Difference between revisions of "Measures"

From Securipedia
Jump to navigation Jump to search
m
 
(29 intermediate revisions by 4 users not shown)
Line 2: Line 2:
 
[[File:ae.png|25px|right|This is a page providing background in a specific field of expertise]]'''Measures''' are provisions made or actions taken to protect an object or subject from risk.
 
[[File:ae.png|25px|right|This is a page providing background in a specific field of expertise]]'''Measures''' are provisions made or actions taken to protect an object or subject from risk.
   
  +
Measure types can be classified by their temporal application: structural or event-driven measures. Structural measures are more geared towards permanent solutions, such as infrastructural improvements, in order to reduce the risk of criminal acts taking place in the areas where these measures are applied. Event-driven measures have a more temporal nature and can be implemented in order to ensure extra risk reduction and mitigation for (large scale) events. These are intended for more high impact crimes such as (terrorist) attacks.
==Measure types==
 
Measures can be clasified by their point of application in the process of a criminal act. From the perspective of a criminal, all measures reduce the perceived attractiveness of a target. Identified points of application are:
 
* Increasing perceived effort
 
* Increasing perceived risk
 
* Decreasing anticipated reward
 
* Controlling attributing circumstances
 
* Other
 
   
  +
==Structural measure types to protect an object or subject from risk==
All measure types can be classified in one of these categories. The table below shows for each of the measure types in this Securipedia which point of application it works on.
 
  +
Structural measures are permanent solutions that mediate the risk of a [[Crime|criminal]] act. These measures can be further classified by their point of application in the process of a criminal act. From the perspective of a criminal, all measures reduce the perceived attractiveness of a target. Identified points of application are:
   
  +
*Increasing perceived effort
{|class="wikitable" style="text-align: center;"
 
! style="background:#f0f0f0;"|'''Increasing perceived effort'''
+
*Increasing perceived risk
  +
*Decreasing anticipated reward
! style="background:#f0f0f0;"|'''Increasing perceived risk'''
 
  +
*Controlling contributing circumstances
! style="background:#f0f0f0;"|'''Decreasing anticipated reward'''
 
  +
*Other
! style="background:#f0f0f0;"|'''Attributing circumstances'''
 
  +
! style="background:#f0f0f0;"|'''Other'''
 
  +
All measure types can be classified in one of these categories. The table below displays for each of the measure types in Securipedia, which point of application it works on.
  +
  +
By clicking the {{#tip-info:Example of a explanatory text}} a brief description of the measure is provided.
  +
  +
{| class="wikitable" style="text-align: center;"
  +
! style="background:#f0f0f0;" |'''Increasing perceived effort'''
  +
! style="background:#f0f0f0;" |'''Increasing perceived risk'''
  +
! style="background:#f0f0f0;" |'''Decreasing anticipated reward'''
  +
! style="background:#f0f0f0;" |'''Contributing circumstances'''
  +
! style="background:#f0f0f0;" |'''Other'''
 
|-
 
|-
|[[Measure: Target hardening|Target hardening]]{{#info:Target hardening is the measure of strengthening the security by increasing the required effort to commit crimes to or at an object}}||[[Measure: Surveillance|Surveillance]]{{#info:Surveillance is the measure of monitoring the behaviour, activities, or other changing information, usually of people for the purpose of influencing, managing, directing, or protecting.}}||[[Measure: Target removal|Target removal]]{{#info:Target removal is the reduction of risk by removing the perceived attracting aspects from an [[attractive object]]}}||[[Measure: Controlling disinhibitors|Controlling disinhibitors]]{{#info:Controlling disinhibitors is the reduction of risk by removing or regulating disinhibiting substances or circumstances}}||[[Measure: Deflection|Deflection]]{{#info:Deflecting crime is the reduction of risk by creating circumstances that direct criminals to less critical objects}}
+
|[[Measure: Target hardening|Target hardening]]{{#tip-info:Target hardening is the measure of strengthening the security by increasing the required effort to commit crimes to or at an object}}||[[Measure: Surveillance|Surveillance]]{{#tip-info:Surveillance is the measure of monitoring the behaviour, activities, or other changing information, usually of people for the purpose of influencing, managing, directing, or protecting.}}||[[Measure: Target removal|Target removal]]{{#tip-info:Target removal is the reduction of risk by removing the perceived attracting aspects from an [[attractive object]]}}||[[Measure: Controlling disinhibitors|Controlling disinhibitors]]{{#tip-info:Controlling disinhibitors is the reduction of risk by removing or regulating disinhibiting substances or circumstances}}||[[Measure: Deflection|Deflection]]{{#tip-info:Deflecting crime is the reduction of risk by creating circumstances that direct criminals to less critical objects}}
 
|-
 
|-
| [[Measure: Access control|Access control]]{{#info:Access control is the reduction of risk by regulating and controlling the flows of traffic into and out of an area of object}}||[[Measure: Reaction force|Reaction force]]{{#info:A reaction force is the measure of having adequate resources (first responders) to react to emergencies in order to minimize impact and restore a normal situation as soon as possible.}}||[[Measure: Removal of crime motivator|Removal of crime motivator]]{{#info:Removal of a crime motivator is the reduction of risk by removing the benefits of a crime}}||[[Measure: Facilitating compliance|Facilitating compliance]]{{#info:Facilitating compliance is the reduction of risk by decreasing crime by facilitating compliance}}||Creating awareness / stimulating conscience{{#info:Creating awareness is the measure of increasing the mental reserves of people to commiting crimes}}
+
|[[Measure: Access control|Access control]]{{#tip-info:Access control is the reduction of risk by regulating and controlling the flows of traffic into and out of an area or object}}||[[Measure: Intervention force|Intervention force]]{{#tip-info:A intervention force is the measure of having adequate resources (first responders) to react to emergencies in order to minimize impact and restore a normal situation as soon as possible.}}||[[Measure: Removal of crime motivator|Removal of crime motivator]]{{#tip-info:Removal of a crime motivator is the reduction of risk by removing the benefits of a crime}}||[[Measure: Facilitating compliance|Facilitating compliance]]{{#tip-info:Facilitating compliance is the measure of reducing risk by decreasing crime by making it easier for the public to behave according to the local rules.}}||Creating awareness / stimulating conscience{{#tip-info:Creating awareness is the measure of increasing the mental reserves of people to committing crimes}}
 
|-
 
|-
| [[Measure: Directing traffic flows|Directing traffic flows]]{{#info:Directing traffic flows is the measure of reducing the opportunitiese for a criminal to approach a sutable target by physically separating the flows of traffic}}||[[Measure: Screening|Screening]]{{#info:Screening is the measure of reducing risk by identifying all traffic entring and/or exiting a certain area or object}}||||Rule setting{{#info:Rule-setting is the measure of erecting legal or regulatory restrictions of a temporal and/or local nature in order to reduce risk}}||
+
|[[Measure: Directing traffic flows|Directing traffic flows]]{{#tip-info:Directing traffic flows is the measure of reducing the opportunities for a criminal to approach a suitable target by physically separating the flows of traffic}}||[[Measure: Screening|Screening]]{{#tip-info:Screening is the measure of reducing risk by identifying all traffic entering and/or exiting a certain area or object}}|| ||Rule setting{{#tip-info:Rule-setting is the measure of erecting legal or regulatory restrictions of a temporal and/or local nature in order to reduce risk}}||
 
|-
 
|-
| [[Measure: Removing means|Removing means]]{{#info:Removing means is the reduction of risk by ensuring the tools or other means conductive to crime are not available}}||Increase punishment{{#info:Increasing punishement is the reduction of risk by the increase of the negative consequences of crime when caught}}||||[[Measure: Ownership|Ownership]]{{#info:Ownership is the reduction of crime by establishing an environment where there is a clear separation between public and private space}}||
+
|[[Measure: Removing means|Removing means]]{{#tip-info:Removing means is the reduction of risk by ensuring the tools or other means conductive to crime are not available}}||Increase punishment{{#tip-info:Increasing punishment is the reduction of risk by the increase of the negative consequences of crime when caught}}|| ||[[Measure: Ownership|Ownership]]{{#tip-info:Ownership is the reduction of crime by establishing an environment where there is a clear separation between public and private space}}||
 
|-
 
|-
| ||||||[[Measure: Maintenance|Maintenance]]{{#info:Maintenance is the measure of discouraging crime by designing places with management and maintenance in mind}}||
+
| || || ||[[Measure: Maintenance|Maintenance]]{{#tip-info:Maintenance is the measure of discouraging crime by designing places with management and maintenance in mind}}||
 
|}
 
|}
   
  +
==Event-driven measure types==
<hl>
 
   
   
  +
Event driven-measures are temporal solutions that can mediate the risk of a high-impact crime (such as an attack) at an event in a designated area. These measures, in turn, can be broken down into various technology categories that could assist in the mitigation of [[Security Vulnerability|vulnerabilities]]:
   
  +
The '''five technology categories''' in event-driven measures are:
   
  +
#''[[Measure type: Information and Communications Technology (ICT)|ICT]]'' that could be used for communicating, storing, analysing and protecting information. Examples are: WiFi, IoT, Encryption, VPN, et cetera;
  +
#''[[Measure type: Sensors|Sensors]]'' that could be used for detection, identification, localisation or tracking. Examples are: cameras, facial recognition, acoustic sniper localisation, et cetera;
  +
#''[[Measure type: Actuators|Actuators]]'' that could be used for warning, intercepting or eliminating. Examples are: sirens, anti-drone drones, HPM vehicle stopping, et cetera;
  +
#''[[Measure type: Physical measures|Physical measures]]'' that could be used for controlling access, impeding an attack or protective materials. Examples are: tourniquets, portable rising steps, bomb blast window film, et cetera;
  +
#''[[Measure type: Methods|Methods]]'' that could be used for procedures, best practices or standards to implement solutions. An example is the ISO 31000 Risk Management
   
  +
In this application, the term technology should be interpreted in the broadest sense of the word. It includes both hard technologies and soft technologies. Hard technologies are tangible devices or components (e.g. computers and software). Soft technologies include the human areas of decision making, strategy development, training, and concept formation (e.g. methodologies or procedures).
   
  +
Each technology is (part of) a security measure, providing some basic security function as a response to a (potential) threat. As used in the EU VAT, there are ten different technology uses that range from before, during and after an attack. The technology uses are:
   
  +
#''Alert'' - used for alerting public (e.g. sirens, texting service);
  +
#''Surveil'' - used for situational awareness (e.g. cameras, social media tools);
  +
#''Respond'' - used for responding to an attack (e.g. security personnel, non-lethal weapons);
  +
#''Protect'' - used to protect assets (people, buildings, infrastructure);
  +
#''Detect'' - used for detecting a weapon or weapon use (e.g. entry scanning equipment);
  +
#''Overcome'' - used for overcoming a sudden vulnerability (e.g. extra concertina wire);
  +
#''Improvise'' - created on the spot from available means (e.g. use police vehicle as a road block);
  +
#''Restrict'' - used for restricting public access (e.g. safety barriers);
  +
#''Adapt'' - used for changing circumstances (e.g. moving assets to a safer location);
  +
#''Other.''
   
  +
The following examples illustrate the potential needs for these event-driven, technological solutions by indicating their support towards mediating risk and mitigating vulnerabilities:
   
  +
*Enhancing the surveillance of an area to for instance count crowds, monitor allocation of citizens or identify occurrences of objects or behaviors. By enhancing this surveillance, a municipality and the other local actors can identify anomalies or assess the impact at certain moments in time before an attack or respond faster to incidents and aid citizens.
  +
*Enhancing the cooperation between different actors (between own forces as well as completely different actors). In the cases of terrorist attacks, actors do not stand alone and need to cooperate in order to prevent, responds and recover from terrorist attacks. By enhancing the cooperation in could create more effective deployment of forces, better communication between them and faster (real time) sharing of information like images or videos to get ahead of the threat.
  +
*Enhancing alerting and evacuating of citizens during an attack by putting in place early warning systems and effective evacuation pathways. Potential innovative technology solutions could enhance the warning systems and evacuation pathways for specific public spaces.
  +
*Enhancing the existing knowledge and train forces specifically for protecting public spaces against terrorism, as anti-terrorism expertise is often missing at local government. There is a need of knowing were and how this knowledge can be obtained as well as how to train personal in the future.<br />
   
  +
<br />
 
 
 
 
{|class="wikitable"
 
|-
 
!text below is a placeholder for measures that can be inserted in other pages
 
|}
 
 
== against vandalism ==
 
<ref>(School-related vandalism)
 
Reprinted with permission of The Guilford Press
 
CHAPTER 14
 
Controlling Vandalism:
 
The Person-Environment Duet
 
ARNOLD P. GOLDSTEIN
 
</ref>
 
 
I. '''Target hardening'''. This situational crime prevention approach involves
 
the use of devices or materials designed to obstruct the vandal by physical
 
barriers:
 
# Toughened glass (acrylic, polycarbon, etc.)
 
# Latticework or screens to cover windows
 
# Fire-retardant paint
 
# High-impact plastic or steel fixtures
 
# Hardened rubber or plastic swing seats
 
# Concrete or steel picnic tables, benches, bleachers
 
# Trash receptacles bolted to concrete bases
 
# Rough-play-tolerant adventure playgrounds
 
# Original planting of large-diameter trees
 
# Slash-proof transit vehicle seats
 
# Steel-framed bus seats
 
# Anti-graffiti repellent spray on bus seats
 
# Tamper-proof sign hardware and fasteners
 
# Door anchor hinges with non-removable pins
 
 
II. '''Access control'''. This approach involves architectural features, mechanical
 
and electronic devices, and related means for maintaining prerogatives
 
over the ability to gain entry:
 
# Key control systems
 
# Locked gates, doors, windows
 
# Electromagnetic doors unopenable from outside
 
# Deadbolt and vertical-bolt locks
 
# Metal door/window shutters
 
# Protective grills over roof access openings
 
# Fenced yards
 
# Vertical metal or small-mesh (unclimbable) fencing
 
# Reduced number of building entrances
 
# Unclimbable trees/bushes planted next to building
 
# Prickly bushes planted next to site to be protected
 
# Sloped windowsills
 
# Elimination of crank and gear window mechanisms
 
# Steeply angled roofs with parapets and ridges
 
# Use of guard dogs
 
# Use of student photo identification
 
# Partitioning off of selected areas during "downtime" hours
 
# High curbs along areas to be protected
 
 
III. '''Deflecting offenders'''. This is the channelling of potentially criminal
 
or aggressive behaviour in more pro-social directions by means of architectural,
 
equipment, and related alterations:
 
# Graffiti boards, mural programs
 
# Schools/studios to give graffiti writers exposure and recognition
 
# Interesting wallpaper, daily newspaper, chalkboard on bathroom wall
 
# Litter bins
 
# Wash fountains and towel dispensers in school hallways
 
# Steering of pathway circulation:
 
## Paving the shortest walk between connecting points
 
## Avoiding sharp changes in direction
 
## Paving natural shortcuts after demonstrated use
 
## Installing or landscaping traffic barriers (e.g., benches, bushes)
 
# "Next step" posters on broken equipment
 
 
IV. '''Controlling facilitators'''. This is the alteration of the means to criminal or aggressive behaviour by making such means less available, less accessible, or less potentially injurious:
 
# Control over sales of spray paint and indelible markers
 
# Removal of debris from construction/demolition sites
 
# Removal of waste paper, rubbish, and other combustibles
 
# Use of tamperproof screws
 
# Placement of permanent signs, building names, and decorative hardware out of reach from ground
 
# Placement of school thermostats, fire alarms, and light switches far
 
from "hang-out" areas
 
 
V. '''Exit-entry screening'''. Instead of seeking to exclude potential perpetrators (as in access control), this set of tactics seeks to increase the likelihood of detecting persons who are not in conformity with entry requirements (entry screening) or detecting the attempted removal of objects that should not be removed from protected areas (exit screening):
 
# Closed-circuit TV
 
# Metal detectors
 
# Vibration detectors
 
# Motion detectors
 
# Perimeter alarm system
 
# Library book tags
 
 
VI. '''Formal surveillance'''. This is surveillance by police, guards, monitors,
 
citizen groups, or other paid or volunteer security personnel:
 
