Urban Security Decision Support OutcomesUrban Security FunctionalRequirements Physical Devices  / AssetsOther  Agencies & Information SourcesIncident ManagementPlanned  & Unplanned(Response Plans& Escalations) Encrypted Communications ProtocolsEncrypted Communications ProtocolsSurveillance & DetectionAccess Control & Physical  Devices i.e.  Traffic  Signals Barriers   etc.Perimeter /Border Control  - Outer  & Inner PerimetersIntelligence & Threat Assessment Prediction & PreventionResponse  Asset  Management(Assets = People /Systems )  Response & InterceptionDetection and Surveillance Devices Building  Security and Management & Fault Management SystemsInformation ManagementIntelligence & Metrics  - Internal & External  AgenciesHuman Resources(Assets)Information Technology & Communications Security Secure Data Collected, Processed  & Stored.Command & Control Spans all Activities , Functions and Business Outcomes
Operations CoordinatorsSecurity AnalystsMilitary / Police  AgenciesDissemination Layer and Decision Support InterfaceEvent / Situation ManagerStored Response PlansEscalations & OperationsProtocols/RulesSituation AnalysisEngines & DatabasesPattern AnalysisEngines & DatabasesIntegrated Messaging Systems  & Data Transport Protocols Typically Web Services DrivenFacial  & FP/Retina  RecognitionVideo Based Incident DetectionBuilding Management & Security Systems / Fault ManagementData  Supplied By Others – Security Intelligence Wanted Lists etcOCR Engines + Automated Character RecogSpecific Security Applications – Aggregate and  Integrate data from multiple underlying Detection Devices & SourcesCCTV & Actual Surveillance BiometricsVBID CCTV + ZonesIT Systems & CommsANPR/LPRAlarms Presence DetectionDetection Devices + End Points of Presence  / Border / Perimeter Detection Systems
Command & Control2

Command & Control2

  • 1.
    Urban Security DecisionSupport OutcomesUrban Security FunctionalRequirements Physical Devices / AssetsOther Agencies & Information SourcesIncident ManagementPlanned & Unplanned(Response Plans& Escalations) Encrypted Communications ProtocolsEncrypted Communications ProtocolsSurveillance & DetectionAccess Control & Physical Devices i.e. Traffic Signals Barriers etc.Perimeter /Border Control - Outer & Inner PerimetersIntelligence & Threat Assessment Prediction & PreventionResponse Asset Management(Assets = People /Systems ) Response & InterceptionDetection and Surveillance Devices Building Security and Management & Fault Management SystemsInformation ManagementIntelligence & Metrics - Internal & External AgenciesHuman Resources(Assets)Information Technology & Communications Security Secure Data Collected, Processed & Stored.Command & Control Spans all Activities , Functions and Business Outcomes
  • 2.
    Operations CoordinatorsSecurity AnalystsMilitary/ Police AgenciesDissemination Layer and Decision Support InterfaceEvent / Situation ManagerStored Response PlansEscalations & OperationsProtocols/RulesSituation AnalysisEngines & DatabasesPattern AnalysisEngines & DatabasesIntegrated Messaging Systems & Data Transport Protocols Typically Web Services DrivenFacial & FP/Retina RecognitionVideo Based Incident DetectionBuilding Management & Security Systems / Fault ManagementData Supplied By Others – Security Intelligence Wanted Lists etcOCR Engines + Automated Character RecogSpecific Security Applications – Aggregate and Integrate data from multiple underlying Detection Devices & SourcesCCTV & Actual Surveillance BiometricsVBID CCTV + ZonesIT Systems & CommsANPR/LPRAlarms Presence DetectionDetection Devices + End Points of Presence / Border / Perimeter Detection Systems

Editor's Notes

  • #2 Note – model assumes that:1) Policy and Legislative imperatives are clear2) Chain of command and ops control roles are clearly defined and understood as are escalations and degree of responses based on severity / threat assessment.3) Incident closure process is assumed as being defined as are incident response plans.4) Tertiary Systems such as Traffic lights barriers and tolling systems are available as inputs – not all detection types are listed ie RFID is a valid mechanism for tracking cars as is cellular ESN for tracking people5) All data point to point is encrypted to military grades.
  • #3 Note the above diagram should be read from bottom to top.Each layer is representative of functions and roles and presents a limited example of each level.Situation and Response planning requires that response plans are already available – heuristics for the analysis layer are always customised depending on the requirements of the agency seeking the system.Terrorism will require military response and therefore all command and control will default to military objectives overriding standard surveillance requirements.AVL as an example should be installed on all official vehicles etc and a web map interface present for coordination of response assets.