Difference between revisions of "Measures"

From Securipedia
Jump to navigation Jump to search
m
 
(126 intermediate revisions by 4 users not shown)
Line 1: Line 1:
[[Category:Top category]]
 
   
  +
[[File:ae.png|25px|right|This is a page providing background in a specific field of expertise]]'''Measures''' are provisions made or actions taken to protect an object or subject from risk.
= {{PAGENAME}} =
 
{|
 
|This page is a placeholder for measures that need to be inserted in other pages
 
|}
 
I. Target hardening. This situational crime prevention approach involves
 
the use of devices or materials designed to obstruct the vandal by physical
 
barriers:
 
1. Toughened glass (acrylic, polycarbon, etc.)
 
2. Latticework or screens to cover windows
 
3. Fire-retardant paint
 
4. High-impact plastic or steel fixtures
 
5. Hardened rubber or plastic swing seats
 
6. Concrete or steel picnic tables, benches, bleachers
 
7. Trash receptacles bolted to concrete bases
 
8. Rough-play-tolerant adventure playgrounds
 
9. Original planting of large-diameter trees
 
10. Slashproof transit vehicle seats
 
11. Steel-framed bus seats
 
12. Antigraffiti repellent spray on bus seats
 
13. Tamperproof sign hardware and fasteners
 
14. Door anchor hinges with nonremovable pins
 
   
  +
Measure types can be classified by their temporal application: structural or event-driven measures. Structural measures are more geared towards permanent solutions, such as infrastructural improvements, in order to reduce the risk of criminal acts taking place in the areas where these measures are applied. Event-driven measures have a more temporal nature and can be implemented in order to ensure extra risk reduction and mitigation for (large scale) events. These are intended for more high impact crimes such as (terrorist) attacks.
II. Access control. This approach involves architectural features, mechanical
 
and electronic devices, and related means for maintaining prerogatives
 
over the ability to gain entry:
 
15. Key control systems
 
16. Locked gates, doors, windows
 
17. Electromagnetic doors unopenable from outside
 
18. Deadbolt and vertical-bolt locks
 
19. Metal door/window shutters
 
20. Protective grills over roof access openings
 
21. Fenced yards
 
22. Vertical metal or small-mesh (unclimbable) fencing
 
23. Reduced number of building entrances
 
24. Unclimbable trees/bushes planted next to building
 
25. Prickly bushes planted next to site to be protected
 
26. Sloped windowsills
 
27. Elimination of crank and gear window mechanisms
 
28. Steeply angled roofs with parapets and ridges
 
29. Use of guard dogs
 
30. Use of student photo identification
 
31. Partitioning off of selected areas during "downtime" hours
 
32. High curbs along areas to be protected
 
   
  +
==Structural measure types to protect an object or subject from risk==
III. Deflecting offenders. This is the channeling of potentially criminal
 
  +
Structural measures are permanent solutions that mediate the risk of a [[Crime|criminal]] act. These measures can be further classified by their point of application in the process of a criminal act. From the perspective of a criminal, all measures reduce the perceived attractiveness of a target. Identified points of application are:
or aggressive behavior in more prosocial directions by means of architectural,
 
equipment, and related alterations:
 
33. Graffiti boards, mural programs
 
34. Schools/studios to give graffiti writers exposure and recognition
 
35. Interesting wallpaper, daily newspaper, chalkboard on bathroom wall
 
36. Litter bins
 
37. Wash fountains and towel dispensers in school hallways
 
38. Steering of pathway circulation:
 
• Paving the shortest walk between connecting points
 
• Avoiding sharp changes in direction
 
• Paving natural shortcuts after demonstrated use
 
• Installing or landscaping traffic barriers (e.g., benches, bushes)
 
39. "Next step" posters on broken equipment
 
   
  +
*Increasing perceived effort
IV. Controlling facilitators. This is the alteration of the means to criminal
 
  +
*Increasing perceived risk
or aggressive behavior by making such means less available, less accessible,
 
  +
*Decreasing anticipated reward
or less potentially injurious:
 
  +
*Controlling contributing circumstances
40. Control over sales of spray paint and indelible markers
 
  +
*Other
41. Removal of debris from construction/demolition sites
 
42. Removal of waste paper, rubbish, and other combustibles
 
43. Use of tamperproof screws
 
44. Placement of permanent signs, building names, and decorative hardware
 
out of reach from ground
 
45. Placement of school thermostats, fire alarms, and light switches far
 
from "hang-out" areas
 
   
  +
All measure types can be classified in one of these categories. The table below displays for each of the measure types in Securipedia, which point of application it works on.
V. Exit-entry screening. Instead of seeking to exclude potential perpetrators
 
(as in access control), this set of tactics seeks to increase the likelihood
 
of detecting persons who are not in conformity with entry requirements
 
(entry screening) or detecting the attempted removal of objects that should
 
not be removed from protected areas (exit screening):
 
46. Closed-circuit TV
 
47. Metal detectors
 
48. Vibration detectors
 
49. Motion detectors
 
50. Perimeter alarm system
 
51. Library book tags
 
   
  +
By clicking the {{#tip-info:Example of a explanatory text}} a brief description of the measure is provided.
VI. Formal surveillance. This is surveillance by police, guards, monitors,
 
citizen groups, or other paid or volunteer security personnel:
 
52. Police, citizen, senior citizen, tenant, parent patrols
 
53. Neighborhood Watch, School Watch, Block Watch, Rail/Bus Watch
 
groups
 
54. Provision of on-site living quarters for citizens or security personnel
 
(e.g., "school sitters," "campground hosts")
 
55. Informant hotlines (e.g., "rat-on-a-rat program," "secret witness
 
program")
 
56. Crime Solvers Anonymous reward program
 
57. Mechanical, ultrasonic, infrared, electronic intruder alarm systems
 
58. Automatic fire detection systems
 
59. After-hours use of school public address system for monitoring
 
   
  +
{| class="wikitable" style="text-align: center;"
VII. Natural surveillance. This is surveillance provided by employees,
 
  +
! style="background:#f0f0f0;" |'''Increasing perceived effort'''
home owners, pedestrians, and others going about their regular daily
 
  +
! style="background:#f0f0f0;" |'''Increasing perceived risk'''
activities:
 
  +
! style="background:#f0f0f0;" |'''Decreasing anticipated reward'''
60. Community after-school use
 
  +
! style="background:#f0f0f0;" |'''Contributing circumstances'''
61. Reduced teacher-student ratio
 
  +
! style="background:#f0f0f0;" |'''Other'''
62. Increased number of employees (e.g., playground supervisors, bus
 
  +
|-
conductors, teachers)
 
  +
|[[Measure: Target hardening|Target hardening]]{{#tip-info:Target hardening is the measure of strengthening the security by increasing the required effort to commit crimes to or at an object}}||[[Measure: Surveillance|Surveillance]]{{#tip-info:Surveillance is the measure of monitoring the behaviour, activities, or other changing information, usually of people for the purpose of influencing, managing, directing, or protecting.}}||[[Measure: Target removal|Target removal]]{{#tip-info:Target removal is the reduction of risk by removing the perceived attracting aspects from an [[attractive object]]}}||[[Measure: Controlling disinhibitors|Controlling disinhibitors]]{{#tip-info:Controlling disinhibitors is the reduction of risk by removing or regulating disinhibiting substances or circumstances}}||[[Measure: Deflection|Deflection]]{{#tip-info:Deflecting crime is the reduction of risk by creating circumstances that direct criminals to less critical objects}}
63. Round-the-clock custodial staffing
 
  +
|-
64. Live-in custodian/caretaker
 
  +
|[[Measure: Access control|Access control]]{{#tip-info:Access control is the reduction of risk by regulating and controlling the flows of traffic into and out of an area or object}}||[[Measure: Intervention force|Intervention force]]{{#tip-info:A intervention force is the measure of having adequate resources (first responders) to react to emergencies in order to minimize impact and restore a normal situation as soon as possible.}}||[[Measure: Removal of crime motivator|Removal of crime motivator]]{{#tip-info:Removal of a crime motivator is the reduction of risk by removing the benefits of a crime}}||[[Measure: Facilitating compliance|Facilitating compliance]]{{#tip-info:Facilitating compliance is the measure of reducing risk by decreasing crime by making it easier for the public to behave according to the local rules.}}||Creating awareness / stimulating conscience{{#tip-info:Creating awareness is the measure of increasing the mental reserves of people to committing crimes}}
65. Distribution of faculty/staff offices throughout the school
 
  +
|-
66. Assignment of additional faculty/staff members to hall, cafeteria
 
  +
|[[Measure: Directing traffic flows|Directing traffic flows]]{{#tip-info:Directing traffic flows is the measure of reducing the opportunities for a criminal to approach a suitable target by physically separating the flows of traffic}}||[[Measure: Screening|Screening]]{{#tip-info:Screening is the measure of reducing risk by identifying all traffic entering and/or exiting a certain area or object}}|| ||Rule setting{{#tip-info:Rule-setting is the measure of erecting legal or regulatory restrictions of a temporal and/or local nature in order to reduce risk}}||
duty
 
  +
|-
67. "Youth vacation vigil" student surveillance program
 
  +
|[[Measure: Removing means|Removing means]]{{#tip-info:Removing means is the reduction of risk by ensuring the tools or other means conductive to crime are not available}}||Increase punishment{{#tip-info:Increasing punishment is the reduction of risk by the increase of the negative consequences of crime when caught}}|| ||[[Measure: Ownership|Ownership]]{{#tip-info:Ownership is the reduction of crime by establishing an environment where there is a clear separation between public and private space}}||
68. Use of bus/train employees to report vandalism on their routes
 
  +
|-
69. Improved exterior and interior lighting
 
  +
| || || ||[[Measure: Maintenance|Maintenance]]{{#tip-info:Maintenance is the measure of discouraging crime by designing places with management and maintenance in mind}}||
70. Low trimming of shrubbery and plants
 
  +
|}
 
VIII. Target removal. This is the physical removal or enhanced inaccessibility
 
of potential vandalism targets:
 
71. Use of graffiti dissuaders
 
• Teflon, plastic laminate, fiberglass, or melamine covering
 
• Rock cement, slanted siding, or deeply grooved surfaces
 
• "Paint-outs" or use of contrasting colors in patterned surfaces
 
• Fast-growing wall vines or shrubbery, or construction of wall
 
barriers
 
72. Removal of pay phones from high-loitering areas
 
73. Removal of corner bus seats, hidden from driver's view
 
74. Removal of outside plant bulbs
 
75. Windowless school or other buildings
 
76. Omission of ground-level windows
 
77. Concealed school door closers
 
78. Concealed pipework
 
79. Fittings moved out of reach (e.g., from wall to ceiling)
 
80. Signs/fixtures made flush with wall or ceiling
 
81. Key-controlled light fixtures in public areas
 
82. Removal of (or no replanting of) easily damaged trees/bushes
 
IX. Identifying property. This is the physical identification marking of
 
potential vandalism targets:
 
83. Property marking with school district identification
 
84. Property marking with business logo
 
85. Property marking with identification seals
 
86. Property marking with organization stencil
 
87. Property marking with individual's Social Security number
 
 
X. Removing inducements. This is the physical alteration of potential
 
vandalism targets:
 
88. Rapid repair of damaged property
 
89. Rapid removal of graffiti
 
90. Use of small windowpanes
 
91. Elimination of school washroom and toilet stall doors
 
92. Elimination of bars over toilet stall doorways
 
93. School restroom thermostats kept at 62°F
 
94. Removal of gates and fences
 
95. Repainting of playground equipment in bright colors
 
96. Beautification programs (e.g., landscaping, painting, maintenance)
 
   
  +
==Event-driven measure types==
XL Rule setting. This is the making of explicit prior statements about
 
acceptable and unacceptable behaviors, as well as about penalties for
 
noncompliance:
 
97. Model "hate crime" bill
 
98. Antivandalism laws
 
99. Building design specifications
 
100. Building security codes
 
101. Parental liability statutes
 
102. Prohibition of sale of spray paint and indelible markers
 
103. Codes of rights and responsibilities
 
104. School rules of student conduct
 
105. Rigorous, irregular, no-warning fire drills
 
   
XII. Education. These are direct efforts to dissuade potential and actual
 
vandals by informing them about vandalism costs, consequences, and
 
alternatives:
 
106. Vandalism education programs
 
107. Arson education programs
 
108. Vandalism awareness walks
 
109. Vandalism case study classroom discussions
 
110. Classroom brainstorming on vandalism reduction
 
112. Year-round education
 
113. Student orientation handbook and meetings
 
114. Multicultural sensitivity training
 
115. Antivandalism lectures by older students to younger ones
 
116. Antivandalism films
 
117. Antivandalism games
 
118. Antivandalism slide or tape program
 
119. Antivandalism brochures
 
120. "Ride with pride" antivandalism transit program
 
   
  +
Event driven-measures are temporal solutions that can mediate the risk of a high-impact crime (such as an attack) at an event in a designated area. These measures, in turn, can be broken down into various technology categories that could assist in the mitigation of [[Security Vulnerability|vulnerabilities]]:
XIII. Publicity. These are indirect efforts to inform potential and actual
 
vandals, as well as the general public, about vandalism costs, consequences,
 
and alternatives:
 
121. Antivandalism advertising
 
122. Antivandalism news releases
 
123. Milk carton/grocery bag antivandalism messages
 
124. Antivandalism decals on mass transit vehicles
 
125. Antivandalism slogan contests
 
126. "Sign amnesty" day (a day of no fines or other penalties for those
 
who return stolen signs)
 
127. "Help the playground" campaigns
 
128. Antivandalism buttons, T-shirts, rulers, bookmarks, posters
 
   
  +
The '''five technology categories''' in event-driven measures are:
XIV. Punishment. These are negative experiences directed to perpetrators
 
consequent to their vandaiistic behavior:
 
129. Suspension from school
 
130. Monetary fines
 
131. Restitution
 
132. Student vandalism account
 
133. Group billing for residence hall damage
 
   
  +
#''[[Measure type: Information and Communications Technology (ICT)|ICT]]'' that could be used for communicating, storing, analysing and protecting information. Examples are: WiFi, IoT, Encryption, VPN, et cetera;
XV. Counseling. These are remedial experiences directed to perpetrators
 
  +
#''[[Measure type: Sensors|Sensors]]'' that could be used for detection, identification, localisation or tracking. Examples are: cameras, facial recognition, acoustic sniper localisation, et cetera;
consequent to their vandaiistic behavior:
 
  +
#''[[Measure type: Actuators|Actuators]]'' that could be used for warning, intercepting or eliminating. Examples are: sirens, anti-drone drones, HPM vehicle stopping, et cetera;
134. Student counseling programs
 
  +
#''[[Measure type: Physical measures|Physical measures]]'' that could be used for controlling access, impeding an attack or protective materials. Examples are: tourniquets, portable rising steps, bomb blast window film, et cetera;
135. Conflict negotiation skills training
 
  +
#''[[Measure type: Methods|Methods]]'' that could be used for procedures, best practices or standards to implement solutions. An example is the ISO 31000 Risk Management
136. Moral reasoning training
 
137. Interpersonal skills training
 
138. Aggression replacement training
 
139. Behavior modification treatment for arson
 
• Stimulus satiation
 
• Contingency management
 
• Assertion training
 
   
  +
In this application, the term technology should be interpreted in the broadest sense of the word. It includes both hard technologies and soft technologies. Hard technologies are tangible devices or components (e.g. computers and software). Soft technologies include the human areas of decision making, strategy development, training, and concept formation (e.g. methodologies or procedures).
XVI. Involvement. These are efforts to increase the sense of involvement
 
with and ownership of potential vandalism targets:
 
