Measure type: Physical measures

From Securipedia
Revision as of 15:14, 9 November 2020 by Dolinda (talk | contribs)
Jump to navigation Jump to search

Physical measures could be used for controlling access, impeding an attack or protective materials.

The following chart includes various Physical solutions that can be implemented as event driven-measures to mediate the risk of a high-impact crime (such as a terrorist attack) at an event in a designated area. These are examples derived from the PRoTECT project.

Tech description Threat type Threat phase Tech use Tech criteria
Influence attacker physically (for example, intimidate, Less Lethal Weapons (sound, vision)) all Execution Respond / restrict


Readiness / Performance
Physical barriers that are flexible or permanent Vehicle attack Pre-attack preparations Protect Readiness / performance
Urban layout with bollards, planters, et cetera Vehicle, VBIED attack Execution


Protect


Other: impact, architectural looks
Reduce the loading on a building by using landscape design


VBIED attack Execution


Protect


Cost and other: effectiveness
Design of roads to prevent the impact of vehicles with a high speed Vehicle, VBIED attack Execution / Post-Attack/Escape Protect


n/a
Prevent crowded places with environment design all Execution


Protect


n/a
Temporary measures – vehicle barriers, checkpoint, road block Vehicle, VBIED attack Execution Protect Physical, cost and other: impact on normal operations
Permanent measures – security gate, (blast resistant) fencing, bollards…. Vehicle, VBIED attack Execution Protect Physical, cost and other: impact on normal operations
Façade design (include the window and door anchors) IED, PBIED, UAVIED, VBIED attack Execution Protect Physical / cost
Explosion resistant glazing IED, PBIED, UAVIED, VBIED attack Execution Protect Physical / cost
Bullet proof glazing Fire arms attack Execution Protect Physical / cost
Prevent progressive collapse IED, PBIED, UAVIED, VBIED attack Execution Protect Physical / cost
Prevent roof objects like lightning, panels to fall on the people IED, PBIED, UAVIED, VBIED attack Execution Protect Physical / cost
Provide a safe place for shelter Fire arms, sharp object attack Execution Protect Physical / cost
Products to mitigate or reduce the explosion effects like blast container (place them around the threat) to isolate the threat


IED, PBIED attack Execution Protect Other: (It might be effective to protect the surrounding, but also has side effects. E.g. additional risk for EOD)
Personal protection (vest, helmet, gear) to the first responders and security personnel Fire arms, sharp object attack Pre-attack preparations / Execution Respond Physical / cost / performance
Bomb suit (Explosive ordnance) of the first responders and security personnel IED, PBIED, UAVIED, VBIED attack Execution / Post-Attack/Escape Respond Physical / performance

In the first column, under 'Tech description', technological solutions are listed.

The next column indicates which 'Threat types' can be mitigated with these technological solutions:

  1. Fire arms attack - small calibre pistol or semi/full-automatic rifle;
  2. Sharp object attack - knifes, machete, other sharp and blunt objects;
  3. Vehicle attack - use of vehicle as a weapon by ramming large crowds;
  4. IED (explosives) - left/concealed in objects or goods (based on home-made or commercial explosives);
  5. PBIED (explosives) - explosives concealed on a person (suicide or carrier);
  6. UAVIED (explosives) - explosives delivered by a remote-controlled airborne device;
  7. VBIED (explosives) - explosives concealed inside a vehicle (or its cargo);
  8. Chemical attack - threat object concealed in goods or carried items (e.g. canister or UAV dispensed);
  9. Biological attack - threat object concealed in goods or carried items (e.g. canister or UAV dispensed);
  10. Radiological attack - threat object concealed in goods or carried items (e.g. canister or UAV dispensed).


The 'Threat phase' column states in which phase of the attack the technological solution has the most effect:

  1. Initial Target Identification (before the attack);
  2. Operational Planning (before the attack);
  3. Pre-Attack Preparation (before the attack);
  4. Execution (during the attack);
  5. Post-Attack/Escape (after the attack).


Finally, the 'Tech use' column states the appertaining security function of the technological solution:

  1. Alert - used for alerting public (e.g. sirens, texting service);
  2. Surveil - used for situational awareness (e.g. cameras, social media tools);
  3. Respond - used for responding to an attack (e.g. security personnel, non-lethal weapons);
  4. Protect - used to protect assets (people, buildings, infrastructure);
  5. Detect - used for detecting a weapon or weapon use (e.g. entry scanning equipment);
  6. Overcome - used for overcoming a sudden vulnerability (e.g. extra concertina wire);
  7. Improvise - created on the spot from available means (e.g. use police vehicle as a road block);
  8. Restrict - used for restricting public access (e.g. safety barriers);
  9. Adapt - used for changing circumstances (e.g. moving assets to a safer location);
  10. Other.

Other measure types are: