WO2010061381A2 - A security system and a method for training and for detection and prevention of hostile activity at distant range from a secured site - Google Patents

A security system and a method for training and for detection and prevention of hostile activity at distant range from a secured site Download PDF

Info

Publication number
WO2010061381A2
WO2010061381A2 PCT/IL2009/001082 IL2009001082W WO2010061381A2 WO 2010061381 A2 WO2010061381 A2 WO 2010061381A2 IL 2009001082 W IL2009001082 W IL 2009001082W WO 2010061381 A2 WO2010061381 A2 WO 2010061381A2
Authority
WO
WIPO (PCT)
Prior art keywords
state
sdr
training
detection
carried
Prior art date
Application number
PCT/IL2009/001082
Other languages
French (fr)
Other versions
WO2010061381A3 (en
Inventor
Ran Cohen
Original Assignee
Ran Cohen
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ran Cohen filed Critical Ran Cohen
Publication of WO2010061381A2 publication Critical patent/WO2010061381A2/en
Publication of WO2010061381A3 publication Critical patent/WO2010061381A3/en

Links

Classifications

    • FMECHANICAL ENGINEERING; LIGHTING; HEATING; WEAPONS; BLASTING
    • F41WEAPONS
    • F41HARMOUR; ARMOURED TURRETS; ARMOURED OR ARMED VEHICLES; MEANS OF ATTACK OR DEFENCE, e.g. CAMOUFLAGE, IN GENERAL
    • F41H11/00Defence installations; Defence devices
    • F41H11/02Anti-aircraft or anti-guided missile or anti-torpedo defence installations or systems
    • FMECHANICAL ENGINEERING; LIGHTING; HEATING; WEAPONS; BLASTING
    • F41WEAPONS
    • F41HARMOUR; ARMOURED TURRETS; ARMOURED OR ARMED VEHICLES; MEANS OF ATTACK OR DEFENCE, e.g. CAMOUFLAGE, IN GENERAL
    • F41H11/00Defence installations; Defence devices
    • FMECHANICAL ENGINEERING; LIGHTING; HEATING; WEAPONS; BLASTING
    • F41WEAPONS
    • F41HARMOUR; ARMOURED TURRETS; ARMOURED OR ARMED VEHICLES; MEANS OF ATTACK OR DEFENCE, e.g. CAMOUFLAGE, IN GENERAL
    • F41H13/00Means of attack or defence not otherwise provided for

Definitions

  • the present invention relates to a security system and a method, more particularly, to a security system and a method for training and for detection and prevention of hostile activity at a distant range from a secured site.
  • the security solution can be only partial, while the solution according to the present invention is structured as a triangular spear which unites human abilities with procedures and advanced technologies in order to seek, detect, and react in the most effective way. Seeing as the spearhead is a person
  • the present invention relates to a search detect and react, (SDR) system and a method of use for detection and prevention of hostile activity at a distant range from a secured site, or any other location, with flexible search, without geographical limitation, according to analysis of the enemy's method of operation, and to a system and a 5 method for training for their efficient use.
  • the method of use includes definition of fives SDR states, which will be detailed below, and which comprise an operative protocol according to which a security array can function efficiently.
  • a method for detection and prevention of hostile activity including the stage of: (a) providing a detection and prevention system to security personnel.
  • the method for detection and prevention of hostile activity includes: (i) identifying attire for quick recognition of undercover operatives carried on the body of the security official; (ii) a belt carried on the body of the security official; (iii) a communication system; (iv) a weapon carried on the belt; (v) an operational personal flashlight carried on the belt;(vi) a tear gas container carried on the belt; and (vii) a metal detector carried on the belt.
  • the detection and prevention system is deployed throughout a distant perimeter of the secured site.
  • the method for detection and prevention of hostile activity further including the stage of: (c) integrative combining; (d) analyzing, learning, and determining of a routine; (e) declaring SDR 1 state, wherein the SDR 1 state is a routine and normal state; and (f) operating and distributing means.
  • the operating and distributing means stage includes the sub-stages of: (i) stimulating; and (ii) treating any anomaly.
  • the method for detection and prevention of hostile activity further includes the stage of: (g) declaring
  • SDR 2 state wherein the SDR 2 state is a state of suspicion
  • SDR 3 state wherein the SDR 3 state is verification and preventing expansion of a threat state
  • SDR 4 state wherein the SDR 4 state is a violent action state, that obligates the security personnel to perform a precise and swift reaction
  • SDR 5 state wherein the SDR 5 state is of clear and present mortal danger
  • a method for training including the stages of: (a) providing a theoretical background; and (b) performing indoor training.
  • the method for training of further includes the stage of: (c) performing field training.
  • the method for training further including the stage of: (d) wrapping up.
  • the theoretical background includes a basic acquaintance of an arena and its surroundings, principles of site analysis, analysis of enemy's aggressive options, evaluating the SDR integration with the existing security plan, interview with security personnel and watching the security procedures applied in a league game, as well as theoretical training, including, suicide bomber phenomena, car bomb characteristics, dealing with suspect objects, reading body language, identifying suspicious signs, and seeing the arena through the eyes of the enemy.
  • the indoor training includes identifying suspicious signs.
  • the theoretical background includes an initial survey of an arena and its surroundings, basic analysis of site analysis, analysis of enemy's aggressive options, identifying intelligence collection by the enemy, interviewing with security personnel, watching security procedures applied in a league game, defining normal routine and unusual events, and principles of emergency procedures, providing a feedback session with security managers after watching the game, and putting together a basic SDR plan according to the needs, the capabilities and the constraints of the arena, theoretical training regarding suicide bomber phenomena, car bomb characteristics, dealing with suspect objects, reading body language, identifying suspicious signs, seeing the arena through the eyes of the enemy, and identifying any enemy intelligence collector.
  • the indoor training includes identifying suspicious signs, identifying a suicide bomber, identifying malicious intentions such as eyes and hands, and observation.
  • the field training includes individual training, team training, running a full SDR model in a live game, attack and protect drills, and co-working with local law enforcement.
  • the wrap up session includes feedback for the training period, open forum for discussion, and exploring further development options such as FCU and red team.
  • a detection and prevention system carried on the body of a security official, the detection and prevention system including: (a) identifying attire for quick recognition of undercover operatives carried on the body of the security official; (b) a belt carried on the body of the security official; and (c) a communication system including: (i) a transceiver carried on the identifying attire; (ii) a microphone carried on the identifying attire; and a earphone carried on the security official's body.
  • the detection and prevention system further includes: (d) a weapon carried on the belt; (e) an operational personal flashlight carried on the belt; (f) a tear gas container carried on the belt; and (g) a metal detector carried on the belt.
  • the detection and prevention system further includes: (h) a personal photography and recording system carried on the identifying attire.
  • Figure 1 is a flow chart that schematically illustrates a method for detection and prevention of hostile activity at a distant range from a secured site, in accordance with an embodiment of the present invention.
  • Figure 2 is a flow chart that schematically illustrates a method of training for use a system and a method for detection and prevention of hostile activity at a distant range from a secured site, in accordance with an embodiment of the present invention.
  • Figure 3 is a front view schematic illustration of an illustrative, exemplary embodiment of the detection and prevention system, according to the present invention, carried on the body of a male security official.
  • Figure 4 is a front view schematic illustration of an illustrative, exemplary embodiment of the detection and prevention system, according to the present invention, carried on the body of a female security official.
  • SDR Search, detect, and react, method of security which is designed for detection and prevention of hostile activity at distant range from the secured site.
  • covert and overt security personnel are deployed, in accordance with a plan of action that had been specifically designed for a given site.
  • the security personnel are deployed throughout the distant perimeter of the site, along the points where the people, en-route to the site, are passing.
  • the security personnel qualified for SDR functions shall localize the suspicious factors, such as criminal or terrorist elements and shall investigate the suspicion as far as possible from the secured site.