140. Encouraging students in residence halls to personalize (paint, furnish)
 
their rooms
 
141. Permitting students in residence halls to retain same room several
 
semesters
 
142. Student participation in school decision making
 
143. School administration collaboration with student organizations
 
144. School-home collaboration
 
145. Hiring of unemployed youths as subway vandalism inspectors
 
146. "Adopt-a-station" antivandalism program
 
   
  +
Each technology is (part of) a security measure, providing some basic security function as a response to a (potential) threat. As used in the EU VAT, there are ten different technology uses that range from before, during and after an attack. The technology uses are:
XVII. Organizational climate. These are procedures for enhancing the
 
quality of the potential or actual vandal's social/educational/daily living
 
context:
 
147. Teacher/staff approval/reward for student prosocial behaviors
 
148. Teacher respect toward students
 
149. Teacher/parent modeling of respect for others and for property
 
150. Regular, visible presence of school principal
 
151. Involvement of school principal in community activities
 
152. School curriculum revision
 
153. Improved student-custodian relationships
 
154. Improved school-community relationships
 
155. Reorganization of large schools into schools-within-a-school or
 
house plans
 
   
  +
#''Alert'' - used for alerting public (e.g. sirens, texting service);
{{references}}
 
  +
#''Surveil'' - used for situational awareness (e.g. cameras, social media tools);
  +
#''Respond'' - used for responding to an attack (e.g. security personnel, non-lethal weapons);
  +
#''Protect'' - used to protect assets (people, buildings, infrastructure);
  +
#''Detect'' - used for detecting a weapon or weapon use (e.g. entry scanning equipment);
  +
#''Overcome'' - used for overcoming a sudden vulnerability (e.g. extra concertina wire);
  +
#''Improvise'' - created on the spot from available means (e.g. use police vehicle as a road block);
  +
#''Restrict'' - used for restricting public access (e.g. safety barriers);
  +
#''Adapt'' - used for changing circumstances (e.g. moving assets to a safer location);
  +
#''Other.''
   
  +
The following examples illustrate the potential needs for these event-driven, technological solutions by indicating their support towards mediating risk and mitigating vulnerabilities:
= MAP =
 
   
  +
*Enhancing the surveillance of an area to for instance count crowds, monitor allocation of citizens or identify occurrences of objects or behaviors. By enhancing this surveillance, a municipality and the other local actors can identify anomalies or assess the impact at certain moments in time before an attack or respond faster to incidents and aid citizens.
<websiteFrame>
 
  +
*Enhancing the cooperation between different actors (between own forces as well as completely different actors). In the cases of terrorist attacks, actors do not stand alone and need to cooperate in order to prevent, responds and recover from terrorist attacks. By enhancing the cooperation in could create more effective deployment of forces, better communication between them and faster (real time) sharing of information like images or videos to get ahead of the threat.
website=http://securipedia.eu/cool/index.php?concept=Risk
 
  +
*Enhancing alerting and evacuating of citizens during an attack by putting in place early warning systems and effective evacuation pathways. Potential innovative technology solutions could enhance the warning systems and evacuation pathways for specific public spaces.
width=100%
 
  +
*Enhancing the existing knowledge and train forces specifically for protecting public spaces against terrorism, as anti-terrorism expertise is often missing at local government. There is a need of knowing were and how this knowledge can be obtained as well as how to train personal in the future.<br />
border=0
 
scroll=auto
 
align=middle
 
</websiteFrame>
 
   
<headertabs/>
+
<br />

Latest revision as of 16:28, 23 November 2020

This is a page providing background in a specific field of expertise

Measures are provisions made or actions taken to protect an object or subject from risk.

Measure types can be classified by their temporal application: structural or event-driven measures. Structural measures are more geared towards permanent solutions, such as infrastructural improvements, in order to reduce the risk of criminal acts taking place in the areas where these measures are applied. Event-driven measures have a more temporal nature and can be implemented in order to ensure extra risk reduction and mitigation for (large scale) events. These are intended for more high impact crimes such as (terrorist) attacks.

