Difference between revisions of "Measure type: Information and Communications Technology (ICT)"

From Securipedia
Jump to navigation Jump to search
(Tabel uitleggen/introduceren: elke kolom kort benoemen met de juiste link. Threat type (Terrorism)/Threat phase (Terrorism)/Tech Use (Measure types)/Tech Criteria (PRoTECT evaluation). [products/suppliers weglaten])
Line 1: Line 1:
ICT could be used for: communicating, storing, analysing and protecting information.
+
ICT measures could be used for: communicating, storing, analysing and protecting information.
   
  +
The following chart includes various ICT solutions that can be implemented as event driven-measures to mediate the risk of a high-impact crime (such as a terrorist attack) at an event in a designated area.
''Tabel uitleggen/introduceren: elke kolom kort benoemen met de juiste link. Threat type (Terrorism)/Threat phase (Terrorism)/Tech Use (Measure types)/Tech Criteria (PRoTECT evaluation). [products/suppliers weglaten]''
 
 
{| class="wikitable"
 
{| class="wikitable"
 
|'''Tech description'''
 
|'''Tech description'''
Line 7: Line 7:
 
|'''Threat phase'''
 
|'''Threat phase'''
 
|'''Tech use'''
 
|'''Tech use'''
|'''Tech criteria'''
 
 
|-
 
|-
 
|Detection of deviant behaviour online (by combining data science (how to extract and model online behaviour) and social science (which behaviours to address))
 
|Detection of deviant behaviour online (by combining data science (how to extract and model online behaviour) and social science (which behaviours to address))
Line 14: Line 13:
 
<br />
 
<br />
 
|Surveil
 
|Surveil
|Performance (detection rate)
 
 
|-
 
|-
 
|Vulnerability assessment of individuals before the fact (for example, Multi-Agency Vulnerability Assessment Support Tool (MAVAST))
 
|Vulnerability assessment of individuals before the fact (for example, Multi-Agency Vulnerability Assessment Support Tool (MAVAST))
Line 20: Line 18:
 
|Initial target identification
 
|Initial target identification
 
|Surveil
 
|Surveil
|Performance (accuracy, at face value as data are largely absent)
 
 
|-
 
|-
 
|GIS system for geographical information
 
|GIS system for geographical information
Line 26: Line 23:
 
|Execution / post-attack/escape
 
|Execution / post-attack/escape
 
|Surveil / respond / protect / detect / improvise
 
|Surveil / respond / protect / detect / improvise
|Performance
 
 
|-
 
|-
 
|Video analytics
 
|Video analytics
Line 32: Line 28:
 
|Initial target identification / execution / post-attack/escape
 
|Initial target identification / execution / post-attack/escape
 
|Surveil / respond / protect / detect
 
|Surveil / respond / protect / detect
|Performance
 
 
|}
 
|}
  +
<u>The chart includes various columns that are explained here.</u>
  +
  +
In the first column, under ''''Tech description'''<nowiki/>', '''technological solutions''' are listed.
  +
  +
The next column indicates which '<nowiki/>'''Threat types'''' can be mitigated with these technological solutions:
  +
  +
# ''Fire arms'' attack - small calibre pistol or semi/full-automatic rifle;
  +
# ''Sharp object'' attack - knifes, machete, other sharp and blunt objects;
  +
# ''Vehicle'' attack - use of vehicle as a weapon by ramming large crowds;
  +
# ''IED'' (explosives) - left/concealed in objects or goods (based on home-made or commercial explosives);
  +
# ''PBIED'' (explosives) - explosives concealed on a person (suicide or carrier);
  +
# ''UAVIED'' (explosives) - explosives delivered by a remote-controlled airborne device;
  +
# ''VBIED'' (explosives) - explosives concealed inside a vehicle (or its cargo);
  +
# ''Chemical'' attack - threat object concealed in goods or carried items (e.g. canister or UAV dispensed);
  +
# ''Biological'' attack - threat object concealed in goods or carried items (e.g. canister or UAV dispensed);
  +
# ''Radiological'' attack - threat object concealed in goods or carried items (e.g. canister or UAV dispensed).
  +
  +
The 'T'''hreat phase'''' column states in which phase of the attack the technological solution has the most effect:
  +
  +
# ''Initial Target Identification'' (before the attack);
  +
# ''Operational Planning'' (before the attack);
  +
# ''Pre-Attack Preparation'' (before the attack);
  +
# ''Execution'' (during the attack);
  +
# ''Post-Attack/Escape'' (after the attack).
  +
  +
Finally, the '<nowiki/>'''Tech use'''' column states the appertaining security function of the technological solution:
  +
  +
# ''Alert'' - used for alerting public (e.g. sirens, texting service);
  +
# ''Surveil'' - used for situational awareness (e.g. cameras, social media tools);
  +
# ''Respond'' - used for responding to an attack (e.g. security personnel, non-lethal weapons);
  +
# ''Protect'' - used to protect assets (people, buildings, infrastructure);
  +
# ''Detect'' - used for detecting a weapon or weapon use (e.g. entry scanning equipment);
  +
# ''Overcome'' - used for overcoming a sudden vulnerability (e.g. extra concertina wire);
  +
# ''Improvise'' - created on the spot from available means (e.g. use police vehicle as a road block);
  +
# ''Restrict'' - used for restricting public access (e.g. safety barriers);
  +
# ''Adapt'' - used for changing circumstances (e.g. moving assets to a safer location);
  +
# ''Other.''
  +
  +
 
