Counter-Terrorism and the Protection of Crowded Places

Similar documents
Crowded Places: The Planning System and Counter-Terrorism

administered by S30: Terrorism sources of guidance and support

RiskTopics. Counter-Terrorism October 2017

Cyber Security Strategy

The Office of Infrastructure Protection

Cybersecurity governance in Europe. Sokratis K. Katsikas Systems Security Laboratory Dept. of Digital Systems University of Piraeus

Action Plan to enhance preparedness against CBRN security risks

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO

STUDENT AND ACADEMIC SERVICES

Side Events Organized on the Margins of the International Conference on Nuclear Security: Commitments and Actions

The Office of Infrastructure Protection

ACTIVE SHOOTER RESPONSE CAPABILITY STATEMENT. Dynamiq - Active Shooter Response

Automatic Number Plate Recognition (ANPR) ANPR Strategy Infrastructure Development

A comprehensive approach on personal data protection in the European Union

PRIOR LEARNING ASSESSMENT AND RECOGNITION (PLAR)

STRATEGY ATIONAL. National Strategy. for Critical Infrastructure. Government

Member of the County or municipal emergency management organization

Special Action Plan on Countermeasures to Cyber-terrorism of Critical Infrastructure (Provisional Translation)

Federal Civilian Executive branch State, Local, Tribal, Territorial government (SLTT) Private Sector (PS) Unclassified / Business Networks

keeping executives safe

Security Awareness Training Courses

ATHLETICS WORLD CUP PRIVACY NOTICE

BHConsulting. Your trusted cybersecurity partner

Global Security Advisor

Endpoint Security for Wholesale Payments

Privacy Policy. England Athletics Limited commitment to Privacy. Introduction. The information we collect about you. The information provided to us

Digital Health Cyber Security Centre

OAS Cybersecurity Capacity Building Efforts

Plan of action for Implementation of the Sendai Framework for Disaster Risk Reduction in Central Asia and South Caucasus Region

The APEC Model. Global Partnership through Regional Initiatives

CYBER INCIDENT REPORTING GUIDANCE. Industry Reporting Arrangements for Incident Response

Nuclear Security. Resolution adopted on 30 September 2016 during the tenth plenary meeting

BACKGROUND PAPER. Sub-Regional Platform on Disaster Risk Reduction

PROTECT YOUR DATA AND PREPARE FOR THE EUROPEAN GENERAL DATA PROTECTION REGULATION

Overview of the Federal Interagency Operational Plans

Strategic Security Analyst

Netherlands Cyber Security Strategy. Michel van Leeuwen Head of Cyber Security Policy Ministry of Security and Justice

NATIONAL CYBER SECURITY STRATEGY. - Version 2.0 -

The Office of Infrastructure Protection

SECURITY CODE. Responsible Care. American Chemistry Council. 7 April 2011

Panel 1 National CSIRT Experience

Her Majesty the Queen in Right of Canada, Cat. No.: PS4-66/2014E-PDF ISBN:

CYBERSECURITY TRAINING EXERCISE KMU TRAINING CENTER NOVEMBER 7, 2017

Highway & Motor Carrier Orientation & Modal Overview. June 2018

The UK s National Cyber Security Strategy

Max Security Solutions

STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE

Resilience, Deterrence and Defence: Building strong cybersecurity for the EU

NSI. Suspicious Activity Reporting Line Officer Training

SRM Service Guide. Smart Security. Smart Compliance. Service Guide

INFORMATION SECURITY NO MORE THE CINDERELLA?

UNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21

Qualification Specification. Level 2 Award in Cyber Security Awareness For Business

Cyber Security of ETCS

Users may, however, visit our Site anonymously.

Cloud First: Policy Not Aspiration. A techuk Paper April 2017

National Business Crime Partnership Association

Cyber Security Issues and Responses. Andrew Rogoyski Head of Cyber Security Services CGI UK

CYBER RESILIENCE & INCIDENT RESPONSE

HEALTH INFORMATION INFRASTRUCTURE PROJECT: PROGRESS REPORT

Florida Regional Domestic Security Task Forces

The Office of Infrastructure Protection

EXECUTIVE ORDER Chemical Facility Safety and Security: Providing ProtecFon Reduces Risk

The need for developing a cyber security ecosystem of professionals

Resilience in London

UAE National Space Policy Agenda Item 11; LSC April By: Space Policy and Regulations Directory

Thirteenth Symposium on the ICAO Traveller Identification Programme

International Atomic Energy Agency Meeting the Challenge of the Safety- Security Interface

Managing Jurisdictional Risks for Public Cloud Services

BHConsulting. Your trusted cybersecurity partner

1. To provide an update on the development of the SPA Assurance Map.

Contact Centre Qualifications Reference Guide for Centres

Grand Orange Lodge of Ireland Privacy Notice

Summary of Conference

THE WHITE HOUSE. Office of the Press Secretary EXECUTIVE ORDER

How to apply for professional membership and registration. 22 October 2018 Terry Winter Membership Manager

Shared Responsibility: Roles and Responsibilities in Emergency Management Geoff Hay

SAFER PLACES: A COUNTER TERRORISM SUPPLEMENT A CONSULTATION DOCUMENT

Public Sector Cyber Security Series

Cybersecurity Package

Counter-Terrorism Working Group Proposed Workplan for 2017

Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure

Exclusive Fast Track Opportunity for CEng Professionals - Gain a recognised Level 5 Diploma in Management and Leadership Qualification

THE WHITE HOUSE Office of the Press Secretary EXECUTIVE ORDER

Developing a Model for Cyber Security Maturity Assessment

Business Resilience & Incident Response Are You Ready?

Homeland Security & All-Hazards Senior Advisory Committee (H-SAC)

The Office of Infrastructure Protection

Virtual Currencies and The Commonwealth. 1 June 2016

Cybersecurity in Asia-Pacific State of play, key issues for trade and e-commerce

Protecting your data. EY s approach to data privacy and information security

IQ Level 4 Award in Understanding the External Quality Assurance of Assessment Processes and Practice (QCF) Specification

MEETING: RSSB Board Meeting DATE: 03 November 2016 SUBJECT: Rail Industry Cyber Security Strategy SPONSOR: Mark Phillips AUTHOR: Tom Lee

General Data Protection Regulation: Knowing your data. Title. Prepared by: Paul Barks, Managing Consultant

THE WHITE HOUSE. Office of the Press Secretary. EMBARGOED UNTIL DELIVERY OF THE PRESIDENT'S February 12, 2013 STATE OF THE UNION ADDRESS

cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services

Child Online Protection

Protecting Canada s Nuclear Industry THE

Information Technology Branch Organization of Cyber Security Technical Standard

HPH SCC CYBERSECURITY WORKING GROUP

Transcription:

Counter-Terrorism and the Protection of Crowded Places Alasdair Booth MSc @CT_PhD_Student Supervisors: Dr Lee Bosher and Dr Ksenia Chmutina

Background Information on Counter-Terrorism Security in the UK UK Counter-Terrorism Strategy split into four work steams: * Pursue (Trying to reduce the threat of terrorism and stop attacks) * Prevent (Stopping people becoming involved in terrorism) * Protect (Strengthening the protection against a terrorist attack) * Prepare (Intended to mitigate + reduce the impact of an attack)

NaCTSO are the national police unit responsible for supporting the UK Governments Protect and Prepare work streams. NaCTSO oversee a network of approx. 170 counter terrorism security advisors (CTSAs) across the UK. CTSAs are responsible delivering protective security advice to business and to crowded places to reduce vulnerability to terrorist threats.

What is a crowded place? A crowded place is a location or environment to which members of the public have access that may be considered potentially liable to a terrorist attack by virtue of its crowd density (Home Office 2012) *Shopping Centres *Further & Higher Educations *Cinemas & Theatres *Hotels & Restaurants *Sports Stadiums & Arenas *Commercial Centres *Pubs, Clubs, Bars *Health Sector *Places of Worship *Major Events

Research Justification Terrorism threat level in the UK severe for international terrorism substantial from Northern Ireland related Terrorism. Crowded places remain attractive targets. Lack of information on the role of the CTSA and how they provide protective security advice / tasked. Lack of information on how current protective security advice and guidance is meeting the needs to stakeholders.

Research Aim To critically assess the effectiveness of the current UK counter-terrorism protective security advice designed to protect crowded places from terrorism threats.

Research Objectives 1. To develop an understanding of the current landscape of counterterrorism security advice (advice, initiatives, threats, arrangements) 2. To establish who are the actual and potential stakeholders in relation to protecting crowded places, and to what extend they are being targeted. 3. To identify the range of both structural and non-structural protective security measures that are recommended to protect crowded places. 4. To develop an understanding of the extent to which current security advice and guidance is meeting the needs of stakeholders. 5. Suggest recommendations about how current counter-terrorism protective security advice could be revised and developed further.

Research Sample (Participants) *Police Counter-Terrorism Security Advisers (23) *Security Managers (range of crowded places) (26) *Architects (10) *Developers (3) *Planners (6) *Security Consultants (3)

Research Locations North East Region North West Region East Midlands Region West Midlands Region London Region

Achieving the Aims and Objectives *Literature review has been completed to identify the gaps in the knowledge including reviewing available CT security advice / guidance. *Semi-structured interviews have been utilised to carry out the rest of the data collection. *An exercise / desktop exercise was designed for CTSAs during the interview this enabled the scoping of the different range of protective security measures.

CTSA Crowded Place Security Exercise

Key Findings Concerning Architects, Planners and Developers Lack of awareness amongst the Architect, Planners and Developers of the role of CTSA and the protective security advice they provide: * 60% (architects), 100% (planners), 67% (developers) unaware of protective security advice booklet * 50% (architects), 17% (planners), 67% (developers) unaware of CTSA role

Standout Concerns and Challenges to CT Protective Security.. *Costs 80% (architects) 17% (planners) 67%(developers) *The appearance of the security measures 90% (architects) 100% (planners) 100% (developers) * Lack of legislation, procedure and guidance 50% (architects) * Clients needs 60% (architects) 33% (developers) *Access 10% (architects) 50% (planners)

Key Drivers for CT Protective Security Advice Receiving security advice at the design and concept stage 100% (architects) 100% (planners) 100% (developers) New terrorist attacks would encourage them to think more about CT security 30% (architects) 67% (planners) 100% (developers) Adopted into policy and regulation within planning 70% (architects) 50% (planners) 33% (developers) Greater promotion and advertising of CT security 50% (architects) 50% (planners) Project context and location 70% (architects)

Thank you for listening E-mail: A.booth2@lboro.ac.uk @CT_PhD_Student