Structural measure types to protect an object or subject from risk

Structural measures are permanent solutions that mediate the risk of a criminal act. These measures can be further classified by their point of application in the process of a criminal act. From the perspective of a criminal, all measures reduce the perceived attractiveness of a target. Identified points of application are:

  • Increasing perceived effort
  • Increasing perceived risk
  • Decreasing anticipated reward
  • Controlling contributing circumstances
  • Other

All measure types can be classified in one of these categories. The table below displays for each of the measure types in Securipedia, which point of application it works on.

By clicking the a brief description of the measure is provided.

Increasing perceived effort Increasing perceived risk Decreasing anticipated reward Contributing circumstances Other
Target hardening Surveillance Target removal Controlling disinhibitors Deflection
Access control Intervention force Removal of crime motivator Facilitating compliance Creating awareness / stimulating conscience
Directing traffic flows Screening Rule setting
Removing means Increase punishment Ownership
Maintenance

Event-driven measure types

Event driven-measures are temporal solutions that can mediate the risk of a high-impact crime (such as an attack) at an event in a designated area. These measures, in turn, can be broken down into various technology categories that could assist in the mitigation of vulnerabilities:

The five technology categories in event-driven measures are:

  1. ICT that could be used for communicating, storing, analysing and protecting information. Examples are: WiFi, IoT, Encryption, VPN, et cetera;
  2. Sensors that could be used for detection, identification, localisation or tracking. Examples are: cameras, facial recognition, acoustic sniper localisation, et cetera;
  3. Actuators that could be used for warning, intercepting or eliminating. Examples are: sirens, anti-drone drones, HPM vehicle stopping, et cetera;
  4. Physical measures that could be used for controlling access, impeding an attack or protective materials. Examples are: tourniquets, portable rising steps, bomb blast window film, et cetera;
  5. Methods that could be used for procedures, best practices or standards to implement solutions. An example is the ISO 31000 Risk Management

In this application, the term technology should be interpreted in the broadest sense of the word. It includes both hard technologies and soft technologies. Hard technologies are tangible devices or components (e.g. computers and software). Soft technologies include the human areas of decision making, strategy development, training, and concept formation (e.g. methodologies or procedures).

Each technology is (part of) a security measure, providing some basic security function as a response to a (potential) threat. As used in the EU VAT, there are ten different technology uses that range from before, during and after an attack. The technology uses are:

  1. Alert - used for alerting public (e.g. sirens, texting service);
  2. Surveil - used for situational awareness (e.g. cameras, social media tools);
  3. Respond - used for responding to an attack (e.g. security personnel, non-lethal weapons);
  4. Protect - used to protect assets (people, buildings, infrastructure);
  5. Detect - used for detecting a weapon or weapon use (e.g. entry scanning equipment);
  6. Overcome - used for overcoming a sudden vulnerability (e.g. extra concertina wire);
  7. Improvise - created on the spot from available means (e.g. use police vehicle as a road block);
  8. Restrict - used for restricting public access (e.g. safety barriers);
  9. Adapt - used for changing circumstances (e.g. moving assets to a safer location);
  10. Other.

The following examples illustrate the potential needs for these event-driven, technological solutions by indicating their support towards mediating risk and mitigating vulnerabilities:

  • Enhancing the surveillance of an area to for instance count crowds, monitor allocation of citizens or identify occurrences of objects or behaviors. By enhancing this surveillance, a municipality and the other local actors can identify anomalies or assess the impact at certain moments in time before an attack or respond faster to incidents and aid citizens.
  • Enhancing the cooperation between different actors (between own forces as well as completely different actors). In the cases of terrorist attacks, actors do not stand alone and need to cooperate in order to prevent, responds and recover from terrorist attacks. By enhancing the cooperation in could create more effective deployment of forces, better communication between them and faster (real time) sharing of information like images or videos to get ahead of the threat.
  • Enhancing alerting and evacuating of citizens during an attack by putting in place early warning systems and effective evacuation pathways. Potential innovative technology solutions could enhance the warning systems and evacuation pathways for specific public spaces.
  • Enhancing the existing knowledge and train forces specifically for protecting public spaces against terrorism, as anti-terrorism expertise is often missing at local government. There is a need of knowing were and how this knowledge can be obtained as well as how to train personal in the future.