Total of potential risk (assets)


90

Total score potential risk


%




Site characterization

Value

Factor

Score

Max

1. Site and physical environment





1.1 Density of the area


3


9

low density

3

9



medium density

2

6



high density

1

3





1.2 Access and road network



multiple accesses from several roads, close to an intersection

3

6

two-way road

2

4

single track road or cul de sac

1

1

1.3 Type of access road


2

Public road

3

6

Semi-public road

2

4

Private road

1

1

1.4 Presence of landscaping giving visual obstructions

3

low (attacker cannot hide)

3

9

medium (some visual obstruction)

2

6

high (easy to hide during attack)

1

3

1.5 Level of noise


1

low

1

1

medium

2

2

high

3

3

1.6 Site adjoins railway line or river or wooded area


1

yes

5

5

no

0

0

Subtotal 1 Site and Physical environment



Subtotal 1 Score



2. Human and social factors of the environment



2.1 Crime history


1

No major incidents

1

1

Incident in last three years

10

10

Incident in last year

20

20

2.2 Visitor impression of tidiness/level of organization


1

poor

12

12

average

6

6

good

1

1

2.4 Crime rate in neighbourhood compared to national 1 average

low 1 1

medium 5 5










































high

10

10

Subtotal 2 Human and social factors

Subtotal 2 Score



3. Use of the site (occupancy)


3.1 Periods of occupancy


concen- non-

(during operating hours some parts of the site monitored (for over 30 min)

are not

trated concen­trated

24/7

-

1 5

daytime

-

5 10

seasonal

Subtotal 3 Use of the site

Subtotal 3 Score

  1. Access

    1. Do you have a need of access for employees? Select highest category


10 15

1

Pedestrians

1

1

Cars

3

3

Trucks

7

7

Boat or train

10

10

4.2 Does the site require access by external parties?

1

Select highest category




Pedestrians

2

2


Cars

6

6


Trucks

14

14


Boat or train

20

20


4.3 Type of access


regular

irregular

daytime

-

1

5

night

-

5

10

4.4 Access intensity


regular

irregular

Intensity (use)




low

1

3

medium - 5 8


high - 10 15


Subtotal 4 Access


55







































Total of potential significance


155

Total score potential significance


%

Subtotal 4 Score



  1. Modus operand!

    1. Introduction

Most breaches of perimeter security on a site are committed because aggressors enjoy opportunities: easy access, hiding places, absence of demarcation of the site, poor lighting and/or favourable landscaping. It is important to analyse and identify in order to understand the motivation of potential aggressors.

Modus operandi should cover all combinations of:

aggressor type (5.2);

scenario to breach the perimeter (5.3);

toolset (5.4).

The aggressor type is the most important 'constituent' of the Modus operandi. Four Modus operandi (MO 1 to MO 4) should cover all possible situations with intended breach of the perimeter. Further detailed descriptions are deemed irrelevant, as it does not add to the ways the attack will take place, nor will it differentiate in the perseverance of the potential attacker.

  1. Aggressor types

Four aggressor type are distinguished:

  1. Opportunist - vandalism and theft;

  2. Activist;

  3. Organized crime (creating opportunity, experienced);

  4. Terrorist.

The types reflect the level of know-how, preparation and motivation of the attacker. For example, opportunists are those who will commit an offence if the opportunity presents itself. They are interested in sites with easy access, a low level of surveillance and ready escape routes.

A more experienced aggressor will, prior to carrying out an offence, conduct an important phase of gathering information. It is also probable that he will have a specific target in mind and may be prepared to use more effective tools to gain entry to the site. He very often has expertise in bypassing or sabotaging mechanical, electronic or CCTV and electronic detection devices.

  1. Scenarios

The most likely methods to breach the perimeter are:

walk in;

reach over;

climb over;

go underneath;

swim/sail over inland water;

intrusion with hand tools;

intrusion with electric/pneumatic toolset;

intrusion with hydraulic tools;

vehicle intrusion/attack.

  1. Toolsets

To be able to choose the proper Modus operandi, the tools the attacker may be expected to use have to be determined or chosen.

The user of the present classification methodology might want to choose his own list. A list distinguishing between three toolsets is given here as an example:

  1. manual, easily-portable tooling crowbar, handsaw, hammer and pliers;

  2. intermediate tooling including battery-operated tools, car jack;

  3. power operated tools including petrol-driven tools.

NOTE If a fixed list of pre-defined toolsets is considered necessary, the development such list will be part of the future activities.

  1. Risk assessment methodology

    1. General

Although the methods for risk assessment for perimeter protection can be generic, a risk assessment itself shall be conducted specifically for each site. It should take into account the perimeter and its location, the assets on the site, their value and their function and the threats and their probability.

Completing the risk assessment itself is a task performed by people. It is a task that is highly influenced by a number of (subjective) factors such as: moment in time, past experiences, interaction of stakeholders, skills and competences of the people involved and complexity of the situation. The validity of a risk assessment therefore depends on the availability of a comprehensive structure and the minimization of interpretation.

The risk assessment has to be conducted from the customer/user point of view and not from the product point of view. Considering the purpose of the risk assessment itself, it is of importance that all relevant stakeholders are involved in the assessment and that the assessment is formally accepted by the customer. Stakeholders are everyone who has an interest in the security of the site including site owner, site users, budget holders and security managers.

  1. Risk - Target identification

Risk is defined by the probability of an event multiplied by its impact. For a site owner or user of a site, the risks to analyse can be (see Questionnaires 1.1 to 1.3):

  1. Financial loss;

  2. Operational and environmental safety;

  3. Business Continuity (Confidential documents, prototypes, machinery).

NOTE It has been noted that the 'human aspect’ is missing. It is possible therefore that risks like ’Trauma to people’, ’Image damage’ and Damage to society/public’ will be considered in the future.

  1. Threats

Threats can be:

  1. burglary - thefts of goods, thefts of information, thefts of data;

  2. vandalism;

  3. aggression to people;

  4. sabotage;

  5. damage by arson;

  6. product contamination;

  7. espionage;

  8. escape;

  9. non complying I breach of health and safety regulations.

The threats enter the questionnaire through the choice of the risk level (risk value) taken into account.

  1. Site characterization

    1. General

Site characterization with regard to e.g. surroundings, access and use should be reviewed in order to determine vulnerability and necessary resistance methods.

  1. Site and physical environment

See Questionnaires 1.1 to 1.6:

  1. Density of the area;

  2. Access and road network;

  3. Type of access road;

  1. Presence of landscaping giving visual obstruction;Level of noise;

  2. Site adjoins railway track, river, wooded area.

6.4.3 Human and social factors of the environment

See Questionnaires 2.1 to 2.3:

  1. Crime history;

  2. Visitor impression of tidiness level of organization;

  3. Crime rate in neighbourhood compared to national average level.

6.4.4 Use of the site

See Questionnaire 3.1:

3.1 Periods of occupancy - human presence:

Daytime;

Full time 24/7;

Seasonal.

6.4.5 Type of access

See Questionnaires 4.1 to 4.4:

  1. Need for access employees;

  2. Access by external parties;

  3. Type of access regular, irregular, daytime, 24/7;

  4. Access intensity.

  1. Level of protection

Once the value for 'Potential risk' and 'Site characterization' have been established, the required level of protection has to be determined. This step is rather intuitive and subjective, since clear procedures for this are not (yet) available.

However, by assessing the sensitivity of use of the calculation model for various situations, which the user may have select himself, the user can tune in on the following classification

:Table 1 — Nature of the problem and Level of protection

Combination of 'Potential risk' and 'Site characterization’

Desired 'Level of protection'

No problem

1

Medium problem

2

Serious problem

3

Very serious problem

4



  1. Determining functional requirements

    1. Introduction

The aggregation of Level of Protection, Modus Operandi and Site Characterization will define, as a result, a Desired Performance as required by the site owner or user regarding the perimeter protection system. With the criteria described in the Desired performance the functional requirements need to be determined.

The desired Level of protection is the main determining factor. Data about the Modus operandi and from the Site characterization are more or less 'boundary conditions'.

A preliminary, indicative first impression of possible solutions given a desired Level of protection, may be as follows:

Table 2 — Level op protection and indicative solution

Level of protection

Objective

Possible solution (indicative)

1

Deter and delay

Mechanical solution

2

Deter, detect and delay

Mechanical solution plus single intrusion detection

3

Deter, detect, delay and intervention

Mechanical solution plus multiple detection, including alarm and verification

4

Deter, detect, delay and intervention

Multiple mechanical solutions (zoning) plus multiple detection including alarm and verification



  1. Questions for establishing the functional requirement

In the process of actually formulating the functional requirement the following three main questions have to be answered:

What should the system do?

How well / to what degree should the system do that?

- Why?

While identifying the actual objectives/requirements the following (non-exhaustive) list can be used:

  1. restrict area perimeter - demarcation;

  2. secure site assets - protecting assets and persons;

  3. regulate flow of persons and vehicles;

  4. control flow persons and vehicles;

  5. creating time to respond:

  1. deter;

  2. detect;

  3. delay;

  4. deny.

  1. Elements of possible solutions

    1. Introduction

Perimeter protection is all about deterrence, detection, assessment and delaying of the intrusion for a intervention and response is initiated. Every solution needs to match the criteria set in the functional requirements of the site to be protected.

Operating environment, perimeter protection construction, security history, site layouts, surrounding environment, activity in and around the site, local weather conditions are all factors to be considered when planning a perimeter protection system solution. These influence the detection technologies selected and as a consequence the overall performance of the system.

Often the final perimeter protection solution will consist of several different but complementary technologies to form layers of protection.

In this clause a quick survey is given regarding possible solutions to meet the functional requirements providing an adequate match. In Clause 10 'Inventories' an overview is given of all the annexes with the Inventories that have been made.

Distinction is made between the following elements of a possible solution:

elements of delay;

elements of detection;

external elements;

local law and regulations.

A combination of the above measures is needed to provide a level of delay commensurate to the maximum response time from detection of intruder to interception; and to facilitate intervention.