# Police, citizen, senior citizen, tenant, parent patrols
 
# Neighbourhood Watch, School Watch, Block Watch, Rail/Bus Watch groups
 
# Provision of on-site living quarters for citizens or security personnel (e.g., "school sitters," "campground hosts")
 
# Informant hotlines (e.g., "rat-on-a-rat program," "secret witness program")
 
# Crime Solvers Anonymous reward program
 
# Mechanical, ultrasonic, infrared, electronic intruder alarm systems
 
# Automatic fire detection systems
 
# After-hours use of school public address system for monitoring
 
 
VII. '''Natural surveillance'''. This is surveillance provided by employees,
 
home owners, pedestrians, and others going about their regular daily
 
activities:
 
# Community after-school use
 
# Reduced teacher-student ratio
 
# Increased number of employees (e.g., playground supervisors, bus conductors, teachers)
 
# Round-the-clock custodial staffing
 
# Live-in custodian/caretaker
 
# Distribution of faculty/staff offices throughout the school
 
# Assignment of additional faculty/staff members to hall, cafeteria duty
 
# "Youth vacation vigil" student surveillance program
 
# Use of bus/train employees to report vandalism on their routes
 
# Improved exterior and interior lighting
 
# Low trimming of shrubbery and plants
 
 
VIII. '''Target removal'''. This is the physical removal or enhanced inaccessibility of potential vandalism targets:
 
# Use of graffiti dissuaders
 
## Teflon, plastic laminate, fiberglass, or melamine covering
 
## Rock cement, slanted siding, or deeply grooved surfaces
 
## "Paint-outs" or use of contrasting colours in patterned surfaces
 
## Fast-growing wall vines or shrubbery, or construction of wall barriers
 
# Removal of pay phones from high-loitering areas
 
# Removal of corner bus seats, hidden from driver's view
 
# Removal of outside plant bulbs
 
# Windowless school or other buildings
 
# Omission of ground-level windows
 
# Concealed school door closers
 
# Concealed pipework
 
# Fittings moved out of reach (e.g., from wall to ceiling)
 
# Signs/fixtures made flush with wall or ceiling
 
# Key-controlled light fixtures in public areas
 
# Removal of (or no replanting of) easily damaged trees/bushes
 
 
IX. '''Identifying property'''. This is the physical identification marking of potential vandalism targets:
 
# Property marking with school district identification
 
# Property marking with business logo
 
# Property marking with identification seals
 
# Property marking with organization stencil
 
# Property marking with individual's Social Security number
 
 
X. '''Removing inducements'''. This is the physical alteration of potential
 
vandalism targets:
 
# Rapid repair of damaged property
 
# Rapid removal of graffiti
 
# Use of small windowpanes
 
# Elimination of school washroom and toilet stall doors
 
# Elimination of bars over toilet stall doorways
 
# School restroom thermostats kept at 62°F
 
# Removal of gates and fences
 
# Repainting of playground equipment in bright colours
 
# Beautification programs (e.g., landscaping, painting, maintenance)
 
 
XL '''Rule setting'''. This is the making of explicit prior statements about
 
acceptable and unacceptable behaviours, as well as about penalties for
 
non-compliance:
 
# Model "hate crime" bill
 
# Antivandalism laws
 
# Building design specifications
 
# Building security codes
 
# Parental liability statutes
 
# Prohibition of sale of spray paint and indelible markers
 
# Codes of rights and responsibilities
 
# School rules of student conduct
 
# Rigorous, irregular, no-warning fire drills
 
 
XII. '''Education'''. These are direct efforts to dissuade potential and actual vandals by informing them about vandalism costs, consequences, and alternatives:
 
# Vandalism education programs
 
# Arson education programs
 
# Vandalism awareness walks
 
# Vandalism case study classroom discussions
 
# Classroom brainstorming on vandalism reduction
 
# Year-round education
 
# Student orientation handbook and meetings
 
# Multicultural sensitivity training
 
# Antivandalism lectures by older students to younger ones
 
# Antivandalism films
 
# Antivandalism games
 
# Antivandalism slide or tape program
 
# Antivandalism brochures
 
# "Ride with pride" antivandalism transit program
 
 
XIII. '''Publicity'''. These are indirect efforts to inform potential and actual vandals, as well as the general public, about vandalism costs, consequences, and alternatives:
 
# Antivandalism advertising
 
# Antivandalism news releases
 
# Milk carton/grocery bag antivandalism messages
 
# Antivandalism decals on mass transit vehicles
 
# Antivandalism slogan contests
 
# "Sign amnesty" day (a day of no fines or other penalties for those who return stolen signs)
 
# "Help the playground" campaigns
 
# Antivandalism buttons, T-shirts, rulers, bookmarks, posters
 
 
XIV. '''Punishment'''. These are negative experiences directed to perpetrators consequent to their vandalistic behaviour:
 
# Suspension from school
 
# Monetary fines
 
# Restitution
 
# Student vandalism account
 
# Group billing for residence hall damage
 
 
XV. '''Counselling'''. These are remedial experiences directed to perpetrators
 
consequent to their vandalistic behaviour:
 
# Student counselling programs
 
# Conflict negotiation skills training
 
# Moral reasoning training
 
# Interpersonal skills training
 
# Aggression replacement training
 
# Behaviour modification treatment for arson
 
## Stimulus satiation
 
## Contingency management
 
## Assertion training
 
 
XVI. '''Involvement'''. These are efforts to increase the sense of involvement with and ownership of potential vandalism targets:
 
# Encouraging students in residence halls to personalize (paint, furnish) their rooms
 
# Permitting students in residence halls to retain same room several semesters
 
# Student participation in school decision making
 
# School administration collaboration with student organizations
 
# School-home collaboration
 
# Hiring of unemployed youths as subway vandalism inspectors
 
# "Adopt-a-station" antivandalism program
 
 
XVII. '''Organizational climate'''. These are procedures for enhancing the
 
quality of the potential or actual vandal's social/educational/daily living
 
context:
 
# Teacher/staff approval/reward for student prosocial behaviours
 
# Teacher respect toward students
 
# Teacher/parent modelling of respect for others and for property
 
# Regular, visible presence of school principal
 
# Involvement of school principal in community activities
 
# School curriculum revision
 
# Improved student-custodian relationships
 
# Improved school-community relationships
 
# Reorganization of large schools into schools-within-a-school or
 
house plans
 
 
==against graffiti==
 
<ref>http://www.popcenter.org/problems/graffiti/summary/</ref>
 
{|
 
| colspan="5" align="center" style="background:#f0f0f0;"|'''Reducing Rewards to Offenders'''
 
|-- style="background:black; color:white"
 
| #||Response||How It Works||Works Best If...||Considerations
 
|-
 
| 1||Detecting graffiti rapidly and routinely ||Permits rapid removal ||…locations are regularly monitored ||Requires commitment and resources — efforts should not be piecemeal; can involve employees, police, citizens, hotlines, and other means
 
|-
 
| 2||Removing graffiti rapidly ||Reduces time graffiti is visible, thus thwarting offenders' objective of having graffiti be widely seen ||…removal is very quick and consistent ||Removal may be expensive, difficult and/or coercive (e.g., victims, as well as offenders, may be sanctioned)
 
|-
 
| Increasing the Risk of Detection||||||||
 
|-
 
| 3||Increasing natural observation of graffiti-prone locations||Increases risk of detection||…graffiti occurs in low-visibility places ||Efforts to improve lighting, reduce shrubbery and improve sight lines are most effective if the area is not isolated for long periods of time
 
|-
 
| 4||Increasing formal observation of graffiti-prone locations ||Increases risk of detection; information can aid investigations ||…there are high- risk hot spots ||Can use undercover personnel, other employees and electronic means; easily available; can be used on transit systems
 
|-
 
| 5||Increasing electronic security ||Increases risk of detection ||…offenders are targeting large areas such as transit lots ||Can be cost effective; information can aid investigations
 
|-
 
| 6||Conducting publicity campaigns||Increases risk of detection ||…information is widely disseminated, and risk of detection increases||May contribute to increased graffiti reports and extend deterrent effect
 
|-
 
| Increasing the Difficulty of Offending||||||||
 
|-
 
| 7||Vandal-proofing graffiti-prone locations||Increases difficulty of applying graffiti (may also decrease graffiti visibility, reducing motives); some methods facilitate removal ||…there are chronic graffiti locations ||Can be expensive if done retroactively; offenders may change their methods or targets; may stimulate and challenge offenders; some measures, such as using grooved, slanted or heavily textured walls, or otherwise unappealing graffiti surfaces, can be very effective; may be unsightly
 
|-
 
| 8||Controlling access to graffiti-prone locations ||Makes it more difficult to access or vandalize properties ||…property or operations can support design changes ||May be expensive, but very effective; may best be incorporated into construction and planning designs; most effective if behaviour is also regulated, such as in apartment complexes or transit stations
 
|-
 
| 9||Focusing on chronic offenders ||Increases risk of detection of prolific graffiti offenders||…there is a small group of chronic offenders ||Requires offender identification and follow-up
 
|-
 
| Responses With Limited Effectiveness||||||||
 
|-
 
| 10||Controlling graffiti tools ||Makes it more difficult for offenders to get paint or markers ||…offenders are easily deterred, and merchants comply ||Difficult to enforce; offenders can seek tools elsewhere; tools are easily accessed, transported and hidden
 
|-
 
| 11|| Channelling behaviour into more acceptable activities ||Intended to provide creative outlets||…offenders are artistically motivated ||Graffiti boards and walls can be placed in highly visible locations; they appear to attract little vandalism; they may not attract the target group
 
|-
 
| 12||Providing alternative activities and services ||Intended to engage and provide supervision to youth||….offenders are jobless, bored or unsupervised ||Difficult to identify and involve chronic offenders; programs may be expensive.
 
|-
 
| 13||Involving youth in developing programs||Intended to tap offenders' consciences and create ownership ||…offenders are not highly invested in the graffiti lifestyle ||Little deterrent effect for chronic offenders
 
|-
 
| 14||Expanding applicable laws ||Increases threat of punishment to deter offenders||…laws target particular problems ||Can be time consuming; offenders believe they won't get caught, so they don't worry about punishment
 
|-
 
| 15||Holding parents accountable ||Involves parents in controlling offenders' behaviour ||….offenders are juveniles ||Offenders can often hide behaviour from parents; parents may have little control
 
|-
 
| 16||Increasing sanctions for offenders ||Raises the risks associated with graffiti||…combined with investigative enforcement activities ||Because apprehension of offenders is low, may have little deterrent effect; sanctions should be applied systematically; requires collaboration with prosecutors and judges; can consist of fines, community service or loss of driver's license
 
|-
 
| 17||Applying new technologies ||Reduces motives, deflects or diverts offenders, or increases detection||…the technology fits the problem ||May be expensive and require substantial adaptation or experimentation
 
|-
 
| 18||Establishing juvenile curfews ||Increases the risk of detection for certain offenders ||…graffiti typically occurs late at night, and offenders are juveniles ||Difficult to enforce
 
|-
 
| 19||Warning offenders||Intended to increase fear of detection||…detection is increased, and consequences are unpleasant ||Apprehension of offenders is low; warnings of dire consequences may not be effective
 
|-
 
|
 
|}
 
{{references}}
 

Latest revision as of 16:28, 23 November 2020

This is a page providing background in a specific field of expertise

Measures are provisions made or actions taken to protect an object or subject from risk.

Measure types can be classified by their temporal application: structural or event-driven measures. Structural measures are more geared towards permanent solutions, such as infrastructural improvements, in order to reduce the risk of criminal acts taking place in the areas where these measures are applied. Event-driven measures have a more temporal nature and can be implemented in order to ensure extra risk reduction and mitigation for (large scale) events. These are intended for more high impact crimes such as (terrorist) attacks.