  • the SDR puts the human factor as a leader in a set of solutions that are available to first responders, and the covert and overt security personnel that are deployed in a distant range from the secured site, are familiar with the knowledge acquired in training, also including the matter of the suicide terrorist phenomenon, and the skill of early detection of a hostile individual thanks to the ability to see thru the eyes of the adversary and detecting suspicious signs and signals, as well as behavior profiling.
  • Figure 1 is a flow chart that schematically illustrates a method for detection and prevention of hostile activity at a distant range from a secured site, in accordance with an embodiment of the present invention.
  • the method for detection and prevention of hostile activity at a distant range from a secured site including the stages of:
  • stage 10 Providing a detection and prevention system to a local security array, stage 10.
  • the detachment in charge of a defined area will have, for a good example, a team head, six male security officials, and two female security officials, which are subordinate to a regional supervisor and event commander.
  • This description does not limit the present invention to this specific team staffing.
  • the members of the team, according to the present invention are equipped with various means, lethal and nonlethal, which can also include various weapons. A specific description of such means follows in the present patent application, and presents a good possible example, however does not exclude other options.
  • stage 12 includes analysis and learning of the routine, and definition of the local routine according to the present state.
  • the present state also refers to time of day, conditions, such as after a league game, when a rally with a large number of participants is held, and other circumstances, with maximal flexibility, while the user is free to establish and use individual procedures.
  • SDR 1 stage 13.
  • the state of the security array is of routine and local normality as defined by a local security professional, after the general routine has been defined and all persons or objects scanned by the security array not shown any suspect behaviors or appearances. In this state, there is nothing unusual, no disruption of public order, and no need for involvement or action of the security array.
  • stage 14 Operating and distributing means, stage 14.
  • This stage involves activation of the operation methods, technologies, and the distribution of means and personnel to tactical positions both overtly and covertly, continuously.
  • This stage includes sub-stages.
  • This sub-stage involves sending and positioning pulses of stimulus in the relevant field and into the involved crowd in order to receive feedback regarding any irregularities and anomalies.
  • stimulus a.
  • a police officer is purposefully positioned in a static location, and undercover security personnel is positioned in other locations to observe the police officer and the response of the environment.
  • the police officer addresses a person in the crowd with a standard line, such as "Can I help you, sir?". A person with malicious intent will respond differently from an innocent person.
  • This stage is declared by a field official of the security array, and is defined as an unusual state of behavior, conduction, or presence of any person or individual due to detection of abnormality in a professional scan, which showed suspect signs.
  • the field official defines this stage of the method as a result of any exception from the normal routine. The official needs to act immediately and without delay and refute or confirm the suspicion of an unusual state, and follow the protocol for necessary action according to local regulations and guidelines. In the case of confirmation of the unusual state, there is an immediate turn to higher stages of the method.
  • the security system will not ease from this stage back down to SDR 1 stage, according to the perception that "when in doubt, there's no doubt.”
  • the SDR method is based on this stage, which is pivotal to action.
  • This stage is declared when a suspicion is confirmed for activity of a criminal nature or disruption of public order.
  • the handling security official needs to stop the occurrence and detain the suspect party or parties for investigation or incarceration, or to hand them over to the law enforcement as defined in the local protocol for action, in accordance with early briefing.
  • the state is of any action or activity in which destructive means or any means of violent or lethal nature is engaged with clear intent to be used and activated against people who are secured or defined as part of the security defense mission as defined in local protocol and briefings.
  • This state requires swift and precise action to remove the threat under local protocols for action and according to local law; and SDR 5, stage 18.
  • Figure 2 is a flow chart that schematically illustrates a method of training for use of a system and a method for detection and prevention of hostile activity at a distant range from a secured site, in accordance with an embodiment of the present invention.
  • Figure 3 is a front view schematic illustration of an illustrative, exemplary embodiment of the detection and prevention system 100, according to the present invention, carried on the body of a male security official.
  • the detection and prevention system 100 includes identifying attire 10, enabling quick recognition of undercover operatives, a belt 11, an identifying hat 12 serving in case of emergency, a communication system 13 including transceiver 14 and microphone 15 carried upon the identifying attire 10, and earphone 24 carried on the head.
  • the belt 11 carries a communication system 15, with performance abilities such as WiFi/WIMAX/Bluetooth back transmission, a weapon 16 and ammunition, an operational personal flashlight 17, a tear gas container 18, a metal detector unit 19, and an electric taser gun 20.
  • the detection and prevention system 100 includes a personal photography and recording system 21, which includes a camera 22 and a DVR 23.
  • the detection and prevention system 100 can include additional means such as night vision means and a public address system.
  • the detection and prevention system 100 does not necessarily need to include all of the above listed means, nor are their carrying positions on the body.
  • Figure 4 is a front view schematic illustration of an illustrative, exemplary embodiment of the detection and prevention system 100, according to the present invention, carried on the body of a female security official.
  • the method of training for use of a system and a method for detection and prevention of hostile activity at a distant range from a secured site including the stages of: Providing a theoretical background 21;
  • the theoretical background includes: A basic acquaintance of an arena and its surroundings; Principles of: Site analysis;
  • the indoor training includes:
  • the theoretical background includes:
  • the indoor training includes: Identifying suspicious signs
  • the field training includes: Individual training; Team training;
  • the wrapping up includes:
  • a wrap up session including: Feedback for the training period; Open forum for discussion; and
  • the training method according to the present invention does not require use of all the stages described, does not require inclusion of all of the aforementioned training materials, and does not require the specific order as described above for the training stages.

Abstract

A search detect and react, (SDR) system and a method of use for detection and prevention of hostile activity at a distant range from a secured site, and a system and a method for training for their efficient use. The method of use includes definition of fives SDR states, which comprise an operative protocol according to which a security array can function efficiently.

Description

A SECURITY SYSTEM AND A METHOD FOR TRAINING AND FOR
DETECTION AND PREVENTION OF HOSTILE ACTIVITY AT DISTANT
RANGE FROM A SECURED SITE
REFERENCE TO CROSS-RELATED APPLICATION This application claims priority from Israeli Patent Application No. 195,504, filed on November 25, 2008, herein incorporated by reference in its entirety.
FIELD OF THE INVENTION
The present invention relates to a security system and a method, more particularly, to a security system and a method for training and for detection and prevention of hostile activity at a distant range from a secured site.
BACKGROUND OF THE INVENTION
Throughout human history, great damage and suffering have been the result of hostile activities, a phenomenon which is increasing in occurrence and severity of late. Police forces and security services in many countries have developed means, methods, and systems for dealing with the risk of hostile activities, also for the purpose of detecting individuals who are planning to perform such activities in advance, and prevent the activity from occurring. However, hostile activities still occur around the world, even in cases in which at least one security official detected unusual or suspect activity of an individual, or noticed an unusual object, namely noticed suspect indications. The prevalent means and methods in use nowadays are not dominated by the human factor, existent procedures restrict police officers and security officials from applying their personal abilities and applying their senses naturally. The high dependency on technological means hinders security arrays and does not provide a sufficiently clear answer to the questions of who is suspect and how to recognize suspect indications, so that hostile intents do not have systematic solutions. 5 When procedure leads the human factor or technology requires motor action or limited involvement of the operator, the security solution can be only partial, while the solution according to the present invention is structured as a triangular spear which unites human abilities with procedures and advanced technologies in order to seek, detect, and react in the most effective way. Seeing as the spearhead is a person
I O who is skilled and trained for the circumstances and missions, the odds for success and effectiveness are much larger than those of the present global method and doctrine.
In a state of actual threat, the lack of definition of the critical state facing officials prevents quick and correct responses. In the case of suspect indications, it is
15 imperative to be able to act rather than respond post factum.
There is therefore a need for a security system and a method, for detection and prevention of hostile activity at a distant range from a secured site and for a training system and a method. 0 SUMMARY OF THE INVENTION
The present invention relates to a search detect and react, (SDR) system and a method of use for detection and prevention of hostile activity at a distant range from a secured site, or any other location, with flexible search, without geographical limitation, according to analysis of the enemy's method of operation, and to a system and a 5 method for training for their efficient use. The method of use includes definition of fives SDR states, which will be detailed below, and which comprise an operative protocol according to which a security array can function efficiently.
According to the present invention there is provided a method for detection and prevention of hostile activity, the method including the stage of: (a) providing a detection and prevention system to security personnel.
According to further features in described embodiments the method for detection and prevention of hostile activity includes: (i) identifying attire for quick recognition of undercover operatives carried on the body of the security official; (ii) a belt carried on the body of the security official; (iii) a communication system; (iv) a weapon carried on the belt; (v) an operational personal flashlight carried on the belt;(vi) a tear gas container carried on the belt; and (vii) a metal detector carried on the belt.
According to still further features in described embodiments the detection and prevention system is deployed throughout a distant perimeter of the secured site.
According to still further features in described embodiments the method for detection and prevention of hostile activity further including the stage of: (c) integrative combining; (d) analyzing, learning, and determining of a routine; (e) declaring SDR 1 state, wherein the SDR 1 state is a routine and normal state; and (f) operating and distributing means.
According to still further features in described embodiments the operating and distributing means stage includes the sub-stages of: (i) stimulating; and (ii) treating any anomaly.
According to still further features in described embodiments the method for detection and prevention of hostile activity further includes the stage of: (g) declaring
SDR 2 state, wherein the SDR 2 state is a state of suspicion; (h) declaring SDR 3 state, wherein the SDR 3 state is verification and preventing expansion of a threat state; (i) declaring SDR 4 state, wherein the SDR 4 state is a violent action state, that obligates the security personnel to perform a precise and swift reaction; and (j) declaring SDR 5 state, wherein the SDR 5 state is of clear and present mortal danger.
According to another embodiment of the present invention there is provided a method for training, the method including the stages of: (a) providing a theoretical background; and (b) performing indoor training.
According to further features in described embodiments the method for training of further includes the stage of: (c) performing field training.
According to still further features in described embodiments the method for training further including the stage of: (d) wrapping up.
According to still further features in described embodiments the theoretical background includes a basic acquaintance of an arena and its surroundings, principles of site analysis, analysis of enemy's aggressive options, evaluating the SDR integration with the existing security plan, interview with security personnel and watching the security procedures applied in a league game, as well as theoretical training, including, suicide bomber phenomena, car bomb characteristics, dealing with suspect objects, reading body language, identifying suspicious signs, and seeing the arena through the eyes of the enemy.
According to still further features in described embodiments the indoor training includes identifying suspicious signs.
According to still further features in described embodiments the theoretical background includes an initial survey of an arena and its surroundings, basic analysis of site analysis, analysis of enemy's aggressive options, identifying intelligence collection by the enemy, interviewing with security personnel, watching security procedures applied in a league game, defining normal routine and unusual events, and principles of emergency procedures, providing a feedback session with security managers after watching the game, and putting together a basic SDR plan according to the needs, the capabilities and the constraints of the arena, theoretical training regarding suicide bomber phenomena, car bomb characteristics, dealing with suspect objects, reading body language, identifying suspicious signs, seeing the arena through the eyes of the enemy, and identifying any enemy intelligence collector.
According to still further features in described embodiments the indoor training includes identifying suspicious signs, identifying a suicide bomber, identifying malicious intentions such as eyes and hands, and observation. According to still further features in described embodiments the field training includes individual training, team training, running a full SDR model in a live game, attack and protect drills, and co-working with local law enforcement.
According to still further features in described embodiments the wrap up session includes feedback for the training period, open forum for discussion, and exploring further development options such as FCU and red team.
According to another embodiment of the present invention there is provided a detection and prevention system carried on the body of a security official, the detection and prevention system including: (a) identifying attire for quick recognition of undercover operatives carried on the body of the security official; (b) a belt carried on the body of the security official; and (c) a communication system including: (i) a transceiver carried on the identifying attire; (ii) a microphone carried on the identifying attire; and a earphone carried on the security official's body.
According to further features in described embodiments the detection and prevention system further includes: (d) a weapon carried on the belt; (e) an operational personal flashlight carried on the belt; (f) a tear gas container carried on the belt; and (g) a metal detector carried on the belt.
According to still further features in described embodiments the detection and prevention system further includes: (h) a personal photography and recording system carried on the identifying attire.
Additional objects and advantages of the invention will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the invention.
BRIEF DESCRIPTION OF THE DRAWINGS
The invention is herein described, by way of example only, with reference to the accompanying drawings, wherein:
Figure 1 is a flow chart that schematically illustrates a method for detection and prevention of hostile activity at a distant range from a secured site, in accordance with an embodiment of the present invention.
Figure 2 is a flow chart that schematically illustrates a method of training for use a system and a method for detection and prevention of hostile activity at a distant range from a secured site, in accordance with an embodiment of the present invention.
Figure 3 is a front view schematic illustration of an illustrative, exemplary embodiment of the detection and prevention system, according to the present invention, carried on the body of a male security official.
Figure 4 is a front view schematic illustration of an illustrative, exemplary embodiment of the detection and prevention system, according to the present invention, carried on the body of a female security official. DETAILED DESCRIPTION QF EMBODIMENTS
The principles and operation of a SDR system and method according to the present invention may be better understood with reference to the drawings and the accompanying description. Before explaining at least one embodiment of the invention in detail, it is to be understood that the invention is not limited in its application to the details of construction and the arrangement of the components set forth in the following description or illustrated in the drawings.
Unless otherwise defined, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. The materials, dimensions, methods, and examples provided herein are illustrative only and are not intended to be limiting.
As used herein the specification and in the claims section that follows, the term "SDR" and the like refer to a search, detect, and react, method of security which is designed for detection and prevention of hostile activity at distant range from the secured site.
According to the present invention, in the SDR method, covert and overt security personnel are deployed, in accordance with a plan of action that had been specifically designed for a given site. The security personnel are deployed throughout the distant perimeter of the site, along the points where the people, en-route to the site, are passing.
The security personnel qualified for SDR functions shall localize the suspicious factors, such as criminal or terrorist elements and shall investigate the suspicion as far as possible from the secured site. According to the present invention the SDR puts the human factor as a leader in a set of solutions that are available to first responders, and the covert and overt security personnel that are deployed in a distant range from the secured site, are familiar with the knowledge acquired in training, also including the matter of the suicide terrorist phenomenon, and the skill of early detection of a hostile individual thanks to the ability to see thru the eyes of the adversary and detecting suspicious signs and signals, as well as behavior profiling.
According to the present invention unique indoor and field training brings the student as close as possible to the challenges and threats as in real life situations. Referring now to the drawings, Figure 1 is a flow chart that schematically illustrates a method for detection and prevention of hostile activity at a distant range from a secured site, in accordance with an embodiment of the present invention.
The method for detection and prevention of hostile activity at a distant range from a secured site, in accordance with an embodiment of the present invention including the stages of:
Providing a detection and prevention system to a local security array, stage 10. The detachment in charge of a defined area will have, for a good example, a team head, six male security officials, and two female security officials, which are subordinate to a regional supervisor and event commander. This description does not limit the present invention to this specific team staffing. The members of the team, according to the present invention, are equipped with various means, lethal and nonlethal, which can also include various weapons. A specific description of such means follows in the present patent application, and presents a good possible example, however does not exclude other options. Integrative combining, stage 11. This stage is taken in a routine state. An integrative synergy of the human factor, technology and procedures is achieved through training, exercising, supervision, and control
Analyzing, learning, and determining of the routine, stage 12. This stage includes analysis and learning of the routine, and definition of the local routine according to the present state. The present state also refers to time of day, conditions, such as after a league game, when a rally with a large number of participants is held, and other circumstances, with maximal flexibility, while the user is free to establish and use individual procedures. SDR 1 , stage 13.
In this stage the state of the security array is of routine and local normality as defined by a local security professional, after the general routine has been defined and all persons or objects scanned by the security array not shown any suspect behaviors or appearances. In this state, there is nothing unusual, no disruption of public order, and no need for involvement or action of the security array.
Operating and distributing means, stage 14.
This stage involves activation of the operation methods, technologies, and the distribution of means and personnel to tactical positions both overtly and covertly, continuously. This stage includes sub-stages.
Stimulating, sub-stage 14a.
This sub-stage involves sending and positioning pulses of stimulus in the relevant field and into the involved crowd in order to receive feedback regarding any irregularities and anomalies. Examples of stimulus: a. A police officer is purposefully positioned in a static location, and undercover security personnel is positioned in other locations to observe the police officer and the response of the environment. b. The police officer addresses a person in the crowd with a standard line, such as "Can I help you, sir?". A person with malicious intent will respond differently from an innocent person.
Treating any anomaly, sub-stage 14b.
In this sub-stage, any anomaly is dealt with according to a procedure planned and approved by local authorities. SDR 2, stage 15.
This stage is declared by a field official of the security array, and is defined as an unusual state of behavior, conduction, or presence of any person or individual due to detection of abnormality in a professional scan, which showed suspect signs. The field official defines this stage of the method as a result of any exception from the normal routine. The official needs to act immediately and without delay and refute or confirm the suspicion of an unusual state, and follow the protocol for necessary action according to local regulations and guidelines. In the case of confirmation of the unusual state, there is an immediate turn to higher stages of the method. The security system will not ease from this stage back down to SDR 1 stage, according to the perception that "when in doubt, there's no doubt." The SDR method is based on this stage, which is pivotal to action.
SDR 3, stage 16.
This stage is declared when a suspicion is confirmed for activity of a criminal nature or disruption of public order. The handling security official needs to stop the occurrence and detain the suspect party or parties for investigation or incarceration, or to hand them over to the law enforcement as defined in the local protocol for action, in accordance with early briefing.
SDR 4, stage 17.
In this stage, the state is of any action or activity in which destructive means or any means of violent or lethal nature is engaged with clear intent to be used and activated against people who are secured or defined as part of the security defense mission as defined in local protocol and briefings. This state requires swift and precise action to remove the threat under local protocols for action and according to local law; and SDR 5, stage 18.
In this stage there is a state of clear and present danger of terrorist activity of a lethal and widespread nature such as an attack, a suicide bomber, an object suspected to be a bomb, a car bomb, or any other threat as defined in local briefings.
Going from one stage of the method to the other as shown in the present flow chart is one of many different options. The method is not limited to any specific movement from one method to any other.
Figure 2 is a flow chart that schematically illustrates a method of training for use of a system and a method for detection and prevention of hostile activity at a distant range from a secured site, in accordance with an embodiment of the present invention. Figure 3 is a front view schematic illustration of an illustrative, exemplary embodiment of the detection and prevention system 100, according to the present invention, carried on the body of a male security official.
The detection and prevention system 100 includes identifying attire 10, enabling quick recognition of undercover operatives, a belt 11, an identifying hat 12 serving in case of emergency, a communication system 13 including transceiver 14 and microphone 15 carried upon the identifying attire 10, and earphone 24 carried on the head.
The belt 11 carries a communication system 15, with performance abilities such as WiFi/WIMAX/Bluetooth back transmission, a weapon 16 and ammunition, an operational personal flashlight 17, a tear gas container 18, a metal detector unit 19, and an electric taser gun 20.
Furthermore, the detection and prevention system 100 includes a personal photography and recording system 21, which includes a camera 22 and a DVR 23.
The detection and prevention system 100 can include additional means such as night vision means and a public address system.
The detection and prevention system 100, according to the present invention, does not necessarily need to include all of the above listed means, nor are their carrying positions on the body.
Figure 4 is a front view schematic illustration of an illustrative, exemplary embodiment of the detection and prevention system 100, according to the present invention, carried on the body of a female security official.
The method of training for use of a system and a method for detection and prevention of hostile activity at a distant range from a secured site, in accordance with an embodiment of the present invention including the stages of: Providing a theoretical background 21;
Performing indoor training 22;
Performing field training 23; and
Wrapping up 24.
According to a first embodiment of the present invention the theoretical background includes: A basic acquaintance of an arena and its surroundings; Principles of: Site analysis;
Analysis of enemy's aggressive options; Evaluating the SDR integration with the existing security plan;
Interview with security personnel; and Watching the security procedures applied in a league game; Theory lectures including:
The suicide bomber phenomena; Car bomb characteristics; Dealing with suspect objects; Reading body language; Identifying suspicious signs; and
Seeing the arena "through the eyes of the enemy".
According to the first embodiment of the present invention, the indoor training includes:
Identifying suspicious signs. According to a second embodiment of the present invention, the theoretical background includes:
An initial survey of the arena and its surroundings; Basic analyses:
Site analysis; Analysis of enemy's aggressive options; Identifying intelligence collection by the enemy; Interview with security personnel;
Watching the security procedures applied in a league game; Defining normal routine and unusual events; and Principles of emergency procedures;
Providing a feedback session with security managers after watching the game; and
Putting together a basic SDR plan according to the needs, the capabilities and the constraints of the arena; Theory lectures:
The suicide bomber phenomena; Car bomb characteristics; Dealing with suspect objects; Reading body language; Identifying suspicious signs;
The arena "through the eyes of the enemy"; and Identifying enemy intelligence collector/s.
According to the second embodiment of the present invention, the indoor training includes: Identifying suspicious signs;
Identifying a suicide bomber;
Identifying malicious intentions (eyes and hands); and Observation - types of observations, identifying observers. According to the second embodiment of the present invention the field training includes: Individual training; Team training;
Running a full SDR model in a live game (game timing permitting); Attack and protect drills; and Cooperation with local law enforcement.
According to the second embodiment of the present invention, the wrapping up includes:
A wrap up session including: Feedback for the training period; Open forum for discussion; and
Exploring further development options (such as an undercover field control unit (FCU) and an active control team (Red Team)).
The training method according to the present invention does not require use of all the stages described, does not require inclusion of all of the aforementioned training materials, and does not require the specific order as described above for the training stages.
While the invention has been described with respect to a limited number of embodiments, it will be appreciated that many variations, modifications and other applications of the invention may be made.

Claims

WHAT IS CLAIMED IS:
1. A method for detection and prevention of hostile activity, said method comprising the stage of:
(a) providing a detection and prevention system to security personnel.
2. The method for detection and prevention of hostile activity of claim 1 wherein said detection and prevention system includes:
(i) identifying attire for quick recognition of undercover operatives carried on the body of said security official;
(ii) a belt carried on the body of said security official;
(iii) a communication system;
(iv) a weapon carried on said belt;
(v) an operational personal flashlight carried on said belt;
(vi) a tear gas container carried on said belt; and
(vii) a metal detector carried on said belt.
3. The method for detection and prevention of hostile activity of claim 2 wherein said detection and prevention system is deployed throughout a distant perimeter of said secured site.
4. The method for detection and prevention of hostile activity of claim 1 further comprising the stage of:
(c) integrative combining;
(d) analyzing, learning, and determining of a routine; (e) declaring SDR I state, wherein said SDR 1 state is a routine and normal state; and
(f) operating and distributing means.
5. The method for detection and prevention of hostile activity of claim 4 wherein said operating, and distributing means stage includes the sub-stages of:
(i) stimulating; and
(ii) treating any anomaly.
6. The method for detection and prevention of hostile activity of claim 5 further comprising the stage of:
(g) declaring SDR 2 state, wherein said SDR 2 state is a state of suspicion; (h) declaring SDR 3 state, wherein said SDR 3 state is a verification and preventing an expansion of a threat state; (i) declaring SDR 4 state, wherein said SDR 4 state is a violent action state, that obligates said security personnel to perform a precise and swift reaction; and (j) declaring SDR 5 state, wherein said SDR 5 state is of clear and present mortal danger.
7. The method for detection and prevention of hostile activity of claim 2 further comprising the stage of:
(c) integrative combining;
(d) analyzing, learning, and determining of a routine; (e) declaring SDR 1 state, wherein said SDR 1 state is a routine and normal state; and
(f) operating and distributing means.
8. The method for detection and prevention of hostile activity of claim 7 wherein said operating and distributing means stage includes the sub-stages of:
(i) stimulating; and
(ii) treating any anomaly.
9. The method for detection and prevention of hostile activity of claim 8 further comprising the stages of:
(g) declaring SDR 2 state, wherein said SDR 2 state is a state of suspicion; (h) declaring SDR 3 state, wherein said SDR 3 state is a verification and preventing an expansion of a threat state; (i) declaring SDR 4 state, wherein said SDR 4 state is a violent action state, that obligates said security personnel to perform a precise and swift reaction; and (h) declaring SDR 5 state, wherein said SDR 5 state is of clear and present mortal danger.
10. A method for training, the method comprising the stages of:
(a) providing a theoretical background; and
(b) performing indoor training.
1 1. The method for training of claim 10 further comprising the stage of: (c) performing field training.
12. The method for training of claim 1 1 further comprising the stage of:
(d) wrapping up.
13. The method for training of claim 10, wherein said theoretical background includes, a basic acquaintance of an arena and its surroundings, principles of site analysis, analysis of enemy's aggressive options, evaluating the SDR integration with the existing security plan, interview with security personnel and watching the security procedures applied in a league game, theory lectures including, a suicide bomber phenomena, car bomb characteristics, dealing with suspect objects, reading body language, identifying suspicious signs, and seeing said arena through the eyes of the enemy.
14. The method for training of claim 10, wherein said indoor training includes identifying suspicious signs.
15. The method for training of claim 10, wherein said theoretical background includes an initial survey of an arena and its surroundings, basic analysis of site analysis, analysis of enemy's aggressive options, identifying intelligence collection by the enemy, interview with security personnel, watching security procedures applied in a league game, defining normal routine and unusual events, and principles of emergency procedures, providing a feedback session with security managers after watching the game, and putting together a basic SDR plan according to the needs, the capabilities and the constraints of said arena, theory lectures of a suicide bomber phenomena, car bomb characteristics, dealing with suspect objects, reading body language, identifying suspicious signs, see said arena through the eyes of the enemy, and identifying enemy intelligence collector.
16. The method for training of claim 10, wherein the indoor training includes identifying suspicious signs, identifying a suicide bomber, identifying malicious intentions such as eyes and hands, and observation.
17. The method for training of claim 1 1, wherein the field training includes individual training, team training, running a full SDR model in a live game, attack and protect drills, and co-working with local law enforcement.
18. The method for training of claim 12, wherein the wrap up session includes, feedback for the training period, open forum for discussion, and exploring further development options such as FCU and red team.
19. A detection and prevention system carried on the body of a security official, the detection and prevention system comprising:
(a) identifying attire for quick recognition of undercover operatives carried on the body of said security official;
(b) a belt carried on the body of said security official; and
(c) a communication system including:
(i) a transceiver carried on said identifying attire; (ii) a microphone carried on said identifying attire; and (iii) a earphone carried on said security official's body.
20. The detection and prevention system of claim 19 further comprising:
(d) a weapon carried on said belt;
(e) an operational personal flashlight carried on said belt;
(f) a tear gas container carried on said belt; and
(g) a metal detector carried on said belt.
21. The detection and prevention system of claim 19 further comprising: (h) a personal photography and recording system carried on said identifying attire.
PCT/IL2009/001082 2008-11-25 2009-11-17 A security system and a method for training and for detection and prevention of hostile activity at distant range from a secured site WO2010061381A2 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
IL195504 2008-11-25
IL195504A IL195504A0 (en) 2008-11-25 2008-11-25 A security system and a method for training and for detection and prevention of hostile activity at distant range from a secured site

Publications (2)

Publication Number Publication Date
WO2010061381A2 true WO2010061381A2 (en) 2010-06-03
WO2010061381A3 WO2010061381A3 (en) 2010-08-05

Family

ID=42226182

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IL2009/001082 WO2010061381A2 (en) 2008-11-25 2009-11-17 A security system and a method for training and for detection and prevention of hostile activity at distant range from a secured site

Country Status (2)

Country Link
IL (1) IL195504A0 (en)
WO (1) WO2010061381A2 (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6088831A (en) * 1999-04-13 2000-07-18 Jensen; Derek L. Peace officer's uniform with gear support
US20050003797A1 (en) * 2003-07-02 2005-01-06 Baldwin Johnny E. Localized cellular awareness and tracking of emergencies
US20060206246A1 (en) * 2004-10-28 2006-09-14 Walker Richard C Second national / international management and security system for responsible global resourcing through technical management to brige cultural and economic desparity
US20090115603A1 (en) * 2007-06-25 2009-05-07 Joseph Akwo Tabe Homeland intelligence systems technology "H-List"

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6088831A (en) * 1999-04-13 2000-07-18 Jensen; Derek L. Peace officer's uniform with gear support
US20050003797A1 (en) * 2003-07-02 2005-01-06 Baldwin Johnny E. Localized cellular awareness and tracking of emergencies
US20060206246A1 (en) * 2004-10-28 2006-09-14 Walker Richard C Second national / international management and security system for responsible global resourcing through technical management to brige cultural and economic desparity
US20090115603A1 (en) * 2007-06-25 2009-05-07 Joseph Akwo Tabe Homeland intelligence systems technology "H-List"

Also Published As

Publication number Publication date
IL195504A0 (en) 2011-08-01
WO2010061381A3 (en) 2010-08-05

Similar Documents

Publication Publication Date Title
Praks Hybrid or Not: Deterring and Defeating Russia's Ways of Warfare in the Baltics-the Case of Estonia
Atwater Force Protection for Fire Fighters: Warm Zone Operations at Paramilitary Style Active Shooter Incidents in a Multi-Hazard Environment as a Fire Service Core Competency
Kaplan R2d2 or irobot: Can armed robots be a friend to police without being a foe to the public
Rizvi et al. The continued relevance of the November, 2008 Mumbai terrorist attack: Countering new attacks with old lessons
WO2010061381A2 (en) A security system and a method for training and for detection and prevention of hostile activity at distant range from a secured site
Sinclair Proposed Rules to Determine the Legal Use of Autonomous and Semi-Autonomous Platforms in Domestic US Law Enforcement
Nikolov Building societal resilience against hybrid threats
Britovšek Comparing Counterintelligence and Counterterrorism–Similarities, Issues and Solutions
Brennan Protecting the Homeland: Insights from Army Wargames
Salt et al. Reassessing Military Assistance to the Civil Powers: Are Traditional British Anti-Terrorist Responses Still Effective?
Dambre Assessing the ethical and legal use of unmanned aerial vehicles in military operations by the US Army AFRICOM
Justice Active shooters: is law enforcement ready for a Mumbai style attack?
Hersman Eliminating Adversary Weapons of Mass Destruction: What's at Stake?
Caudill et al. Defending the Joint Force-Lessons Learned from Joint Base Balad
Covey Defense Support of Civil Authorities: A Primer On Intelligence Collection During Civil Disturbance and Disaster Relief Operations
Murphy Complex Coordinated Terrorist Attacks
Frącik Insider attacks as one of the main threats to resolute support personnel in Afghanistan
Den Heyer Police Respond to Terrorism: Case Studies from India, France, Belgium, and England
Shepherd et al. Homeland Security: Establishment and Implementation of the United States Northern Command
Manafe et al. Evaluation of the VVIP Security System in Cases of Terrorism in Indonesia
Muradi The 88th Densus AT: The Role and the Problem of Coordination on Counter-Terrorism in Indonesia
Hunt Due Process: A Casualty of the War on Terror
Campion-Smith “All the touts we need”: HUMINT experience in Northern Ireland
Clarke Arming drones for law enforcement: Challenges and opportunities for the protection of human life
BIESTERFELD The Use of Threat Assessment in Tactical Operations

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 09828726

Country of ref document: EP

Kind code of ref document: A2

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 09828726

Country of ref document: EP

Kind code of ref document: A2

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC

122 Ep: pct application non-entry in european phase

Ref document number: 09828726

Country of ref document: EP

Kind code of ref document: A2