2.1 Terrorist Threat in the European Urban Built Environment: Understanding Levels of Riskiness in Outdoor Open Areas Using Risk Matrix
-
Determine the most frequent and riskiness scenarios in the urban BE considering homogeneous classes of uses of places and buildings and the weapon types to provide if some uses can alter the inherent level of proneness of OAs (Goal 1—G1)
-
Identify the most relevant (in frequency and efficaciousness) weapon types in increasing the global riskiness of places considering the uses of buildings facing the OAs, in order to delineate dominant traces to focus on for OAs (Goal 2—G2)
2.1.1 The Discretization of the Terroristic Phenomenon in the Outdoor Open Areas Within the GTD Database
Code of CBE | Class of built environment |
---|---|
A | Transportation infrastructure (airport, docks, metro, and rail stations) |
B | Public buildings with entertainment uses (theatres, museums, bars, restaurants, hotels, shopping centres) |
C | Hospitals, schools, universities |
D | Representative (symbolic) or strategic buildings |
E | Residential buildings and industries |
F | Public un-built areas, squares, and streets |
Code | Description |
---|---|
T1 | Assassination |
T2 | Armed assault |
T3 | Bombing/Explosion |
T4 | Hijacking |
T5 | Barricade incident |
T6 | Kidnapping |
T7 | Facility/Infrastructure attack |
T8 | Unarmed assault |
2.1.2 The Frequentistic Analysis of the Terroristic Phenomenon in Western Europe: From the Built Environment to the Outdoor Open Area Scale
-
The frequentistic probability (PF), representing the outcomes of event observation (the ratio between the number of occurrences of a specific event type and the total number of events).
-
The consequences (C) in terms of damage, evaluated as the cumulative sum of injured individuals and victims, excluding the details about building damages.1
-
The first focuses on the whole set of events that occurred in Western Europe BEs during the selected period (GTDBE2001–2020).
-
The second concerns the events that occurred outside the buildings, to relate the inherent proneness of squares and streets to the uses of buildings (GTDOutBE2001–2020), which counts approximately 50% of the whole one.
-
An attack type is mainly pursued every week in the BE of Western Europe.
-
The main value of the consequences for the whole set of violent events counts three people (victims and injured).
Likelihood levels | PF range | Description |
---|---|---|
Very likely | x > 50% | Until 1 event per day |
Likely | 14.25% < x ≤ 50% | Until 1 event per 2 days |
Possible | 3.3% < x ≤ 14.25% | Until 1 event per week |
Unlikely | 0.3% < x ≤ 3.3% | Until 1 event per month |
Remote | x ≤ 0.3% | Until 1 event per year |
Consequence levels | n. of people involved (injured and victims) |
---|---|
Extreme (Ex) | x > 3 × 103 |
Major (Ma) | 3 × 102 < x < 3 × 103 |
Medium (Me) | 3 × 101 < x < 3 × 102 |
Moderate (Mo) | 0 < x ≤ 3 × 101 |
Minor (Mi) | x = 0 |
2.2 Secure Urban Built Environment Prone to the Terrorism Threat: The Risk Mitigation and Reduction Strategies
2.2.1 Classification of Risk Mitigation and Reduction Strategies in the Built Environment: An International Overview
-
The type of target (target-oriented strategies) [6, 7], taking into account the classification already introduced between hard and soft targets. Moreover, this criterion distinguishes RMRS based on the varying level of public area accessibility, restricting the perpetrator's proximity to the sensitive target (human-to-event). A secondary division pertains to potential interactions with users, distinguishing between active actions (generating a bi-univocal relation between overarching governance and urban users in prevention processes such as intelligence, active user education, and security surveillance) and passive actions (application of predefined instructions, e.g. regulatory norms, risk communication, urban space redesign).
-
The types of attack (attack-oriented) [8, 9], where the definition, selection, and organization of RMRSs may involve simple or complex control and management systems for public space or sensitive buildings, depending on the possible or anticipated modus operandi, as well as their effectiveness concerning space configuration and predisposition to attack.
-
The event timings (time-dependent classification) [10, 11], where, coherently with the times of risk, RMRSs are classified with a focus on prevention (pre-event) or management (post-disaster) capabilities, also in relation to potential attack modalities. The perpetrator's operational approach can significantly impact the choice of RMRSs and predict possible human-to-event and event-to-user interactions (e.g. intervention times for video surveillance activities or first responder actions).
-
The morphology and nature of the BE [12, 13], consistently with principles outlined in Chap. 1, Sect. 1.1, a terrorist act may target a specific part of public space, necessitating diverse distribution of RMRSs throughout the entire built sector in which the target is situated (e.g., a car bomb attack in areas characterized by varying vehicular accessibility). This includes design strategies for “zones” or “defence areas”, recognizing the boundary (a) externally locating all physical barriers and control systems for entire areas characterized by high vulnerability; (b) intermediate, aiming to limit and protect areas or objects within the physical boundary of OAs; (c) internal, referring to the envelope of the vulnerable, sensitive, or strategic building, or areas within them (core) when identified as primary targets of the attack.
-
Physical or managerial purposes [14, 15] according to which, RMRSs can be geared towards risk reduction or emergency event management, focusing on physical interventions in the urban BE and its sub-parts. Additionally, in relation to the first, attention is directed to coordination and management with strategies related to planning, regulation, as well as user education and risk preparedness to maximize effectiveness.
-
S1.The design of the physical elements. Perimeter design [S1.1] and secure envelope [S1.2] [12, 15, 16] are addressed for open spaces requiring heightened levels of security and well-being for users; perimeter design incorporates effective mitigative systems evaluated for impact resistance, geometric efficacy concerning accessibility (for T3 attacks), and compatibility with emergency evacuation flows; when the target is confined to a specific element of the built space, the discussion revolves around the building envelope, particularly concerning explosion dynamics.
-
S2.The design of BE layout, combining physical elements [S2.1] and layout geometries [S2.2] [15, 16], aims at identifying and creating secure external (standoff) or internal (sheltering) spaces during emergency events by combining physical elements with risk management tools, such as the design of emergency plans [S2.3] [17, 18].
-
S3.Pursuing the access control [S3.1] and surveillance [S3.2] [12, 15, 19, 20]; these are predominantly used in managing large events, often combined with perimeter control systems [S1.1], supported by personnel or advanced technologies (body scanners, optical people counting devices, facial recognition in video surveillance). Effective lighting systems [S3.3] [12] are also recognized as necessary to improve visibility and support during emergency evacuations.
-
S4. Ensure safety and security management [15, 21‐25] by means of several layers of strategies; the use of security personnel [S4.1] as a preventive strategy to deter attacks, support recognition of aggressors, and provide initial aid during and after an attack. This strategy requires broader support, including emergency plan design [S2.3], and, in this context, should be aimed at developing specific issues related to the planning of first aid interventions [S4.2], and their coordination [S4.3]. Finally, the users’ involvement [S4.4] through content sharing on various devices has shown significant benefits in public security management, especially after recent traumatic events in Belgium, France, and Germany.2
2.2.2 The Sustainability of Risk Mitigation and Reduction Strategies in the Built Environment
RMRS | Redundancy with attack typologies | Coordination with other RMRS classes | Adaptable for existing BE | Main application context (intended use; overcrowding) | Factors influencing costs |
---|---|---|---|---|---|
Design of the physical elements of the BE [S1] | |||||
Safe perimeter [S1.1] | T3 | S2.1, S3.1 | Adaptable, if punctual installations are used | For hard targets, because of their complexity level | Adopted technologies, BE perimeter length |
Secure envelope [S1.2] | T1, T2, T3 | S2.2 | Usually, they consider new facades, while interventions on openings are more sustainable | For public buildings featuring high crowding levels | Reinforcement typologies for existing openings technology and extension of facades for new constructions |
BE layout [S2] | |||||
Standoff [S2.1] | T3 | S1.1, S1.2, S3.1 | Massive impact is expected when combined with S1.1. Otherwise, adaptable to the existing layout using management actions | Specific for strategic buildings but extendable to soft targets when hosting a high number of visitors | land use costs in guaranteeing the distances, for new constructions In existing BEs, costs concern the space use management |
Sheltering [S2.2] | T2, T3, T8 | S2.3, S4.2 | Adaptable if limited to shelter areas; not compatible when interventions are applied to facades and structures | Single and strategic buildings with something/ someone to protect | Costs are limited only if intervention is applied to existing shelter areas |
Emergency layout [S2.3] | all | S1.1, S2.1, S2.2, S3.1, S4.1, S4.2, S4.3 | Adaptable for each situation | Adaptable in each event typology | Width of the emergency area and use of BE |
Access control and surveillance in the BE [S3] | |||||
Access control [S3.1] | T1 to T6 | S1.1, S2.1, S2.3, S4.1, S4.3 | Adaptable due to the possibility to limit areas (i.e. square perimeter) | Useful for events with significant crowding conditions | Number of installed control points number employed |
Security service [S3.2] | T1 to T6 | S1.1, S3.1, S3.3, S4.1, S4.2 | Adaptable for all the existing BE (including historical) because not invasive installations | Adaptable to all conditions and uses | Width to monitor Adopted technologies |
Illumination [S3.3] | T1, T2, T3, T7 | S1.1, S3.1 | Adaptable for existing (including historical) BEs with possible restrictions at the technological level (e.g. systems integration/installation) | Adaptable to all conditions and uses | Number of devices operational and maintenance issues |
Safety and security management in the BE [S4] | |||||
Security personnel [S4.1] | T1, T2, T3, T4, T5, T6 | S1.1, S2.2, S2.3, S3.1, S4.2, S4.3 | Adaptable in each condition | Adaptable to all conditions and uses | Building dimensions and floors In mass gatherings, event area extension and number of participants |
First aid [S4.2] | all | S.2.2, S2.3, S4.1, S4.3 | Adaptable in each condition | Mandatory for mass gatherings and in hard targets of the BE | Low costs by considering the direct possibility of saving lives |
Coordination [S4.3] | all | S2.2, S3.1, S4.1, S4.2 | Not dependent on the BE typology | Always necessary in each case special consideration for hard targets or mass gathering events | employed technology |
Users’ involvement [S4.4] | all | S1.2, S2.2, S2.3, S4.1, S4.2,
S4.3 | Not dependent on the BE typology | Users should be trained to face disaster in all conditions | Financing informative campaign Types of guiding tools (e.g.: apps) |
-
The potential interference with behavioural issues;
-
Their representability in modelling evacuation processes in simulators.
RMRS [code] | Interactions with behavioural issues | Possibility to be represented in crowd evacuation simulators |
---|---|---|
Design of the physical elements of the BE | ||
Safe perimeter [S1.1] | Barriers ought to be crafted with a thoughtful consideration of users’ perceptions and behaviours during emergencies, such as evacuation, while maintaining a correlation with emergency layout and strategic planning | Geometry and obstacles can be represented in a virtual environment, studying the influence on the perpetrator and pedestrian evacuation dynamic |
Secure envelope [S1.2] | N.A | Attack effects on the BE elements |
BE layout | ||
Standoff [S2.1] | N.A | BE planimetric geometry |
Sheltering [S2.2] | Their design should ensure the safety of users, addressing their essential needs in an emergency | Safe places are attractive for refuging |
Emergency layout [S2.3] | Its design should consider the number of users and typologies to support the behaviour (literature or in simulation) | It constitutes input data for the setup of final conditions in simulation, influencing the evacuation paths to reach the defined safe areas |
Access control and surveillance in the BE | ||
Access control [S3.1] | Aiming to discourage the perpetrators | It is an element/a set of elements influencing the pedestrian presence in the environment, representing input data in simulations |
Security service [S3.2] | Aiming to discourage the perpetrators | Their incorporation into emergency scenarios enables the simulation of “intelligent” solutions, utilizing input data for the detection of emergencies and the management of evacuation |
Illumination [S3.3] | Aiming to discourage the perpetrators | The degree of illumination affects the movement of individuals and influences the selection of specific paths, both in regular circumstances and during emergency evacuations |
Safety and security management in the BE | ||
Security personnel [S4.1] | Aiming to discourage the perpetrators | It can be modelled as a source which modifies the pedestrian’s evacuation |
First aid [S4.2] | Adequate to users’ typologies and number | It can be expressed as a decrease in the number of victims and a directed movement of rescuers towards specific areas |
Coordination [S4.3] | N.A | Simultaneous and coordinated employment of different countermeasures |
Users’ involvement [S4.4] | Instructions provided to users should align with their instinctive responses in hazardous situations | Capabilities of the users to perform proper safety behaviours |
2.3 Factors Affecting the Terroristic Risk in the Outdoor Open Areas for the Most Recurrent Attack Typologies
-
The perpetrator’s will and decision capability.
-
The BE features and uses.
-
The user behaviour in evacuation and emergency processes.
Risk determ | Keyword | Terrorism principle | Contents | Refs. | |
---|---|---|---|---|---|
HAZARD | TARGET | TP.3; TP.3.2 | Inter-dependence and replacement of targets; soft target | [44] | |
TP.2 | Publicity impact is key to targeting | [44] | |||
Each EC has an inherent probability of being a target due to the relevance of being a soft target | [45] | ||||
Symbolic value of the target; Presence of media | [45] | ||||
USES | TP.1 | Impact factor | [44] | ||
The potential high level of crowd of EC increases the likelihood of hazard | [45] | ||||
People gathered in one place | [11] | ||||
The level of alert could consider the attraction of places for tourists that can increase crowding | [35] | ||||
PREVENTION | TP.3.1 | Hard target | [44] | ||
TP.4 | The characterization of terrorist weaponry | [45] | |||
Security personnel, the presence of the police force | [11] | ||||
The introduction of countermeasures can prevent access to vehicles | |||||
Study strategies for controlling accesses | |||||
VULNERABILITY | FORM/SHAPE | The presence of speed regulation elements limits the speed of vehicles along the street | |||
ACCESSIBILITY | The local topography of the place can preclude vehicle-borne threats | [22] | |||
Mitigative measures should be correctly designed to be effective | [36] | ||||
Management of the vehicular traffic | |||||
OBSTACLES | TP.3.2 | Soft target, not only as a place but also as a part of the place that allows high crowd levels (i.e. archaeological sites, stairs) | [44] | ||
Most of the “attractor” classes which have a high crowd level of people also outside the buildings (FD–FB) (i.e., Dehors) | [45] | ||||
The presence of mobile or fixed obstacles being/as specific attractors for people (rendezvous, hangouts) | [37] | ||||
EXPOSURE | ATTACK TYPE | Inherent capacity of attack to maximize the effects | [45] | ||
Study different strategies related to possible attack types | |||||
CROWD | TP.1 | The impact factor | [44] | ||
The high level of crowding influences the total number of victims | [45] | ||||
Check the variability of density in some parts of the places | [37] | ||||
REACTION/OBSTACLE | Use urban furniture or urban objects as protection during the attack | ||||
Check the accesses and emergency paths and their capacity to be crossed during the evacuation | |||||
Check along the accesses the presence of obstacles | [46] |
-
“TARGET” describes the type and inherent proneness of the place to be attacked. It is demonstrated by the phenomenological analysis of events in the BE and in OAs, highlighting the higher relevance in likelihood for CBEs B and D, consequently extending to FB, FD, and F for the events that occurred in relation to the outdoors (compare with Table 2.1). Specifically for OAs, the environmental significance of a location is contingent upon its inherent likelihood of being attacked, influenced by the notion of “soft target”. Moreover, the size of the target does not preclude the symbolic importance of OAs. Even though the prior assessment of the terrorism phenomenon adopts a geographically independent analysis, the selection of an OA (one among other soft targets) should be tied to their symbolic relevance (i.e. religious, political, economic), which depends also on the presence of representative and symbolic buildings.
-
“USES” is related to the impact “maximization” of violent acts, because the use of OAs and their structures assumes varying degrees of importance in terms of likelihood. Near the common uses of places, the “attractiveness” of squares/streets or buildings facing OAs increases the potential proneness to perpetrators’ choice, increasing locally the touristic flows [35]. Similarly, the presence of public buildings influences the use of the OAs, even if these are dependent on the opening times.
-
“PREVENTION” considers the current significance of terrorism in urban environments, due to the fact that the extensive deployment of countermeasures or mitigative solutions can impact the potential likelihood of threats in OAs. This stems from the distinction between hard and soft targets (TP.3). Likewise, preventive strategies may vary based on weaponry and attack types aimed at achieving violent objectives (TP.4). In this context, the prevention encompasses both the existence of preventive measures in the urban BE (e.g., access control, robust barriers) and their efficacy against specific attack types (e.g., vehicular or armed assaults) [11, 35‐38]. Thus, all mitigative urban physical elements, including geometric features of accesses, both within OAs and along their boundaries, participate in the discussion.
-
“FORM/SHAPE” which discusses the morphological feature of the OAs and their relations with the assaults. This is strongly clear focusing on the attack typologies: for T2, mainly executed with cold arms or with guns, the perpetrator's violent act is “centralized” covering a circular area of interest; while for T3 the prevalent elongated features of places allow vehicles to reach higher speeds to pursue the act [12, 22, 36, 38, 39].
-
“ACCESSIBILITY” related to the geometric dimensions of OAs while discussing their perimeter. The concept of accessibility is clearly stated in terms of the physical permeability of OAs as the ratio of physical geometries of accesses and the overall perimeter but also related to the urban regulations about vehicular accessibility (for the T3) [22, 36] or the topographic/human-induced conditions along the accesses (e.g., stairs, squatting) [40].
-
“OBSTACLES” recurs to describe all the OAs elements (within the area and along the frontier) that constitute temporal rendezvous for people. It’s the case of bar-covered terraces, staircases, or greening that may increase locally the vulnerability of a place in terms of meeting points [37].
-
“ATTACK TYPE” describes the relationships between the potential severity of the attack and the type of the attack itself. As demonstrated in previous sections, most of the mitigative strategies are classified coherently to the weapons or the means of the attack. On the other hand, the attack type itself constitutes the way to describe the severity of events when related to the OAs uses, as highlighted in the phenomenological analysis [35, 37].
-
“CROWDING” is mostly related to the quantification of severity. In this case, the keyword is related to the maximum number of people to be involved in the events, considering the density of OAs and the associated facing buildings for their uses [37].
-
“REACTION/OBSTACLE” describes the quality of OAs and its part in enhancing the responsiveness of users in the moment of the attack. Specifically, a first level of quality can be discussed focusing on the relationship between the physical objects/obstruction within the OAs and users. Here, their “protective” or “obstructive” potentialities can be considered [37, 41‐43], following the main suggestions shared by some national guidelines to users: “hide” or “run”.3 The second level of discussion about the “reaction” refers to detailed countermeasures present within the OAs, assessed as effective for the attack types.