Difference between revisions of "Measures"

From Securipedia
Jump to navigation Jump to search
(Created page with "Category:Top category = {{PAGENAME}} = --- This page is a placeholder for measures that need to be inserted in other pages --- I. Target hardening. This situational crim...")
 
m
 
(127 intermediate revisions by 4 users not shown)
Line 1: Line 1:
[[Category:Top category]]
 
   
  +
[[File:ae.png|25px|right|This is a page providing background in a specific field of expertise]]'''Measures''' are provisions made or actions taken to protect an object or subject from risk.
= {{PAGENAME}} =
 
   
  +
Measure types can be classified by their temporal application: structural or event-driven measures. Structural measures are more geared towards permanent solutions, such as infrastructural improvements, in order to reduce the risk of criminal acts taking place in the areas where these measures are applied. Event-driven measures have a more temporal nature and can be implemented in order to ensure extra risk reduction and mitigation for (large scale) events. These are intended for more high impact crimes such as (terrorist) attacks.
---
 
This page is a placeholder for measures that need to be inserted in other pages
 
---
 
I. Target hardening. This situational crime prevention approach involves
 
the use of devices or materials designed to obstruct the vandal by physical
 
barriers:
 
1. Toughened glass (acrylic, polycarbon, etc.)
 
2. Latticework or screens to cover windows
 
3. Fire-retardant paint
 
4. High-impact plastic or steel fixtures
 
5. Hardened rubber or plastic swing seats
 
6. Concrete or steel picnic tables, benches, bleachers
 
7. Trash receptacles bolted to concrete bases
 
8. Rough-play-tolerant adventure playgrounds
 
9. Original planting of large-diameter trees
 
10. Slashproof transit vehicle seats
 
11. Steel-framed bus seats
 
12. Antigraffiti repellent spray on bus seats
 
13. Tamperproof sign hardware and fasteners
 
14. Door anchor hinges with nonremovable pins
 
   
  +
==Structural measure types to protect an object or subject from risk==
II. Access control. This approach involves architectural features, mechanical
 
  +
Structural measures are permanent solutions that mediate the risk of a [[Crime|criminal]] act. These measures can be further classified by their point of application in the process of a criminal act. From the perspective of a criminal, all measures reduce the perceived attractiveness of a target. Identified points of application are:
and electronic devices, and related means for maintaining prerogatives
 
over the ability to gain entry:
 
15. Key control systems
 
16. Locked gates, doors, windows
 
17. Electromagnetic doors unopenable from outside
 
18. Deadbolt and vertical-bolt locks
 
19. Metal door/window shutters
 
20. Protective grills over roof access openings
 
21. Fenced yards
 
22. Vertical metal or small-mesh (unclimbable) fencing
 
23. Reduced number of building entrances
 
24. Unclimbable trees/bushes planted next to building
 
25. Prickly bushes planted next to site to be protected
 
26. Sloped windowsills
 
27. Elimination of crank and gear window mechanisms
 
28. Steeply angled roofs with parapets and ridges
 
29. Use of guard dogs
 
30. Use of student photo identification
 
31. Partitioning off of selected areas during "downtime" hours
 
32. High curbs along areas to be protected
 
   
  +
*Increasing perceived effort
III. Deflecting offenders. This is the channeling of potentially criminal
 
  +
*Increasing perceived risk
or aggressive behavior in more prosocial directions by means of architectural,
 
  +
*Decreasing anticipated reward
equipment, and related alterations:
 
  +
*Controlling contributing circumstances
33. Graffiti boards, mural programs
 
  +
*Other
34. Schools/studios to give graffiti writers exposure and recognition
 
35. Interesting wallpaper, daily newspaper, chalkboard on bathroom wall
 
36. Litter bins
 
37. Wash fountains and towel dispensers in school hallways
 
38. Steering of pathway circulation:
 
• Paving the shortest walk between connecting points
 
• Avoiding sharp changes in direction
 
• Paving natural shortcuts after demonstrated use
 
• Installing or landscaping traffic barriers (e.g., benches, bushes)
 
