Bellman Transcript

Request email notification when page changes E-Notify

[Music plays, video fly through of Las Vegas strip at night]

[Video of Lance Burton, Master Magician, performing magic]

Lance Burton: Hi, I'm Lance Burton. You know, the world looks to the Silver State as a refuge away from the burdens and uncertainties of daily life, and it is my special privilege to work with you in making that experience a lifelong memory for those who visit our home. 

Your hard work has helped build the reputation of our state as a welcoming, exciting, safe and secure sanctuary. 

We need to preserve and protect our hard-earned reputation and, in today’s world of extremes, it has never been more important to understand the threats to our livelihood. 

That is why I am pleased to share with you the important information that follows, providing you with the knowledge and tools that will protect our home and our extraordinary position as the finest and friendliest tourist destination on Earth.

[Title: Enhanced Awareness For Prevention: Bellman]

Dave Courvoisier, News Anchors: This message builds on a fundamental understanding of the Seven Signs of Terrorism and is designed to assist you, the BELLMAN, in more effectively supporting property security and guest safety.

The learning objectives are to help you:

  • Know the Seven Signs of Terrorism
  • Know what is suspicious in your working environment
  • Pay attention to what doesn’t look, sound, smell or feel right.
  • Know how and to whom to report suspicious activity.

Several of the Seven Signs are uniquely seen in the BELLMAN’S workplacE:

  • Information gathering
  • Testing Security (or Probing)
  • Suspicious behavior


Dave Courvoisier: This is when someone attempts to gain information about an important place, operation or workers. 

[Video of a person asking a bellman questions] 
Terrorists may ask what the areas of your building are used for, question you about building operations or deliveries, or seek out security-related information.  That alone, or taken together with other facts, might reveal security strengths or weaknesses.


Dave Courvoisier: Testing the property, or probing, is another way for terrorists to gather information. This may be done by walking or driving into restricted areas to observe security or law enforcement response. They may also try to pass physical security barriers or bypass access procedures in order to assess strengths, weaknesses and response times. 

[Video of a fire engine pulling up next to a bellman, and a suspicious person taking a video of the fire engine with an iPad]
Specific areas of interest to terrorists would include how long it takes security or law enforcement to respond to an incident, the number of responding personnel and their equipment, and the routes taken to a specific location. 


[Video of a suspicious person with a briefcase scanning the area. A bellman approaches him asking if he's OK. The suspicious man nods that he is. The suspicious man places the briefcase next to a garbage recepticle and leaves.]

Dave Courvoisier: A suspicious person may be seen pre-positioning supplies or equipment.  They might be seen in a given area as though they are waiting for something to happen.  They may exhibit signs of nervousness.  And …they may appear oblivious to normal activities taking place around them because of their focus on their own impending plans.

Dave Courvoisier: We all have good instincts and, if we listen to those instincts, they just might make the difference in detecting those people who are testing our security. It may be simple human curiosity or it could be something more sinister, but we should listen to our instincts when it simply doesn’t feel right.

[Sharpening Observational Skills

  • What is suspicious?
  • How will I know?
  • What should I do?
  • Am I misreading?
  • Is this for real?


Dave Courvoisier: Any of the seven signs may come months apart, so it is very important to document every fragment of information, no matter how insignificant it may appear, and forward this information to the proper authorities. These could be the vital pieces of the puzzle.

[Pieces of the Puzzle

  • Heavier Bags
  • Suspicious Suitcases
  • Guest With Empty Luggage
  • Guest Refuses Help With Bag
  • Unattended Luggage
  • Expensive Photographic/Surveillance Equipment
  • Heavy, Clumsy Parcels
  • Vehicle With Concealed Items
  • Attention To Vehicle And Pedestrian Traffic
  • Taking Notes, Pictures, Or Videos
  • Vehicle Appears Weighted Down
  • Vehicle Emit A Strange Odor
  • Liquid Leaking From Vehicle


Dave Courvoisier:

  • Bags which are heavier than normal.
  • Bags or suitcases that are stained, leaking or have wires protruding.
  • A guest who arrives with luggage that is seemingly empty
  • a Guest who refuses assistance with NUMEROUS BAGS
  • unattended luggage
  • Possession of very expensive photographic/surveillance equipment, binoculars or other equipment not typically carried by guests or tourists, like night vision goggles or military binoculars.
  • parcels or boxes that have unusual weight or balance
  • Vehicle that contains large items concealed by blankets or tarps.
  • Individuals taking notes, pictures, or videos of STRUCTURAL FEATURES.
  • A vehicle that appears weighted down, where the rear sags noticeably
  • A vehicle emitting a strange odor, such as a chemical or fertilizer smell
  • A liquid substance, not normally associated with a vehicle, is observed leaking from the passenger compartment or the trunk.

Dave Courvoisier: The goal is simple:  “If you see something, say something.”  It’s about protecting our guests, our co-workers,  ourselves, and our communities. 

[Video montage of bellman scenes. Puzzle pieces form a stop sign. Report anything suspicious to a supervisor, security, or the Police.]

Dave Courvoisier: Every observation you make of suspicious behavior or suspicious items could be part of a bigger puzzle that, when known by the right people in a timely manner, will help save lives and stop something bad from happening. 

[University of Las Vegas (UNLV) Institute for Security Studies]