Difference between revisions of "Measure type: Methods"

From Securipedia
Jump to navigation Jump to search
(Created page with "''Methods'' could be used for procedures, best practices or standards to implement solutions. ''Threat type/threat phase/tech use hier uitleggen of linken naar measures en he...")
 
 
(4 intermediate revisions by 2 users not shown)
Line 1: Line 1:
 
''Methods'' could be used for procedures, best practices or standards to implement solutions.
 
''Methods'' could be used for procedures, best practices or standards to implement solutions.
   
  +
The following chart includes various Methods that can be implemented as event driven-measures to mediate the risk of a high-impact crime (such as a [[Terrorism|terrorist]] attack) at an event in a designated area. These are examples derived from the [[PRoTECT research project|PRoTECT]] project.
''Threat type/threat phase/tech use hier uitleggen of linken naar measures en het op die pagina uitleggen?''
 
  +
 
{| class="wikitable"
 
{| class="wikitable"
 
|'''''Tech description'''''
 
|'''''Tech description'''''
Line 8: Line 9:
 
|'''Tech use'''
 
|'''Tech use'''
 
|'''Tech criteria'''
 
|'''Tech criteria'''
|'''Products/suppliers'''
 
 
|-
 
|-
 
|Increase resilience LEOs (for example, training, monitoring)
 
|Increase resilience LEOs (for example, training, monitoring)
Line 15: Line 15:
 
|Other (or all)
 
|Other (or all)
 
|Readiness
 
|Readiness
|Training and monitoring by TNO for Police and MinDef
 
 
|-
 
|-
 
|Trainings to enhance LEO capabilities (for example, flexibility, communication skills)
 
|Trainings to enhance LEO capabilities (for example, flexibility, communication skills)
Line 22: Line 21:
 
|Other (or all)
 
|Other (or all)
 
|Performance (measured increase in capabilities)
 
|Performance (measured increase in capabilities)
|Trainings by TNO for Police and MinDef
 
 
|-
 
|-
 
|Enhance multiparty decision making (for example, reducing bias, improving collaboration)
 
|Enhance multiparty decision making (for example, reducing bias, improving collaboration)
 
|all
 
|all
 
|all
 
|all
|Other (or all)
+
|Other (or all)
 
|Readiness / Compliancy
 
|Readiness / Compliancy
|Multidisciplinair Interactie Raamwerk by TNO for Flood Control 2015 (<nowiki>http://digitalpages.tno.nl/mirror/page/1</nowiki>)
 
 
|-
 
|-
 
|Planning and Response to an Active Shooter:
 
|Planning and Response to an Active Shooter:
Line 40: Line 37:
 
|SURVEIL, RESPOND, PROTECT, DETECT
 
|SURVEIL, RESPOND, PROTECT, DETECT
 
|Readiness / Compliancy
 
|Readiness / Compliancy
|DHS website
 
 
|-
 
|-
 
|Security and Resiliency Guide: Counter-Improvised Explosive Device (C-IED) Concepts (including for events and sports venues)
 
|Security and Resiliency Guide: Counter-Improvised Explosive Device (C-IED) Concepts (including for events and sports venues)
Line 47: Line 43:
 
|SURVEIL, RESPOND, PROTECT, DETECT
 
|SURVEIL, RESPOND, PROTECT, DETECT
 
|Readiness / Compliancy
 
|Readiness / Compliancy
|DHS website (<nowiki>https://www.dhs.gov/publication/security-and-resiliency-guide-and-annexes</nowiki>)
 
 
|}
 
|}
  +
  +
In the first column, under ''''Tech description'''<nowiki/>', '''technological solutions''' are listed.
  +
  +
  +
The next column indicates which '<nowiki/>'''Threat types'''' can be mitigated with these technological solutions:
  +
  +
#''Fire arms'' attack - small calibre pistol or semi/full-automatic rifle;
  +
#''Sharp object'' attack - knifes, machete, other sharp and blunt objects;
  +
#''Vehicle'' attack - use of vehicle as a weapon by ramming large crowds;
  +
#''Improvised Explosive Device (IED)'' - left/concealed in objects or goods (based on home-made or commercial explosives);
  +
#''Person-Born Improvised Explosive Device'' (PBIED) - explosives concealed on a person (suicide or carrier);
  +
#''Unmanned Aerial Vehicle Improvised Explosive Device (UAVIED)'' - explosives delivered by a remote-controlled airborne device;
  +
#''Vehicle-Borne Improvised Explosive Devise (VBIED)'' - explosives concealed inside a vehicle (or its cargo);
  +
#''Chemical'' attack - threat object concealed in goods or carried items (e.g. canister or UAV dispensed);
  +
#''Biological'' attack - threat object concealed in goods or carried items (e.g. canister or UAV dispensed);
  +
#''Radiological'' attack - threat object concealed in goods or carried items (e.g. canister or UAV dispensed).
  +
  +
  +
The '<nowiki/>'''Threat phase'''' column states in which phase of the attack the technological solution has the most effect:
  +
  +
#''Initial Target Identification'' (before the attack);
  +
#''Operational Planning'' (before the attack);
  +
#''Pre-Attack Preparation'' (before the attack);
  +
#''Execution'' (during the attack);
  +
#''Post-Attack/Escape'' (after the attack).
  +
  +
  +
Finally, the '<nowiki/>'''Tech use'''' column states the appertaining security function of the technological solution:
  +
  +
#''Alert'' - used for alerting public (e.g. sirens, texting service);
  +
#''Surveil'' - used for situational awareness (e.g. cameras, social media tools);
  +
#''Respond'' - used for responding to an attack (e.g. security personnel, non-lethal weapons);
  +
#''Protect'' - used to protect assets (people, buildings, infrastructure);
  +
#''Detect'' - used for detecting a weapon or weapon use (e.g. entry scanning equipment);
  +
#''Overcome'' - used for overcoming a sudden vulnerability (e.g. extra concertina wire);
  +
#''Improvise'' - created on the spot from available means (e.g. use police vehicle as a road block);
  +
#''Restrict'' - used for restricting public access (e.g. safety barriers);
  +
#''Adapt'' - used for changing circumstances (e.g. moving assets to a safer location);
  +
#''Other.''
  +
  +
 
Other [[Measures|measure types]] are:
 
Other [[Measures|measure types]] are:
   
* [[Measure type: Information and Communications Technology (ICT)|ICT]]
+
*[[Measure type: Information and Communications Technology (ICT)|ICT]]
* [[Measure type: Sensors|Sensors]]
+
*[[Measure type: Sensors|Sensors]]
* [[Measure type: Actuators|Actuators]]
+
*[[Measure type: Actuators|Actuators]]
* [[Measure type: Physical measures|Physical measures]]
+
*[[Measure type: Physical measures|Physical measures]]

Latest revision as of 11:27, 20 November 2020

Methods could be used for procedures, best practices or standards to implement solutions.

The following chart includes various Methods that can be implemented as event driven-measures to mediate the risk of a high-impact crime (such as a terrorist attack) at an event in a designated area. These are examples derived from the PRoTECT project.

Tech description Threat type Threat phase Tech use Tech criteria
Increase resilience LEOs (for example, training, monitoring) all Pre-attack preparations Other (or all) Readiness
Trainings to enhance LEO capabilities (for example, flexibility, communication skills) all Pre-attack preparations Other (or all) Performance (measured increase in capabilities)
Enhance multiparty decision making (for example, reducing bias, improving collaboration) all all Other (or all) Readiness / Compliancy
Planning and Response to an Active Shooter:

An Interagency Security Committee Policy and Best Practices Guide

November 2015

Fire arms Execution SURVEIL, RESPOND, PROTECT, DETECT Readiness / Compliancy
Security and Resiliency Guide: Counter-Improvised Explosive Device (C-IED) Concepts (including for events and sports venues) IED, PBIED, UAVIED, VBIED (explosives) Pre-attack preparations, Execution SURVEIL, RESPOND, PROTECT, DETECT Readiness / Compliancy

In the first column, under 'Tech description', technological solutions are listed.


The next column indicates which 'Threat types' can be mitigated with these technological solutions:

  1. Fire arms attack - small calibre pistol or semi/full-automatic rifle;
  2. Sharp object attack - knifes, machete, other sharp and blunt objects;
  3. Vehicle attack - use of vehicle as a weapon by ramming large crowds;
  4. Improvised Explosive Device (IED) - left/concealed in objects or goods (based on home-made or commercial explosives);
  5. Person-Born Improvised Explosive Device (PBIED) - explosives concealed on a person (suicide or carrier);
  6. Unmanned Aerial Vehicle Improvised Explosive Device (UAVIED) - explosives delivered by a remote-controlled airborne device;
  7. Vehicle-Borne Improvised Explosive Devise (VBIED) - explosives concealed inside a vehicle (or its cargo);
  8. Chemical attack - threat object concealed in goods or carried items (e.g. canister or UAV dispensed);
  9. Biological attack - threat object concealed in goods or carried items (e.g. canister or UAV dispensed);
  10. Radiological attack - threat object concealed in goods or carried items (e.g. canister or UAV dispensed).


The 'Threat phase' column states in which phase of the attack the technological solution has the most effect:

  1. Initial Target Identification (before the attack);
  2. Operational Planning (before the attack);
  3. Pre-Attack Preparation (before the attack);
  4. Execution (during the attack);
  5. Post-Attack/Escape (after the attack).


Finally, the 'Tech use' column states the appertaining security function of the technological solution:

  1. Alert - used for alerting public (e.g. sirens, texting service);
  2. Surveil - used for situational awareness (e.g. cameras, social media tools);
  3. Respond - used for responding to an attack (e.g. security personnel, non-lethal weapons);
  4. Protect - used to protect assets (people, buildings, infrastructure);
  5. Detect - used for detecting a weapon or weapon use (e.g. entry scanning equipment);
  6. Overcome - used for overcoming a sudden vulnerability (e.g. extra concertina wire);
  7. Improvise - created on the spot from available means (e.g. use police vehicle as a road block);
  8. Restrict - used for restricting public access (e.g. safety barriers);
  9. Adapt - used for changing circumstances (e.g. moving assets to a safer location);
  10. Other.


Other measure types are: