Difference between revisions of "Measure type: Sensors"
m |
|||
Line 1: | Line 1: | ||
''Sensors'' could be used for detection, identification, localisation or tracking. |
''Sensors'' could be used for detection, identification, localisation or tracking. |
||
− | The following chart includes various Sensor solutions that can be implemented as event driven-measures to mediate the risk of a high-impact crime (such as a terrorist attack) at an event in a designated area. |
+ | The following chart includes various Sensor solutions that can be implemented as event driven-measures to mediate the risk of a high-impact crime (such as a terrorist attack) at an event in a designated area. These are examples derived from the [[PRoTECT research project|PRoTECT]] project. |
− | |||
− | The chart includes various columns: |
||
− | |||
− | In the first column, under ''''Tech description'''<nowiki/>', '''technological solutions''' are listed. |
||
− | |||
− | The next column indicates which '<nowiki/>'''Threat types'''' can be mitigated with these technological solutions: |
||
− | |||
− | # ''Fire arms'' attack - small calibre pistol or semi/full-automatic rifle; |
||
− | # ''Sharp object'' attack - knifes, machete, other sharp and blunt objects; |
||
− | # ''Vehicle'' attack - use of vehicle as a weapon by ramming large crowds; |
||
− | # ''IED'' (explosives) - left/concealed in objects or goods (based on home-made or commercial explosives); |
||
− | # ''PBIED'' (explosives) - explosives concealed on a person (suicide or carrier); |
||
− | # ''UAVIED'' (explosives) - explosives delivered by a remote-controlled airborne device; |
||
− | # ''VBIED'' (explosives) - explosives concealed inside a vehicle (or its cargo); |
||
− | # ''Chemical'' attack - threat object concealed in goods or carried items (e.g. canister or UAV dispensed); |
||
− | # ''Biological'' attack - threat object concealed in goods or carried items (e.g. canister or UAV dispensed); |
||
− | # ''Radiological'' attack - threat object concealed in goods or carried items (e.g. canister or UAV dispensed). |
||
− | |||
− | The 'T'''hreat phase'''' column states in which phase of the attack the technological solution has the most effect: |
||
− | |||
− | # ''Initial Target Identification'' (before the attack); |
||
− | # ''Operational Planning'' (before the attack); |
||
− | # ''Pre-Attack Preparation'' (before the attack); |
||
− | # ''Execution'' (during the attack); |
||
− | # ''Post-Attack/Escape'' (after the attack). |
||
− | |||
− | Finally, the '<nowiki/>'''Tech use'''' column states the appertaining security function of the technological solution: |
||
− | |||
− | # ''Alert'' - used for alerting public (e.g. sirens, texting service); |
||
− | # ''Surveil'' - used for situational awareness (e.g. cameras, social media tools); |
||
− | # ''Respond'' - used for responding to an attack (e.g. security personnel, non-lethal weapons); |
||
− | # ''Protect'' - used to protect assets (people, buildings, infrastructure); |
||
− | # ''Detect'' - used for detecting a weapon or weapon use (e.g. entry scanning equipment); |
||
− | # ''Overcome'' - used for overcoming a sudden vulnerability (e.g. extra concertina wire); |
||
− | # ''Improvise'' - created on the spot from available means (e.g. use police vehicle as a road block); |
||
− | # ''Restrict'' - used for restricting public access (e.g. safety barriers); |
||
− | # ''Adapt'' - used for changing circumstances (e.g. moving assets to a safer location); |
||
− | # ''Other.'' |
||
{| class="wikitable" |
{| class="wikitable" |
||
− | | |
+ | |'''Tech description''' |
|'''Threat type''' |
|'''Threat type''' |
||
|'''Threat phase''' |
|'''Threat phase''' |
||
|'''Tech use''' |
|'''Tech use''' |
||
|'''Tech criteria''' |
|'''Tech criteria''' |
||
− | |'''Products/suppliers''' |
||
|- |
|- |
||
− | | |
+ | |Weapon detector (DEXTER) |
|Fire arms attack |
|Fire arms attack |
||
|Pre-attack |
|Pre-attack |
||
|Surveil / detect / protect |
|Surveil / detect / protect |
||
|Performance (detection rate) |
|Performance (detection rate) |
||
− | |n/a |
||
|- |
|- |
||
− | | |
+ | |Explosive detector (DEXTER) |
|PBIED |
|PBIED |
||
|Pre-attack |
|Pre-attack |
||
|Surveil / detect / protect |
|Surveil / detect / protect |
||
|Performance (detection rate) |
|Performance (detection rate) |
||
− | |n/a |
||
|- |
|- |
||
− | | |
+ | |Automatic vehicle behaviour and threat detection (SASSSISLAN) |
|Vehicle Attack |
|Vehicle Attack |
||
|Pre-attack |
|Pre-attack |
||
|Surveil / protect |
|Surveil / protect |
||
|Performance (detection rate) |
|Performance (detection rate) |
||
− | |n/a |
||
|- |
|- |
||
− | | |
+ | |Automatic person behaviour and threat detection (SASSSISLAN) |
|Sharp object attack / PBIED |
|Sharp object attack / PBIED |
||
|Pre-attack |
|Pre-attack |
||
|Surveil / protect |
|Surveil / protect |
||
|Performance (detection rate) |
|Performance (detection rate) |
||
− | |n/a |
||
|- |
|- |
||
− | | |
+ | |Automatic aggression detection |
|Sharp object attack |
|Sharp object attack |
||
|Pre-attack / execution |
|Pre-attack / execution |
||
|Surveil / protect |
|Surveil / protect |
||
|Performance (detection rate) |
|Performance (detection rate) |
||
− | |n/a |
||
|- |
|- |
||
− | | |
+ | |Person re-identification to avoid next attack (DEXTER) |
|PBIED |
|PBIED |
||
|Post-attack / Pre-attack (next) |
|Post-attack / Pre-attack (next) |
||
|Surveil / detect / protect |
|Surveil / detect / protect |
||
|Performance (detection rate) |
|Performance (detection rate) |
||
− | |n/a |
||
|- |
|- |
||
− | | |
+ | |Automatic crowd behaviour and threat detection (SASSSISLAN) |
|Sharp object attack |
|Sharp object attack |
||
|Pre-attack / execution |
|Pre-attack / execution |
||
|Surveil / protect |
|Surveil / protect |
||
|Performance (detection rate) |
|Performance (detection rate) |
||
− | |n/a |
||
|- |
|- |
||
− | | |
+ | |mmw-portals (≈30-300 GHz) |
|Fire arms, sharp object, PBIED, chemical, biological & radiological attack |
|Fire arms, sharp object, PBIED, chemical, biological & radiological attack |
||
|Execution |
|Execution |
||
|Detect |
|Detect |
||
|anomaly detection, slow (person by person) |
|anomaly detection, slow (person by person) |
||
− | |L-3 Provision, Rohde & Schwarz QPS200, Smiths Echo, Nuctech |
||
|- |
|- |
||
− | | |
+ | |mmw walk-through (≈30-300 GHz) |
|Fire arms, sharp object, PBIED, chemical, biological & radiological attack |
|Fire arms, sharp object, PBIED, chemical, biological & radiological attack |
||
|Execution |
|Execution |
||
|Detect |
|Detect |
||
|anomaly detection (several 100 persons/h) |
|anomaly detection (several 100 persons/h) |
||
− | |Evolv Edge, APSTEC HSR, R&S (Camero) Easycheck |
||
|- |
|- |
||
− | | |
+ | |radar/microwave (≈3-30 GHz) |
|Fire arms, sharp object, PBIED, chemical, biological & radiological attack |
|Fire arms, sharp object, PBIED, chemical, biological & radiological attack |
||
|Execution |
|Execution |
||
Line 119: | Line 71: | ||
large distance |
large distance |
||
− | |Rapiscan Counterbomber |
||
|- |
|- |
||
− | | |
+ | |THz/IR cameras |
|Fire arms, sharp object, PBIED, chemical, biological & radiological attack |
|Fire arms, sharp object, PBIED, chemical, biological & radiological attack |
||
|Execution |
|Execution |
||
Line 128: | Line 79: | ||
difficult image interpretation |
difficult image interpretation |
||
− | |THz - no COTS equipment on the market |
||
− | |||
− | IR – ELBIT IR camera |
||
|- |
|- |
||
− | | |
+ | |X-ray backscatter persons |
|Fire arms, sharp object, PBIED, chemical, biological & radiological attack |
|Fire arms, sharp object, PBIED, chemical, biological & radiological attack |
||
|Execution |
|Execution |
||
|Detect |
|Detect |
||
|forbidden for use in public in Europe – ionising radiation |
|forbidden for use in public in Europe – ionising radiation |
||
− | |Rapiscan (discontinued product) |
||
|- |
|- |
||
− | | |
+ | |X-ray transmission persons |
|Fire arms, sharp object, PBIED, chemical, biological & radiological attack |
|Fire arms, sharp object, PBIED, chemical, biological & radiological attack |
||
|Execution |
|Execution |
||
|Detect |
|Detect |
||
|forbidden for use in public in Europe – ionising radiation |
|forbidden for use in public in Europe – ionising radiation |
||
− | |Smiths Detection B-scan |
||
|- |
|- |
||
− | | |
+ | |X-ray transmission belt systems |
|Fire arms, sharp object, IED, chemical, biological & radiological attack |
|Fire arms, sharp object, IED, chemical, biological & radiological attack |
||
|Execution |
|Execution |
||
|Detect |
|Detect |
||
|checkpoint necessary, slow (bag by bag), ATR possible for explosives, guns and knives |
|checkpoint necessary, slow (bag by bag), ATR possible for explosives, guns and knives |
||
− | |many commercial systems available |
||
|- |
|- |
||
− | | |
+ | |X-ray backscatter for cars |
|Fire arms & VBIED attack |
|Fire arms & VBIED attack |
||
|Execution |
|Execution |
||
|Detect |
|Detect |
||
|covert: needs close proximity to car (drive by), image difficult to interpret, Mobile Portal solution possible, checkpoint situation, driver has to leave the car |
|covert: needs close proximity to car (drive by), image difficult to interpret, Mobile Portal solution possible, checkpoint situation, driver has to leave the car |
||
− | |Rapiscan (many products) |
||
|- |
|- |
||
− | | |
+ | |Explosive vapour Detection – High Volume Sampling (HVS) |
|IED, PBIED & VBIED attack (potentially chemical attack) |
|IED, PBIED & VBIED attack (potentially chemical attack) |
||
|Execution |
|Execution |
||
|Detect |
|Detect |
||
|not all explosives can be detected, detection rate depends on circumstances (eg temperature), needs time (1-30 minutes), sampling device is portable, detection device is large and expensive, detector usually mass spectrometer based technology |
|not all explosives can be detected, detection rate depends on circumstances (eg temperature), needs time (1-30 minutes), sampling device is portable, detection device is large and expensive, detector usually mass spectrometer based technology |
||
− | |SEADM, Karsa |
||
|- |
|- |
||
− | | |
+ | |Explosive vapour Detection – Direct Sampling |
|IED, PBIED & VBIED attack (potentially chemical attack) |
|IED, PBIED & VBIED attack (potentially chemical attack) |
||
|Execution |
|Execution |
||
|Detect |
|Detect |
||
|Less sensitive than HVS, lower DR, handheld, limited use, many technology sub categories |
|Less sensitive than HVS, lower DR, handheld, limited use, many technology sub categories |
||
− | |Rapiscan Mobile trace, Fido |
||
|- |
|- |
||
− | | |
+ | |Explosive Trace Particle detection – contact |
|IED, PBIED & VBIED attack (potentially chemical attack) |
|IED, PBIED & VBIED attack (potentially chemical attack) |
||
|Execution |
|Execution |
||
|Detect |
|Detect |
||
|contact with object necessary (swab), very sensitive equipment mostly Ion Mobility Spectrometry (IMS) based, but also other technologies success depends on skill operator |
|contact with object necessary (swab), very sensitive equipment mostly Ion Mobility Spectrometry (IMS) based, but also other technologies success depends on skill operator |
||
− | |Bruker, Nuctech, Rapiscan, Smiths Detection, L-3 and others |
||
|- |
|- |
||
− | | |
+ | |Explosive Trace Particle detection – non-contact |
|IED, PBIED & VBIED attack (potentially chemical attack) |
|IED, PBIED & VBIED attack (potentially chemical attack) |
||
|Execution |
|Execution |
||
|Detect |
|Detect |
||
|Mostly Raman-effect based technology, use of laser, eye-safety is an issue when use in public. Proximity measurements (<2 cm) are mature, longer distance (up to several meters) less mature, also bulk detection possible up to 40 m for some explosives (low TRL), line of sight necessary |
|Mostly Raman-effect based technology, use of laser, eye-safety is an issue when use in public. Proximity measurements (<2 cm) are mature, longer distance (up to several meters) less mature, also bulk detection possible up to 40 m for some explosives (low TRL), line of sight necessary |
||
− | |Thermo Fisher (True/First defender), ALAKAI, ENEA (prototype, low TRL) |
||
|- |
|- |
||
− | | |
+ | |Walk Through Metal Detection |
|Fire arms, sharp object & vehicle attack |
|Fire arms, sharp object & vehicle attack |
||
|Execution |
|Execution |
||
|Detect |
|Detect |
||
|checkpoint necessary, only works if threat contains metal |
|checkpoint necessary, only works if threat contains metal |
||
− | |Ceia, Rapiscan, Garret |
||
|- |
|- |
||
− | | |
+ | |Hand held Metal Detector |
|Fire arms, sharp object & vehicle attack |
|Fire arms, sharp object & vehicle attack |
||
|Execution |
|Execution |
||
|Detect |
|Detect |
||
|depends on skill operator, only works if threat contains metal |
|depends on skill operator, only works if threat contains metal |
||
− | |Ceia, Rapiscan, Garret |
||
|- |
|- |
||
− | | |
+ | |Explosive Detection Dogs |
|IED, PBIED & VBIED attack (potentially chemical attack) |
|IED, PBIED & VBIED attack (potentially chemical attack) |
||
|Execution |
|Execution |
||
|Detect |
|Detect |
||
|versatile use, performance varies from dog to dog and in time, expensive |
|versatile use, performance varies from dog to dog and in time, expensive |
||
− | |mostly police, military, though commercial parties do exist (PMT, Twickelerveld) |
||
|- |
|- |
||
− | | |
+ | |Pat down |
|Fire arms, sharp object, PBIED, chemical, biological & radiological attack |
|Fire arms, sharp object, PBIED, chemical, biological & radiological attack |
||
|Execution |
|Execution |
||
|Detect |
|Detect |
||
|often used as alarm resolution, invasive, time consuming, depends on skill of the screener and cooperation of the subject |
|often used as alarm resolution, invasive, time consuming, depends on skill of the screener and cooperation of the subject |
||
− | |Screeners can be supplied by private security companies (G4S, Securitas) |
||
|- |
|- |
||
− | | |
+ | |Visual inspection of bags, cars, etc. |
|Fire arms, sharp object, PBIED, chemical, biological & radiological attack |
|Fire arms, sharp object, PBIED, chemical, biological & radiological attack |
||
|Execution |
|Execution |
||
|Detect |
|Detect |
||
|often used as alarm resolution, invasive, time consuming, depends on skill of the screener and cooperation of the subject |
|often used as alarm resolution, invasive, time consuming, depends on skill of the screener and cooperation of the subject |
||
− | |Screeners can be supplied by private security companies (G4S, Securitas) |
||
|- |
|- |
||
− | | |
+ | |Detection of deviant behaviour offline (for example, security questioning, distinguishing psychiatric patient from terrorist (Rapid Observation of Psychological Disorders (ROPD) tool)) |
|all |
|all |
||
|Execution |
|Execution |
||
|Surveil |
|Surveil |
||
|Performance (detection rate) |
|Performance (detection rate) |
||
− | |Rapid Observation of Psychological Disorders (ROPD) tool: |
||
− | |||
− | translation of a psychopathology diagnostic tool for healthcare professionals into manageable questions with everyday terms for safety professionals (TNO) |
||
|- |
|- |
||
− | | |
+ | |Use of animals as sensor (for example, emotions, stress level, use of substances, presence of explosives, and establishing identity) |
|all |
|all |
||
|Execution |
|Execution |
||
Line 238: | Line 170: | ||
<br /> |
<br /> |
||
|Readiness / Performance |
|Readiness / Performance |
||
− | |n/a |
||
|- |
|- |
||
− | | |
+ | |Risk assessment of individuals on the spot (i.e., stress assessment) |
|all |
|all |
||
|Execution |
|Execution |
||
Line 246: | Line 177: | ||
<br /> |
<br /> |
||
|Performance (accuracy) |
|Performance (accuracy) |
||
− | |Rapid Resilience Scan: estimates the effects of behavioral measures on a target. The RRS is being developed for measuring stress and resilience in a criminal context (by TNO) |
||
|- |
|- |
||
− | | |
+ | |Vulnerability assessment of individuals before the fact (for example, Multi-Agency Vulnerability Assessment Support Tool (MAVAST)) |
|all |
|all |
||
|Initial target identification |
|Initial target identification |
