people entering the venue and their belongings.

Generally speaking, the security lead time for a meeting is at least about 3 hours. The security check at the gate of the four-nation summit is expected to be isolated from the venue. First went through a machine security check, and then went through a very careful hand-picking after opening the bag. All the machinery and equipment in the bag even need to go through the boot inspection. Under normal circumstances, there are explosion-proof dogs and explosion-proof teams on standby in the venue, and several police dogs patrol the venue.

The security check procedure is divided into two parts. The first security check is relatively simple. You only need to show your credentials for participating in the meeting or a press card that allows you to enter the interview; the second security check is to pass all items you carry with you through the security check machine, cameras and The computer needs to be turned on to determine if it is working properly. "Jianggan explained, "These are fixed processes. "

"In that case, it is not difficult to get into the venue. The key is the issue of weapons." Sergey frowned. "You can also think of another way."

"In addition, in accordance with international practice, in order to ensure the safety of these people, there are generally five firewalls.

The last firewall is to contact the hospital along the journey of the target, prepare first aid measures, prepare blood of the same blood type as the target, and so on. Once the target has an accident, it can be rescued in time.

In addition to these three security circles, there is also intelligence to prepare and prepare. That is, the target person collects and organizes intelligence information before traveling, and then takes corresponding protective measures based on the intelligence. These preparations include the need to conduct a prior inspection of the target travel road, including the topography and the width of the road.

For example, people who frequently threaten to go to the scene to make troubles are basically positioned, their risk factors are evaluated, and corresponding protective measures are formulated.

The third layer of security is to detect and monitor any surrounding locations that may pose a threat to the targets participating in the meeting within the scope of a fixed point, to prevent snipers from causing damage to the target from a long distance.

The security measures in South Africa also follow this practice, that is, during the passage of the target convoy, the windows of all nearby tall buildings remain closed.

The second level is to allow security personnel to have extensive and close contact with the masses, to promptly stop any existing risks that may pose to the target, and to stop abnormal phenomena and signs in time. This level should be the private security personnel under Octopus. They are distributed in a wider range. There is no fixed standard for the distance from the target. The identity is not easy to identify. If you are not careful, you will think that they are also the masses or reporters.

Among the five firewalls, there is a three-layer security circle, and the first layer is the personal security circle of the target person, that is, the core security personnel. They must follow the target at any time to prevent accidents. They are quick to react, have strong adaptability, and can sacrifice themselves at any time. These people may be the octopus’s elite security personnel and the target’s personal bodyguards. "Jiangan drew circles on the map.

"This is really troublesome." Sergey said in a daze.

"This level of assassination has never been an easy task, and the South African side is very experienced in such large-scale international conferences. This is why the representatives of these four countries did not hold the conference in their own country, but chose the Durban International Conference Center in South Africa. The reason. One is the impact, and the other is safety." Jiang An nodded.

"I think there is another reason. These warlord leaders are not at ease with each other and will never go to each other's turf in person. So they chose to hold the meeting in the fifth party, which has no obvious bias, in South Africa." Sergey thought. Thought about it.

"Yes." Lin Rui nodded, "And it is not so much that they have no trust in each other, but rather that they have doubts about the attitude of the secret society. They could each be the emperor of the earth, but now they want to unite to form a federation. It is inevitable in their hearts. There will be some worries, worried that the secret society that organizes everything behind the scenes will be biased towards one of them. This will lead to the loss of their own interests."

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like