10 minute read
Martyn’s Law
Security lessons from Manchester by Peter Jackson, Jacksons Fencing
Recently Manchester City Council took a step in the right direction by implementing ‘Martyn’s Law’. The new policy follows the Manchester Arena bombing in 2017 and is named after one of the victims, Martyn Hett. It introduces five new requirements for licensing venues, ensuring they conduct vulnerability assessments and have a terror plan in place.
They are listed as:
1. A requirement that spaces and places to which the public have access engage with freely available counter-terrorism advice and training. 2. A requirement for those places to conduct vulnerability assessments of their operating places and spaces. 3. A requirement for those places to mitigate the risks created by the vulnerabilities. 4. A requirement for those places to have a counter-terrorism plan. 5. A requirement for local authorities to plan for the threat of terrorism.
Having advocated these measures for years, we are pleased to see the first steps of local government taking more effective action and
implementing a common-sense security law. A successful interpretation of the new law will rest on thorough assessment and monitoring by local bodies and industry experts, understanding the local threat context and having a knowledge of the most effective measures for each individual situation.
Assessing the threats
The first step in integrating security for public venues is to carry out a full-scale risk assessment, identifying any potential hazards and possible design flaws. This includes site considerations such as location, its day-to-day usage and topography.
It’s important to consider the types of buildings in the area and identify any high-risk sites nearby, as these will have a direct impact on the planning process, potential threats and overall security of the area. Establishing how the space will be used, who will have access and how access is controlled are also crucial parts of a standard risk assessment.
Importantly, an assessment will highlight an area’s weak points, from poor traffic management, unmonitored vehicle access control or blast stand-off distances. By painting a picture of how these weak points can be exploited, specifiers and planners can design against potential methods of attack.
It’s not just high-profile terror attacks that authorities and businesses need to consider. Criminal activity and opportunist lone-wolf attacks should also be planned for. Analysing the local threat context and emergency service response times can help inform security decisions. A venue in a neighbourhood reporting high levels of burglary should ensure they have effective detection capabilities, removing blind spots, employing CCTV or maximising the attack time needed to break into an area and thus increasing the likelihood of preventing intrusion.
Designing out danger
Once an assessment has been carried out and potential risks identified, it’s possible to design out threats. Well thought out design can play a pivotal role in security. The next step is to ensure appropriate measures are implemented according to the situation. This can include improving the physical security of the buildings themselves and also incorporating crime prevention techniques into the actual layout and landscape of
the surroundings. For example, if an assessment indicates the venue is vulnerable to vehicle attack, then the threat can be mitigated by implementing traffic calming measures and vehicle security barriers. Street furniture (speed bumps, bollards etc.) or chicanes will prevent vehicles reaching dangerous speeds or even getting into the space at all.
Intelligent, holistic design can help prevent or deter security breaches in subtle ways that will be barely noticeable to residents. Busy urban spaces can be secured against risks and attacks without being turned into a fortress. A good model
of this is in place at Arsenal FC’s Emirates Stadium:
On match day the venue can expect crowds of up to 65,000. A vehicle attack could result in a catastrophic loss of life. However, between the road and the pedestrianised area is a sculpture with huge letters spelling ‘ARSENAL’. These are strong enough to stop a vehicle in its tracks, preventing it from reaching the crowds. In other areas large steel cannons, the club’s symbol, also greatly reduce the chance of hostile vehicles gaining access.
Taking inspiration
The UK government has already indicated its support of Martyn’s Law, a promising sign of things to come. While legislators and policymakers debate the new licensing rules and work on implementing them throughout the country, private businesses and venues should not passively watch on. Security breaches can risk lives and cause serious commercial damage. Venue manager and security specifiers should take the initiative and start implementing effective strategies today.
For further information please visit www.jacksons-fencing.co.uk
Astute Electronics Astute Electronics promises to deliver customers the best Quality, Service and Reliability. Astute is both an Electronic Components distributor and a global and UK parts supplier. The company’s highly-qualifi ed team is experienced in procurement, engineering, logistics, fi nance, program management and QA. www.astute.co.uk
SURVEILLANCE CAMERA
REMOTE NETWORK BUSINESS DATA
TRAFFIC CAMERA
REMOTE INTERACTION
Smarter visualization
Networked visualization leading to smarter decision making
A reliable networked visualization solution is indispensable to monitor, analyze, and share an ever increasing number of video and data sources all over the world. That is why Barco designed its networked visualization solution, the simplest and most fl exible way to securely distribute any information to any location. The result: faster and smarter decision-making.
Barco Barco designs and develops visualization solutions for the security market. With its own facilities for Sales & Marketing, Customer Support, R&D and Manufacturing in Europe, North America and Asia Pacifi c, Barco is active in more than 90 countries with 4,000 employees worldwide. Barco posted sales of 1.158 billion euro in 2013. www.barco.com/references
Learn more about networked visualization at www.barco.com/netviz
14090.BARCO.resize.ad.in security.netviz.indd 1 24/04/14 15:43
Bosch Security Systems Offer an extensive portfolio of innovative, high-quality, ergonomic products and systems for security, safety and communication. Our product range includes video surveillance systems with state-of-the-art IP-solutions, access control systems, intrusion detection systems, fi re detection and evacuation systems, security management systems, paging and personal security systems and public address and
conference solutions. www.boschsecuritysystems.com
Dallmeier One of the world leading providers of products for network-based video surveillance solutions, already has more than 30 years experience in the development and manufacture of high quality components and complete solutions for the CCTV/IP sector. www.dallmeier-electronic.com
DSX manufactures integrated solutions for the access control and security industries. Based in Dallas, DSX designs all software and hardware in house. The company motto is: ‘Integrated Solutions and real world applications are what we do best.’ DSX products are sold worldwide through a network of factory-trained dealers. Dealers are located in the US, Canada, Mexico, Latin and South America, Europe, Middle East, Australia and the Pacifi c Rim, and Nigeria amongst others. www.dsxinc.com
Falken At Falken, we are a fully licensed, registered, and insured professional service, equipment, manufacturing and retail supply fi rm. Founded and staffed by former law enforcement offi cers and retired military personnel, we have grown to become a trusted and secure global provider. www.falken.us
FLIR FLIR Systems, Inc. is the global leader in Infrared cameras, night vision and thermal imaging systems. Our products play pivotal roles in a wide range of industrial, commercial and government activities in more than 60 countries. www.fl ir.com
Hitachi Hitachi’s 3D LiDAR “Time-of-Flight” (TOF) sensor adds an enhanced layer of security / marketing data to existing systems using advanced infrared motion technology. Hide.Hayashi@hitachi-eu.com
Honeywell Security Group delivers the newest innovations, technologies and products. Honeywell is driven to maintain its position as an innovator and leading manufacturer, and invests continuously in R&D. Each of the product ranges regularly delivers new features and technological advancements, while maintaining a familiar user interface and backwards compatibility for ease of installation. Honeywell is a world leading security business. www.security.honeywell.com
Paxton Access Ltd is a leading manufacturer of electronic access control systems. From its inception Paxton has aimed for engineering excellence. This means designing and manufacturing intelligent and innovative products that are fi t for their purpose. We have become a market leader through our constant efforts to exceed the expectations of installers and system users. www.paxton.co.uk
Keytracker Ltd Secure Storage & Management for all Keys & Equipment Mechanical & electronic tracking to suit all budgets & applications, low spec to high tech – the world’s largest range of tracking systems for keys & equipment. Keytracker Ltd, Keyper House, Unit 3, Station Road, Rowley Regis, West Midlands, B65 0JY sales@keytracker.co.uk www.keytracker.com
Luminite Luminite have been designing and manufacturing PIR detection systems for 35 years and have extensive expertise in the security market. Their fl agship Genesis wireless security range provides rapid, fl exible and robust solutions to minimise installation costs and maximise profi ts.
www.luminite.co.uk
The leading global M2M managed services provider
It’s good to be well connected.
Your M2M solution is more than just data connectivity. We understand that. So we not only built the world’s most advanced global M2M platform, we also built our business upon the most important connections of all – our relationships with our partners, carriers and customers. That’s why Wyless is the trusted M2M partner of Fortune 500 companies and startups alike. We’re the easiest company to work with. We listen to our customers and take pride in every connection. Wyless offers truly uncompromising M2M solutions, delivering worldwide wireless connectivity via the most secure and resilient network infrastructure. We provide unrivaled management tools and empower you with end-to-end managed services, technical expertise and dedicated support. So connect with the experts and together we’ll take your applications to the next level. You have found your true M2M partner. We can’t wait to discuss the possibilities. Keysure KEYSURE’s patented Key Control container is a pilfer proof, tamper evident key safe. This is the only non-electronic security device that will control and audit the use of a key, password or any other content. Once an item is secured inside the Key Control, it must be physically broken to access the contents. www.keysure.net Videotec Videotec manufactures in-house a wide range of CCTV products recognized for high performances, fl exibility and style. Our mission to lead the fi eld in the development of robust, reliable and high performances mechanical and electronic products for surveillance applications is the driving force behind our success. www.videotec.com ULISSE COMPACT THERMAL The positioning unit off ers an integrated solution for total darkness, fog, rain or smoke. CCTV PRODUCTS www.videotec.com Dual vision, Real time. ULISSE COMPACT THERMAL The positioning unit off ers an integrated solution for total darkness, fog, rain or smoke. Dual vision, Real time.
CCTV PRODUCTS www.videotec.com
Samsung Security Samsung Techwin is one of the fastest growing professional security brands in Europe. Providing a complete range of security solutions that are suitable for a wide range of applications, the company is dedicated to developing technology and products that its clients demand. www.samsungsecurity.com
Wyless Systems Our award-winning M2M platform, delivered in partnership with the world’s largest mobile network operators, provides secure, reliable wireless connectivity to mobile and fi xed devices in nearly every country in the world. Our unique products and services help our customers deploy robust, scalable and secure M2M applications. www.wyless.com +1 617 949 8900 +44 1895 454 699 info@wyless.com www.wyless.com
The leading global M2M managed services provider
Audio made smart & easy.
AXIS C1004-E Network Cabinet Speaker
AXIS C2005 Network Ceiling Speaker
AXIS C3003-E Network Horn Speaker
Axis network speakers are complete high-quality audio systems in a single unit. And because they’re based on open standards, they’re easy to integrate with other systems. Our ceiling and cabinet speakers are perfect for public address system and background music in stores and other settings, such as schools. And with our horn speaker you have a cost-efficient way to deter crime by complementing your video surveillance solution in outdoor settings.
Learn more about our network audio systems at www.axis.com/products/audio