Due to terrorist incidents in the whole country, the level of security in the organizations such as concerts, meetings, matches, celebrations, etc. has been maximized. Nevertheless, during the period when these terrorist incidents increased, there were cancellations in many organizations. Even bomb reconnaissance with K9 dogs before the event became frequent.
In crowded events, first of all, no people should enter into the relevant area without authorization. Therefore, all entry and exit points must be controlled. All remaining border sizes should not allow entry with physical obstacles. Thus, a safe area must be established inside.
All people who enter should be scanned with electronic devices such as turnstiles, x-rays, metal detectors, etc. and taken to a safe area free from all kinds of weapons and, if possible, GBT by means of the police.
Entrances should be recorded and controlled with the camera systems and biometric reader card access systems.
Since the entries and exits will be made through these controlled points, there may be intensity or even congestion in different gates at different times. All officials should be in online communication with the radio systems for the rapid intervention in case of various incidents and for the reinforcement from other gates by notifying this situation to the management center quickly. Today, almost all personnel have smartphones. All personnel should be in online communication with these smartphones and, if possible, smart applications.
It can be easily ensured that both physical security personnel communicate, assign tasks, track their location, etc. by developing special applications that will enable the personnel to communicate with each other. While the same application is made available to visitors and information such as useful information about the organization area, locations of police stations, maps, public transportation information, locations of less busy gates can be provided, the people's locations, movement psychology etc. can be followed. In addition, this software will allow people to send necessary warnings and notification messages.
The number of people inside must be recorded at all times in order to avoid congestion inside. This can be assured very intelligently with camera systems or card access systems. Door-type metal detectors or turnstiles can also be used for this.
Blacklist applications can be made with advanced biometric systems such as face recognition systems, iris recognition systems, vein recognition systems, fingerprint recognition systems during the activities that require very high precautions.
Note that electronic security equipment can never substitute humans. For this reason, the system performance can only be guaranteed if people are constantly trained on the use of these devices.