||
|Surveil |
|Surveil |
||
|Performance (accuracy, at face value as data are largely absent) |
|Performance (accuracy, at face value as data are largely absent) |
||
− | |Multi-Agency Vulnerability Assessment Support Tool (MAVAST): supports multi-agency teams (for example, police, justice, municipality, social work) in identifying the level of vulnerability of an individual to radicalise in a violent way (by TNO for H2020 Pericles) |
||
|- |
|- |
||
− | | |
+ | |Automatic sprinkler system |
|IED, PBIED, UAVIED & VBIED attack |
|IED, PBIED, UAVIED & VBIED attack |
||
|Execution |
|Execution |
||
|Respond / protect / overcome |
|Respond / protect / overcome |
||
|Performance |
|Performance |
||
− | |n/a |
||
|- |
|- |
||
− | | |
+ | |Drones with sensor |
|all |
|all |
||
|Initial target identification / execution / post-attack/escape |
|Initial target identification / execution / post-attack/escape |
||
|Surveil / respond / detect |
|Surveil / respond / detect |
||
|Performance (detection rate, accuracy) |
|Performance (detection rate, accuracy) |
||
− | |n/a |
||
|} |
|} |
||
+ | |||
+ | In the first column, under ''''Tech description'''<nowiki/>', '''technological solutions''' are listed. |
||
+ | |||
+ | |||
+ | |||
+ | The next column indicates which '<nowiki/>'''Threat types'''' can be mitigated with these technological solutions: |
||
+ | |||
+ | |||
+ | |||
+ | #''Fire arms'' attack - small calibre pistol or semi/full-automatic rifle; |
||
+ | #''Sharp object'' attack - knifes, machete, other sharp and blunt objects; |
||
+ | #''Vehicle'' attack - use of vehicle as a weapon by ramming large crowds; |
||
+ | #''IED'' (explosives) - left/concealed in objects or goods (based on home-made or commercial explosives); |
||
+ | #''PBIED'' (explosives) - explosives concealed on a person (suicide or carrier); |
||
+ | #''UAVIED'' (explosives) - explosives delivered by a remote-controlled airborne device; |
||
+ | #''VBIED'' (explosives) - explosives concealed inside a vehicle (or its cargo); |
||
+ | #''Chemical'' attack - threat object concealed in goods or carried items (e.g. canister or UAV dispensed); |
||
+ | #''Biological'' attack - threat object concealed in goods or carried items (e.g. canister or UAV dispensed); |
||
+ | #''Radiological'' attack - threat object concealed in goods or carried items (e.g. canister or UAV dispensed). |
||
+ | |||
+ | The 'T'''hreat phase'''' column states in which phase of the attack the technological solution has the most effect: |
||
+ | |||
+ | #''Initial Target Identification'' (before the attack); |
||
+ | #''Operational Planning'' (before the attack); |
||
+ | #''Pre-Attack Preparation'' (before the attack); |
||
+ | #''Execution'' (during the attack); |
||
+ | #''Post-Attack/Escape'' (after the attack). |
||
+ | |||
+ | Finally, the '<nowiki/>'''Tech use'''' column states the appertaining security function of the technological solution: |
||
+ | |||
+ | |||
+ | |||
+ | #''Alert'' - used for alerting public (e.g. sirens, texting service); |
||
+ | #''Surveil'' - used for situational awareness (e.g. cameras, social media tools); |
||
+ | #''Respond'' - used for responding to an attack (e.g. security personnel, non-lethal weapons); |
||
+ | #''Protect'' - used to protect assets (people, buildings, infrastructure); |
||
+ | #''Detect'' - used for detecting a weapon or weapon use (e.g. entry scanning equipment); |
||
+ | #''Overcome'' - used for overcoming a sudden vulnerability (e.g. extra concertina wire); |
||
+ | #''Improvise'' - created on the spot from available means (e.g. use police vehicle as a road block); |
||
+ | #''Restrict'' - used for restricting public access (e.g. safety barriers); |
||
+ | #''Adapt'' - used for changing circumstances (e.g. moving assets to a safer location); |
||
+ | #''Other.'' |
||
+ | |||
Other [[Measures|measure types]] are: |
Other [[Measures|measure types]] are: |
||
Revision as of 16:11, 9 November 2020
Sensors could be used for detection, identification, localisation or tracking.
The following chart includes various Sensor solutions that can be implemented as event driven-measures to mediate the risk of a high-impact crime (such as a terrorist attack) at an event in a designated area. These are examples derived from the PRoTECT project.
Tech description | Threat type | Threat phase | Tech use | Tech criteria |
Weapon detector (DEXTER) | Fire arms attack | Pre-attack | Surveil / detect / protect | Performance (detection rate) |
Explosive detector (DEXTER) | PBIED | Pre-attack | Surveil / detect / protect | Performance (detection rate) |
Automatic vehicle behaviour and threat detection (SASSSISLAN) | Vehicle Attack | Pre-attack | Surveil / protect | Performance (detection rate) |
Automatic person behaviour and threat detection (SASSSISLAN) | Sharp object attack / PBIED | Pre-attack | Surveil / protect | Performance (detection rate) |
Automatic aggression detection | Sharp object attack | Pre-attack / execution | Surveil / protect | Performance (detection rate) |
Person re-identification to avoid next attack (DEXTER) | PBIED | Post-attack / Pre-attack (next) | Surveil / detect / protect | Performance (detection rate) |
Automatic crowd behaviour and threat detection (SASSSISLAN) | Sharp object attack | Pre-attack / execution | Surveil / protect | Performance (detection rate) |
mmw-portals (≈30-300 GHz) | Fire arms, sharp object, PBIED, chemical, biological & radiological attack | Execution | Detect | anomaly detection, slow (person by person) |
mmw walk-through (≈30-300 GHz) | Fire arms, sharp object, PBIED, chemical, biological & radiological attack | Execution | Detect | anomaly detection (several 100 persons/h) |
radar/microwave (≈3-30 GHz) | Fire arms, sharp object, PBIED, chemical, biological & radiological attack | Execution | Detect | anomaly detection
large distance |
THz/IR cameras | Fire arms, sharp object, PBIED, chemical, biological & radiological attack | Execution | Detect | anomaly detection
difficult image interpretation |
X-ray backscatter persons | Fire arms, sharp object, PBIED, chemical, biological & radiological attack | Execution | Detect | forbidden for use in public in Europe – ionising radiation |
X-ray transmission persons | Fire arms, sharp object, PBIED, chemical, biological & radiological attack | Execution | Detect | forbidden for use in public in Europe – ionising radiation |
X-ray transmission belt systems | Fire arms, sharp object, IED, chemical, biological & radiological attack | Execution | Detect | checkpoint necessary, slow (bag by bag), ATR possible for explosives, guns and knives |
X-ray backscatter for cars | Fire arms & VBIED attack | Execution | Detect | covert: needs close proximity to car (drive by), image difficult to interpret, Mobile Portal solution possible, checkpoint situation, driver has to leave the car |
Explosive vapour Detection – High Volume Sampling (HVS) | IED, PBIED & VBIED attack (potentially chemical attack) | Execution | Detect | not all explosives can be detected, detection rate depends on circumstances (eg temperature), needs time (1-30 minutes), sampling device is portable, detection device is large and expensive, detector usually mass spectrometer based technology |
Explosive vapour Detection – Direct Sampling | IED, PBIED & VBIED attack (potentially chemical attack) | Execution | Detect | Less sensitive than HVS, lower DR, handheld, limited use, many technology sub categories |
Explosive Trace Particle detection – contact | IED, PBIED & VBIED attack (potentially chemical attack) | Execution | Detect | contact with object necessary (swab), very sensitive equipment mostly Ion Mobility Spectrometry (IMS) based, but also other technologies success depends on skill operator |
Explosive Trace Particle detection – non-contact | IED, PBIED & VBIED attack (potentially chemical attack) | Execution | Detect | Mostly Raman-effect based technology, use of laser, eye-safety is an issue when use in public. Proximity measurements (<2 cm) are mature, longer distance (up to several meters) less mature, also bulk detection possible up to 40 m for some explosives (low TRL), line of sight necessary |
Walk Through Metal Detection | Fire arms, sharp object & vehicle attack | Execution | Detect | checkpoint necessary, only works if threat contains metal |
Hand held Metal Detector | Fire arms, sharp object & vehicle attack | Execution | Detect | depends on skill operator, only works if threat contains metal |
Explosive Detection Dogs | IED, PBIED & VBIED attack (potentially chemical attack) | Execution | Detect | versatile use, performance varies from dog to dog and in time, expensive |
Pat down | Fire arms, sharp object, PBIED, chemical, biological & radiological attack | Execution | Detect | often used as alarm resolution, invasive, time consuming, depends on skill of the screener and cooperation of the subject |
Visual inspection of bags, cars, etc. | Fire arms, sharp object, PBIED, chemical, biological & radiological attack | Execution | Detect | often used as alarm resolution, invasive, time consuming, depends on skill of the screener and cooperation of the subject |
Detection of deviant behaviour offline (for example, security questioning, distinguishing psychiatric patient from terrorist (Rapid Observation of Psychological Disorders (ROPD) tool)) | all | Execution | Surveil | Performance (detection rate) |
Use of animals as sensor (for example, emotions, stress level, use of substances, presence of explosives, and establishing identity) | all | Execution | Surveil / respond / detect / restrict
|
Readiness / Performance |
Risk assessment of individuals on the spot (i.e., stress assessment) | all | Execution | Respond / detect
|
Performance (accuracy) |
Vulnerability assessment of individuals before the fact (for example, Multi-Agency Vulnerability Assessment Support Tool (MAVAST)) | all | Initial target identification | Surveil | Performance (accuracy, at face value as data are largely absent) |
Automatic sprinkler system | IED, PBIED, UAVIED & VBIED attack | Execution | Respond / protect / overcome | Performance |
Drones with sensor | all | Initial target identification / execution / post-attack/escape | Surveil / respond / detect | Performance (detection rate, accuracy) |
In the first column, under 'Tech description', technological solutions are listed.
The next column indicates which 'Threat types' can be mitigated with these technological solutions:
- Fire arms attack - small calibre pistol or semi/full-automatic rifle;
- Sharp object attack - knifes, machete, other sharp and blunt objects;
- Vehicle attack - use of vehicle as a weapon by ramming large crowds;
- IED (explosives) - left/concealed in objects or goods (based on home-made or commercial explosives);
- PBIED (explosives) - explosives concealed on a person (suicide or carrier);
- UAVIED (explosives) - explosives delivered by a remote-controlled airborne device;
- VBIED (explosives) - explosives concealed inside a vehicle (or its cargo);
- Chemical attack - threat object concealed in goods or carried items (e.g. canister or UAV dispensed);
- Biological attack - threat object concealed in goods or carried items (e.g. canister or UAV dispensed);
- Radiological attack - threat object concealed in goods or carried items (e.g. canister or UAV dispensed).
The 'Threat phase' column states in which phase of the attack the technological solution has the most effect:
- Initial Target Identification (before the attack);
- Operational Planning (before the attack);
- Pre-Attack Preparation (before the attack);
- Execution (during the attack);
- Post-Attack/Escape (after the attack).
Finally, the 'Tech use' column states the appertaining security function of the technological solution:
- Alert - used for alerting public (e.g. sirens, texting service);
- Surveil - used for situational awareness (e.g. cameras, social media tools);
- Respond - used for responding to an attack (e.g. security personnel, non-lethal weapons);
- Protect - used to protect assets (people, buildings, infrastructure);
- Detect - used for detecting a weapon or weapon use (e.g. entry scanning equipment);
- Overcome - used for overcoming a sudden vulnerability (e.g. extra concertina wire);
- Improvise - created on the spot from available means (e.g. use police vehicle as a road block);
- Restrict - used for restricting public access (e.g. safety barriers);
- Adapt - used for changing circumstances (e.g. moving assets to a safer location);
- Other.
Other measure types are: