Difference between revisions of "Measures"

From Securipedia
Jump to navigation Jump to search
m
 
(14 intermediate revisions by 4 users not shown)
Line 2: Line 2:
 
[[File:ae.png|25px|right|This is a page providing background in a specific field of expertise]]'''Measures''' are provisions made or actions taken to protect an object or subject from risk.
 
[[File:ae.png|25px|right|This is a page providing background in a specific field of expertise]]'''Measures''' are provisions made or actions taken to protect an object or subject from risk.
   
  +
Measure types can be classified by their temporal application: structural or event-driven measures. Structural measures are more geared towards permanent solutions, such as infrastructural improvements, in order to reduce the risk of criminal acts taking place in the areas where these measures are applied. Event-driven measures have a more temporal nature and can be implemented in order to ensure extra risk reduction and mitigation for (large scale) events. These are intended for more high impact crimes such as (terrorist) attacks.
==Measure types==
 
  +
Measures can be classified by their point of application in the process of a criminal act. From the perspective of a criminal, all measures reduce the perceived attractiveness of a target. Identified points of application are:
 
  +
==Structural measure types to protect an object or subject from risk==
* Increasing perceived effort
 
 
Structural measures are permanent solutions that mediate the risk of a [[Crime|criminal]] act. These measures can be further classified by their point of application in the process of a criminal act. From the perspective of a criminal, all measures reduce the perceived attractiveness of a target. Identified points of application are:
* Increasing perceived risk
 
  +
* Decreasing anticipated reward
 
 
*Increasing perceived effort
* Controlling contributing circumstances
 
 
*Increasing perceived risk
* Other
 
 
*Decreasing anticipated reward
 
*Controlling contributing circumstances
 
*Other
   
 
All measure types can be classified in one of these categories. The table below displays for each of the measure types in Securipedia, which point of application it works on.
 
All measure types can be classified in one of these categories. The table below displays for each of the measure types in Securipedia, which point of application it works on.
   
By clicking the "?" a brief description of the measure is provided.
+
By clicking the {{#tip-info:Example of a explanatory text}} a brief description of the measure is provided.
   
{|class="wikitable" style="text-align: center;"
+
{| class="wikitable" style="text-align: center;"
! style="background:#f0f0f0;"|'''Increasing perceived effort'''
+
! style="background:#f0f0f0;" |'''Increasing perceived effort'''
! style="background:#f0f0f0;"|'''Increasing perceived risk'''
+
! style="background:#f0f0f0;" |'''Increasing perceived risk'''
! style="background:#f0f0f0;"|'''Decreasing anticipated reward'''
+
! style="background:#f0f0f0;" |'''Decreasing anticipated reward'''
! style="background:#f0f0f0;"|'''Contributing circumstances'''
+
! style="background:#f0f0f0;" |'''Contributing circumstances'''
! style="background:#f0f0f0;"|'''Other'''
+
! style="background:#f0f0f0;" |'''Other'''
 
|-
 
|-
|[[Measure: Target hardening|Target hardening]]{{#info:Target hardening is the measure of strengthening the security by increasing the required effort to commit crimes to or at an object}}||[[Measure: Surveillance|Surveillance]]{{#info:Surveillance is the measure of monitoring the behaviour, activities, or other changing information, usually of people for the purpose of influencing, managing, directing, or protecting.}}||[[Measure: Target removal|Target removal]]{{#info:Target removal is the reduction of risk by removing the perceived attracting aspects from an [[attractive object]]}}||[[Measure: Controlling disinhibitors|Controlling disinhibitors]]{{#info:Controlling disinhibitors is the reduction of risk by removing or regulating disinhibiting substances or circumstances}}||[[Measure: Deflection|Deflection]]{{#info:Deflecting crime is the reduction of risk by creating circumstances that direct criminals to less critical objects}}
+
|[[Measure: Target hardening|Target hardening]]{{#tip-info:Target hardening is the measure of strengthening the security by increasing the required effort to commit crimes to or at an object}}||[[Measure: Surveillance|Surveillance]]{{#tip-info:Surveillance is the measure of monitoring the behaviour, activities, or other changing information, usually of people for the purpose of influencing, managing, directing, or protecting.}}||[[Measure: Target removal|Target removal]]{{#tip-info:Target removal is the reduction of risk by removing the perceived attracting aspects from an [[attractive object]]}}||[[Measure: Controlling disinhibitors|Controlling disinhibitors]]{{#tip-info:Controlling disinhibitors is the reduction of risk by removing or regulating disinhibiting substances or circumstances}}||[[Measure: Deflection|Deflection]]{{#tip-info:Deflecting crime is the reduction of risk by creating circumstances that direct criminals to less critical objects}}
 
|-
 
|-
| [[Measure: Access control|Access control]]{{#info:Access control is the reduction of risk by regulating and controlling the flows of traffic into and out of an area or object}}||[[Measure: Intervention force|Intervention force]]{{#info:A intervention force is the measure of having adequate resources (first responders) to react to emergencies in order to minimize impact and restore a normal situation as soon as possible.}}||[[Measure: Removal of crime motivator|Removal of crime motivator]]{{#info:Removal of a crime motivator is the reduction of risk by removing the benefits of a crime}}||[[Measure: Facilitating compliance|Facilitating compliance]]{{#info:Facilitating compliance is the reduction of risk by decreasing crime by facilitating compliance}}||Creating awareness / stimulating conscience{{#info:Creating awareness is the measure of increasing the mental reserves of people to committing crimes}}
+
|[[Measure: Access control|Access control]]{{#tip-info:Access control is the reduction of risk by regulating and controlling the flows of traffic into and out of an area or object}}||[[Measure: Intervention force|Intervention force]]{{#tip-info:A intervention force is the measure of having adequate resources (first responders) to react to emergencies in order to minimize impact and restore a normal situation as soon as possible.}}||[[Measure: Removal of crime motivator|Removal of crime motivator]]{{#tip-info:Removal of a crime motivator is the reduction of risk by removing the benefits of a crime}}||[[Measure: Facilitating compliance|Facilitating compliance]]{{#tip-info:Facilitating compliance is the measure of reducing risk by decreasing crime by making it easier for the public to behave according to the local rules.}}||Creating awareness / stimulating conscience{{#tip-info:Creating awareness is the measure of increasing the mental reserves of people to committing crimes}}
 
|-
 
|-
| [[Measure: Directing traffic flows|Directing traffic flows]]{{#info:Directing traffic flows is the measure of reducing the opportunities for a criminal to approach a suitable target by physically separating the flows of traffic}}||[[Measure: Screening|Screening]]{{#info:Screening is the measure of reducing risk by identifying all traffic entering and/or exiting a certain area or object}}||||Rule setting{{#info:Rule-setting is the measure of erecting legal or regulatory restrictions of a temporal and/or local nature in order to reduce risk}}||
+
|[[Measure: Directing traffic flows|Directing traffic flows]]{{#tip-info:Directing traffic flows is the measure of reducing the opportunities for a criminal to approach a suitable target by physically separating the flows of traffic}}||[[Measure: Screening|Screening]]{{#tip-info:Screening is the measure of reducing risk by identifying all traffic entering and/or exiting a certain area or object}}|| ||Rule setting{{#tip-info:Rule-setting is the measure of erecting legal or regulatory restrictions of a temporal and/or local nature in order to reduce risk}}||
 
|-
 
|-
| [[Measure: Removing means|Removing means]]{{#info:Removing means is the reduction of risk by ensuring the tools or other means conductive to crime are not available}}||Increase punishment{{#info:Increasing punishment is the reduction of risk by the increase of the negative consequences of crime when caught}}||||[[Measure: Ownership|Ownership]]{{#info:Ownership is the reduction of crime by establishing an environment where there is a clear separation between public and private space}}||
+
|[[Measure: Removing means|Removing means]]{{#tip-info:Removing means is the reduction of risk by ensuring the tools or other means conductive to crime are not available}}||Increase punishment{{#tip-info:Increasing punishment is the reduction of risk by the increase of the negative consequences of crime when caught}}|| ||[[Measure: Ownership|Ownership]]{{#tip-info:Ownership is the reduction of crime by establishing an environment where there is a clear separation between public and private space}}||
 
|-
 
|-
| ||||||[[Measure: Maintenance|Maintenance]]{{#info:Maintenance is the measure of discouraging crime by designing places with management and maintenance in mind}}||
+
| || || ||[[Measure: Maintenance|Maintenance]]{{#tip-info:Maintenance is the measure of discouraging crime by designing places with management and maintenance in mind}}||
 
|}
 
|}
   
  +
==Event-driven measure types==
<hr/>
 
   
   
  +
Event driven-measures are temporal solutions that can mediate the risk of a high-impact crime (such as an attack) at an event in a designated area. These measures, in turn, can be broken down into various technology categories that could assist in the mitigation of [[Security Vulnerability|vulnerabilities]]:
   
  +
The '''five technology categories''' in event-driven measures are:
   
  +
#''[[Measure type: Information and Communications Technology (ICT)|ICT]]'' that could be used for communicating, storing, analysing and protecting information. Examples are: WiFi, IoT, Encryption, VPN, et cetera;
  +
#''[[Measure type: Sensors|Sensors]]'' that could be used for detection, identification, localisation or tracking. Examples are: cameras, facial recognition, acoustic sniper localisation, et cetera;
  +
#''[[Measure type: Actuators|Actuators]]'' that could be used for warning, intercepting or eliminating. Examples are: sirens, anti-drone drones, HPM vehicle stopping, et cetera;
  +
#''[[Measure type: Physical measures|Physical measures]]'' that could be used for controlling access, impeding an attack or protective materials. Examples are: tourniquets, portable rising steps, bomb blast window film, et cetera;
  +
#''[[Measure type: Methods|Methods]]'' that could be used for procedures, best practices or standards to implement solutions. An example is the ISO 31000 Risk Management
   
  +
In this application, the term technology should be interpreted in the broadest sense of the word. It includes both hard technologies and soft technologies. Hard technologies are tangible devices or components (e.g. computers and software). Soft technologies include the human areas of decision making, strategy development, training, and concept formation (e.g. methodologies or procedures).
   
  +
Each technology is (part of) a security measure, providing some basic security function as a response to a (potential) threat. As used in the EU VAT, there are ten different technology uses that range from before, during and after an attack. The technology uses are:
   
  +
#''Alert'' - used for alerting public (e.g. sirens, texting service);
  +
#''Surveil'' - used for situational awareness (e.g. cameras, social media tools);
  +
#''Respond'' - used for responding to an attack (e.g. security personnel, non-lethal weapons);
  +
#''Protect'' - used to protect assets (people, buildings, infrastructure);
  +
#''Detect'' - used for detecting a weapon or weapon use (e.g. entry scanning equipment);
  +
#''Overcome'' - used for overcoming a sudden vulnerability (e.g. extra concertina wire);
  +
#''Improvise'' - created on the spot from available means (e.g. use police vehicle as a road block);
  +
#''Restrict'' - used for restricting public access (e.g. safety barriers);
  +
#''Adapt'' - used for changing circumstances (e.g. moving assets to a safer location);
  +
#''Other.''
   
  +
The following examples illustrate the potential needs for these event-driven, technological solutions by indicating their support towards mediating risk and mitigating vulnerabilities:
   
  +
*Enhancing the surveillance of an area to for instance count crowds, monitor allocation of citizens or identify occurrences of objects or behaviors. By enhancing this surveillance, a municipality and the other local actors can identify anomalies or assess the impact at certain moments in time before an attack or respond faster to incidents and aid citizens.
  +
*Enhancing the cooperation between different actors (between own forces as well as completely different actors). In the cases of terrorist attacks, actors do not stand alone and need to cooperate in order to prevent, responds and recover from terrorist attacks. By enhancing the cooperation in could create more effective deployment of forces, better communication between them and faster (real time) sharing of information like images or videos to get ahead of the threat.
  +
*Enhancing alerting and evacuating of citizens during an attack by putting in place early warning systems and effective evacuation pathways. Potential innovative technology solutions could enhance the warning systems and evacuation pathways for specific public spaces.
  +
*Enhancing the existing knowledge and train forces specifically for protecting public spaces against terrorism, as anti-terrorism expertise is often missing at local government. There is a need of knowing were and how this knowledge can be obtained as well as how to train personal in the future.<br />
   
 
<br />
 
 
 
 
{|class="wikitable"
 
|-
 
!text below is a placeholder for measures that can be inserted in other pages
 
|}
 
 
*[[Measure: Target hardening|Target hardening]]
 
*[[Measure: Access control|Access control]]
 
*[[Measure: Directing traffic flows|Directing traffic flows]]
 
*[[Measure: Removing means|Removing means]]
 
*[[Measure: Surveillance|Surveillance]]
 
*[[Measure: Intervention force|Intervention force]]
 
*[[Measure: Screening|Screening]]
 
*[[Measure: Target removal|Target removal]]
 
*[[Measure: Removal of crime motivator|Removal of crime motivator]]
 
*[[Measure: Controlling disinhibitors|Controlling disinhibitors]]
 
*[[Measure: Facilitating compliance|Facilitating compliance]]
 
*[[Measure: Deflection|Deflection]]
 
*[[Measure: Ownership|Ownership]]
 
*[[Measure: Maintenance|Maintenance]]
 
 
{{references}}
 

Latest revision as of 16:28, 23 November 2020

This is a page providing background in a specific field of expertise

Measures are provisions made or actions taken to protect an object or subject from risk.

Measure types can be classified by their temporal application: structural or event-driven measures. Structural measures are more geared towards permanent solutions, such as infrastructural improvements, in order to reduce the risk of criminal acts taking place in the areas where these measures are applied. Event-driven measures have a more temporal nature and can be implemented in order to ensure extra risk reduction and mitigation for (large scale) events. These are intended for more high impact crimes such as (terrorist) attacks.

Structural measure types to protect an object or subject from risk

Structural measures are permanent solutions that mediate the risk of a criminal act. These measures can be further classified by their point of application in the process of a criminal act. From the perspective of a criminal, all measures reduce the perceived attractiveness of a target. Identified points of application are:

  • Increasing perceived effort
  • Increasing perceived risk
  • Decreasing anticipated reward
  • Controlling contributing circumstances
  • Other

All measure types can be classified in one of these categories. The table below displays for each of the measure types in Securipedia, which point of application it works on.

By clicking the a brief description of the measure is provided.

Increasing perceived effort Increasing perceived risk Decreasing anticipated reward Contributing circumstances Other
Target hardening Surveillance Target removal Controlling disinhibitors Deflection
Access control Intervention force Removal of crime motivator Facilitating compliance Creating awareness / stimulating conscience
Directing traffic flows Screening Rule setting
Removing means Increase punishment Ownership
Maintenance

Event-driven measure types

Event driven-measures are temporal solutions that can mediate the risk of a high-impact crime (such as an attack) at an event in a designated area. These measures, in turn, can be broken down into various technology categories that could assist in the mitigation of vulnerabilities:

The five technology categories in event-driven measures are:

  1. ICT that could be used for communicating, storing, analysing and protecting information. Examples are: WiFi, IoT, Encryption, VPN, et cetera;
  2. Sensors that could be used for detection, identification, localisation or tracking. Examples are: cameras, facial recognition, acoustic sniper localisation, et cetera;
  3. Actuators that could be used for warning, intercepting or eliminating. Examples are: sirens, anti-drone drones, HPM vehicle stopping, et cetera;
  4. Physical measures that could be used for controlling access, impeding an attack or protective materials. Examples are: tourniquets, portable rising steps, bomb blast window film, et cetera;
  5. Methods that could be used for procedures, best practices or standards to implement solutions. An example is the ISO 31000 Risk Management

In this application, the term technology should be interpreted in the broadest sense of the word. It includes both hard technologies and soft technologies. Hard technologies are tangible devices or components (e.g. computers and software). Soft technologies include the human areas of decision making, strategy development, training, and concept formation (e.g. methodologies or procedures).

Each technology is (part of) a security measure, providing some basic security function as a response to a (potential) threat. As used in the EU VAT, there are ten different technology uses that range from before, during and after an attack. The technology uses are:

  1. Alert - used for alerting public (e.g. sirens, texting service);
  2. Surveil - used for situational awareness (e.g. cameras, social media tools);
  3. Respond - used for responding to an attack (e.g. security personnel, non-lethal weapons);
  4. Protect - used to protect assets (people, buildings, infrastructure);
  5. Detect - used for detecting a weapon or weapon use (e.g. entry scanning equipment);
  6. Overcome - used for overcoming a sudden vulnerability (e.g. extra concertina wire);
  7. Improvise - created on the spot from available means (e.g. use police vehicle as a road block);
  8. Restrict - used for restricting public access (e.g. safety barriers);
  9. Adapt - used for changing circumstances (e.g. moving assets to a safer location);
  10. Other.

The following examples illustrate the potential needs for these event-driven, technological solutions by indicating their support towards mediating risk and mitigating vulnerabilities:

  • Enhancing the surveillance of an area to for instance count crowds, monitor allocation of citizens or identify occurrences of objects or behaviors. By enhancing this surveillance, a municipality and the other local actors can identify anomalies or assess the impact at certain moments in time before an attack or respond faster to incidents and aid citizens.
  • Enhancing the cooperation between different actors (between own forces as well as completely different actors). In the cases of terrorist attacks, actors do not stand alone and need to cooperate in order to prevent, responds and recover from terrorist attacks. By enhancing the cooperation in could create more effective deployment of forces, better communication between them and faster (real time) sharing of information like images or videos to get ahead of the threat.
  • Enhancing alerting and evacuating of citizens during an attack by putting in place early warning systems and effective evacuation pathways. Potential innovative technology solutions could enhance the warning systems and evacuation pathways for specific public spaces.
  • Enhancing the existing knowledge and train forces specifically for protecting public spaces against terrorism, as anti-terrorism expertise is often missing at local government. There is a need of knowing were and how this knowledge can be obtained as well as how to train personal in the future.