Difference between revisions of "Measure type: Actuators"

From Securipedia
Jump to navigation Jump to search
m
m
Line 1: Line 1:
 
''Actuators'' could be used for warning, intercepting or eliminating.
 
''Actuators'' could be used for warning, intercepting or eliminating.
   
  +
The following chart includes various Actuator solutions that can be implemented as event driven-measures to mediate the risk of a high-impact crime (such as a terrorist attack) at an event in a designated area.
''Threat type/threat phase/tech use hier uitleggen of linken naar measures en het op die pagina uitleggen?''
 
  +
  +
The chart includes various columns:
  +
  +
In the first column, under ''''Tech description'''<nowiki/>', '''technological solutions''' are listed.
  +
  +
The next column indicates which '<nowiki/>'''Threat types'''' can be mitigated with these technological solutions:
  +
  +
# ''Fire arms'' attack - small calibre pistol or semi/full-automatic rifle;
  +
# ''Sharp object'' attack - knifes, machete, other sharp and blunt objects;
  +
# ''Vehicle'' attack - use of vehicle as a weapon by ramming large crowds;
  +
# ''IED'' (explosives) - left/concealed in objects or goods (based on home-made or commercial explosives);
  +
# ''PBIED'' (explosives) - explosives concealed on a person (suicide or carrier);
  +
# ''UAVIED'' (explosives) - explosives delivered by a remote-controlled airborne device;
  +
# ''VBIED'' (explosives) - explosives concealed inside a vehicle (or its cargo);
  +
# ''Chemical'' attack - threat object concealed in goods or carried items (e.g. canister or UAV dispensed);
  +
# ''Biological'' attack - threat object concealed in goods or carried items (e.g. canister or UAV dispensed);
  +
# ''Radiological'' attack - threat object concealed in goods or carried items (e.g. canister or UAV dispensed).
  +
  +
The 'T'''hreat phase'''' column states in which phase of the attack the technological solution has the most effect:
  +
  +
# ''Initial Target Identification'' (before the attack);
  +
# ''Operational Planning'' (before the attack);
  +
# ''Pre-Attack Preparation'' (before the attack);
  +
# ''Execution'' (during the attack);
  +
# ''Post-Attack/Escape'' (after the attack).
  +
  +
Finally, the '<nowiki/>'''Tech use'''' column states the appertaining security function of the technological solution:
  +
  +
# ''Alert'' - used for alerting public (e.g. sirens, texting service);
  +
# ''Surveil'' - used for situational awareness (e.g. cameras, social media tools);
  +
# ''Respond'' - used for responding to an attack (e.g. security personnel, non-lethal weapons);
  +
# ''Protect'' - used to protect assets (people, buildings, infrastructure);
  +
# ''Detect'' - used for detecting a weapon or weapon use (e.g. entry scanning equipment);
  +
# ''Overcome'' - used for overcoming a sudden vulnerability (e.g. extra concertina wire);
  +
# ''Improvise'' - created on the spot from available means (e.g. use police vehicle as a road block);
  +
# ''Restrict'' - used for restricting public access (e.g. safety barriers);
  +
# ''Adapt'' - used for changing circumstances (e.g. moving assets to a safer location);
  +
# ''Other.''
  +
 
{| class="wikitable"
 
{| class="wikitable"
 
|'''''Tech description'''''
 
|'''''Tech description'''''

Revision as of 14:47, 15 October 2020

Actuators could be used for warning, intercepting or eliminating.

The following chart includes various Actuator solutions that can be implemented as event driven-measures to mediate the risk of a high-impact crime (such as a terrorist attack) at an event in a designated area.

The chart includes various columns:

In the first column, under 'Tech description', technological solutions are listed.

The next column indicates which 'Threat types' can be mitigated with these technological solutions:

  1. Fire arms attack - small calibre pistol or semi/full-automatic rifle;
  2. Sharp object attack - knifes, machete, other sharp and blunt objects;
  3. Vehicle attack - use of vehicle as a weapon by ramming large crowds;
  4. IED (explosives) - left/concealed in objects or goods (based on home-made or commercial explosives);
  5. PBIED (explosives) - explosives concealed on a person (suicide or carrier);
  6. UAVIED (explosives) - explosives delivered by a remote-controlled airborne device;
  7. VBIED (explosives) - explosives concealed inside a vehicle (or its cargo);
  8. Chemical attack - threat object concealed in goods or carried items (e.g. canister or UAV dispensed);
  9. Biological attack - threat object concealed in goods or carried items (e.g. canister or UAV dispensed);
  10. Radiological attack - threat object concealed in goods or carried items (e.g. canister or UAV dispensed).

The 'Threat phase' column states in which phase of the attack the technological solution has the most effect:

  1. Initial Target Identification (before the attack);
  2. Operational Planning (before the attack);
  3. Pre-Attack Preparation (before the attack);
  4. Execution (during the attack);
  5. Post-Attack/Escape (after the attack).

Finally, the 'Tech use' column states the appertaining security function of the technological solution:

  1. Alert - used for alerting public (e.g. sirens, texting service);
  2. Surveil - used for situational awareness (e.g. cameras, social media tools);
  3. Respond - used for responding to an attack (e.g. security personnel, non-lethal weapons);
  4. Protect - used to protect assets (people, buildings, infrastructure);
  5. Detect - used for detecting a weapon or weapon use (e.g. entry scanning equipment);
  6. Overcome - used for overcoming a sudden vulnerability (e.g. extra concertina wire);
  7. Improvise - created on the spot from available means (e.g. use police vehicle as a road block);
  8. Restrict - used for restricting public access (e.g. safety barriers);
  9. Adapt - used for changing circumstances (e.g. moving assets to a safer location);
  10. Other.
Tech description Threat type Threat phase Tech use Tech criteria Products/suppliers
Influence attacker in communication (for example, negotiation strategies, security questioning, communication skills) all Execution Respond Performance


Security Questioning Protocols
Deception of attacker (for example, distract (i.e., slow down) by unexpected noises or physical barriers) all Execution Respond Readiness /  Performance Psychological Intervention Guide for PBIED attacks: multidimensional matrix of significant aspects of PBIED in crowd,

facilitates sense making in using softer methods to delay/protect (by TNO, for FP7 SUBCOP)

Loudspeakers all Execution / post-attack/escape Alert Physical Many available
Lights on pathways (maybe in combination with sensor) all Execution / post-attack/escape Respond Physical / readiness / performance n/a
Crowd control (for example, influence techniques or use of social media) all Execution Alert / protect / restrict Readiness / Performance n/a
Non lethal weapons (acoustic, electroshock, et cetera) Fire arms, sharp object, PBIED attack Execution Pre-attack preparations


Physical / cost n/a
Weapons to stop the terrorist during the attempted attack Fire arms, sharp object, vehicle, PBIED attack Execution Pre-attack preparations


Cost / compliancy n/a
Intervention to stop the terrorist during the attempted attack Fire arms, sharp object, PBIED attack Execution Pre-attack preparations


Other: effectiveness n/a
Use of animals as actuator (for example, influencing behaviour in an overt manner (for example intimidation) and a covert manner) all Execution Surveil / respond / detect / restrict


Readiness / Performance n/a

Other measure types are: