Trending Topics

What we can learn about event security from the Charlie Kirk assassination

The fatal shooting of Charlie Kirk underscores why overlapping security layers and coordinated planning are essential in today’s threat environment

AP25254008410269.jpg

Well-wishers pay their respects at a makeshift memorial at the national headquarters of Turning Point USA shown after the shooting death of Charlie Kirk, the co-founder and CEO of the organization, during a Utah college event Wednesday, Sept. 10, 2025.

Ross D. Franklin

On September 10, political activist and Turning Point USA founder Charlie Kirk was assassinated at a rally at Utah Valley University. The rally, billed as the American Comeback Tour, was meant to “educate students about the importance of freedom, free markets and limited government.”

Video shows Kirk sitting on the stage and talking when a shot rang out and struck him in the neck. He later died from the wound, becoming the latest victim of targeted political violence.

| NEWS COVERAGE: Charlie Kirk fatally shot in act of political assassination at Utah college

Two people were initially taken into custody after the shooting but later released, as reported by ABC News. FBI Director Kash Patel said the manhunt for the suspected shooter remains underway and the investigation is ongoing. [1] Law enforcement at the federal, state and local levels is processing a large crime scene, collecting evidence and interviewing witnesses.

The challenge of event security

The U.S. Secret Service has studied targeted attacks for decades. Its Exceptional Case Study identified behavioral indicators of assassins, citing factors such as a documented history of mental health issues within the court system, contacts with law enforcement and the presence of a real or perceived grievance. [2]

A grievance is often the first step along the pathway to violence. If not interdicted, it can escalate to an act of violence. [3] (See the DHS National Threat Evaluation & Reporting Program Behavioral Approach to Violence Prevention guide below.)

A critical issue is how event security is planned and executed. In the modern age, event security requires extensive planning and the full resources of the local first responder community. Working with event hosts and guests, organizers must ensure that, as the Secret Service says, 360 degrees of protection is provided.

Layers of protection

All events in today’s threat environment must adhere to basic security principles, often described as overlapping three rings of protection. These rings — outer, middle and inner — provide layers and tripwires that backstop each other. If not managed properly, as seen in the attempted assassination of former President Trump in Butler, Pennsylvania, a gap can emerge that adversaries can exploit.

The outer ring

The outer ring includes access control points such as parking, transportation and event check-in. At this stage, it is critical to monitor approaching attendees and surrounding high-ground vantage points, especially at venues like college campuses with tall buildings and line-of-sight vulnerabilities.

Controlling entry and exit points allows security to observe attendees before they enter the middle or inner perimeters. Access control also establishes rules on what can or cannot be brought into the event. Ticketing provides tracking of attendees before, during and after an event, which can be vital if an incident occurs.

The middle ring

The middle ring manages the flow of people and maintains surveillance inward and outward. Crowd monitoring helps identify potential threats before they escalate. This area also allows staging of support assets, such as fire and EMS personnel, to provide rapid assistance — a critical issue for any large gathering.

The inner ring

The inner ring provides close-in protection. In this case, Kirk had a personal security detail. But even the best close protection cannot prevent long-range attacks; it is the final layer of defense. If this ring is engaged, as seen in Butler, then the overall security plan has failed.

A 360-degree approach

Given today’s evolving threat environment, there is no room for incomplete or reactive security postures. Event planning must embrace a 360-degree approach — one that deters attacks while ensuring rapid, coordinated response when lives are at stake.

Please keep the Kirk family in your thoughts and prayers.

Tactical takeaway

Event security must integrate layered defenses and coordinated planning with first responders to close gaps adversaries can exploit.

How can smaller agencies without federal-level resources strengthen event security for political or community gatherings? Share below.



Police1 event security resources

| WATCH: Gordon Graham on planning for the worst-case scenario at public events

References

  1. Deliso M. Manhunt for shooter continues after Charlie Kirk killed in ‘political assassination.’ ABC News.
  2. Mihalek D. How would-be assassins are identified by the Secret Service: ANALYSIS. ABC News.
  3. U.S. Department of Homeland Security. Behavioral Approach to Violence Prevention.

Donald J. Mihalek is the Executive VP of the FLEOA Foundation, an ABC News Contributor, a retired senior Secret Service agent and a regional field training instructor who served on the President’s detail and during two presidential transitions. He was also a police officer and served in the U.S. Coast Guard.