39. "Next step" posters on broken equipment
 
   
  +
All measure types can be classified in one of these categories. The table below displays for each of the measure types in Securipedia, which point of application it works on.
IV. Controlling facilitators. This is the alteration of the means to criminal
 
or aggressive behavior by making such means less available, less accessible,
 
or less potentially injurious:
 
40. Control over sales of spray paint and indelible markers
 
41. Removal of debris from construction/demolition sites
 
42. Removal of waste paper, rubbish, and other combustibles
 
43. Use of tamperproof screws
 
44. Placement of permanent signs, building names, and decorative hardware
 
out of reach from ground
 
45. Placement of school thermostats, fire alarms, and light switches far
 
from "hang-out" areas
 
   
  +
By clicking the {{#tip-info:Example of a explanatory text}} a brief description of the measure is provided.
V. Exit-entry screening. Instead of seeking to exclude potential perpetrators
 
(as in access control), this set of tactics seeks to increase the likelihood
 
of detecting persons who are not in conformity with entry requirements
 
(entry screening) or detecting the attempted removal of objects that should
 
not be removed from protected areas (exit screening):
 
46. Closed-circuit TV
 
47. Metal detectors
 
48. Vibration detectors
 
49. Motion detectors
 
50. Perimeter alarm system
 
51. Library book tags
 
   
  +
{| class="wikitable" style="text-align: center;"
VI. Formal surveillance. This is surveillance by police, guards, monitors,
 
  +
! style="background:#f0f0f0;" |'''Increasing perceived effort'''
citizen groups, or other paid or volunteer security personnel:
 
  +
! style="background:#f0f0f0;" |'''Increasing perceived risk'''
52. Police, citizen, senior citizen, tenant, parent patrols
 
  +
! style="background:#f0f0f0;" |'''Decreasing anticipated reward'''
53. Neighborhood Watch, School Watch, Block Watch, Rail/Bus Watch
 
  +
! style="background:#f0f0f0;" |'''Contributing circumstances'''
groups
 
  +
! style="background:#f0f0f0;" |'''Other'''
54. Provision of on-site living quarters for citizens or security personnel
 
  +
|-
(e.g., "school sitters," "campground hosts")
 
  +
|[[Measure: Target hardening|Target hardening]]{{#tip-info:Target hardening is the measure of strengthening the security by increasing the required effort to commit crimes to or at an object}}||[[Measure: Surveillance|Surveillance]]{{#tip-info:Surveillance is the measure of monitoring the behaviour, activities, or other changing information, usually of people for the purpose of influencing, managing, directing, or protecting.}}||[[Measure: Target removal|Target removal]]{{#tip-info:Target removal is the reduction of risk by removing the perceived attracting aspects from an [[attractive object]]}}||[[Measure: Controlling disinhibitors|Controlling disinhibitors]]{{#tip-info:Controlling disinhibitors is the reduction of risk by removing or regulating disinhibiting substances or circumstances}}||[[Measure: Deflection|Deflection]]{{#tip-info:Deflecting crime is the reduction of risk by creating circumstances that direct criminals to less critical objects}}
55. Informant hotlines (e.g., "rat-on-a-rat program," "secret witness
 
  +
|-
program")
 
  +
|[[Measure: Access control|Access control]]{{#tip-info:Access control is the reduction of risk by regulating and controlling the flows of traffic into and out of an area or object}}||[[Measure: Intervention force|Intervention force]]{{#tip-info:A intervention force is the measure of having adequate resources (first responders) to react to emergencies in order to minimize impact and restore a normal situation as soon as possible.}}||[[Measure: Removal of crime motivator|Removal of crime motivator]]{{#tip-info:Removal of a crime motivator is the reduction of risk by removing the benefits of a crime}}||[[Measure: Facilitating compliance|Facilitating compliance]]{{#tip-info:Facilitating compliance is the measure of reducing risk by decreasing crime by making it easier for the public to behave according to the local rules.}}||Creating awareness / stimulating conscience{{#tip-info:Creating awareness is the measure of increasing the mental reserves of people to committing crimes}}
56. Crime Solvers Anonymous reward program
 
  +
|-
57. Mechanical, ultrasonic, infrared, electronic intruder alarm systems
 
  +
|[[Measure: Directing traffic flows|Directing traffic flows]]{{#tip-info:Directing traffic flows is the measure of reducing the opportunities for a criminal to approach a suitable target by physically separating the flows of traffic}}||[[Measure: Screening|Screening]]{{#tip-info:Screening is the measure of reducing risk by identifying all traffic entering and/or exiting a certain area or object}}|| ||Rule setting{{#tip-info:Rule-setting is the measure of erecting legal or regulatory restrictions of a temporal and/or local nature in order to reduce risk}}||
58. Automatic fire detection systems
 
  +
|-
59. After-hours use of school public address system for monitoring
 
  +
|[[Measure: Removing means|Removing means]]{{#tip-info:Removing means is the reduction of risk by ensuring the tools or other means conductive to crime are not available}}||Increase punishment{{#tip-info:Increasing punishment is the reduction of risk by the increase of the negative consequences of crime when caught}}|| ||[[Measure: Ownership|Ownership]]{{#tip-info:Ownership is the reduction of crime by establishing an environment where there is a clear separation between public and private space}}||
  +
|-
  +
| || || ||[[Measure: Maintenance|Maintenance]]{{#tip-info:Maintenance is the measure of discouraging crime by designing places with management and maintenance in mind}}||
  +
|}
   
  +
==Event-driven measure types==
VII. Natural surveillance. This is surveillance provided by employees,
 
home owners, pedestrians, and others going about their regular daily
 
activities:
 
60. Community after-school use
 
61. Reduced teacher-student ratio
 
62. Increased number of employees (e.g., playground supervisors, bus
 
conductors, teachers)
 
63. Round-the-clock custodial staffing
 
64. Live-in custodian/caretaker
 
65. Distribution of faculty/staff offices throughout the school
 
66. Assignment of additional faculty/staff members to hall, cafeteria
 
duty
 
67. "Youth vacation vigil" student surveillance program
 
68. Use of bus/train employees to report vandalism on their routes
 
69. Improved exterior and interior lighting
 
70. Low trimming of shrubbery and plants
 
   
VIII. Target removal. This is the physical removal or enhanced inaccessibility
 
of potential vandalism targets:
 
71. Use of graffiti dissuaders
 
• Teflon, plastic laminate, fiberglass, or melamine covering
 
• Rock cement, slanted siding, or deeply grooved surfaces
 
• "Paint-outs" or use of contrasting colors in patterned surfaces
 
• Fast-growing wall vines or shrubbery, or construction of wall
 
barriers
 
72. Removal of pay phones from high-loitering areas
 
73. Removal of corner bus seats, hidden from driver's view
 
74. Removal of outside plant bulbs
 
75. Windowless school or other buildings
 
76. Omission of ground-level windows
 
77. Concealed school door closers
 
78. Concealed pipework
 
79. Fittings moved out of reach (e.g., from wall to ceiling)
 
80. Signs/fixtures made flush with wall or ceiling
 
81. Key-controlled light fixtures in public areas
 
82. Removal of (or no replanting of) easily damaged trees/bushes
 
IX. Identifying property. This is the physical identification marking of
 
potential vandalism targets:
 
83. Property marking with school district identification
 
84. Property marking with business logo
 
85. Property marking with identification seals
 
86. Property marking with organization stencil
 
87. Property marking with individual's Social Security number
 
   
  +
Event driven-measures are temporal solutions that can mediate the risk of a high-impact crime (such as an attack) at an event in a designated area. These measures, in turn, can be broken down into various technology categories that could assist in the mitigation of [[Security Vulnerability|vulnerabilities]]:
X. Removing inducements. This is the physical alteration of potential
 
vandalism targets:
 
88. Rapid repair of damaged property
 
89. Rapid removal of graffiti
 
90. Use of small windowpanes
 
91. Elimination of school washroom and toilet stall doors
 
92. Elimination of bars over toilet stall doorways
 
93. School restroom thermostats kept at 62°F
 
94. Removal of gates and fences
 
95. Repainting of playground equipment in bright colors
 
96. Beautification programs (e.g., landscaping, painting, maintenance)
 
   
  +
The '''five technology categories''' in event-driven measures are:
XL Rule setting. This is the making of explicit prior statements about
 
acceptable and unacceptable behaviors, as well as about penalties for
 
noncompliance:
 
97. Model "hate crime" bill
 
98. Antivandalism laws
 
99. Building design specifications
 
100. Building security codes
 
101. Parental liability statutes
 
102. Prohibition of sale of spray paint and indelible markers
 
103. Codes of rights and responsibilities
 
104. School rules of student conduct
 
105. Rigorous, irregular, no-warning fire drills
 
   
  +
#''[[Measure type: Information and Communications Technology (ICT)|ICT]]'' that could be used for communicating, storing, analysing and protecting information. Examples are: WiFi, IoT, Encryption, VPN, et cetera;
XII. Education. These are direct efforts to dissuade potential and actual
 
  +
#''[[Measure type: Sensors|Sensors]]'' that could be used for detection, identification, localisation or tracking. Examples are: cameras, facial recognition, acoustic sniper localisation, et cetera;
vandals by informing them about vandalism costs, consequences, and
 
  +
#''[[Measure type: Actuators|Actuators]]'' that could be used for warning, intercepting or eliminating. Examples are: sirens, anti-drone drones, HPM vehicle stopping, et cetera;
alternatives:
 
  +
#''[[Measure type: Physical measures|Physical measures]]'' that could be used for controlling access, impeding an attack or protective materials. Examples are: tourniquets, portable rising steps, bomb blast window film, et cetera;
106. Vandalism education programs
 
  +
#''[[Measure type: Methods|Methods]]'' that could be used for procedures, best practices or standards to implement solutions. An example is the ISO 31000 Risk Management
107. Arson education programs
 
108. Vandalism awareness walks
 
109. Vandalism case study classroom discussions
 
110. Classroom brainstorming on vandalism reduction
 
112. Year-round education
 
113. Student orientation handbook and meetings
 
114. Multicultural sensitivity training
 
115. Antivandalism lectures by older students to younger ones
 
116. Antivandalism films
 
117. Antivandalism games
 
118. Antivandalism slide or tape program
 
119. Antivandalism brochures
 
120. "Ride with pride" antivandalism transit program
 
   
  +
In this application, the term technology should be interpreted in the broadest sense of the word. It includes both hard technologies and soft technologies. Hard technologies are tangible devices or components (e.g. computers and software). Soft technologies include the human areas of decision making, strategy development, training, and concept formation (e.g. methodologies or procedures).
XIII. Publicity. These are indirect efforts to inform potential and actual
 
vandals, as well as the general public, about vandalism costs, consequences,
 
and alternatives:
 
121. Antivandalism advertising
 
122. Antivandalism news releases
 
123. Milk carton/grocery bag antivandalism messages
 
124. Antivandalism decals on mass transit vehicles
 
125. Antivandalism slogan contests
 
126. "Sign amnesty" day (a day of no fines or other penalties for those
 
who return stolen signs)
 
127. "Help the playground" campaigns
 
128. Antivandalism buttons, T-shirts, rulers, bookmarks, posters
 
   
  +
Each technology is (part of) a security measure, providing some basic security function as a response to a (potential) threat. As used in the EU VAT, there are ten different technology uses that range from before, during and after an attack. The technology uses are:
XIV. Punishment. These are negative experiences directed to perpetrators
 
consequent to their vandaiistic behavior:
 
129. Suspension from school
 
130. Monetary fines
 
131. Restitution
 
132. Student vandalism account
 
133. Group billing for residence hall damage
 
   
  +
#''Alert'' - used for alerting public (e.g. sirens, texting service);
XV. Counseling. These are remedial experiences directed to perpetrators
 
  +
#''Surveil'' - used for situational awareness (e.g. cameras, social media tools);
consequent to their vandaiistic behavior:
 
  +
#''Respond'' - used for responding to an attack (e.g. security personnel, non-lethal weapons);
134. Student counseling programs
 
  +
#''Protect'' - used to protect assets (people, buildings, infrastructure);
135. Conflict negotiation skills training
 
  +
#''Detect'' - used for detecting a weapon or weapon use (e.g. entry scanning equipment);
136. Moral reasoning training
 
  +
#''Overcome'' - used for overcoming a sudden vulnerability (e.g. extra concertina wire);
137. Interpersonal skills training
 
  +
#''Improvise'' - created on the spot from available means (e.g. use police vehicle as a road block);
138. Aggression replacement training
 
  +
#''Restrict'' - used for restricting public access (e.g. safety barriers);
139. Behavior modification treatment for arson
 
  +
#''Adapt'' - used for changing circumstances (e.g. moving assets to a safer location);
• Stimulus satiation
 
  +
#''Other.''
• Contingency management
 
• Assertion training
 
   
  +
The following examples illustrate the potential needs for these event-driven, technological solutions by indicating their support towards mediating risk and mitigating vulnerabilities:
XVI. Involvement. These are efforts to increase the sense of involvement
 
with and ownership of potential vandalism targets:
 
140. Encouraging students in residence halls to personalize (paint, furnish)
 
their rooms
 
141. Permitting students in residence halls to retain same room several
 
semesters
 
142. Student participation in school decision making
 
143. School administration collaboration with student organizations
 
144. School-home collaboration
 
145. Hiring of unemployed youths as subway vandalism inspectors
 
146. "Adopt-a-station" antivandalism program
 
   
  +
*Enhancing the surveillance of an area to for instance count crowds, monitor allocation of citizens or identify occurrences of objects or behaviors. By enhancing this surveillance, a municipality and the other local actors can identify anomalies or assess the impact at certain moments in time before an attack or respond faster to incidents and aid citizens.
XVII. Organizational climate. These are procedures for enhancing the
 
  +
*Enhancing the cooperation between different actors (between own forces as well as completely different actors). In the cases of terrorist attacks, actors do not stand alone and need to cooperate in order to prevent, responds and recover from terrorist attacks. By enhancing the cooperation in could create more effective deployment of forces, better communication between them and faster (real time) sharing of information like images or videos to get ahead of the threat.
quality of the potential or actual vandal's social/educational/daily living
 
  +
*Enhancing alerting and evacuating of citizens during an attack by putting in place early warning systems and effective evacuation pathways. Potential innovative technology solutions could enhance the warning systems and evacuation pathways for specific public spaces.
context:
 
  +
*Enhancing the existing knowledge and train forces specifically for protecting public spaces against terrorism, as anti-terrorism expertise is often missing at local government. There is a need of knowing were and how this knowledge can be obtained as well as how to train personal in the future.<br />
147. Teacher/staff approval/reward for student prosocial behaviors
 
148. Teacher respect toward students
 
149. Teacher/parent modeling of respect for others and for property
 
150. Regular, visible presence of school principal
 
151. Involvement of school principal in community activities
 
152. School curriculum revision
 
153. Improved student-custodian relationships
 
154. Improved school-community relationships
 
155. Reorganization of large schools into schools-within-a-school or
 
house plans
 
   
  +
<br />
{{references}}
 
 
= MAP =
 
 
<websiteFrame>
 
website=http://securipedia.eu/cool/index.php?concept=Risk
 
width=100%
 
border=0
 
scroll=auto
 
align=middle
 
</websiteFrame>
 
 
<headertabs/>
 

Latest revision as of 15:28, 23 November 2020

This is a page providing background in a specific field of expertise

Measures are provisions made or actions taken to protect an object or subject from risk.

Measure types can be classified by their temporal application: structural or event-driven measures. Structural measures are more geared towards permanent solutions, such as infrastructural improvements, in order to reduce the risk of criminal acts taking place in the areas where these measures are applied. Event-driven measures have a more temporal nature and can be implemented in order to ensure extra risk reduction and mitigation for (large scale) events. These are intended for more high impact crimes such as (terrorist) attacks.

Structural measure types to protect an object or subject from risk

Structural measures are permanent solutions that mediate the risk of a criminal act. These measures can be further classified by their point of application in the process of a criminal act. From the perspective of a criminal, all measures reduce the perceived attractiveness of a target. Identified points of application are:

  • Increasing perceived effort
  • Increasing perceived risk
  • Decreasing anticipated reward
  • Controlling contributing circumstances
  • Other

All measure types can be classified in one of these categories. The table below displays for each of the measure types in Securipedia, which point of application it works on.

By clicking the a brief description of the measure is provided.

Increasing perceived effort Increasing perceived risk Decreasing anticipated reward Contributing circumstances Other
Target hardening Surveillance Target removal Controlling disinhibitors Deflection
Access control Intervention force Removal of crime motivator Facilitating compliance Creating awareness / stimulating conscience
Directing traffic flows Screening Rule setting
Removing means Increase punishment Ownership
Maintenance

Event-driven measure types

Event driven-measures are temporal solutions that can mediate the risk of a high-impact crime (such as an attack) at an event in a designated area. These measures, in turn, can be broken down into various technology categories that could assist in the mitigation of vulnerabilities:

The five technology categories in event-driven measures are:

  1. ICT that could be used for communicating, storing, analysing and protecting information. Examples are: WiFi, IoT, Encryption, VPN, et cetera;
  2. Sensors that could be used for detection, identification, localisation or tracking. Examples are: cameras, facial recognition, acoustic sniper localisation, et cetera;
  3. Actuators that could be used for warning, intercepting or eliminating. Examples are: sirens, anti-drone drones, HPM vehicle stopping, et cetera;
  4. Physical measures that could be used for controlling access, impeding an attack or protective materials. Examples are: tourniquets, portable rising steps, bomb blast window film, et cetera;
  5. Methods that could be used for procedures, best practices or standards to implement solutions. An example is the ISO 31000 Risk Management

In this application, the term technology should be interpreted in the broadest sense of the word. It includes both hard technologies and soft technologies. Hard technologies are tangible devices or components (e.g. computers and software). Soft technologies include the human areas of decision making, strategy development, training, and concept formation (e.g. methodologies or procedures).

Each technology is (part of) a security measure, providing some basic security function as a response to a (potential) threat. As used in the EU VAT, there are ten different technology uses that range from before, during and after an attack. The technology uses are:

  1. Alert - used for alerting public (e.g. sirens, texting service);
  2. Surveil - used for situational awareness (e.g. cameras, social media tools);
  3. Respond - used for responding to an attack (e.g. security personnel, non-lethal weapons);
  4. Protect - used to protect assets (people, buildings, infrastructure);
  5. Detect - used for detecting a weapon or weapon use (e.g. entry scanning equipment);
  6. Overcome - used for overcoming a sudden vulnerability (e.g. extra concertina wire);
  7. Improvise - created on the spot from available means (e.g. use police vehicle as a road block);
  8. Restrict - used for restricting public access (e.g. safety barriers);
  9. Adapt - used for changing circumstances (e.g. moving assets to a safer location);
  10. Other.

The following examples illustrate the potential needs for these event-driven, technological solutions by indicating their support towards mediating risk and mitigating vulnerabilities:

  • Enhancing the surveillance of an area to for instance count crowds, monitor allocation of citizens or identify occurrences of objects or behaviors. By enhancing this surveillance, a municipality and the other local actors can identify anomalies or assess the impact at certain moments in time before an attack or respond faster to incidents and aid citizens.
  • Enhancing the cooperation between different actors (between own forces as well as completely different actors). In the cases of terrorist attacks, actors do not stand alone and need to cooperate in order to prevent, responds and recover from terrorist attacks. By enhancing the cooperation in could create more effective deployment of forces, better communication between them and faster (real time) sharing of information like images or videos to get ahead of the threat.
  • Enhancing alerting and evacuating of citizens during an attack by putting in place early warning systems and effective evacuation pathways. Potential innovative technology solutions could enhance the warning systems and evacuation pathways for specific public spaces.
  • Enhancing the existing knowledge and train forces specifically for protecting public spaces against terrorism, as anti-terrorism expertise is often missing at local government. There is a need of knowing were and how this knowledge can be obtained as well as how to train personal in the future.