Structural measure types to protect an object or subject from risk

Structural measures are permanent solutions that mediate the risk of a criminal act. These measures can be further classified by their point of application in the process of a criminal act. From the perspective of a criminal, all measures reduce the perceived attractiveness of a target. Identified points of application are:

  • Increasing perceived effort
  • Increasing perceived risk
  • Decreasing anticipated reward
  • Controlling contributing circumstances
  • Other

All measure types can be classified in one of these categories. The table below displays for each of the measure types in Securipedia, which point of application it works on.

By clicking the a brief description of the measure is provided.

Increasing perceived effort Increasing perceived risk Decreasing anticipated reward Contributing circumstances Other
Target hardening Surveillance Target removal Controlling disinhibitors Deflection
Access control Intervention force Removal of crime motivator Facilitating compliance Creating awareness / stimulating conscience
Directing traffic flows Screening Rule setting
Removing means Increase punishment Ownership
Maintenance

Event-driven measure types

Event driven-measures are temporal solutions that can mediate the risk of a high-impact crime (such as an attack) at an event in a designated area. These measures, in turn, can be broken down into various technology categories that could assist in the mitigation of vulnerabilities:

The five technology categories in event-driven measures are:

  1. ICT that could be used for communicating, storing, analysing and protecting information. Examples are: WiFi, IoT, Encryption, VPN, et cetera;
  2. Sensors that could be used for detection, identification, localisation or tracking. Examples are: cameras, facial recognition, acoustic sniper localisation, et cetera;
  3. Actuators that could be used for warning, intercepting or eliminating. Examples are: sirens, anti-drone drones, HPM vehicle stopping, et cetera;
  4. Physical measures that could be used for controlling access, impeding an attack or protective materials. Examples are: tourniquets, portable rising steps, bomb blast window film, et cetera;
  5. Methods that could be used for procedures, best practices or standards to implement solutions. An example is the ISO 31000 Risk Management

In this application, the term technology should be interpreted in the broadest sense of the word. It includes both hard technologies and soft technologies. Hard technologies are tangible devices or components (e.g. computers and software). Soft technologies include the human areas of decision making, strategy development, training, and concept formation (e.g. methodologies or procedures).

Each technology is (part of) a security measure, providing some basic security function as a response to a (potential) threat. As used in the EU VAT, there are ten different technology uses that range from before, during and after an attack. The technology uses are:

  1. Alert - used for alerting public (e.g. sirens, texting service);
  2. Surveil - used for situational awareness (e.g. cameras, social media tools);
  3. Respond - used for responding to an attack (e.g. security personnel, non-lethal weapons);
  4. Protect - used to protect assets (people, buildings, infrastructure);
  5. Detect - used for detecting a weapon or weapon use (e.g. entry scanning equipment);
  6. Overcome - used for overcoming a sudden vulnerability (e.g. extra concertina wire);
  7. Improvise - created on the spot from available means (e.g. use police vehicle as a road block);
  8. Restrict - used for restricting public access (e.g. safety barriers);
  9. Adapt - used for changing circumstances (e.g. moving assets to a safer location);
  10. Other.

The following examples illustrate the potential needs for these event-driven, technological solutions by indicating their support towards mediating risk and mitigating vulnerabilities:

  • Enhancing the surveillance of an area to for instance count crowds, monitor allocation of citizens or identify occurrences of objects or behaviors. By enhancing this surveillance, a municipality and the other local actors can identify anomalies or assess the impact at certain moments in time before an attack or respond faster to incidents and aid citizens.
  • Enhancing the cooperation between different actors (between own forces as well as completely different actors). In the cases of terrorist attacks, actors do not stand alone and need to cooperate in order to prevent, responds and recover from terrorist attacks. By enhancing the cooperation in could create more effective deployment of forces, better communication between them and faster (real time) sharing of information like images or videos to get ahead of the threat.
  • Enhancing alerting and evacuating of citizens during an attack by putting in place early warning systems and effective evacuation pathways. Potential innovative technology solutions could enhance the warning systems and evacuation pathways for specific public spaces.
  • Enhancing the existing knowledge and train forces specifically for protecting public spaces against terrorism, as anti-terrorism expertise is often missing at local government. There is a need of knowing were and how this knowledge can be obtained as well as how to train personal in the future.