WO2010061381A2 - A security system and a method for training and for detection and prevention of hostile activity at distant range from a secured site - Google Patents
A security system and a method for training and for detection and prevention of hostile activity at distant range from a secured site Download PDFInfo
- Publication number
- WO2010061381A2 WO2010061381A2 PCT/IL2009/001082 IL2009001082W WO2010061381A2 WO 2010061381 A2 WO2010061381 A2 WO 2010061381A2 IL 2009001082 W IL2009001082 W IL 2009001082W WO 2010061381 A2 WO2010061381 A2 WO 2010061381A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- state
- sdr
- training
- detection
- carried
- Prior art date
Links
Classifications
-
- F—MECHANICAL ENGINEERING; LIGHTING; HEATING; WEAPONS; BLASTING
- F41—WEAPONS
- F41H—ARMOUR; ARMOURED TURRETS; ARMOURED OR ARMED VEHICLES; MEANS OF ATTACK OR DEFENCE, e.g. CAMOUFLAGE, IN GENERAL
- F41H11/00—Defence installations; Defence devices
- F41H11/02—Anti-aircraft or anti-guided missile or anti-torpedo defence installations or systems
-
- F—MECHANICAL ENGINEERING; LIGHTING; HEATING; WEAPONS; BLASTING
- F41—WEAPONS
- F41H—ARMOUR; ARMOURED TURRETS; ARMOURED OR ARMED VEHICLES; MEANS OF ATTACK OR DEFENCE, e.g. CAMOUFLAGE, IN GENERAL
- F41H11/00—Defence installations; Defence devices
-
- F—MECHANICAL ENGINEERING; LIGHTING; HEATING; WEAPONS; BLASTING
- F41—WEAPONS
- F41H—ARMOUR; ARMOURED TURRETS; ARMOURED OR ARMED VEHICLES; MEANS OF ATTACK OR DEFENCE, e.g. CAMOUFLAGE, IN GENERAL
- F41H13/00—Means of attack or defence not otherwise provided for
Definitions
- the present invention relates to a security system and a method, more particularly, to a security system and a method for training and for detection and prevention of hostile activity at a distant range from a secured site.
- the security solution can be only partial, while the solution according to the present invention is structured as a triangular spear which unites human abilities with procedures and advanced technologies in order to seek, detect, and react in the most effective way. Seeing as the spearhead is a person
- the present invention relates to a search detect and react, (SDR) system and a method of use for detection and prevention of hostile activity at a distant range from a secured site, or any other location, with flexible search, without geographical limitation, according to analysis of the enemy's method of operation, and to a system and a 5 method for training for their efficient use.
- the method of use includes definition of fives SDR states, which will be detailed below, and which comprise an operative protocol according to which a security array can function efficiently.
- a method for detection and prevention of hostile activity including the stage of: (a) providing a detection and prevention system to security personnel.
- the method for detection and prevention of hostile activity includes: (i) identifying attire for quick recognition of undercover operatives carried on the body of the security official; (ii) a belt carried on the body of the security official; (iii) a communication system; (iv) a weapon carried on the belt; (v) an operational personal flashlight carried on the belt;(vi) a tear gas container carried on the belt; and (vii) a metal detector carried on the belt.
- the detection and prevention system is deployed throughout a distant perimeter of the secured site.
- the method for detection and prevention of hostile activity further including the stage of: (c) integrative combining; (d) analyzing, learning, and determining of a routine; (e) declaring SDR 1 state, wherein the SDR 1 state is a routine and normal state; and (f) operating and distributing means.
- the operating and distributing means stage includes the sub-stages of: (i) stimulating; and (ii) treating any anomaly.
- the method for detection and prevention of hostile activity further includes the stage of: (g) declaring
- SDR 2 state wherein the SDR 2 state is a state of suspicion
- SDR 3 state wherein the SDR 3 state is verification and preventing expansion of a threat state
- SDR 4 state wherein the SDR 4 state is a violent action state, that obligates the security personnel to perform a precise and swift reaction
- SDR 5 state wherein the SDR 5 state is of clear and present mortal danger
- a method for training including the stages of: (a) providing a theoretical background; and (b) performing indoor training.
- the method for training of further includes the stage of: (c) performing field training.
- the method for training further including the stage of: (d) wrapping up.
- the theoretical background includes a basic acquaintance of an arena and its surroundings, principles of site analysis, analysis of enemy's aggressive options, evaluating the SDR integration with the existing security plan, interview with security personnel and watching the security procedures applied in a league game, as well as theoretical training, including, suicide bomber phenomena, car bomb characteristics, dealing with suspect objects, reading body language, identifying suspicious signs, and seeing the arena through the eyes of the enemy.
- the indoor training includes identifying suspicious signs.
- the theoretical background includes an initial survey of an arena and its surroundings, basic analysis of site analysis, analysis of enemy's aggressive options, identifying intelligence collection by the enemy, interviewing with security personnel, watching security procedures applied in a league game, defining normal routine and unusual events, and principles of emergency procedures, providing a feedback session with security managers after watching the game, and putting together a basic SDR plan according to the needs, the capabilities and the constraints of the arena, theoretical training regarding suicide bomber phenomena, car bomb characteristics, dealing with suspect objects, reading body language, identifying suspicious signs, seeing the arena through the eyes of the enemy, and identifying any enemy intelligence collector.
- the indoor training includes identifying suspicious signs, identifying a suicide bomber, identifying malicious intentions such as eyes and hands, and observation.
- the field training includes individual training, team training, running a full SDR model in a live game, attack and protect drills, and co-working with local law enforcement.
- the wrap up session includes feedback for the training period, open forum for discussion, and exploring further development options such as FCU and red team.
- a detection and prevention system carried on the body of a security official, the detection and prevention system including: (a) identifying attire for quick recognition of undercover operatives carried on the body of the security official; (b) a belt carried on the body of the security official; and (c) a communication system including: (i) a transceiver carried on the identifying attire; (ii) a microphone carried on the identifying attire; and a earphone carried on the security official's body.
- the detection and prevention system further includes: (d) a weapon carried on the belt; (e) an operational personal flashlight carried on the belt; (f) a tear gas container carried on the belt; and (g) a metal detector carried on the belt.
- the detection and prevention system further includes: (h) a personal photography and recording system carried on the identifying attire.
- Figure 1 is a flow chart that schematically illustrates a method for detection and prevention of hostile activity at a distant range from a secured site, in accordance with an embodiment of the present invention.
- Figure 2 is a flow chart that schematically illustrates a method of training for use a system and a method for detection and prevention of hostile activity at a distant range from a secured site, in accordance with an embodiment of the present invention.
- Figure 3 is a front view schematic illustration of an illustrative, exemplary embodiment of the detection and prevention system, according to the present invention, carried on the body of a male security official.
- Figure 4 is a front view schematic illustration of an illustrative, exemplary embodiment of the detection and prevention system, according to the present invention, carried on the body of a female security official.
- SDR Search, detect, and react, method of security which is designed for detection and prevention of hostile activity at distant range from the secured site.
- covert and overt security personnel are deployed, in accordance with a plan of action that had been specifically designed for a given site.
- the security personnel are deployed throughout the distant perimeter of the site, along the points where the people, en-route to the site, are passing.
- the security personnel qualified for SDR functions shall localize the suspicious factors, such as criminal or terrorist elements and shall investigate the suspicion as far as possible from the secured site.
- the SDR puts the human factor as a leader in a set of solutions that are available to first responders, and the covert and overt security personnel that are deployed in a distant range from the secured site, are familiar with the knowledge acquired in training, also including the matter of the suicide terrorist phenomenon, and the skill of early detection of a hostile individual thanks to the ability to see thru the eyes of the adversary and detecting suspicious signs and signals, as well as behavior profiling.
- Figure 1 is a flow chart that schematically illustrates a method for detection and prevention of hostile activity at a distant range from a secured site, in accordance with an embodiment of the present invention.
- the method for detection and prevention of hostile activity at a distant range from a secured site including the stages of:
- stage 10 Providing a detection and prevention system to a local security array, stage 10.
- the detachment in charge of a defined area will have, for a good example, a team head, six male security officials, and two female security officials, which are subordinate to a regional supervisor and event commander.
- This description does not limit the present invention to this specific team staffing.
- the members of the team, according to the present invention are equipped with various means, lethal and nonlethal, which can also include various weapons. A specific description of such means follows in the present patent application, and presents a good possible example, however does not exclude other options.
- stage 12 includes analysis and learning of the routine, and definition of the local routine according to the present state.
- the present state also refers to time of day, conditions, such as after a league game, when a rally with a large number of participants is held, and other circumstances, with maximal flexibility, while the user is free to establish and use individual procedures.
- SDR 1 stage 13.
- the state of the security array is of routine and local normality as defined by a local security professional, after the general routine has been defined and all persons or objects scanned by the security array not shown any suspect behaviors or appearances. In this state, there is nothing unusual, no disruption of public order, and no need for involvement or action of the security array.
- stage 14 Operating and distributing means, stage 14.
- This stage involves activation of the operation methods, technologies, and the distribution of means and personnel to tactical positions both overtly and covertly, continuously.
- This stage includes sub-stages.
- This sub-stage involves sending and positioning pulses of stimulus in the relevant field and into the involved crowd in order to receive feedback regarding any irregularities and anomalies.
- stimulus a.
- a police officer is purposefully positioned in a static location, and undercover security personnel is positioned in other locations to observe the police officer and the response of the environment.
- the police officer addresses a person in the crowd with a standard line, such as "Can I help you, sir?". A person with malicious intent will respond differently from an innocent person.
- This stage is declared by a field official of the security array, and is defined as an unusual state of behavior, conduction, or presence of any person or individual due to detection of abnormality in a professional scan, which showed suspect signs.
- the field official defines this stage of the method as a result of any exception from the normal routine. The official needs to act immediately and without delay and refute or confirm the suspicion of an unusual state, and follow the protocol for necessary action according to local regulations and guidelines. In the case of confirmation of the unusual state, there is an immediate turn to higher stages of the method.
- the security system will not ease from this stage back down to SDR 1 stage, according to the perception that "when in doubt, there's no doubt.”
- the SDR method is based on this stage, which is pivotal to action.
- This stage is declared when a suspicion is confirmed for activity of a criminal nature or disruption of public order.
- the handling security official needs to stop the occurrence and detain the suspect party or parties for investigation or incarceration, or to hand them over to the law enforcement as defined in the local protocol for action, in accordance with early briefing.
- the state is of any action or activity in which destructive means or any means of violent or lethal nature is engaged with clear intent to be used and activated against people who are secured or defined as part of the security defense mission as defined in local protocol and briefings.
- This state requires swift and precise action to remove the threat under local protocols for action and according to local law; and SDR 5, stage 18.
- Figure 2 is a flow chart that schematically illustrates a method of training for use of a system and a method for detection and prevention of hostile activity at a distant range from a secured site, in accordance with an embodiment of the present invention.
- Figure 3 is a front view schematic illustration of an illustrative, exemplary embodiment of the detection and prevention system 100, according to the present invention, carried on the body of a male security official.
- the detection and prevention system 100 includes identifying attire 10, enabling quick recognition of undercover operatives, a belt 11, an identifying hat 12 serving in case of emergency, a communication system 13 including transceiver 14 and microphone 15 carried upon the identifying attire 10, and earphone 24 carried on the head.
- the belt 11 carries a communication system 15, with performance abilities such as WiFi/WIMAX/Bluetooth back transmission, a weapon 16 and ammunition, an operational personal flashlight 17, a tear gas container 18, a metal detector unit 19, and an electric taser gun 20.
- the detection and prevention system 100 includes a personal photography and recording system 21, which includes a camera 22 and a DVR 23.
- the detection and prevention system 100 can include additional means such as night vision means and a public address system.
- the detection and prevention system 100 does not necessarily need to include all of the above listed means, nor are their carrying positions on the body.
- Figure 4 is a front view schematic illustration of an illustrative, exemplary embodiment of the detection and prevention system 100, according to the present invention, carried on the body of a female security official.
- the method of training for use of a system and a method for detection and prevention of hostile activity at a distant range from a secured site including the stages of: Providing a theoretical background 21;
- the theoretical background includes: A basic acquaintance of an arena and its surroundings; Principles of: Site analysis;
- the indoor training includes:
- the theoretical background includes:
- the indoor training includes: Identifying suspicious signs
- the field training includes: Individual training; Team training;
- the wrapping up includes:
- a wrap up session including: Feedback for the training period; Open forum for discussion; and
- the training method according to the present invention does not require use of all the stages described, does not require inclusion of all of the aforementioned training materials, and does not require the specific order as described above for the training stages.
Abstract
Description
Claims
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
IL195504 | 2008-11-25 | ||
IL195504A IL195504A0 (en) | 2008-11-25 | 2008-11-25 | A security system and a method for training and for detection and prevention of hostile activity at distant range from a secured site |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2010061381A2 true WO2010061381A2 (en) | 2010-06-03 |
WO2010061381A3 WO2010061381A3 (en) | 2010-08-05 |
Family
ID=42226182
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/IL2009/001082 WO2010061381A2 (en) | 2008-11-25 | 2009-11-17 | A security system and a method for training and for detection and prevention of hostile activity at distant range from a secured site |
Country Status (2)
Country | Link |
---|---|
IL (1) | IL195504A0 (en) |
WO (1) | WO2010061381A2 (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6088831A (en) * | 1999-04-13 | 2000-07-18 | Jensen; Derek L. | Peace officer's uniform with gear support |
US20050003797A1 (en) * | 2003-07-02 | 2005-01-06 | Baldwin Johnny E. | Localized cellular awareness and tracking of emergencies |
US20060206246A1 (en) * | 2004-10-28 | 2006-09-14 | Walker Richard C | Second national / international management and security system for responsible global resourcing through technical management to brige cultural and economic desparity |
US20090115603A1 (en) * | 2007-06-25 | 2009-05-07 | Joseph Akwo Tabe | Homeland intelligence systems technology "H-List" |
-
2008
- 2008-11-25 IL IL195504A patent/IL195504A0/en unknown
-
2009
- 2009-11-17 WO PCT/IL2009/001082 patent/WO2010061381A2/en active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6088831A (en) * | 1999-04-13 | 2000-07-18 | Jensen; Derek L. | Peace officer's uniform with gear support |
US20050003797A1 (en) * | 2003-07-02 | 2005-01-06 | Baldwin Johnny E. | Localized cellular awareness and tracking of emergencies |
US20060206246A1 (en) * | 2004-10-28 | 2006-09-14 | Walker Richard C | Second national / international management and security system for responsible global resourcing through technical management to brige cultural and economic desparity |
US20090115603A1 (en) * | 2007-06-25 | 2009-05-07 | Joseph Akwo Tabe | Homeland intelligence systems technology "H-List" |
Also Published As
Publication number | Publication date |
---|---|
IL195504A0 (en) | 2011-08-01 |
WO2010061381A3 (en) | 2010-08-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Praks | Hybrid or Not: Deterring and Defeating Russia's Ways of Warfare in the Baltics-the Case of Estonia | |
Atwater | Force Protection for Fire Fighters: Warm Zone Operations at Paramilitary Style Active Shooter Incidents in a Multi-Hazard Environment as a Fire Service Core Competency | |
Kaplan | R2d2 or irobot: Can armed robots be a friend to police without being a foe to the public | |
Rizvi et al. | The continued relevance of the November, 2008 Mumbai terrorist attack: Countering new attacks with old lessons | |
WO2010061381A2 (en) | A security system and a method for training and for detection and prevention of hostile activity at distant range from a secured site | |
Sinclair | Proposed Rules to Determine the Legal Use of Autonomous and Semi-Autonomous Platforms in Domestic US Law Enforcement | |
Nikolov | Building societal resilience against hybrid threats | |
Britovšek | Comparing Counterintelligence and Counterterrorism–Similarities, Issues and Solutions | |
Brennan | Protecting the Homeland: Insights from Army Wargames | |
Salt et al. | Reassessing Military Assistance to the Civil Powers: Are Traditional British Anti-Terrorist Responses Still Effective? | |
Dambre | Assessing the ethical and legal use of unmanned aerial vehicles in military operations by the US Army AFRICOM | |
Justice | Active shooters: is law enforcement ready for a Mumbai style attack? | |
Hersman | Eliminating Adversary Weapons of Mass Destruction: What's at Stake? | |
Caudill et al. | Defending the Joint Force-Lessons Learned from Joint Base Balad | |
Covey | Defense Support of Civil Authorities: A Primer On Intelligence Collection During Civil Disturbance and Disaster Relief Operations | |
Murphy | Complex Coordinated Terrorist Attacks | |
Frącik | Insider attacks as one of the main threats to resolute support personnel in Afghanistan | |
Den Heyer | Police Respond to Terrorism: Case Studies from India, France, Belgium, and England | |
Shepherd et al. | Homeland Security: Establishment and Implementation of the United States Northern Command | |
Manafe et al. | Evaluation of the VVIP Security System in Cases of Terrorism in Indonesia | |
Muradi | The 88th Densus AT: The Role and the Problem of Coordination on Counter-Terrorism in Indonesia | |
Hunt | Due Process: A Casualty of the War on Terror | |
Campion-Smith | “All the touts we need”: HUMINT experience in Northern Ireland | |
Clarke | Arming drones for law enforcement: Challenges and opportunities for the protection of human life | |
BIESTERFELD | The Use of Threat Assessment in Tactical Operations |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 09828726 Country of ref document: EP Kind code of ref document: A2 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 09828726 Country of ref document: EP Kind code of ref document: A2 |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 09828726 Country of ref document: EP Kind code of ref document: A2 |