How Tethered Drones Contribute to Securing Large Events
Feedback from CrowdCover
Montana University Chief of Police Brad Giffin, and Cloud Cover Mission Commanders, Richard Simpson and Brian Zacherl, share their experience with the use of tethered drones in large events security. They deployed tethered drones on major events such as the Guns N’Roses concert hosted at the Washington Grizzly stadium, with more than 25 000 seat capacity.
Get the replay
Speakers
Brad Giffin
Police Department of Montana University
Chief of Police, responsible of the management of the Police Department
Brian Zacherl
CrowdCover
Former marine and military in the United States, Co-founder of CrowdCover
Richard Simpson
CrowdCover
Former marine and military in the United States, Co-founder of CrowdCover
Find out
1
Security challenges at the University of Montana
The University of Montana, located in Missoula, has over 10,000 students and features a main campus that includes a 25,200-seat football stadium, hosting major events such as concerts and football games.
2
Police drones for event security
The use of police drones provides a persistent surveillance capability that is crucial for monitoring critical incidents, managing crowds, and responding to emergencies during events.
3
Tethered drones vs. free-flying drones
Tethered drones, with their continuous and real-time surveillance capabilities, offer improved decision-making and coordination before, during, and after events compared to free-flying drones.
About our invited companies
Montana University Police Department
The mission of the Montana State University Police Department is to provide Montana State University students, faculty, staff, and visitors a safe and secure environment for living and learning, and to secure the events taking place in the stadium of the campus.
CrowdCover
CrowdCover is a professional consulting and implementation company of seasoned professionals from the U.S. Military and Intelligence community. CrowdCover focus is supporting decision-makers with solutions to the most complex security requirements.