Measure type: Screening

From Securipedia
Jump to navigation Jump to search

Screening is the measure of reducing risk by testing all traffic entering and/or exiting a certain area or object on criteria to determine their right to do so.

Description

Requiring registration at the receptionist desk before access is granted can be an effective form of screening

Instead of seeking to exclude potential perpetrators (as in access control), this set of tactics seeks to increase the likelihood of detecting persons who are not in conformity with entry requirements (entry screening) or exit requirements (such as detecting the attempted removal of objects that should not be removed from protected areas).

Examples

Screening measures can take a wide range of form, depending on the access/exit criteria they intend to test:

  • Closed-circuit TV (screening for for example hidden objects)
  • Body searches (testing for hidden objects)
  • Metal detectors (testing for metal objects)
  • Vibration detectors or motion detectors (testing for entry at forbidden times or locations)
  • Library book tags (testing for theft)
  • Requirement show identification
  • Electronic badges for trusted personnel
    Electronic identity badges can provide a quick and automated means of screening
  • Vignette on the car window (testing for paid road tax)
  • Camera control (with license plate recognition), e.g. for parking garages or for congestion charging such as in London[1]

Effectiveness

Security issues where this measure can be effective and influenced by the urban planner, are:

Financial gain Boredom or compulsive behaviour Impulse Conflict in beliefs
Burglary{{#info:Burglary is the crime of illicitly entering a building with the intent to commit an offence, particularly (but not limited to) theft.}} Physical assault{{#info:Assault, is a crime which involves causing a victim to fear or to experience any type of violence, except for sexual violence}} Destruction by riots{{#info:Destruction by riots is the act of vandalism of property by organised groups for a shared rational or rationalised reason.}} Mass killing{{#info:Mass killing is the crime of purposely causing harm or death to a group of (unknown) people in order to make a statement or to influence the public opinion. This threat is exerted out of wilful action by fanatics: terrorists or criminal activists.}}
Ram-raiding{{#info:Ram raid is a particular technique for burglars to gain access to primarily commercial premises, by means of driving -usually stolen- vehicles into locked or closed entrances, exits or windows.}} Sexual assault{{#info:Sexual assault is assault of a sexual nature on another person, or any sexual act committed without consent}} Destruction of property by fanatics{{#info:Destruction by fanatics is the crime of purposely causing damage in order to make a statement or to influence the public opinion.}}
Pickpocketing{{#info:Pickpocketing is a form of theft that involves the stealing of valuables from a victim without their noticing the theft at the time. }} Vandalism{{#info:Vandalism is the act of wilful or malicious destruction, injury, disfigurement, or defacement of property without the consent of the owner or person having custody or control.}}
Robbery{{#info:Robbery is the crime of taking or attempting to take something of value by force or threat of force or by putting the victim in fear. It is used her exclusively for acts committed to individual persons.}} Graffiti{{#info:Grafitti is the defacement of property by means of writing or drawings scribbled, scratched, or sprayed on a surface in a public place without the consent of the owner or person having custody or control. }}
Raid{{#info:Raid is the crime of taking or attempting to take something of value from a commercial venue by force or threat of force or by putting the victim in fear.}} Antisocial Behaviour{{#info:Antisocial behaviour is an accumulation category of relatively small crimes that highly influence the security perception of citizens. }}
Vehicle theft{{#info:Vehicle theft is the crime of theft, or attempt of theft of or from a motor vehicle (automobile, truck, bus, motorcycle, etc.).}}
table to be updated if security issue pages finished

Considerations

General considerations

For screening to work in general, a detection method needs to exist that is able to, and effective in, testing the access or exit criteria. The test needs to be designed in conformity to the mobility requirements of the access or exit, that is: it should allow the required flows.

For screening to be deployed in an urban environment, the measure has to be in concordance with the environment it is deployed in. Some types of screening would disrupt traffic flows to an extent that would cause problems: an identity check in a metro station would, because of the high flows of traffic, be very problematic. A body search would normally not be allowed on account of it being very invasive to the privacy of a person, but in certain circumstances - especially when specific indications exist a person might form a significant threat - it might be allowed.

Urban planning considerations

While many forms of screening are not suitable for use in public space due to the potential disruption and time delays it could cause, other forms of natural screening can be promoted through urban design techniques. For example, a clear demarcation of public and private space, through the use of different boundary or surface treatments or the use of fencing, should provide for strong territorial definition. When clear ownership of space is evident, it makes it easier for residents to ‘screen’ for people who do not have legitimate reason to be there.

Safety/security considerations

Intensive forms of screening can raise the prominence of an object, which can raise the attractiveness of the object for fanatics.

Social considerations

Economic considerations

Mobility considerations

Ethics considerations

As a general guideline, the screening measure should aim to test for only the access/exit criteria and avoid to gather any other information. This principal ensures a minimal breach to the personal privacy.

Legal considerations

Footnotes and references