Feature
During an attack, in the monitor and control phase, on-site network cameras can monitor an incident as it unfolds, with on-camera analytics capable of identifying explosions, gun shots and breaking glass, providing early warning and a more accurate indicator of the nature of the evolving incident. Security teams, supplied with accurate intelligence, can then make split-second decisions which could save many lives. This may include, for example, triggering an automated sequence of security responses delivered through the building management system to better control the movement of people,
safely
evacuating them from a location using safe zones and placing other areas into lockdown. Edge-based processing capabilities will also allow video data to be packaged and sent to an alarm receiving centre (ARC), or the emergency services for immediate review. This brings Command and Control teams swiftly up to speed on the situation unravelling on the ground.
Furthermore, this intelligence gathering can be complemented with the use of body-worn cameras by incident response teams (IRTs) that combine the latest modern network camera technology in a high-quality, wearable solution. These cameras should be considered an extension to any fixed security system, complementing existing network surveillance cameras by covering any blind spots in the field of view, such as a person wearing a hat that might shroud the face from a fixed camera. They provide an individual perspective of any situation, with forensic video captured at the point at which an incident occurs, to collect evidence where and when it’s needed. Also, the presence of personnel wearing body-worn cameras can serve as a visual deterrent to potential attackers.
In the post attack review phase, video from fixed and body-worn cameras, access control data gathered at entrance and exit points, and incident response documentation can help build up a picture of the type of attack, how it unfolded and its characteristics to improve knowledge and understanding. This is the type of evidence that can help the police identify the perpetrators of crime more quickly; having rapid access to recorded video is essential while still applying the rigorous requirements of the GDPR and encryption that makes such evidence safe for use in court proceedings. Reviewing data to identify points of failure and staff responses will, in addition, prove invaluable for training purposes to increase organisational preparedness for future threats.
FSM
Cyber-secure solutions and trusted partnerships
Though attacks on a site might be thought of as being only physical in nature, in reality, a combination of cyber and physical attack might be the modus operandi of terrorists to deliver maximum disruption with catastrophic results. A security system is only as strong as its weakest link and it’s imperative that these systems are not left open to cyber attack, in turn, compromising the physical security of a public space or multiple spaces. A cyber attack might be used purely to distract and disorientate a business which, while focused on restoring IT systems, are unprepared for the physical attack which follows. It is therefore imperative that the physical security technologies employed can offer comprehensive site protection while guarding against cyber vulnerabilities.
The management of risk and mitigation of threats extends to the forging of trusted relationships with partners and vendors, whereby trusted partnerships formed with reliable vendors of high-quality security systems, is the best line of defence. Establishing such partnerships can lead to a much more resilient security strategy. Through implementation of a scalable, future-proof security solution, the managers and operators of events and open spaces can feel confident that they are taking all the necessary steps to mitigate threat to create and maintain safer, more secure public spaces.
1:
https://www.gov.uk/government/consultations/protect-duty FSM 27
Page 1 |
Page 2 |
Page 3 |
Page 4 |
Page 5 |
Page 6 |
Page 7 |
Page 8 |
Page 9 |
Page 10 |
Page 11 |
Page 12 |
Page 13 |
Page 14 |
Page 15 |
Page 16 |
Page 17 |
Page 18 |
Page 19 |
Page 20 |
Page 21 |
Page 22 |
Page 23 |
Page 24 |
Page 25 |
Page 26 |
Page 27 |
Page 28 |
Page 29 |
Page 30 |
Page 31 |
Page 32 |
Page 33 |
Page 34 |
Page 35 |
Page 36