Other [[Measures|measure types]] are:
 
Other [[Measures|measure types]] are:
   

Revision as of 15:42, 15 October 2020

ICT measures could be used for: communicating, storing, analysing and protecting information.

The following chart includes various ICT solutions that can be implemented as event driven-measures to mediate the risk of a high-impact crime (such as a terrorist attack) at an event in a designated area.

Tech description Threat type Threat phase Tech use
Detection of deviant behaviour online (by combining data science (how to extract and model online behaviour) and social science (which behaviours to address)) all Initial target identification


Surveil
Vulnerability assessment of individuals before the fact (for example, Multi-Agency Vulnerability Assessment Support Tool (MAVAST)) all Initial target identification Surveil
GIS system for geographical information all Execution / post-attack/escape Surveil / respond / protect / detect / improvise
Video analytics all Initial target identification / execution / post-attack/escape Surveil / respond / protect / detect

The chart includes various columns that are explained here.

In the first column, under 'Tech description', technological solutions are listed.

The next column indicates which 'Threat types' can be mitigated with these technological solutions:

  1. Fire arms attack - small calibre pistol or semi/full-automatic rifle;
  2. Sharp object attack - knifes, machete, other sharp and blunt objects;
  3. Vehicle attack - use of vehicle as a weapon by ramming large crowds;
  4. IED (explosives) - left/concealed in objects or goods (based on home-made or commercial explosives);
  5. PBIED (explosives) - explosives concealed on a person (suicide or carrier);
  6. UAVIED (explosives) - explosives delivered by a remote-controlled airborne device;
  7. VBIED (explosives) - explosives concealed inside a vehicle (or its cargo);
  8. Chemical attack - threat object concealed in goods or carried items (e.g. canister or UAV dispensed);
  9. Biological attack - threat object concealed in goods or carried items (e.g. canister or UAV dispensed);
  10. Radiological attack - threat object concealed in goods or carried items (e.g. canister or UAV dispensed).

The 'Threat phase' column states in which phase of the attack the technological solution has the most effect:

  1. Initial Target Identification (before the attack);
  2. Operational Planning (before the attack);
  3. Pre-Attack Preparation (before the attack);
  4. Execution (during the attack);
  5. Post-Attack/Escape (after the attack).

Finally, the 'Tech use' column states the appertaining security function of the technological solution:

  1. Alert - used for alerting public (e.g. sirens, texting service);
  2. Surveil - used for situational awareness (e.g. cameras, social media tools);
  3. Respond - used for responding to an attack (e.g. security personnel, non-lethal weapons);
  4. Protect - used to protect assets (people, buildings, infrastructure);
  5. Detect - used for detecting a weapon or weapon use (e.g. entry scanning equipment);
  6. Overcome - used for overcoming a sudden vulnerability (e.g. extra concertina wire);
  7. Improvise - created on the spot from available means (e.g. use police vehicle as a road block);
  8. Restrict - used for restricting public access (e.g. safety barriers);
  9. Adapt - used for changing circumstances (e.g. moving assets to a safer location);
  10. Other.


Other measure types are: