Download as pdf or txt
Download as pdf or txt
You are on page 1of 142

Safety and Security Planning Manual

(DP-305)
Abu Dhabi Safety and
Security Planning Manual
Version 01
His Highness Sheikh Khalifa bin Zayed Al Nahyan
President of the United Arab Emirates and Ruler of Abu Dhabi
His Highness General Sheikh Mohamed bin Zayed Al Nahyan
Crown Prince of Abu Dhabi, Deputy Supreme Commander of the UAE Armed Forces
and Chairman of the Abu Dhabi Executive Council

1. Introduction 5
Contents
- Mandate of the Abu Dhabi Urban Planning Council Planning Toolkit Appendix 1:
- The Manual Vision
- Executive Summary
4 A1 Risk Management

Introduction - Introduction 100 - Introduction 240


1 - PT1 Site Selection
- PT2 Access and Circulation Routes
106
112
- Safety and Security
Risk Management Process
242

- PT3 Vehicle Access Control 120 - Communication and Consultation 246


- PT4 Pedestrian Access Control 132 - Stage 1: Establishing the Context 247
- Introduction 19 - PT5 Service Access Control 136 - Stage 2: Risk Identification 248
- Safety and Security Definition 19 - PT6 Parking Placement 142 - Stage 3: Risk Analysis 252
- Planning Context 20 - PT7 Infrastructure Planning 146 - Stage 4: Risk Evaluation 257
- Safety and Security Context 21 - PT8 Topography 150 - Stage 5: Risk Treatment 259
- Implementation Policy 22 - PT9 Building Orientation and Shape 154 - Stage 6: Monitoring and Review 260
- Implementation Process 23 - PT10 Development Delivery 158

The Abu Dhabi Safety Design Toolkit Appendix 2: 263


2 and Security Planning and 5 A2 Glossary
Design Principles

- The Role of Planning and Design in 29 - Introduction 164 Appendix 3: 273


Safety and Security
- Abu Dhabi Factor 1: Culture and Religion 30
- DT1 Landscape and Urban Design
- DT2 Architectural Design
166
190
A3 Further Reading
- Abu Dhabi Factor 2: Climate 30 - DT3 Systems Design 200
- Abu Dhabi Factor 3: Pace of Development 31
- Abu Dhabi Factor 4: Built Form 31
Appendix 4: 277
- The Principles
- P1 Access and Connectivity
34
36
Case Studies
A4 Acknowledgements

6
- P2 Structure and Spatial Layout 40
- P3 Ownership 44
- P4 Surveillance 48
- P5 Activity 54
- P6 Physical Security 58
- P7 Public Image 62 - Al Bandar 210
- P8 Adaptability 66 - Emirates Palace Hotel 216
- Wasat Madinat Abu Dhabi (Sector E4-01) 224
- Saadiyat Island Cultural District 230

Safety and Security Within


3 an Integrated Development
Process

- Introduction 74
- Stage 1: Pre-planning 78
- Stage 2: Planning 81
- Stage 3: Design 87
- Stage 4: Construction, Commissioning 91
and Operations
- Getting the Right Advice 93

1. Introduction 7
Mandate of the Abu Dhabi Urban Planning Council
The Abu Dhabi Urban Planning The Abu Dhabi Urban Planning
Council (UPC) was created by Council’s primary purpose is to
Law No. 23 of 2007 and is deliver upon the vision of His
the agency responsible for the Highness Sheikh Khalifa bin
future of Abu Dhabi’s urban Zayed Al Nahyan, President of
and regional environments, and the United Arab Emirates and
the expert authority behind Ruler of Abu Dhabi, for the
the visionary Abu Dhabi 2030 continued fulfillment of the
Urban Structure Framework grand design envisaged by the
Plan published September late Sheikh Zayed bin Sultan Al
2007. Chaired by His Highness Nahyan, Father of the Nation,
General Sheikh Mohamed bin and the ongoing evolution of
Zayed Al Nahyan, Crown Prince the Emirate of Abu Dhabi. By
of Abu Dhabi, Deputy Supreme drawing on urban planning
Commander of the UAE Armed expertise from local Emiratis,
Forces and Chairman of the throughout the Arab States of
Abu Dhabi Executive Council, the Gulf, and around the world,
the Abu Dhabi Urban Planning the Abu Dhabi Urban Planning
Council defines the shape of Council strives to be a global
human settlements in the authority on the future of urban
Emirate, ensuring factors such planning and design.
as sustainability, infrastructure
capacity, community planning Building on the success of the
and quality of life, by overseeing Abu Dhabi Urban Planning Vision
development in the cities and in 2030, the Abu Dhabi Urban
the Emirate as a whole. The Abu Planning Council is pleased to
Dhabi Urban Planning Council issue the Safety and Security
ensures best practice in planning Planning Manual (SSPM) for the
for both new and existing Emirate of Abu Dhabi.
settlements.

1. Introduction 9
The Manual Vision:
To ensure the creation
of safe and secure
communities that
enhance quality of life
and reflect the Emirate’s
unique identity

10 1. Introduction 1. Introduction 11
Executive Summary
The Abu Dhabi Safety and Work on the initiative that
Security Planning Manual produced the Manual included
(SSPM) was commissioned by a series of workshops over
the Abu Dhabi Urban Planning a nine month period with
Council (UPC) to guide the senior representatives of
development of safe and secure Federal Ministries, Abu Dhabi
communities. Government departments,
representatives of the private
Reassuringly, Abu Dhabi is a sector and Higher Education
safe and secure place for its UAE institutions. The initiative
Nationals, residents and visitors. included a major benchmarking
The purpose of the Manual is to study, that for the first time,
ensure that Abu Dhabi remains examined both community
safe, secure and welcoming as safety and protective security
it continues to grow and attract practices at an international,
a range of diverse activities, regional and domestic scale.
people and opportunities. Where good practices were
observed, these have been
Good planning and design of the amended to take into account
built environment are central to the following Abu Dhabi factors:
community safety and protective Culture & Religion, Climate, Pace
security, yet crime and security of Development and Built Form.
issues rarely receive sufficient
attention early in the development Eight Principles are presented in
process. The purpose of the the Manual (Chapter 2):
Manual is to ensure that safety • P1 Access and Connectivity
and security are embedded in
development proposals and • P2 Structure and Spatial Layout
this is best achieved using an • P3 Ownership
Integrated Development Process.
This process will be used to • P4 Surveillance
implement safety and security • P5 Activity
planning and design principles
that are bespoke to Abu Dhabi • P6 Physical Security
Emirate. It will ensure that neither
• P7 Public Image
the development community,
nor those tasked with safety and • P8 Adaptability
security enforcement, lose sight
of the Vision 2030 overarching They are universal, regardless
principles. The vision for the of the type, size or location of
Manual is to ensure the creation development. However, they
of safe and secure communities need to be applied differently
that enhance quality of life according to context.
and reflect the Emirate’s
unique identity.

1. Introduction 13
Guided by the Principles, specific and Building Permit process place to another and that the Whether this Manual is being
policies have been developed will need to demonstrate solutions that work in one place used during the early stages
under the following topics: the implementation of the might not work in another. There of the development process,
Principles. The Manual does not is a need to take into account or to make improvements
• Planning Culture introduce any new deliverables the local situation and for all at existing buildings, it is
for these types of projects. those involved in developing, intended to inspire innovative
• Risk Assessment High Priority Projects, which managing and maintaining the and aspirational solutions that
will typically be larger in built environment, to work are in-keeping with the local
• Balancing Act
size or include land uses that collaboratively and holistically to context. The Manual does not
• Working Together attract particular security risks, address safety and security risks. provide detailed guidance, as
will be required to submit it is a starting point, covering
• Owner Pays
additional deliverables as part The constraints present in a large geographic area and a
of the municipal planning the existing built environment wide range of projects with
The Integrated Development and Building Permit process. justify the Manual’s focus on the varying safety and security
Process presented in Chapter The recommendation is that planning stage of development. requirements. With further
3 of the Manual will ensure these are completed by However, even though Vision advances and by working
that the Principles are applied specialists, working as part 2030 is ambitious and involves together to implement its
early in the development of the multidiscipline project significant development, much of Principles, it will create a solid
process. This will allow team, who are best placed to Abu Dhabi is existing and there foundation for safe, secure
professionals to use their skills balance competing development is an equal need for community and sustainable communities.
and imagination to incorporate objectives. In these instances, a safety and protective security
unobtrusive measures into Government safety and security in existing areas. As such, the
the built environment. This is advisor will work together with Planning and Design Toolkits
certainly more cost effective the project team to provide present a wide range of options
than retrofitting and will ensure advice and support during the that will be useful for owners of
design quality. planning and design stages existing buildings.
of development. They will be
The Manual is supplemented present at workshops and will An implementation programme
by an online Decision Support review the proposals submitted coordinated and funded by
Tool, that is both simple and to the UPC or relevant the Government will be used
user friendly. It may be used Municipality. to identify any improvements
during the pre-planning stage of needed at existing buildings
a project to gain an appreciation The Manual contains a toolkit of for national security reasons.
of how much influence safety planning and design guidance Owners will be contacted
& security will have on the that may be used to address if their building is deemed
development proposals. There safety and security risks. ‘High Priority’ and if
are only two outcomes from the Decisions relating to which tools improvements are required,
Decision Support Tool. Projects to adopt and to what extent an action plan will be agreed.
will either be identified as they are applied are to be
‘Low Priority’ projects or ‘High made as part of the Integrated
Priority’ projects. Development Process. Neither
the Planning Toolkit (Chapter 4)
It is anticipated that the majority or the Design Toolkit (Chapter
of projects will be identified 5) prescribe any particular
as Low Priority Projects and solutions. Best practice and
applications submitted as experience shows that safety
part of the municipal planning & security risks differ from one
1
Introduction

Secure communities
Introduction
The Abu Dhabi The Abu Dhabi Safety and
Security Planning Manual will
be updated regularly as new
Safety and Security data and experience with best
This Manual is part of the UPC’s practices become available.
Planning Manual development regulations and is Please check the UPC’s website
for the latest version before
approved by the Emirate of Abu
was commissioned Dhabi Executive Council for use
across Abu Dhabi Emirate.
using this Manual.

by the Abu Dhabi It constitutes one of many


Urban Planning related planning and design
initiatives in the Emirate of
Safety and Security
Definition
Council to guide Abu Dhabi and shall be used in
conjunction with other adopted
the development standards and guidelines
as applicable. The Manual
Good planning and design of
the physical environment are

of safe, secure, integrates the needs of different


agencies and its content will
central to community safety and
protective security. Freedom

and sustainable inform developers, owners and a


range of professionals, including
from crime and the fear of crime
lead to social, economic and

communities. urban planners and designers,


transport planners and safety
environmental success and make
a significant contribution to the
and security specialists. fulfillment of Vision 2030.

The Manual shall be used by all The causes of crime and


agencies involved in the approval disorder are many and complex.
of all new development in the For a crime to occur, the
Emirate of Abu Dhabi, and in following are required:
assessing the appropriateness of • An offender who is motivated
community safety and protective and resourceful;
security arrangements at
existing developments. For the • A target or victim; and
first time, the role of owners • A favourable place where the
and the development community crime is likely to go unnoticed,
in maintaining Abu Dhabi’s unchallenged or even be
excellent record on crime has promoted.
been documented.

Through planning and design,


it is possible to reduce the
number of occasions when all
three components are in place.

1. Introduction 19
When discussed within this The 2030 Plans regulate the Safety and Security Terrorism
document, safety and security pattern of urban expansion Context As is the case across the world,
refers to the following: to balance economic, social, the United Arab Emirates
cultural and environmental faces a real, evolving and
Community Safety - comprises priorities in a sustainable Reassuringly, Abu Dhabi is a safe increasingly complex threat
strategies and measures that manner. The Plans seek to and secure place in which to from international extremism.
seek to reduce the risk of crimes establish a planning culture live. The purpose of the Manual To this day, there has not
occurring and their potential and introduce best practice is to ensure that the Emirate been a successful terrorist
harmful effects on individuals principles for both new and remains safe and secure as it attack within the United Arab
and society, including fear existing development. continues to grow rapidly and Emirates, although terrorist
of crime, by intervening to A series of overarching to attract a range of new and activity both globally and
influence their multiple causes. principles within the Plans are diverse activities, people and regionally is significant and its
supported by specific policies to opportunities. impact extensive.
Protective Security - is an guide implementation.
organised system of protective The development of the Given the need for national
Crime
measures implemented to Abu Dhabi Safety and Security security and the target-rich
An extensive benchmarking
achieve and maintain security. Planning Manual (SSPM) is environment that will be created
effort conducted in the
It combines the three disciplines informed specifically by Urban as a product of the ambitious
preparation of the Manual
of personnel, information and Design Policy VII - U23 Crime development plans set out in
concluded that crime is very low
physical security in a manner to Prevention, which states: Vision 2030, the Emirate of
in the Emirate of Abu Dhabi,
create ‘defence in depth’, where Abu Dhabi has established a
but rising at a rate exceeding
multiple layers work together to “Complete a set of guidelines Higher Committee for Crises
the population growth rate.
deter, delay, detect and deny for crime prevention through and Terrorist Acts Management
an attack. building and landscape design (HCCTAM). The HCCTAM leads
Crime statistics supplied by
and henceforth manage the Emirate’s efforts to counter
Abu Dhabi Police GHQ show
development to facilitate the terrorism and is the owner of
that while personal crime is
Planning Context safety of environments and
higher as a proportion of total
the Counter Terrorism Strategy.
maintain Abu Dhabi’s excellent This Strategy is organised around
recorded crime than in the
record on crime.” a series of work streams, one
benchmark countries, there is
of which is ‘Protection’, which
an exceptionally low level of
Central to the planning efforts The preparation of this seeks to increase the resilience
property crime. As such, the
in Abu Dhabi are the 2030 Plans Manual has also been of the UAE against an attack.
primary focus for the Manual
which establish a vision for guided by subsequent UPC
is to reduce crimes against the
the future development of the planning regulations, policy Terrorism is a crime, and
person through changes to the
Emirate. The 2030 Plans include: and guidelines that have with the agreement of the
built environment. Essentially,
been prepared to ensure HCCTAM, the Manual presents
this includes all crimes apart
• Plan Capital 2030: Urban the continued sustainable planning and design guidance
from those that occur within
Structure Framework Plan development of the Emirate. that will embed counter-
private properties.
terrorism protective security
• Plan Al Ain City 2030: Urban in our built environment,
Structure Framework Plan reducing vulnerabilities and
• Plan Al Gharbia 2030: Regional increasing the resilience
Structure Framework Plan of our communities.

A selection of planning policy and


guidelines issued by the UPC

20 1. Introduction 1. Introduction 21
Implementation Policy Policy Statement 1 Implementation Process For projects defined as
‘High Priority Projects’, safety
‘Planning Culture’
and security is likely to influence
spatial use, spatial layouts and
Community safety and
spatial design and Government
The Manual outlines eight protective security shall be a New Development
safety and security advisors will
Principles that are guided by core planning consideration in
be involved in decision making
a vision for safe and secure all new development. Following the release of the
for each project. The developer
communities: Manual, all new development shall
is also advised to appoint a
implement the Abu Dhabi Safety
Policy Statement 2 competent safety and security
P1: Access and Connectivity and Security Planning and Design
specialist to assist them in the
P2: Structure and Spatial Layout ‘Risk Assessment’ Principles (Chapter 2). Chapter 3
preparation of safety and security
P3: Ownership of the Manual illustrates a simple
deliverables required as part of
P4: Surveillance Community safety and Integrated Development Process
planning and Building Permit
P5: Activity protective security (IDP) that describes how safety
Submissions. These deliverables
P6: Physical Security arrangements, in new and and security is to be integrated
are discussed in more detail in
P7: Public Image existing developments, must be in a project. It highlights who
Chapter 3, which includes
P8: Adaptability fit-for-purpose, appropriate and will be involved, when they will
a section on ‘Getting the
proportionate to the risks. be involved and their roles and
Right Advice’.
The Principles need to be applied responsibilities.
carefully as there is no such
Policy Statement 3 Projects within this category
thing as a universal planning A simple, user-friendly Decision
will also be referred to the
and design solution. This ‘Balancing Act’ Support Tool (DST) has also been
Planning Toolkit (Chapter 4) and
explains why the Manual has prepared for use by developers
Design Toolkit (Chapter 5) to
a strong focus on the process Decisions relating to community during pre-planning.
assist developers implement the
of implementing the Principles, safety and protective security
Principles.
rather than outlining a set of must be balanced with other The DST can be used to gain
prescriptive standards that may development objectives. an appreciation of how much
The Government acknowledge
never fulfill the vision. influence safety and security may
that ‘designing-out crime, and
have during planning and design.
Policy Statement 4 designing-in safety’ will be new
Best practice and experience For the majority of projects,
show that safety and security ‘Working Together’ to many developers, planners,
which are likely to be defined
risks differ from one place to designers and operators. As such,
as ‘Low Priority Projects’, this
another and that the solutions Appropriate advice, information the development community will
will mean that, whilst safety and
that work in addressing these sharing, transparency and rigour have access to specialist advice
security is important, it is unlikely
risks in one place, might not must be present to support from Government community
to have significant influence on
work in another. There is a need community safety and protective safety and protective security
development proposals. There will
to take into account the local security decision-making. advisors during the development
be no safety and security specific
situation and for all those involved review process.
deliverables required in planning
in developing, managing and Policy Statement 5 and Building Permit Submissions
maintaining our built environment Before seeking advice, the project
made to the Abu Dhabi Urban
to work collaboratively and ‘Owner pays’ team should read Chapter 3
Planning Council or the relevant
holistically to address safety and (Process) of the Manual and
Municipality. However, the
security challenges. The following Costs associated with complete the Decision Support
content of the normal submissions
policies support and guide the community safety and Tool (DST). Using project-specific
will be expected to demonstrate
decision-making process and will protective security fall where information, the DST will assign
the application of the Manual’s
be adopted to ensure positive responsibility for safety and the development a Low Priority
Principles.
implementation outcomes. security lies: with the owner. or High Priority classification.

22 1. Introduction 1. Introduction 23
Those projects assigned as High Government safety and security Crowded Places The guidance contained in the Manual should
Priority Projects should consult advisors will be initiating a be used to reduce vulnerabilities at crowded
with an advisor. Contact details programme of site vulnerability There will be a focus on places in Abu Dhabi. A Government safety
are available from the UPC and assessments across the Emirate, crowded places during the early and security advisor will assess safety and
the relevant Municipality Town although these will be restricted stages of the implementation of security at crowded places in one of the
Planning department. to ‘High Priority’ sites. A this Manual. following categories:
notification will be received
if the site is to be subject to A crowded place is a location to 1. Restaurants and cafes
Existing Development
an assessment. In the spirit which members of the public
of transparency and fairness can gain access and, by virtue 2. Hotels and resorts
In the existing built environment,
required by Policy Statement 4 of its crowd density and known
certain constraints will reduce 3. Shopping malls, markets and traditional souk
‘Working Together’, the advisors terrorist attack methodology,
opportunities for owners
will explain why the site has may be considered potentially 4. Health establishments
to make community safety
been selected and will share liable to terrorist attack. They
and protective security 5. Recreation and leisure clubs
the results with the owner. The may be buildings or open air
enhancements. This explains
cost of any protective security public spaces and they may be 6. Exhibition, commercial and media centres
why the Government is focusing
improvements will be the permanent or temporary.
on ensuring that developers 7. Visitor and tourist attractions
responsibility of the owner.
integrate safety and security
Whilst there have been attacks 8. Sports and entertainment stadia
early in the development
against well-protected targets
process. However, the Principles 9. Special events
around the world, the trend is
outlined in the Manual are
for terrorists to attack these 10. Religious sites and places of worship
universally applicable and the
crowded public places, where
Design Toolkit (Chapter 5) will
crowd density and the difficulty 11. Transport stations and hubs
be useful to owners wishing to
in controlling access make
install retrofit measures. The 12. Cinemas and theatres
them both attractive and
Toolkit will help them achieve
vulnerable targets. 13. Education establishments
design quality and fit-for-
purpose solutions. 14. Celebration halls
Previous attacks on crowded
places include the bombings on
the London Underground (UK),
at hotels and restaurants in
Egypt and armed assaults
in Mumbai (India).

24 1. Introduction 1. Introduction 25
2
Abu Dhabi Safety and Security
Planning and Design Principles

Secure communities
Introduction
This approach is sometimes referred to as
This Manual is based on eight Abu The Principles are universal – they
are relevant everywhere, regardless of
The Role of Planning and Design
in Safety and Security Crime Prevention through Environmental
development type, size or location. They are Design (CPTED).
Dhabi Safety and Security Planning however, to be applied differently, according
to context. Adopting such an approach has been very
and Design Principles (each with Applying these Principles will help to ensure
A well-planned and designed built
environment can do much to reduce the successfully demonstrated elsewhere alongside
other objectives of planning and design, such
sub principles). All development in that Abu Dhabi residents and visitors can
continue to enjoy a high quality of life in a
likelihood of an incident occurring or its impact
if it does. This can be expressed in a number as sustainability, attractive environments and
economic success.
of ways, such as:
Abu Dhabi will now be expected low crime environment. The Principles will
not just help to keep the Emirate safe and Indeed, it enhances sustainability by making
to follow these Principles. secure; they represent the best of good
planning and design and they will be central
• Reducing opportunities for crime and terrorism
by controlling access to vulnerable places;
a place more popular, better used and with
good community cohesion. These measures
to the implementation of Vision 2030. • Empowering people to contribute to the safety form the basis of the Principles introduced
and security of their communities by providing in this chapter.
This chapter sets the context for the welcoming places to visit that encourage use
Principles by introducing how good planning and promote a sense of ownership; The Manual is part of the Abu Dhabi Vision
and design contributes to safety and security, 2030 suite of documents and its Principles sit
before explaining how the Principles have • Increasing natural surveillance so that alongside those in the existing documents.
been generated. It concludes by presenting offenders are discouraged from wrong-
the eight Principles one by one. doing due to the increased perception of These Principles were considered alongside
being observed; the most common principles from guidance
• Providing clues to how people are expected and practice uncovered in international
to behave in an area or building; benchmarking. This involved a review of more
than 50 documents from around the world,
Principles
• Constructing buildings and other elements of with a particular emphasis on reviewing
the built environment so that they are less guidance from those countries which share
susceptible to crime or terrorism; characteristics with Abu Dhabi. Whilst most
P1: Access and Connectivity
P2: Structure and Spatial Layout formal planning for safety and security
• Arranging buildings and facilities so that
P3: Ownership guidance is found in the UK, USA, Australia,
adjacent uses do not lead to conflicts; and
P4: Surveillance New Zealand and the Netherlands, information
P5: Activity • Allowing the emergency services to was also sourced from countries such as
P6: Physical Security respond quickly and effectively in the Egypt, Pakistan, Singapore and Turkey.
P7: Public Image event of an incident.
P8: Adaptability Finally, to ensure that the Principles are
bespoke to Abu Dhabi, a set of issues that
set the Emirate apart from the benchmark
The Manual uses a legend to demonstrate the Principles or guidance presented
nations were identified. These Abu Dhabi
Factors can be summarised into culture
and religion, climate, pace of development
A positive illustration of the An illustration of an environment and built form. These are presented in the
Principle or guidance presented that will benefit from the
Principle or guidance presented
following pages.

28 2. Abu Dhabi Safety and Security Planning and Design Principles 2. Abu Dhabi Safety and Security Planning and Design Principles 29
Abu Dhabi Factor 1: Abu Dhabi Factor 3:
Culture and Religion Pace of Development

The importance of privacy means that The current pace of development presents
surveillance, overlooking and screening need an opportunity to address macro safety and
to be handled carefully so that residents do security needs using planning and design
not feel uncomfortable. solutions early on in Abu Dhabi’s advancement
towards Vision 2030.
The importance of family and notions
of ‘homeliness’ mean that the focus of The scale of development means that safety
management and maintenance can be more on and security principles can be applied as part
the upkeep of the home than the public realm. of a master plan, rather than being restricted to
individual plots.
The gifting of plots can result in plots that
remain vacant for a period of time.
The scale and pace of the development allows safety and security to be addressed earlier
To ensure privacy UAE Nationals’ homes are typically surrounded by a high boundary wall and on a wider scale

Abu Dhabi Factor 2: Abu Dhabi Factor 4:


Climate Built Form

The climate of the region means that: The layout and design of many urban and
rural settings introduces long, narrow and
• Public areas such as parks and plazas are uninhabited spaces that can be unsafe
quiet during summer time; and vulnerable to misuse. Whilst there are
many landmark buildings, the uniform grid
• People are more likely to drive rather than structure of Abu Dhabi City can make it
walk during the summer months; difficult to orientate oneself.
• Streets are often aligned with prevailing winds
to gain cooling breezes; and Cities have been designed around the
needs of the car user, rather than those of
• Buildings are aligned and narrow paths created pedestrians. Plot sizes are small, particularly
for increased shading. in urban areas, making it more difficult to
introduce stand-off or secure perimeters.

Underground parking is common in central


areas and any constraints on such parking for
safety and security reasons will inevitably
exacerbate existing surface parking issues.

A sikka offers shading to protect people from the summer sun and extreme heat The built form in Abu Dhabi can present particular challenges to safety and security

30 2. Abu Dhabi Safety and Security Planning and Design Principles 2. Abu Dhabi Safety and Security Planning and Design Principles 31
Following discussions at the SSPM The remainder of this chapter introduces each
preparation workshops, the eight Abu Dhabi of the Principles in more detail, including
Safety and Security Planning and Design the rationale behind them. This is achieved
Principles were agreed. by presenting a list of features that can
compromise safety and security and extracts
Before they are introduced, it is important of evidence from benchmarking that can be
to make the following points about these published publicly. Each Principle concludes
Principles: with a useful checklist to help users of the
Manual to apply the Principles.
• They equate with good planning and design
in a general sense. The Principles should To Summarise:
be applied to all development in Abu Dhabi,
regardless of type, scale or perceived safety The Abu Dhabi Safety and Security Planning
and security risk; and and Design Principles were generated through
these three steps:
• The Principles relate to planning and design
outcomes in the built environment. They
do not cover the process of achieving these 1. Examining the existing Vision 2030 principles.
outcomes. There are some assumptions 2. Exploring the principles that stem from
underlying how the Principles will be applied. international best practice in planning for
For example, responses will be: different safety and security.
according to context; proportionate to risk;
based on the sharing of information; and part 3. Amending the international principles
of a holistic strategy. This process is explained so as to take account of the unique
in Chapter 3. Abu Dhabi factors.

Benchmarking
principles

Plan 2030
principles + = SSPM
Principles

Abu Dhabi
Factors

32 2. Abu Dhabi Safety and Security Planning and Design Principles 2. Abu Dhabi Safety and Security Planning and Design Principles 33
P4

The Surveillance P5
Principles
Activity

P1
P7 P6
Access and Connectivity
Physical
Public Image
Security
P2

Structure and
Spatial Layout P3 P8

Adaptability
Ownership

34 2.
2. The
Abu Abu
Dhabi
Dhabi
Safety
Safety
and and
Security
Security
Planning
Planning
and Principles
Design Principles 2. Abu Dhabi
2. The
Safety
Abuand
Dhabi
Security
SafetyPlanning
and Security
and Design
Planning
Principles
Principles 35
P1 Access and Connectivity
Safe and secure places balance the
need for access control with P1A Connectivity is to be
encouraged in Abu Dhabi
connectivity and circulation unless it would result in
inappropriate safety
Safety and security can be and security risks
compromised if:

• Pedestrian routes are poorly lit, Maximising connectivity will be the aim
indirect and segregated from traffic; in most situations, but vulnerable sites will
need to be protected where the risks of
• There is easy, anonymous access to crime and terrorism are high. Restricting
targets, buildings and plots; access, either by foot or vehicle, will
• There is no means of controlling sometimes be needed. The Planning Toolkit
who can enter a development; in Chapter 4 covers this in more detail.
Temporary pedestrian routes are commonly Unplanned residual space can be mistakenly
• There are several uncontrolled unsafe places used as a pedestrian route
escape routes from an area; and
• There is inadequate access for
Well connected neighbourhoods with convenient access to local facilities are full of life and
emergency vehicles.
frequented by members of the community

From the evidence base:

A recent detailed study of P1B Places should have a


well-defined movement
crime patterns in 12 housing
developments showed that “crimes framework that is tailored
are consistently clustered around to the local context
alleyways and footpaths. Properties
are particularly vulnerable when
footpaths allow access to the rear Places rely on the right connections being
or side of the dwelling, where put in place. The most appropriate movement
footpaths are not overlooked by frameworks have direct routes that lead to
surrounding dwellings and where where people want to go.
footpaths are not well used.”
Well-defined routes and destinations will
Armitage, R. (2011) “The Impact of help users orientate themselves as they
Connectivity and Through-Movement move from place to place.
Within Residential Developments
on Levels of Crime and Anti-
Social Behaviour,” University of
Huddersfield

Caption
Poorly littoand
be inserted
segregated pedestrian routes can be unsafe and misused Well designed parks are welcoming and make it easier for people to orient themselves

36 2. Abu Dhabi Safety and Security Planning and Design Principles 2. Abu Dhabi Safety and Security Planning and Design Principles 37
P1C Pedestrian-only routes
need to be planned,
P1D Vehicle access and
circulation routes need to
designed and managed be planned, designed and
with care managed with care

It is important that pedestrian routes have Vehicle access and circulation routes need
a defined purpose as an integral part of a to be planned, designed and managed with
movement network to avoid them being care. Criminals may use a vehicle as a
abandoned by the community for whom means of forcing entry into a site, causing
they were intended. vandalism or even facilitating a terrorist
attack. Vehicle-borne attacks can be
sophisticated, involve high speeds and offer
the criminal manoeuvrability even when
delivering or removing large payloads.

The Abu Dhabi Urban Street Design Manual


provides specific guidance for the planning
and design of streets in the Emirate of
Abu Dhabi. Well-designed vehicle approaches reduce the risk of forced vehicle entry

Pedestrian routes need to be planned and designed to aid public image and proper use

Checklist:
• Has a coherent movement framework
been set out?
• Are all routes necessary?
• Where safety and security risks are high,
has access been controlled for vehicles and
pedestrians?
• Are routes for different users segregated
when they could be integrated?
• Do all sikkak or alleyways lead directly
to a defined destination?
• Are sikkak clear of obstacles, straight
and well lit?
• Does the planning and design of streets
comply with the Abu Dhabi Urban Street
Carefully planned and designed sikkak are safe and support community use Design Manual? The movement framework should consider safety and security alongside other planning objectives

38 2. Abu Dhabi Safety and Security Planning and Design Principles 2. Abu Dhabi Safety and Security Planning and Design Principles 39
P2 Structure and Spatial Layout
Safe and secure places are
structured in a way that manages
P2A Spaces should have a
designated purpose
risk and conflict

Safety and security can be If space either has no intended use or if


compromised if: the intended use of a space is not clear to
the community, then there will inevitably
be conflict, where individuals within the
• The designated use of space is unclear;
community have differing views on what
• Places are under used and derelict; is and is not appropriate within the space.
It is difficult to encourage community
• Conflicting user groups congregate in the ownership of a space that offers no
same places; benefit to the community.
• Public spaces are not overlooked;
• Areas of concealment and entrapment Space with no clear purpose Area of concealment and entrapment
exist; and
• Places at risk of vehicle attack do not Poorly planned and managed spaces with no clear function can become unsafe
benefit from stand-off.

From the evidence base:


P2B Spaces should be planned
and designed to support
In most vehicle-borne explosive attacks,
the impact is worsened by terrorists being
intended use
able to drive vehicles next to, or even
underneath / within, vulnerable buildings.
A space should lend itself to the intended
Examples include:
use. If the space is the wrong size, is
adjacent to conflicting uses or its design is
• Alfred P. Murrah Federal Building, not high quality, then the intended users
Oklahoma City, US, 1995 are less likely to use the space.
(169 Killed, 1000 injured)
• World Trade Centre, New York, US, 1993 Aesthetics, cost and function compete
(6 Killed, 1000 injured) with safety and security when determining
how a site is planned. Talented planners
• Hilton Hotel Taba, Egypt, 2004 and designers will find an appropriate
(34 Killed, more than 100 injured) compromise when planning circulation
routes, placing buildings, infrastructure
and parking.

A lack of stand-off contributed to the large number of fatalities and injuries in the The same space is transformed by programming of space and public
Caption to be inserted
Alfred. P. Murrah Federal Building, (Oklahoma City, USA) realm design improvements

40 2. Abu Dhabi Safety and Security Planning and Design Principles 2. Abu Dhabi Safety and Security Planning and Design Principles 41
Active and visible frontages encourage users to visit a space and observe the public realm, which contributes to community safety and security

Checklist:
• Does every space have a clear purpose?
• Are all spaces fit for their designated
purpose?

Poor spatial planning can present areas of concealment and entrapment Stand-off can be achieved using attractive and creative landscaping

42 2. Abu Dhabi Safety and Security Planning and Design Principles 2. Abu Dhabi Safety and Security Planning and Design Principles 43
P3 Ownership
Safe and secure places are those over
which occupants and users have a
P3A The ownership of space
should be clearly defined
sense of ownership and responsibility

Safety and security can be The built environment consists of spaces over
compromised if: which different users have varying degrees
of access rights and ownership. What is
deemed acceptable behaviour in one space
• It is unclear whether space is public
may be deemed unacceptable in another. It is
or private;
very important that there is clear definition
• Private space is open to the public; of space so users know who owns a space,
where they can go, when they can go there
• There is limited communal interest and the permitted use of the space.
or supervision over a space; and
• Offenders are not afraid of being seen Ownership and responsibility can be
or reported. Public space being used as private space Poor public image facilitated by making it clear where
public space ends and where semi-private
From the evidence base: or private space begins.

The Dutch Police Label Secure Housing


initiative, which seeks to ensure that
residents have a sense of ownership and
A change in texture, colour and style of paving can be used to define space
responsibility over spaces by insisting that
all spaces in a neighbourhood are carefully
planned and defined (alongside other
measures), has seen burglary rates plummet
since it was introduced in 1994 – by
98% in new housing schemes and 80% in
existing environments.

Jongejan, A (2011) “The Dutch Police Label


Secure Housing: a successful approach”,
Working Paper

Caption to be inserted
Clear evidence of the absence of communal interest Physical barriers can be used to define a change in ownership

44 2. Abu Dhabi Safety and Security Planning and Design Principles 2. Abu Dhabi Safety and Security Planning and Design Principles 45
P3B Instil a sense of
ownership over space

The community can be encouraged to


contribute to safety and security when they
have a sense of ownership over space.

By empowering members of the community


as observers, people are more comfortable
and encouraged to report suspicious
behaviour, misuse and crime.

Well designed parks encourage use A lack of ownership or communal interest over a space increases the likelihood of crime and misuse

Checklist:
• Is public and private space clearly defined?
• Is the means of defining space appropriate to
context and other planning objectives?
• Is the space welcoming and encouraging
of positive behaviour?
• Will the development have an identity
of its own that will encourage community
development?

Well designed parks are welcoming A sense of ownership over space helps to bring activity to the public realm

46 2. Abu Dhabi Safety and Security Planning and Design Principles 2. Abu Dhabi Safety and Security Planning and Design Principles 47
P4 Ownership
Surveillance
Safe and secure places have
appropriate levels of surveillance P4A Balance the need for
surveillance with the
need for privacy

Safety and security can be


compromised if: Surveillance needs to be achieved
sensitively to reflect the cultural and
religious factors in Abu Dhabi, as well as
• The balance between surveillance
the value placed on privacy.
and privacy is not achieved;
• The balance between surveillance and
the need for shading is not achieved;
• Offenders are not afraid of being seen
or reported; Underpasses generally lack natural
surveillance and are often perceived
Poor lighting and natural surveillance
• There is restricted natural surveillance as unsafe
of the public realm;
• Vulnerable areas do not have active
surveillance systems; and
An innovative approach to balance the need for privacy while enabling residents to watch
• Places are not well lit. over the public realm from the balcony. Transparent materials enable observation of the
elevator from the public realm and vice versa

From the evidence base:

Maximising surveillance is one of the


P4B Balance the need for
surveillance with the
central aims of the Secured by
need for shading
Design initiative (UK).

There have been five published evaluations


of ‘Secured by Design’, all of which Shading of public realm space encourages
conclude that it has led to significant activity (which is especially important -
reductions in crime. For example, burglary Principle P5). However, it can impede natural
rates are typically four or five times lower and active surveillance. There is a balance to
in Secured by Design based developments be struck between shading and surveillance.
than comparable ones.

Caption to be areas
Underground inserted
can lack natural surveillance Shading and natural surveillance are carefully balanced at the Abu Dhabi Corniche

48 2. Abu Dhabi Safety and Security Planning and Design Principles 2. Abu Dhabi Safety and Security Planning and Design Principles 49
P4C Adopt natural surveillance
before relying on active
systems such as CCTV

Natural surveillance is where users of a


space provide ‘eyes on the street’ that act
as a deterrent to crime and the misuse
of space.

In most situations, good natural surveillance


will be more of a deterrent than active
systems (meaning those that rely on
technology and/or manpower). It is more
important to get the basics of planning and
design right in the first place, rather than
resorting too quickly to active systems.

Spaces that offer good natural surveillance


will generally have clear sight lines that will
offer benefits to active system designers
later in the development process. Good lighting and design increases the perception of safety Residential streets that lack natural surveillance can feel unsafe, particularly at night

Operators may choose to incorporate active


surveillance to meet operational needs such
as public transport safety, traffic monitoring
and crowd management.

Good landscape design enables people to see what is happening around them and
empowers them as observers over space
Natural surveillance can be enhanced by the placement of doors, windows and balconies to overlook the public realm

50 2. Abu Dhabi Safety and Security Planning and Design Principles 2. Abu Dhabi Safety and Security Planning and Design Principles 51
P4D Concentrate active
surveillance systems in
P4F Support natural and
active surveillance with
areas that are more prone appropriate lighting
to crime and misuse
Lighting may be provided to aid in the
In addition to deterring the misuse of space and detection of intruders, to deter intruders, or in
criminal acts, active surveillance systems some cases simply to increase the feeling of
can afford a number of additional benefits to safety. A holistic approach is required to ensure
management and enforcing authorities. These lighting supports effective surveillance.
include incident monitoring and investigation. To ensure lighting elements are fit-for-purpose,
their design and specification should include
An operational requirement should support anti-vandalism and anti-tamper features.
the use of active systems and this can be
developed following a safety and security
Good lighting supports natural surveillance
risk assessment.

Checklist:
• Has a balance been struck between the
needs for surveillance and privacy?
This service area would benefit from the application of video surveillance technology
• Does the approach to surveillance take
account of local context?

P4E Support natural and


active surveillance with
• Are there opportunities for overlooking of
spaces from surrounding buildings?
good landscape, urban • Does the layout and landscaping allow clear
and architectural design lines of sight?
• Are surveillance opportunities available at all
times of the day and night?
Design decisions, ranging from building
orientation and shape through to plant species • Are CCTV and other systems focused on the
most vulnerable areas?
selection and shading structure design, will
influence the effectiveness of surveillance • Does CCTV supplement, rather than replace,
systems. Practitioners will need to adopt natural surveillance?
a holistic approach to address site-specific
• Is lighting provided everywhere that needs
requirements and project objectives. to be lit?
• Is lighting robust and energy efficient?

The open and attractive design of this space optimises natural surveillance and therefore Good lighting makes it easier for people to see what is happening around them while
active surveillance is not required also aiding wayfinding

52 2. Abu Dhabi Safety and Security Planning and Design Principles 2. Abu Dhabi Safety and Security Planning and Design Principles 53
P5 Ownership
Activity
Safe and secure places are active and
welcoming to legitimate users P5A Plan for a rich mix of
compatible uses

Safety and security can be


compromised if: A mix of uses can bring activity to an area at
all times of day or night, offering
‘eyes on the street’.
• An area is very quiet (for most crime types);
• An area is very crowded A mix of uses can make places more
(for terrorism and pick-pocketing); economically and socially successful, as well
as safer. However, care should be taken to
• Communities are not supported by ensure the compatibility of different uses.
the facilities they need; This will be different from one site to another
• Opportunities are not provided for and there is no ‘one-size fits all’ solution.
comfortable walking and cycling; and Very quiet areas allow vandalism to go unnoticed

• Operators are unprepared for sudden


changes in activity levels.

From the evidence base: A mix of uses brings life and ‘capable guardians’ onto the street so it becomes,
to an extent, self-policing
“There is a growing body of research
on activity support and mixed use
neighbourhoods where it is found that P5B Provide the right type
of facilities to support
opportunities for crime are reduced by
increasing the range of activities in the local community
public spaces.”

Western Australian Planning Commission Providing facilities that match the needs of
(2006) “Designing Out Crime Planning the community will generally increase the
Guidelines” level of activity in a community.

The Abu Dhabi Urban Planning Council


provides guidance to developers on the
appropriate provision and placement
of community facilities.

Recreational use helps to activate A lack of community facilities has


Caption areas in the evening led to an impromptu game of cricket in
Inactive to be inserted
areas attract crime and misuse
an unsuitable space

54 2. Abu Dhabi Safety and Security Planning and Design Principles 2. Abu Dhabi Safety and Security Planning and Design Principles 55
P5C Ensure that opportunities
exist for safe and
P5D Pay particular attention to
safety and security risks at
comfortable walking crowded places
and cycling
Abu Dhabi is developing a range of
The Abu Dhabi Public Realm Design Manual tourist attractions, transport facilities and
and Abu Dhabi Urban Street Design Manual commercial centres as part of Vision 2030. In
both provide very useful information on addition, particularly in the winter months in
how to develop environments that support all regions of the Emirate, there is a range of
pedestrians special events and exhibitions.
and cyclists.
These crowded places are accessible to
members of the public and are associated
with high crowd densities. This level of
activity represents an attractive target
for criminals and terrorists. If poorly
planned, crime is hard to detect or may
go unchallenged. Innovation is required
to address safety and security risks at
crowded places.
The planning of crowded places should address safety and security needs

Checklist:
• Is there an appropriate mix of
complementary uses?
• Will public places have legitimate activity
throughout the day and evening?
• Is the community supported by the
facilities it needs?
• Are people encouraged to walk and cycle?
• Is there a safety and security plan for
crowded places?

Cyclists and pedestrians are a sign of successful, safe streets and spaces The planning and design of this Abu Dhabi bus station promotes natural surveillance

56 2. Abu Dhabi Safety and Security Planning and Design Principles 2. Abu Dhabi Safety and Security Planning and Design Principles 57
P6 Ownership
Physical Security
Safe and secure places are appropriately
and proportionately protected
P6A Use risk assessment to
identify and justify
physical security needs

Safety and security can be


compromised if: Physical security includes tactics to deter,
delay, detect and deny inappropriate and/or
criminal behaviour. There is no one size fits
• Physical security is not appropriate or
all solution to physical security and therefore
proportionate to risks;
proposals must be based on an assessment
• Physical security components are not of the local situation and project risks.
fit-for-purpose;
Physical security should be appropriate given
• Defence in depth is not achieved; and the context, proportionate to the safety
• Risks have not been assessed when and security risks and balanced with other
determining physical security needs. Easy to climb Inappropriate to context development objectives.

From the evidence base:

Studies have shown that total


This ornate wall has been specifically designed to provide hostile vehicle mitigation and to
housebreaking crime fell by 60% in match the context of the surrounding environment (London, UK)
residential areas that have fitted secure
doors and windows to houses and
apartments.
P6B Integrate physical
security to result in
Teedon, P et al (2010) “Evaluating Secured by
Design door and window installations: effects
design quality
on residential crime” Crime Prevention and
Community Safety, Vol. 12, 4, 246–262
Physical security needs to be considered
as part of the Integrated Development
Process (IDP) (Chapter 3) to result in fit-for-
purpose solutions. Innovation should be used
to ensure the delivery of design quality,
to seek ‘dual purpose’ installations and
cost effective physical security.

Natural and built physical security elements


such as ditches, walls and gates can be
used to meet other development objectives
e.g. privacy, sound attenuation; as well as
A combination of natural and built physical security measures to achieve
Caption to be inserted performing a safety and security function.
An ineffective vehicle access control point that is easily circumvented hostile vehicle mitigation (Melbourne, Australia)

58 2. Abu Dhabi Safety and Security Planning and Design Principles 2. Abu Dhabi Safety and Security Planning and Design Principles 59
P6C Physical security must
be part of a balanced
security programme

Physical and technical and operational


security should be integrated to offer
defence in depth.

Security should be integrated into the landscape design and grounds


maintenance strategy

P6D Both natural and built


physical security
elements can be used
to reduce safety and
security risks Checklist:
• Has a risk assessment informed planning
Natural elements, such as topographic decisions on physical security?
features, can be used for physical security. • Is there an appropriate emphasis on
These elements can be enhanced or physical security?
combined with built elements if they do not
meet the operational requirement. • Are physical security components
fit-for-purpose?
Built physical elements must be tested
• Is the physical security plan consistent
and certified to ensure they meet the
with the wider protective security
security function.
assumptions?
• Are security measures in keeping with the
wider built environment?
• Is access and connectivity balanced with
physical security?
• Is access maintained for emergency
Water features can be used as a natural barrier vehicles?

60 2. Abu Dhabi Safety and Security Planning and Design Principles 2. Abu Dhabi Safety and Security Planning and Design Principles 61
P7 Ownership
Public Image
Safe and secure places are well
maintained and managed, and promote
P7A Promote a sense of
place and the legitimate
a positive public image use of space

Safety and security can be


compromised if: If a place has its own identity, its community
will feel a sense of place. This promotes
ownership over space, encourages legitimate
• There is no sense of place;
use and deters offenders.
• Places are untidy or unattractive;
• People think that they can commit offences
with little risk of people caring;
• Signs of disorder and neglect are not
dealt with at the earliest opportunity;
A vacant site left in a poor condition Evidence of neglect and poor maintenance
• Management and maintenance is not
considered during planning and design; and
• Vacant or disused plots are left
in poor condition.

A well designed pedestrian route helps to establish a sense of place


From the evidence base:

Several empirical studies have shown that


the presence of disorder such as vandalism,
rubbish or graffiti leads directly to more
inappropriate behaviour. These studies
support the broken windows theory, which
states that “if a window in a building is
broken or left unrepaired, all the rest of
the windows will soon be broken…One
unrepaired broken window is a signal that
no one cares…Untended property becomes
fair game”.

Wilson, J.Q. and Kelling, G.L. (1982) “The


Police and Neighbourhood Safety”, The
Atlantic Monthly

A neglected space receives little attention and detracts from a sense of place
Unattractive and neglected spaces present a poor public image

62 2. Abu Dhabi Safety and Security Planning and Design Principles 2. Abu Dhabi Safety and Security Planning and Design Principles 63
P7B Plan and design with
management and
P7C Hold owners responsible
for managing and
maintenance in mind maintaining their plots

A place that appears to be abandoned or Whether a plot is vacant because development


uncared for will signal to offenders that has not yet commenced, construction is
their actions are likely to go unnoticed and underway or is awaiting clearance, a plot must be
unchallenged. This can even promote crime managed and maintained by its owner to avoid
and discourage the intended use of a space. misuse and criminal behaviour on private land.

Decisions taken during the planning and Due to the pace of development in Abu
design stages to create quality spaces that Dhabi, both the Government and plot owners
are easy to manage and maintain will have shall work together to ensure appropriate
a positive impact on safety and security development phasing and plot allocations.
and lead to sustainable communities.
Management and maintenance of vacant
plots, construction and demolition sites offers
Environmental, Health & Safety benefits as well
as a reduction in crime and inappropriate use
of space.

Checklist:
• Does the development have its own sense
of identity?
• Can design quality be demonstrated?
• Is it easy to maintain high standards
of upkeep?
• Are non-occupied plots well maintained
and secure?
• Does a phasing strategy avoid vacant plots
that may become problematic?

A highly maintained landscape sends out a positive message and pleasant


street environment in Ruwais Places neglected by owners often suffer from crime and misuse

64 2. Abu Dhabi Safety and Security Planning and Design Principles 2. Abu Dhabi Safety and Security Planning and Design Principles 65
P8 Ownership
Adaptability
Safe and secure places are
adaptable to change
P8A Plan for changes in
owner, occupiers
and users

Safety and security can be


compromised if: Significant changes in use or the users of
space can be associated with changes in
safety and security risks. The Principles
• Places cannot respond to changes in
should be adopted even where initially risk
use or users;
may be seen as low.
• Places do not respond to changing threats;
• Places cannot respond to special events;
• There is no planning for incident
management; and
Caption
Temporaryto be inserted
protection measures compromise public image and can degrade functionality
• Places cannot adapt to different modes
of operations.

From the evidence base:

CONTEST, the UK counter-terrorism


strategy, places changing threats and
responses to them at its heart. The 2011
updated strategy commences by reviewing
how threats have changed in the previous
years. It continues to outline how
strategies have been altered in response. It
The planning and design of this building has enabled both commercial and Government use
also explains how counter-terrorism efforts
are responding to specific major events,
most notably the Olympic Games.
P8B Plan for changes in threat

Criminals are constantly evolving their


tactics, weapons, tools and targets. The
challenge for planners and designers is
to systematically anticipate, identify and
prepare for these changes before they occur.
Caption to be
Temporary inserted measures compromise public image and can degrade functionality
protection

Effective adaptable measures to control access of vehicles (Downing Street, London, UK)

66 2. Abu Dhabi Safety and Security Planning and Design Principles 2. Abu Dhabi Safety and Security Planning and Design Principles 67
P8C Plan for special events

Safety and security plans should be able to


accommodate special events, such as visits
by VIPs and crowded places associated with
celebrations.

Temporary safety and security elements may


be introduced if they are readily available,
there is space for their deployment and they
can be integrated within an existing safety
and security programme.

Temporary security measures for a special event held in Abu Dhabi

P8D Plan for all modes


of operation

In many developments there are changes in


safety and security needs at different times
of the day, month or year. In some places
these changes may be subtle, while for
certain uses there are clear differences in the
safety and security requirements between
working hours and out-of-hours operations.

At certain places, typically at crowded


places such as public plazas, shopping malls,
stadia and public transport facilities, there
are extremes of activity and calm.

A good safety and security plan will adapt


to each mode of operation.

Safety and security responses should be ‘scalable’ Increased level of security during a special event

68 2. Abu Dhabi Safety and Security Planning and Design Principles 2. Abu Dhabi Safety and Security Planning and Design Principles 69
P8E Plan for incident
management as well
as normal operations

Additional pressure will be placed on


management systems in an emergency
situation. A good safety and security plan
will incorporate elements that support
effective operations and the work of the
emergency services such as the Abu Dhabi
Police and Civil Defence.

Basic utilities such as electrical power,


water and communications become even
more important in an emergency situation.
Open space can be put to very good
use during an emergency, such as
decontamination areas, assembly points
and for evidence collection.

Checklist:
• Have changes in use or users been
considered during planning and design?
• Have attempts been made to anticipate and
plan for changing threats?
• Can the development accommodate special
events?
• Does the safety and security plan respond to
changing levels and types of activity?
• Is there space, facilities and infrastructure for
use in an emergency situation?

A fire at Al Raha Gardens, Abu Dhabi

70 2. Abu Dhabi Safety and Security Planning and Design Principles 2. Abu Dhabi Safety and Security Planning and Design Principles 71
3
Safety and Security within an
Integrated Development Process

Secure communities
Introduction
This Chapter outlines:
The purpose of this Chapter
is to describe how the • How safety and security fits into the existing
development process; and

Manual will be integrated and • Who will be involved, when they will be
involved and their roles and responsibilities.
implemented within the existing The Integrated Development Process (IDP)
planning and design framework aims to ensure that the right people are
involved in projects at the right time. This
of the Emirate of Abu Dhabi. will facilitate:

• The development of appropriate and


proportionate safety and security solutions;
• Safety and security solutions that are
balanced with other Vision 2030 planning
objectives; and
“Thankfully, safety • Innovation and collaboration between
and security measures are developers and the Government.

rarely called upon. However,


this can often lead to planners Decision Support Tool
and designers underestimating The Decision Support Tool (DST) has been prepared for developers. The
their importance” DST can be used at pre-planning to gain an appreciation of how much
influence safety and security may have during planning and design.
The DST is available online. Visit www.upc.gov.ae for more details.
DST Outputs:

“It is rarely possible or cost effective to ‘High Priority’ ‘Low Priority’


implement every security countermeasure Safety and security is likely Safety & security is important,
for every conceivable scenario. However to influence spatial use, but is unlikely to have
spatial layouts and spatial significant influence on the
integrating security throughout the planning design. Government safety development proposals.
and design process enables the project team and security advisors will
be involved in the decision
to strike a responsible balance between the making on the project.
level of risk, available resources and
appropriate mitigation measures”

74 3. Safety and Security within an Integrated Development Process 3. Safety and Security within an Integrated Development Process 75
Overview

Integrated Development Project Scheduling Planning for


Process Stages The aim of the Manual is to encourage the development
community to consider safety and security early in the
Safety and Security:
There are several sequential stages within the normal
development process, each building on the foundations of
development process so that planning can be used to
reduce safety and security risks.
A Balancing Act
the previous stages. Safety and security must be part of There are few organisations that have the resources or
this process and balanced with other objectives. Commencing design, in parallel with planning or prior to mandate to mitigate every plausible threat scenario.
planning, clearly runs contrary to this aspiration and greatly
At each stage there will be inputs, tasks and deliverables reduces the opportunities for innovative, cost effective The Manual’s Principles and process are based upon the
that are performed to meet the safety and security planning solutions. Scheduling this way is likely to push principles of risk management. The highest risks should
objectives of the project. The four stages of an Integrated safety and security solutions further along the development be tackled first, as the sooner the intervention, the bigger
Development Process are shown below. process, resulting in greater emphasis on design solutions, the impact on reducing risk and the lower the impact on
or if not possible, placing a heavier reliance on operations design quality and cost.
security. Residual risk is likely to be higher, assurance levels
are likely to be lower and aesthetic compatibility is likely to Invariably this involves compromise which will need to be
be reduced. For High Priority Projects this may be deemed clearly identified, understood and recorded. The level of
unacceptable. risk also sets the level of compromise possible with regard
to the specific safety and security requirement. For higher
risk projects, the security requirement will not change,
Planning however there should always be sensible discussion and
agreement on how much protection is to be afforded and
Design flexibility on how that protection level is to be achieved.

SSPM Decision

Occupation Certificate
SSPM Planning Toolkit SSPM Design Toolkit
Support Tool (DST)
Planning Approval

Building Permit

Planning

Construction,
Pre-Planning Planning Design Commissioning Design
Stage 1 Stage 2 Stage 3 and Operations
Stage 4

Planning

Design

76 3. Safety and Security within an Integrated Development Process 3. Safety and Security within an Integrated Development Process 77
Stage 1: Pre-Planning
This tool is not intended to be a substitute for
This stage focuses on setting up a development specific safety and security
Pre-Planning Summary Sheet
risk assessment undertaken by a specialist,
the project and identifying the but its output will help to determine whether
High Priority and Low Priority Projects
safety and security should be a high or low
right people for the project team. priority for the project team. Input

If specialist safety and security ‘Low Priority’ • Project brief


• Planning policy and guidance documents
input is required, then it is at this If the DST identifies the project as low
priority, the project team will be required • Abu Dhabi Safety and Security Planning Manual

stage that the expertise should be during later planning and design approvals
to demonstrate that the Manual’s Principles
identified and sourced. have been implemented. The project team
will not be expected to have appointed a
Task

specialist, although they may wish to do so if • Read the SSPM


the project team is unfamiliar with safety and
• Use the Decision Support Tool (DST) to gain an understanding
security planning and design.
Whether or not specialist input is of the importance of safety and security during planning
required will depend on the complexity ‘High Priority’
of the development project. Clearly, each
project is different, with proposed land If, either the DST indicates safety and
use, development location and scale of security to be a high priority, or the project Output/ Deliverables
development determining safety and security brief incorporates specific safety and security
needs. In addition, stakeholder and regulatory objectives, the developer should seek to • Appointment of a safety and security consultant (if specialist
requirements should be fully understood and appoint a safety and security specialist (See support is required)
documented at this stage. ‘Getting the Right Advice’).

The Manual should be read and understood Projects identified as ‘High Priority’ must
and in particular, the function and application undertake a comprehensive, development
of the Decision Support Tool (DST). specific safety and security risk assessment.
Projects identified as having business or
organisation specific risks may also want Checklist
to undertake a development specific risk 1. Do you understand the SSPM Principles?
assessment (which will be much more 2. Have you used the Decision Support Tool?
comprehensive than the output of the DST).
3. Do you need a specialist as part of your project team?
The Government is only concerned with 4. Do you know what you have to submit for safety and security
protecting the public interest and it may be as part of the Planning Submission?
necessary to consider corporate level safety
and security risks. The DST cannot take
this into account and if unsure, always seek
advice and consult the project owner.
SSPM Decision Support Tool

78 3. Safety and Security within an Integrated Development Process 3. Safety and Security within an Integrated Development Process 79
Stage 2: Planning
Initially, a project will be assessed by the
Within the context of Abu Dhabi, whole project team, whereby various
disciplines seek to analyse the existing site
‘Planning’ covers all those and its context. The project team will identify,
explore and evaluate a number of planning
aspects of planning and design options to ensure that the right concept is
selected for further development. The
that lead the project towards Planning Toolkit (Chapter 4) outlines a series
of planning tools that can be used in Abu
a detailed planning approval. After Dhabi to reduce safety and security risks.

planning approval, the project From the selection of the preferred concept,
the project team moves forward to detailed
will be developed to obtain a planning, which requires a holistic approach
to realising the project’s safety and security
building permit. objectives.

Low Priority Projects

Once confirmation has been received that


a project is Low Priority, the project team
should address the Principles (Chapter 2)
alongside other planning objectives. There
Crowded Places Collaboration is no specific safety and security deliverable
for inclusion in the Planning Submission, but
Crowded places are locations where the public can gain Team collaboration is best achieved through the development review officer at the UPC
access and, by their nature, attract high crowd densities. structured workshops that recognise the or Municipality will assess compliance of
Examples include but are not limited to, shopping malls, importance of safety and security. IDP records all planning policy and guidelines, including
stadia, hotels and transport premises. Unfortunately, should be kept as evidence of this effort. the SSPM, in their review of the Planning
evidence from around the world shows that these locations Submission.
are often targeted by terrorists. As such, developers of these
projects will be expected to pay particular attention to safety
and security and these projects will often require specialist
input and review.

80 3. Safety and Security within an Integrated Development Process 3. Safety and Security within an Integrated Development Process 81
High Priority Projects At this point the brief will be in place and Risks associated with concept plans
the safety and security specialist, as an
Deliverable 1:
For the safety and security specialist, this integrated member of the project team, Risk Summary Graphic
is perhaps the most important stage in will participate and lead workshops (as 1
influencing the strategic outcome of the necessary), to find innovative and appropriate Risk 1:
project. Good communication and information planning solutions. Invariably, this will involve vehicle-borne explosive attack on building
sharing will remain of paramount importance compromise between the needs of safety
throughout. and security and other planning objectives. • No hostile vehicle mitigation treatment –
vehicles can drive up to the building on all sides
It is at this stage that the specialist will Once planning objectives have been balanced, • No stand-off distance between building and
interface for the first time formally, with a set of Safety and Security Plans should be vehicular circulation areas
3
Government safety and security advisors as produced to demonstrate how safety and • Uncontrolled/unscreened access
part of the development review process. Initial security will be achieved for the project. 1 • Parking and deliveries under the building
discussions will focus on the project-specific The deliverables for the Planning • U-shaped building would worsen impact
safety and security risk assessment. The Submission include: of a blast
risk assessment, discussed in more detail in
Appendix 1, should result in a Risk Summary Deliverable 1:
Graphic that identifies the key risks to the Risk Summary Graphic 1 2
project. A typical example is shown (opposite), Risk 2:
and consists of marked up plans identifying Deliverable 2: 2 person-borne explosive attack
vulnerabilities, site constraints Access and Circulation Zoning Plan on building
and critical areas. 4 3 1 • Free, unscreened access to site and building
Deliverable 3:
Following the consultation, the project safety Safety and Security Plan
and security brief can be developed and 3
recorded. This document sets out safety and An illustrative set of deliverables are shown Risk 3:
security priorities to be addressed during on the following pages. crime against person in public realm
3 4
the remainder of the project development • No features to encourage activity for natural
process. This should include any regulatory Elements shown in the Safety and Security surveillance
requirements, best practice (local, regional Plans must be fully integrated with the • Poor private / public space definition
and international) and any requirement remainder of the Planning Submission. For
stemming from the owners project brief. It example, elements relating to access and
is important for this stakeholder group to connectivity should be captured within the
4
reach consensus on the focus for safety and associated transportation plans, while urban Risk 4:
security and appropriate levels of protection. design and Estidama proposals should be inappropriate behaviour and damage
How well the project team address these consistent with the Safety and Security Plans. Catastrophic Risk1 • No distinction between public
priorities through planning and design will If this is not clearly evidenced in the Planning Major Risk2 and private space
be evaluated using the safety and security Submission, the Government safety and • No features to encourage activity for natural
Moderate

Consequence
components of the Planning Submission and security advisor may request IDP records and surveillance
the Building Permit Submission. to see the project safety and security brief. Minor Risk3 Risk4 • No sense of identity
Insignificant

Rare Unlikely Credible Likely Certain

Likelihood

This risk matrix gives a representation of the identified


safety and security risks to inform prioritisation.

82 3. Safety and Security within an Integrated Development Process 3. Safety and Security within an Integrated Development Process 83
Deliverable 2: Deliverable 3: Planning tools used to reduce risks

Access and Circulation Zoning Plan Safety and Security Plans •1 Building located at centre of site to increase
stand-off and reduce impact of security
Submitted as part of the Planning Submission for measures in public zone
High Priority Projects.
•2 Secure perimeter treatment

•3 Building shaped to dissipate energy


from blast
18
17 •4 Stand-off distance (min 30m), also serves as
17 gardens for site staff and visitors
15 4
•5 Raised podium for vehicle access control
2 16
3 •6 Critical infrastructure and connection within
1 the site secure perimeter
5
14
•7 Planting and shading to encourage appropriate
13 12 9 activity in public areas

VC 9
•8 Pedestrian access control, just two entry points
7

6 8
•9 Direct route funnels users to single building
VS+V entrance
11 10 8

• Controlled parking, outside HVM line


10

V Auth • Vehicle access control with HVM measures,


11
PACP single entry point at secure perimeter site
Catastrophic

Major Risk1 • Drop-off area for VIPs only


12
VACP PACP
Moderate Risk2 • Indirect vehicle approach to building

Consequence
13

Minor Risk3
• Pedestrian access control and screening to
14
Insignificant Risk4 building entrance
Rare Unlikely Credible Likely Certain
• Clear sight lines to aid surveillance
15
Restricted zone VACP = Vehicle Access Control Point Likelihood
Private zone PACP = Pedestrian Access Control Point • Infrastructure (e.g. HVAC) placed away from
16
Semi-private zone V Auth = Vehicles (Authorised) This risk matrix identifies residual risks following the application possible interference
Public zone V S+V = Staff and visitors of planning tools outlined in Chapter 4 of the Manual.
VC = Vehicles (Commercial) • Back-of-house delivery area and screening,
17

linked to building by foot tunnel

• Emergency only access point (HVM line


18

maintained)

84 3. Safety and Security within an Integrated Development Process 3. Safety and Security within an Integrated Development Process 85
Stage 3: Design
The Building Permit process is led by the
Planning Summary Sheet Following detailed planning Municipality: Abu Dhabi, Al Ain or Western
Region. Safety and security review by
Input
approval, the project enters Government advisors (High Priority Projects
only) will be captured as part of the existing
• Project brief the Design Stage, which will review process.


Planning policy and guidance documents (including SSPM)
Site context culminate in a Building Permit During design development, the project
moves towards increased design detail with
• External stakeholders (including Government safety and security advisors for High Priority Projects)
that allows construction work to safety and security elements captured in
architectural design, urban design and system
High Priority Projects Low Priority Projects
commence on the development design solutions. The Design Toolkit (Chapter
5) includes a range of safety and security
Task Task
site. The first design task in any tools that can be considered for use in Abu
Dhabi.
Implement the SSPM Principles
• Multi-disciplinary workshops
Implement the SSPM Principles
project is to ensure that the Low Priority Projects

• External stakeholder meetings detailed planning approval is As with the planning review for Low Priority
• Conduct a project safety and security risk assessment
• Preparation of a project safety and security brief read and understood, so that any Projects, there is no safety and security
specific submission within the Building
• Development of deliverables 1-3, using the Planning Toolkit
• Maintain IDP records of meetings and decisions conditions are addressed during Permit Submission. However, the project
team should be able to demonstrate that
the project design implements the SSPM
Output/ Deliverables Output/ Deliverables design development. Principles alongside other design objectives.

The Municipality development review officer


Planning Submission including: Planning Submission demonstrating will assess compliance with the Principles
• Risk Summary Graphic implementation of the SSPM Principles alongside all design policy and guidelines,
• Access and Circulation Zoning Plan such as the Building Code and Estidama. They
• Safety and Security Plans will seek evidence of implementation and
integration in the construction documentation
Other outputs e.g. drawings and specifications.
• IDP records
• Project safety and security risk assessment
• Project safety and security brief
Value Engineering High Priority Projects

If a project goes through a value engineering exercise The project team will continue in consultation
Checklist Checklist during design, safety and security objectives must still be with Government safety and security
1. Have you appointed your safety and security specialist? 1. Have you implemented the achieved. It is an opportunity to reassess design decisions, advisors. An advisor will provide the project
2. Has the consultant led a series of safety and security focused workshops? SSPM Principles? but this should be done in line with the safety and safety and security specialist with inputs,
3. Do you know the key security risks to be addressed by the project? security risks and objectives. offer advice and conduct a review of the
2. Does your submission show evidence of this?
4. Has the team consulted with a Government safety and security advisor? Building Permit Submission.
5. Does the planning application demonstrate that safety and security risks
have been addressed appropriately?
6. Have safety and security been balanced with other planning objectives?
7. Has the safety and security plan been integrated throughout the
submission application?

86 3. Safety and Security within an Integrated Development Process 3. Safety and Security within an Integrated Development Process 87
The project safety and security specialist The design effort will culminate in a Safety
will need to participate and lead a series of and Security Strategy Report which outlines
workshops to ensure safety and security Operations the balance between physical, systems
design proposals are coordinated with other and operational elements that need to be
project team disciplines. incorporated to meet the project safety and
security design objectives. This report will need
The safety and security specialist will to demonstrate that the key concept of defence
employ a range of design tools from the in depth has been achieved and that the design
Design Toolkit in order to achieve the project solutions are appropriate and commensurate
objectives. They will work holistically with with the project risks. On this basis, the project
other design disciplines to find innovative Physical Systems risk assessment should be updated to identify
solutions. They are likely to provide marked- residual risks following integration of planning and
up drawings and design notes throughout design solutions. The design stage concludes with
Strategy
design development. a Building Permit Submission incorporating those
outputs listed in the Design Summary Sheet.

Strategy Physical

Systems Operations

88 3. Safety and Security within an Integrated Development Process 3. Safety and Security within an Integrated Development Process 89
Stage 4: Construction, Commissioning and Operations
Design Summary Sheet Low Priority Projects

High Priority Projects Low Priority Projects


During construction,
The contractor must work with the architect
the contractor’s role is to build and engineers of record to ensure that any
Input Input proposed variations do not contradict the
what is set out in the Building Principles outlined in the Manual.
• Planning approval (with/without conditions) • Planning approval (with/without conditions)
• Project brief • Project brief Permit. Unanticipated site High Priority Projects
• • Planning policy and guidance documents

Planning policy and guidance documents (including SSPM)
Design advice from Government safety and security advisor (including SSPM) conditions, value engineering It is important at this stage that the safety
and security specialist remains on hand to


Risk Summary Graphic
Safety and security brief or preferred construction deliver support and evaluate any proposed
design changes. This would typically involve


Safety and Security Plans
Access and Circulation Zoning Plan
materials and techniques scrutinising shop drawings to ensure design
compliance and that the original safety and
Task Task can all lead to variations which security objectives are met.



Develop the design to address any planning conditions
Multi-disciplinary workshops
• Develop the design to address any planning
conditions may compromise the safety As in all other stages of the IDP, regular
workshops with the contractor and project


External stakeholder meetings
Develop the design referencing the SSPM Design Toolkit
• Design with the SSPM Principles in mind
and security strategy. team will improve design quality and
implementation of the design.
• Prepare the safety and security element of the Building Permit Submission
Upon completion of the project, there
will be a need to commission safety and
Output/ Deliverables Output/ Deliverables security systems to check that they are
fit-for-purpose. The operator will need to
Building Permit Submission demonstrating implementation Building Permit Submission demonstrating receive all as-built drawings, Operations and
of the SSPM Principles, including: implementation of the SSPM Principles
Information Handover Maintenance (O&M) Manuals and introductory
training to ensure effective operation.
• Risk Summary Report
After significant time and effort has been
• Safety and Security Strategy Report (Concept and detailed design) carried out in planning and designing the
• Design drawings and specifications (Construction documentation) project with safety and security in mind, it is
• IDP Records important that the operator is made aware of:

• Residual safety and security risks; and


Checklist Checklist
• The safety and security features of the
1. Have you addressed the planning conditions (if any)? 1. Have you addressed the planning conditions development.
2. Have you conducted a series of safety and security focused workshops? (if any)?
This will ensure appropriate management
3. Have you consulted with external stakeholders? 2. Does your Building Permit Submission include
and maintenance programmes can be
4. Does your Building Permit Submission include evidence of how the SSPM evidence that the SSPM Principles have been
put in place
Principles and Planning Toolkit and Design Toolkit have been implemented? implemented?
5. Is safety and security balanced with other design objectives?
6. Is safety and security integrated as part of the overall design?
7. Does your safety and security strategy have an appropriate balance
between physical, systems and operational security elements?

90 3. Safety and Security within an Integrated Development Process 3. Safety and Security within an Integrated Development Process 91
Getting the Right Advice
Construction, Commissioning and Operations Summary Sheet
High Priority Projects Low Priority
It is now necessary for all Seasoned, multidisciplinary expertise
is critical for fostering innovation. Well
informed project teams develop strategies

Input Input
developers to consider safety that successfully integrate safety and
security with planning, architectural and site
and security as part of the design and work well with operations and
• Building Permit (with construction drawings • Building Permit (with construction drawings maintenance programmes. Team members
and Specifications) and Specifications) development process and for who are aware of the latest techniques can
take advantage of opportunities during the
• Safety and Security Strategy Report
• Risk Summary Report (updated) some projects, this will require early planning and design stages to innovate
and explore new concepts.
the appointment of specialists. Project managers should expect and require
Task Task
that specialists and stakeholders actively
“The best collaboration occurs contribute to planning and design workshops/
• Ensure ‘as-built’ condition conforms to Building Permit • Ensure ‘as built’ conforms to Building Permit meetings and provide deliverables that
• Check any on-site led deviations do not diminish safety and security • Check any on-site led deviations do not early in the project, when facilitate decision making as early as possible
objectives diminish safety and security objectives
• Commission systems • Commission systems
planners, designers and safety in the IDP.

• Prepare O&M manuals for ‘as built’ • Prepare O&M manuals for ‘as built’ and security specialists sit Safety and security specialists within a
• Prepare update Risk Summary Report (if required) down together to consider project team must collaborate with planners
• Prepare update Safety and Security Strategy Report (if required) and other design disciplines in order to:
the problem”
Output/ Deliverables Output/ Deliverables • Identify and determine which safety and
security risks should be addressed;
• ‘As-Built’ drawings • ‘As-Built’ drawings
• O&M manuals • O&Ms manuals • Develop strategies to manage those risks; and
• Commissioning certificates • Commissioning certificates • Create an effective planning and design
• Updated Risk Summary Report (if required) solution that balances safety and security with
• Updated Safety and Security Strategy Report (if required) project budget and client vision.

Checklist
1. Does the contractor have a copy of the safety and security information included in the Building Permit approval?
2. Does the contractor understand the safety and security requirements?
3. Has the construction deviated from the Building Permit design?
4. Has the project safety and security brief been achieved?
5. Has evidence of installation been provided to the future operator?
6. Are the safety and security measures ‘fit-for-purpose’?
7. Are the safety and security systems managed, operated and maintained appropriately?

92 3. Safety and Security within an Integrated Development Process 3. Safety and Security within an Integrated Development Process 93
Roles and Responsibilities Selection of Safety and
Security Specialists

Although the planning and design community


Safety and security roles and responsibilities Planners & Designers has focused on safety and security for many
need to be assigned as follows: years, there remains a limited number
• Develop a holistic project plan and design
of completed projects that illustrate best
• Work closely with safety and security practice. As a result, most companies do
specialists to create flexible alternatives and not have the background needed to lead
innovative solutions successful, well-balanced projects.
Project leaders must be selective to ensure
If a realistic budget or integrated process • Support collaborative teamwork that the chosen consultants possess the
are not in place early in the project, right expertise.
Client/Owners
then the opportunities for creativity and The level of involvement of each safety and
• Support a long term strategy and
innovation are severely restricted. comprehensive site design for the project security specialist will vary, depending on the
type of project and the stage of the IDP. The
• Support long term management and chart on the following page outlines specific
maintenance safety and security roles and responsibilities
• Advocates realistic and innovative at each stage in the IDP.
solutions that serve the property and the
neighbourhood In reality, a group of specialists may work
Project Manager together throughout the planning and
• Selects safety and security specialists with • Shares expertise on the detailed operation and design process to provide the highlighted
sufficient and relevant expertise everyday functionality of the building and site deliverables. For example, it is appropriate for
an engineer to be involved in early design to
• Sets realistic budget and schedules Safety & Security Specialists ensure that the safety and security strategy
(incorporating safety and security) is achievable in engineering terms; equally
• Conduct a site specific risk assessment
• Is practical about managing risk it is important for a strategist to review the
• Support development of innovative solutions engineering designs to ensure the integrity of
• Supports collaboration the strategy has been maintained.
• Collaborate with other stakeholders
• Understands the opportunities and and disciplines
orchestrates the team to achieve a holistic
solution • Seek and implement creative and flexible
safety and security measures
• Leads the team to innovative and successful
solutions • Advise on the balance between safety and
security assurance, the level of risk and cost

94 3. Safety and Security within an Integrated Development Process 3. Safety and Security within an Integrated Development Process 95
In general, most safety and security A Government safety and security advisor
Specific Safety and Security
specialists are likely to be sourced from can provide further guidance if required.
Roles and Responsibilities consultancy practices with relevant
experience of the development process and Institute Memberships & Vocational
Responsibilities
the built environment. Qualifications
Roles
These split into the following general Selecting specialists that are registered with
IDP Stage Tasks Outputs / Deliverables categories: independent institutions or professional
associations will provide confidence that
Conduct a safety and security Risk Summary Graphic • Specific safety and security risk the consultant is involved in continuous
Risk Analyst Planning
risk assessment consultancy practices; professional development activities and
up-to-date with developments and advances
• Management consultancy practices with an in safety and security.
in-house safety and security capability; and
Design Update the safety and security Risk Summary Report
• Architectural and engineering consultancy
risk assessment practices with an in-house safety and security
capability or appreciation.

Safety and Planning Formally captures any Safety and Security Plans In the future, Abu Dhabi will be considering
Security Strategist stakeholder requirements the introduction of a system that will enable
(including Government agencies) Access and Circulation developers to better source and guarantee
Zoning Plan the level of service provided by consultancy
Conducts benchmarking research companies working in the safety and security
Project safety and industry. This will involve benchmarking
Develops a project safety and
security brief against systems employed internationally
security brief
and regionally to determine what is most
Application of the Planning Toolkit IDP records appropriate for Abu Dhabi. However until
that system is developed, project managers
Explore a range of solutions should look at the knowledge, expertise,
which meet the brief qualifications and relevant experience of
potential candidates to ensure that they are
Develop the Safety and capable of fulfilling the role required.
Security Plans
It is recommended that anyone requiring
safety and security specialist services obtains
Design Application of the Design Toolkit Safety and Security
to develop a holistic strategy Strategy Report the Curriculum Vitae for each specialist to
ascertain their relevant level of expertise and
IDP records competency; this should be verified against
references where possible.

Security Engineer Design Implementation of the strategy Specifications


through engineering solutions
Design drawings

Construction documentation

96 3. Safety and Security within an Integrated Development Process 3. Safety and Security within an Integrated Development Process 97
4
Planning Toolkit

Secure communities
Introduction
Chapter 4 presents a Private and Public Navigating the Planning Toolkit There are ten planning tools provided in the Planning Toolkit. They are:
Ownership
series of planning tools
that may be used to Planners designate space for different uses.
These spaces within the built environment
implement Community are either public, such as parks and streets,
or private land which is defined by a
PT1 Site Selection

Safety & Protective development plot. These two zones preserve


land ownership rights and define roles and
This tool highlights the importance of
selecting the right use for the right place.
Security in a development responsibilities for planning, designing,
managing and maintaining space. A good
It deals with land use compatibility, scale
of development and how to deal with
PT7 Infrastructure Planning

project. The guidance planner will ensure design integration


between public and private spaces while
constrained sites where, because of gifting or
competing development objectives, it is not
PT8 Topography
PT9 Building Orientation & Shape
contained here will assist maintaining a clear distinction between the
two. The assumption made in the 2030 Plans
possible to develop at a different location.
Tools PT7 – PT9 deal with other safety
is that as much space as is practically feasible
developers and owners will be public. & security planning requirements that will
likely influence space allocation and site
to implement the Abu This public and private land (development
plots) can be viewed as a series of spatial
spatial planning.

Dhabi Safety and Security layers, as shown in the figure below.

Planning and Design PT2 Access & Circulation Routes


Principles presented in Asset Building Plot District PT3 Vehicle Access Control

Chapter 2. PT4 Pedestrian Access Control


PT5 Service Access Control PT10 Development Delivery
Facade Plot Boundary
PT6 Parking Placement
Tool PT10 highlights how important it is
The Planning Toolkit includes international best
to consider development phasing at the
practice, examples of innovation and draws on Tools PT2-PT6 are all directly related to a
project planning stage, particularly for
good existing examples from around the Emirate project’s movement framework. High Priority
larger developments where there is
of Abu Dhabi. Decisions relating to what planning Projects tend to require increased levels
likely to be partial occupation before
tools need to be applied and to what extent they of access control and physical security to
a development is complete.
are applied, are to be made as part of the Integrated mitigate security risks. This requirement
Development Process (Chapter 3). can influence spatial layout and, if these
tools are ignored or not used correctly, can
It is important to be familiar with these layers as they
The Safety & Security Plans submitted as part of the have a significant impact on the movement
are used throughout the remainder of the Planning
planning application for High Priority Projects should of people, vehicles and services at a
and Design Toolkits to highlight where spatially, the
demonstrate an integrated design solution and development.
guidance presented in each tool can be applied. Equally
highlight the planning tools that have been adopted important, the plot boundary is usually the constraint
by the project. on where it is possible to implement access control
and physical security for a project. That is unless
an agreement is reached that allows the sharing of
security measures with neighbouring plots or the
placement of security measures outside the
100 4. Planning Toolkit 4. Planning Toolkit 101
plot boundary.
A useful concept for all those involved in Defence in Depth Access Control Zoning The simplistic spatial model on the previous In this common scenario it is necessary
developing High Priority Projects is ‘defence in page does not address how to achieve defence to introduce a more sophisticated access
depth’. This describes how obstacles can be in depth where there are multiple user groups control model to define the level of access
arranged in multiple layers to make it harder who have different access rights to spaces, or control for different spaces within a
for a criminal or attacker to reach a target. At how to deal with access control where there development plot (private space).
each transition between spaces, there is an are multiple dispersed assets to be protected
opportunity to establish a layer of security and i.e. a single set of layers cannot be defined.
implement access control. A safety and security
specialist can use these layers to deter, delay,
detect or deny intruders.
Access control zoning involves the following stages:
The level of protection afforded is only as
effective as its weakest link. Therefore, care 1) Defining a series of zones with differing degrees of access control
must be taken to ensure the layers of protection
are balanced. The time to penetrate a layer Zone Description & Examples
and the probability of detection should remain
constant; equally the transition or access control
process at each point between layers should be Public Public zones are normally accessible to everyone Examples: Sidewalks, pavements, roadways,
at all times with no automatic ability to impose pedestrian links and tram ways.
consistent. No matter how many layers are in
access control measures.
place or how well constructed they are, they are
unlikely to be one hundred percent effective for Semi-public Access to these areas is typically restricted outside Examples: Retail, hotel lobbies, restaurants,
one hundred percent of the time. normal business hours. Visitors are considered guests bank lobbies, community facilities and
of the facility and their access may be limited at public transit facilities (prior to ticket line).
Best practice dictates that the higher the risk, any time. For example, a retail mall is open to the
the more layers are required and the more public during normal operating hours. The mall may
robust each layer should be. A traditional example of defence in depth (Edinburgh Castle, UK) choose to restrict access to some individuals or
choose to close at any time.

Increasing access control


Urban Context Open Site
Semi-private Semi-private areas are predominantly for the use of Examples: Sports events with accreditation
a limited, authorised population. Visitors may enter, checks on entry, office buildings, bank service
Private Public Realm Private Public Realm but are either invited or screened prior to entry. areas, hotel guest areas and public transit facilities
Semi-private facilities usually employ electronic or (beyond ticket line).
procedural access control measures that limit free
public access to a lobby or reception area.
Asset Building Plot District Asset Building Plot District Private Private areas are limited to access by authorised Examples: Individual residences, internal offices
individuals and their guests. In commercial and executive parking.
environments, guests are normally escorted within
private areas.

Facade Plot Boundary Facade Plot Boundary Restricted Restricted areas are private areas that contain Examples: Data centres, IT rooms, security command
critical, essential or sensitive assets or are areas centres, bank interiors and essential and critical
Only two layers of defence are afforded at the building facade Here it has been possible to implement access control at the reserved for very exclusive groups (VIP). Access infrastructure facilities.
and asset level development boundary, again at the building facade and again is usually limited to a very small group of people
at the asset within an organisation. Access control measures to
these areas may include biometrics, access token,
etc. Guests are allowed entry but are always screened
and escorted.

102 4. Planning Toolkit 4. Planning Toolkit 103


2) Locating assets that Case Study -
need protecting within an Mixed-use Development
appropriate zone category
In this virtual example, the
Cash vault
access control zones show
3) Organising the zones in Offices
that there are different access
layers where practical
control requirements for the
office, public plaza and
a) The layers should be
commercial areas. The office
organised so there is
Cash vault space is semi-private in the day
increasing access control
and restricted at night, while
the plaza remains publicly
b) Wherever possible, avoid
accessible 24 hours a day. Bureau de Retail
placing zones with extremes
change
of access control adjacent Cash vault located in restricted area Cash vault located in public zone
One of the retail units operates
to one another e.g. public next
24 hours a day, while access is
to restricted
to be restricted to the other, a
bureau de change, out of hours. Office hours Night hours
4) Determining which users 08.00 - 18.00 18.00 - 08.00
have access rights to these
spaces and when they can
have access Two years later, a Federal
Government Agency moves
into the development and this
This effort will require a changes the access control
safety & security specialist requirements. The previously
to work with the project public zone spaces surrounding Government
team and mark up plans and offices
the offices must be restricted
general arrangement drawings. for security reasons. Initially,
This collaborative approach An open site where layering has been achieved An urban site where layering has been achieved the Government Agency
will avoid spatial conflicts, wanted the public plaza to be
maximise opportunities to restricted access 24 hours a
Restricted zone Semi-public zone
achieve defence in depth and day. However, a compromise
Private zone Public zone
forms the basis of an effective was achieved to allow the plaza
Semi-private zone Bureau de
access control strategy. to remain a public zone during Retail
change
office hours, allowing access
to the commercial facilities.
This required minor design
modifications to the ground
floor areas of the office block. Office hours Night hours
This is a good example of the 08.00 - 18.00 18.00 - 08.00
need for adaptability and the
balancing of objectives between
safety and security and other Restricted zone Semi-public zone
development objectives. Private zone Public zone
Semi-private zone

104 4. Planning Toolkit 4. Planning Toolkit 105


PT1 Site Selection
Introduction demands, Estidama principles and of course, Land use compatibility should be considered at all development scales, whether the project is a master plan involving numerous
safety and security. For obvious reasons, plots, a single plot development, or even when spatially planning a single building within a plot.
project-specific safety and security needs
cannot be taken into account when allocating
The need to develop the right uses in the a permitted land use for a plot. For example, Land use compatibility at different scales
right places, away from conflicting uses, is it may be appropriate for a commercial office
at the heart of good urban planning and is to be located directly adjacent to a hotel
Master Plan It is necessary to consider the relationships between the
equally important for safety and security. If but not for a Government office. In both
types of land use, their locations and their adjacencies to
a development is badly located, community cases, the intended use is office but the
determine if they create any significant safety and security
safety may be negatively affected and it may protective security needs are very different.
vulnerabilities. Particular care is required when considering
be difficult or even impossible to achieve This observation highlights the importance Luxury apartments
the placement of land uses that tend to generate higher levels
effective protective security. Mistakes in of the project owner and their development
of risk e.g. royal palaces, military bases, heavy industry,
choosing the location of a development team working with a Government safety and
hazardous material storage and group labour accommodation.
cannot usually be corrected in design or security advisor to consider whether the
As well as land use, the design of buildings on a plot may also
subsequent operations. proposed development location is appropriate
create vulnerabilities. For example a high rise building such
for their project.
as luxury apartments immediately adjacent to a restricted
Planning Tool 1 (PT1) provides guidance Government building or military camp, may create line
The types of questions that planners Government building
for selecting an appropriate site for a of sight issues. Development controls may be required to
development. should ask when assessing land use
address this type of issue.
compatibility include:
For those developers that are gifted land or
for those with existing plots, the guidance 1. Would the relationship between the project Site The same principles also apply at a site level. The
contained here can be used to identify and the community increase safety and placement of buildings and their functions should enable
possible vulnerabilities that may need to be security requirements? effective site-level zoning. In this example, the commercial
addressed using other tools in the Planning office, cafe and public transport location are compatible
and Design Toolkits. 2. Could the project introduce uses and users that land uses. Office
will conflict with the existing community?
The challenge is to maximise the safety & 3. Would the level of activity associated with
security advantages that new development the new development be appropriate? Cafe
can bring to a community.
4. Could the project increase the local
community’s exposure to crime and Bus stop
Land Use Compatibility inappropriate behaviour?
5. Could access control be achieved without Building At a building level, as with the site level, spatial use and
disrupting the surrounding community? adjacency must enable effective internal zoning. In this Gym
example, a publicly accessible gymnasium is located on the Residential

The Abu Dhabi Urban Planning Council has top floor alongside residential apartments. This may be more
developed Urban and Regional Structure appropriately located on the ground or first floor, enabling the
b
Framework Plans for each of the three upper floors to remain private. Clu
municipal regions of the Emirate. These ol
ho
Plans, along with supplementary planning Sc
policy and guidance, are used to determine
permitted land use for development plots.
There are many land use dimensions that are
considered in this decision-making process,
including transportation needs, growth

106 4. Planning Toolkit 4. Planning Toolkit 107


Scale Compatibility Case Study -
US Embassy London
Villas
Shopping mall Due to an increased terrorist
If a development project is out of scale with threat, the US Embassy in
the surrounding community uses, it can London needed to introduce
cause nuisance to existing residents and additional physical security.
stimulate the fear of crime. An example is Their constrained plot within
shown opposite. Central London could not
accommodate the new
In a constrained site, it can be difficult measures.
to implement access control and physical
security. Therefore, if a project risk Villas Ultimately this resulted in
assessment identifies security as a high the Embassy moving to an
priority, then it will be important to select alternative plot where
a plot that is sufficiently large to achieve security can be achieved.
defence in depth.

It is important that developers understand the


development constraints on their plot. These
Out of scale facility may cause crime and nuisance for neighbouring residents An insufficient plot means that temporary physical measures have been erected in the public zone
are set out in planning policy and regulations
and should be discussed with the UPC or
the Municipality. For example, it may be Innovation -
possible in some cases to increase building
height in order to decrease the footprint of a
‘Although rare, a project with high Constrained plots
building while maintaining the desired Gross
Floor Area of the project, This may offer
security needs may be required to If a project is constrained
by a small plot and physical
additional space for the introduction of access
control but whether this is permitted will be
develop in an alternative location security and access control
improvements are required, it Development 1 Development 2
dependant on the regulations governing the where there is more space and a secure may be possible to implement
particular plot proposed for development. measures at the district layer.
perimeter can be established’
This involves the use of public
land, and as the existing US
Embassy example shows above,
it is not always feasible to
Public realm Public realm
adopt space to respond to a
changing threat. This will require
innovation, careful consideration
and consultation with
stakeholders. Here, two plots
share an access control point to A shared access control point
facilitate increased stand-off.

108 4. Planning Toolkit 4. Planning Toolkit 109


Dispersed
Balancing Act – To Cluster or
Disperse Buildings?

The pace of development in Abu Dhabi means


that many projects will involve large-scale
master planning and campus developments
where it is possible for safety and security to
influence plot allocations.
Medium risk
One of the required planning decisions will
be whether to cluster or disperse buildings of
similar risk profile. Do you put ‘all your eggs in
one basket’ and protect them well or do you High risk
scatter them to reduce the probability
of attack?
Low risk
A concentration of buildings, physical assets,
people and business operations in one location
creates a target-rich environment for criminals
or terrorists. An attack against one building
is more likely to result in collateral damage
to others and it presents the terrorist with Clustered
multiple targets to attack simultaneously.
However clustering of assets allows for a
‘collective security solution’ that can be more Checklist
concentrated, more efficient and effective;
response should be quicker and costs should
be lower. Also as buildings have similar • Have safety and security needs
security requirements, entry points can been considered in the decision
be minimised and security measures and to develop on this site?
procedures can be more readily standardised. Medium risk • Do safety and security needs
High risk
Clustering of buildings also allows them to suggest that the development
be located further from public space i.e. the would be better located
plot boundary; this should make it easier elsewhere?
to implement defence in depth and help to
maximise stand-off distance. By contrast, • Are neighbouring uses
dispersal across a site (or multiple sites) compatible?
reduces the risk that an attack on any one part Low risk • Does the development
will impact on the others and enables a less
introduce safety and security
obtrusive security profile to be adopted.
risks for neighbours?
Both patterns have compelling strengths
and weaknesses. There is no ‘one size fits • Have buildings been clustered
all’ solution and planners should take advice or dispersed depending on the
from their safety and security specialist and Examples of dispersal approach adopted (top image), safety and security risks?
and a clustered approach (bottom image)
external stakeholders.

110 4. Planning Toolkit 4. Planning Toolkit 111


PT2 Access and Circulation Routes
Introduction
Asset Building Plot District

Principle P1 (Access & Connectivity) requires


connectively to be maximised in projects, subject to
this not compromising safety and security. It also Facade Plot Boundary
highlights the need to plan pedestrian and vehicular
routes with safety and security in mind. This section
of the Planning Toolkit provides implementation There are safety & security advantages of permeable and impermeable structures, these are identified
guidance for urban planners and transport planners. below and should be compared with the findings of the risk assessment.

Safety and security advantages


Access Control - Permeability of well-connected layouts

• Clear views and easy orientation


The project movement framework is used in planning • Easier to bring life to streets and improved
to define how freely vehicles, people and materials natural surveillance
can move into, out of and around a development. If a Permeable block structure suitable for a low risk site
project-specific risk assessment identifies a need to • Local facilities will be more accessible
introduce access control, this requirement should be and so more viable
integrated into the project movement framework. Any
• Better emergency access
access control within the movement framework is
expressed in the degree of connectivity in the layout
of streets and pathways. Where risks dictate that
the number of through routes should be reduced, the
rectilinear block structure prevalent in much of Abu
Dhabi can be easily amended. This is illustrated in
the images (right).
Safety and security advantages of
layouts with fewer connections
Urban Street Planning & Design
• Easier to control access and create
‘defensible space’

The Abu Dhabi Urban Street Design Manual (USDM) • Less chance of opportunistic crime
should be used when designing streets in the Emirate • Activity is directed towards certain routes
of Abu Dhabi. The findings of the SSPM Benchmarking and spaces
Report support its guidance for designing pedestrian
orientated streets, where pedestrians and vehicles share • Fewer escape routes for criminals
streets, rather than isolating pedestrians.
Where risks are higher, permeability may be curtailed by incorporating • Easier to monitor potential offenders
no-through-routes

112 4. Planning Toolkit 4. Planning Toolkit 113


Villa
Pedestrian Route Planning Vehicular Route Planning Even small reductions in speed on the
approach to a target building will significantly
reduce the impact on the building or the
Hostile Vehicle Mitigation barriers installed
Segregated pedestrian-only footpaths and Planners highlight that the most efficient to protect it. This can reduce the design
subways can lead to problems of crime and movement framework will take users on specification and associated cost of the
inappropriate behaviour. Isolation of users the most direct route to their destination. barriers presented in the Design Toolkit
can make them vulnerable, as an offender Destination However, it is sometimes necessary for (Chapter 5).
is less likely to feel they will be seen or safety and security reasons, to use horizontal
caught committing a crime. deflections to limit vehicle speeds in the
Sikka vicinity of buildings deemed to be vulnerable
The movement framework should establish to penetrative vehicle attack. This is
a hierarchy of pedestrian routes and shared discussed in more detail in Planning Tool PT3
spaces. An emphasis should be placed ‘Vehicle Access Control’.
on designing out or removing existing
pedestrian routes, including sikkak, that are
under-used because they do not connect
to a specific destination. These can be Here a Sikka provides a connection to a specific destination
problematic if they allow secluded access to
the rear of plots.

Grade crossing - natural surveillance provided

Subway

The use of subways are a last resort where other planning objectives cannot be met with at-grade crossings

114 4. Planning Toolkit 4. Planning Toolkit 115


Emergency Access & Case Study 1 -
Circulation Routes Emergency Access during Construction Stage - Week 1 Construction Stage - Week 20
Construction

As a result of ongoing
The General Directorate of Abu Dhabi
construction and phased
Civil Defence, in cooperation with the
occupation of a master planned
Municipalities, regulates and enforces
community, emergency access
minimum standards for emergency access.
and circulation routes for Civil
Defence would change on a
These access and circulation standards are
regular basis. Civil Defence were
often more onerous than those for other
called on numerous occasions
vehicles, due to the need for large vehicles
and their response was delayed
to gain access to buildings. Developers are
due to changes in access points,
responsible for addressing these access
new road layouts and a lack of
needs within the project movement
wayfinding signage.
framework plan.

There are two important planning criteria to


be addressed when planning a project that Changes to emergency access and circulation routes may change during construction
has protective security needs: Desert Islands Civil Defence Station, Abu Dhabi effecting emergency response

1. Any proposal to introduce Vehicle Access


Control (refer to PT3 Vehicle Access Control) Case Study 2 –
shall be integrated into the movement Emergency Access
framework to ensure appropriate emergency
access is maintained. A development in Abu Dhabi
had considerable difficulty
2. Minimum access and circulation route obtaining Civil Defence approval
standards may be insufficient to address after proceeding directly to
the project-specific response requirements design without planning for
dictated by the risk assessment. appropriate emergency access
to high rise buildings.

Inappropriate project scheduling


resulted in:
• Additional plot access which
Limited
reduced achievable Gross Floor
access
Area (GFA);
• Impaired emergency response;
and
• Increased infrastructure costs. Inadequate access to high rise waterfront plots Inadequate clearance heights under bridge structures

A vehicle borne improvised explosive device created a large crater at the only entrance to this
embassy compound. This hampered emergency response vehicles attending the incident

116 4. Planning Toolkit 4. Planning Toolkit 117


Vehicle Access Control – Movement Signage & Wayfinding Systems
Framework Integration

If it is necessary to close public streets for A well-planned movement framework will


vehicle access control, which could be avoided create a development that requires few
by selecting an appropriate development wayfinding signs. Signage can supplement
site, the impact of such measures must be cues from the built environment that support
taken into account when testing a project’s wayfinding by pedestrians and drivers.
movement framework. Temporary road
closures introduce significant disruption. Signage should make navigation easy for
They can result in significant transport delays first-time visitors. Signage should be part of
including delaying emergency responders. a hierarchy of wayfinding elements. It should
They are not a sustainable solution and project be consistent, using a unified visual language
teams should collaborate with stakeholders to of fonts, colours, scales and symbology. It is
Access control induced delays at Wembley Stadium, London UK
find aspirational and innovative solutions. good practice to consult with the Municipality
during the development of a wayfinding plan.
The Abu Dhabi Public Realm Design Manual
Case Study – Area with restricted vehicle access
should be referred to, and conformed with, Well planned spaces require few
Canary Wharf, London Vehicle entry if any form of signage is inserted into the wayfinding signs
Warning signage
control public realm.
A vehicle borne terrorist threat from the Anti-ram road blocker

Provisional Irish Republican Army (PIRA) Vehicle boom barrier


against this London financial district led to
Public transport route
the development of a security zone. Checklist
Guard house / check point
Vehicle entry
Neighbouring sites with similar security control Footpath - No vehicle access
needs share vehicle access control and • Do footpaths run alongside streets, as opposed
CCTV monitoring
physical security arrangements. to being segregated?
Planter
• Do segregated paths have a defined function,
This allows security to be ‘scaled-up’ in
such as leading to a specified facility?
response to increased threat. An appropriate
amount of stand-off would not have been • Is the movement framework structured to
possible without a collaborative approach. reduce the risk of vehicle attack of vulnerable
buildings, spaces and assets?
• Have the implications of access control on the
Vehicle entry control remainder of the wider movement framework
been assessed?
• Is access controlled for all people and vehicles
or just some? How will this be achieved?
• Do user groups need to be separated?
• Are the mandatory standards for emergency
Vehicle entry control
access met? Signage should make navigation easy for first time visitors
A plan of Canary Wharf,
London, UK

118 4. Planning Toolkit 4. Planning Toolkit 119


PT3 Vehicle Access Control
Introduction Vehicle Attack Tactics Vehicle Exclusion
or Vehicle Inclusion?

Criminals may use a vehicle to force entry Vehicles may attack a target using one or a From a security perspective, the best way to
into a site, cause malicious damage or as an combination of the following tactics: deal with vehicle attack threats is to exclude
aid in a terrorist attack. These attacks can be vehicles from a site altogether. However, at
sophisticated and past incidents indicate that 1. Parking underneath or next to a building most buildings, especially crowded places,
vehicles are a preferred means for delivering other planning objectives such as access
Improvised Explosive Devices (IEDs) due to 2. Encroachment into a site by bypassing and parking requirements will require
the speeds, manoeuvrability and payloads or breaching access control measures compromise.
offered by vehicles. without force
3. Penetration - using the vehicle to forcibly Total vehicle exclusion is more likely to be
Vehicle access control is used to prevent appropriate and proportionate where the risk
breach access control measures, the site
unauthorised vehicle access and to reduce of a vehicle attack is high. It may be neither
perimeter, or building facade Vehicle exclusion
vulnerabilities to attacks involving vehicles. possible nor necessary to adopt this approach
This section of the Planning Toolkit provides at low risk sites.
guidance for implementing vehicle access Attackers may also resort to the following
control where justified by risk assessment. tactics where access control measures are
Where vehicle inclusion is adopted, access
It highlights a full range of access control installed:
for authorised vehicles, such as the
options, ranging from high to low security. emergency services and approved delivery
It offers innovative ideas for constrained 4. Duress - such as forcing the driver vehicles, will need to be controlled at Vehicle
developments and outlines the additional of a legitimate vehicle to carry an explosive, Access Control Points. Even where the very
benefits of introducing the most aspirational or a guard to grant access, through a vehicle best operational security regime is in place,
form of vehicle access control;‘Total Vehicle access control point a project adopting vehicle inclusion will
Exclusion’. remain vulnerable to attacks using Duress and
5. Deception - such as the use of a Trojan
(disguised) vehicle or cloned ID Deception tactics.

It is important that the threat to a project


is clearly defined and understood. This will
require consultation with stakeholders.

Vehicle inclusion

Asset Building Plot District

Facade Plot Boundary

120 4. Planning Toolkit 4. Planning Toolkit 121


Option 1: + Security –
Stand-off Vehicle Access Control –
Total vehicle exclusion zone
Planning Options

‘Stand-off’ is the distance between a Four vehicle access control planning options
structure and a physical barrier designed to are presented here. They range from an
protect it. If a risk assessment concludes that aspirational vehicle exclusion scheme,
there is a high risk associated with a Vehicle through to a scheme that affords no access
Borne Improvised Explosive Device (VBIED) control. The latter would leave a project
attack, then it is important to use stand-off vulnerable to any form of vehicle attack.
to reduce the impact of an attack. This is best
achieved at the planning stage of a project. It is important to remember that even if a HVM
Asset
risk assessment identifies a low risk for this
In new developments, if the right site has type of attack at present, changes in threat,
Maximum protection from
been selected, it should be possible to occupiers, and special events may warrant
vehicle-borne attack and can
introduce adequate blast stand-off distance protection in the future. Planners should Stand-off
make for welcoming pedestrian
or enhance the structural design of a building consider future adaptability.
environment. A good example is
to make it more resilient to blast loading Plot boundary
the Washington Monument (USA)
(See Chapter 5 – Design Toolkit). Whichever of the options is adopted, there
pictured above
is a need to integrate emergency access
and circulation routes in accordance with
minimum standards.

Option 2: + Security –
Asset vehicle exclusion

EVERY METRE Continuous


HVM Line

MATTERS Parking Asset

HVM
Parking

Continuous Stand-off
10m 20m 30m 40m HVM Line

Plot boundary
Stand off
Excellent protection from
vehicle-borne attack, and other
forms of attack
122 4. Planning Toolkit 4. Planning Toolkit 123
Option 3: + Security –
Vehicle inclusion

Asset Parking
HVM

Access is possible using vehicle stand off


attack tactics 4 and 5 even if a
3600 HVM line is installed and
operated effectively

Plot boundary

This existing building is set-back from the street. It would be relatively simple to introduce stand-off if deemed necessary

Option 4: + Security –
Vehicle inclusion,
no secure HVM perimeter

In this option, urban design and


architecture have complete freedom
but the site is very vulnerable to all
vehicle attack tactics

Asset Parking

No VACP
No HVM

Plot boundary

These existing buildings are constrained and if stand-off is required, it will be a significant challenge to implement

124 4. Planning Toolkit 4. Planning Toolkit 125


Complementary Planning Objectives A series of benefits and examples of
developments that have introduced vehicle
access control for non security reasons are
presented here.
An innovative planning team will identify
complementary planning objectives that
increase the likelihood that stand-off and
vehicle exclusion will be implemented
for a project.

This park has been planned to exclude vehicles

Masdar City is an emerging global hub for renewable energy and clean technologies. This modern Arabian city is car-free.
High-tech driverless pods transport users into the city. This introduces major security advantages for the city, even though
Pedestrian-only public realm (Sheikh Zayed Grand Mosque, Abu Dhabi)
this was not the principal planning objective

At the Al Forsan Club (Abu Dhabi), vehicle access to the club is controlled, with only VIPs and club members able to utilise
on-site parking. Visitors park outside the site boundary and gain access on a courtesy bus. Although this access control
is primarily for exclusivity, it benefits security and access could be controlled further or excluded altogether if there Public realm spaces within a vehicle exclusion area can be used to create public plazas, outdoor souks, a park,
was an increase in threat (adaptability) or similar uses that contribute to the community

126 4. Planning Toolkit 4. Planning Toolkit 127


District-wide Vehicle (2) Planned Street Closures Before
Access Control Solutions
A planned closure of streets surrounding a
vulnerable building may be an option where
Every metre matters when it comes to the traffic demand is low and even welcomed if
protection of buildings from a vehicle borne it creates new public realm space for use by
improvised explosive attack. In constrained the local community.
urban areas, publicly owned land (space
outside the development plot) may be used
to reduce blast vulnerability subject to the Shopping Mall Hotel
following planning conditions:
• Risk assessment justifies blast protection and
the most appropriate solution is additional
stand-off;
• Relevant stakeholders, including the Vehicle access is controlled to this campus of Government buildings in Melbourne (Australia)
Municipality, issue a ‘No Objection Certificate’; Vehicular route (via public road)
and
• Demand analysis confirms that any proposed
road closures can be accommodated by the
local movement framework.
After
Two options for enhancing security for Street closure, Central London, UK

projects constrained by their urban setting


are presented below.

(1) The Security Zone –


Collective Vehicle Access Control

A cluster of buildings with similar security


needs may share vehicle access control Shopping Mall and Hotel
facilities by creating a district security zone.
This collective approach is often most feasible
for master planned developments, although The ‘Ring of Steel’ surrounding the City of London (UK), Is an example of a district-wide
solution to mitigate the risk of VBIED
the potential for large stand-off distances
and cost savings brought about by shared
access control facilities, might make this an
attractive option. Vehicular route (via public road)

A pedestrian-only public realm space has been created between the


hotel and shopping mall

128 4. Planning Toolkit 4. Planning Toolkit 129


Vehicle Access Control Points 3. Planned so that any queuing does not
impede the traffic flow on the surrounding
road network.
4. Planned so that vehicles do not need to
Where vehicle access control has been reverse or enter the site to be rejected. Crash proof vehicle barrier
introduced and vehicle inclusion is required,
then it will be necessary to introduce one or 5. Placed either in a location offering a level Rejection lane
more access control points. approach or preferably where there is a gentle
rise to offer reduced approach speed and clear
These points are used to ensure that only sight of approaching vehicles from the Protected guard house

authorised vehicles can gain access to the control point.


access controlled zone. A well planned and
Bollards
designed access control point will deliver The access control strategy may identify
effective security checks while maximising different access control needs for different
the rate of entry for authorised users based user groups. For example, it may be Vehicle barrier
on a demand analysis. necessary at a football match to search
normal ticket holders while allowing VIPs or Perimeter
Typical attributes of Vehicle Access Exit Entry
the players to enter the stadium without a
Control Points: security search. At industrial and commercial
1. Placed such that the surrounding road buildings it is common for trusted staff to be
A typical high security vehicle access control point Emirates Palace Hotel, Abu Dhabi
network can handle the traffic demand and given different access rights to visitors.
minimum processing rate.
At the planning stage this is likely to have
2. Spatial requirement determined by demand implications on the number of access control
and required security checks. These could points, the amount of space allocated for Checklist
range from credential checks or include full access control and the location of access
search and screening regimes. control points.
• Is there a threat from vehicle attack?
• Does the risk associated with a vehicle attack
warrant vehicle access control?
• Is vehicle exclusion or vehicle inclusion more
appropriate?
• Does the movement framework accommodate
access control?
• How much stand-off is appropriate?
• Have any associated benefits of incorporating
stand-off been identified?
• Are vehicle access control points required?
• Have vehicle access control points been
Typical vehicle access control points at existing developments in Abu Dhabi planned to accommodate the anticipated
vehicle demand?

130 4. Planning Toolkit 4. Planning Toolkit 131


PT4 Pedestrian Access Control
Option 1: + Security –
Introduction Pedestrian Access Control -
Plot boundary pedestrian
Planning Options access control
Practical at special
Access control and searching events, high security
If a risk assessment has determined that Four planning options are presented for facilities and
pedestrian access control is required for occurs at or near to the plot Secure perimeter
pedestrian access control. They range from industrial premises
security reasons, then there will be a need boundary, enabling less control and where most visitors
an aspirational high security plan, where
to determine whether to control access more flexibility at the building are staff or approved
space is allocated at the plot boundary, to the
at the plot boundary, at the facade of the entrances Primary entry contractors
lowest level of security, where no provision
building, or after pedestrians have entered of space has been made, with multiple entry Asset
a building. An appropriate solution will balance points around a building facade. PACP Lobby
access and connectivity with the level of
security needed. It is important to remember that even if risk
is assessed as being low at present, changes Secondary
Unlike vehicle access control, pedestrians in threat, the occupiers of the development entry
cannot be excluded from buildings, and in or special events may warrant additional
crowded places in particular, introducing protection in the future. It is often difficult to
excessive access control will not only disrupt allocate additional space for pedestrian access Parking
normal operations but could discourage visits control post construction and therefore
by legitimate users. planners should be considering adaptability.

This section of the Planning Toolkit outlines Whichever option is adopted, there is a need
a series of planning options for pedestrian to integrate pedestrian access control with
access control, along with advice for the vehicle access control and service access
developers and owners of constrained control strategies.
development plots. Design guidance for Option 2: + Security –
pedestrian access control is presented Building extremity
in the Design Toolkit (Chapter 5). pedestrian access control
Good practice often
Access is controlled at the building seen in US Federal
facade in a dedicated lobby. Plot boundary not secured buildings
The remainder of the facade is
Asset Building Plot District
secured to prevent circumvention Pedestrian searching

Lobby

Asset

Facade Plot Boundary

Primary entry Secondary entry


secured

Parking

132 4. Planning Toolkit 4. Planning Toolkit 133


Option 3: + Security –
Pedestrian Access Control Points Constrained Sites ‘Urban Context’
Internal lobby pedestrian
access control
Common in
Access is controlled at the main airports and
Plot boundary not secured The number and amount of space to be In dense urban areas, it is rarely possible to
Government
entrance. There is space allocated allocated for access control points will be have multiple layers of defence. This is often
buildings
for search capability if required project-specific e.g. size of the plot, the the case in downtown Abu Dhabi due to small
anticipated numbers of legitimate users, plot sizes. This means that it is difficult to
Internal lobby the number and location of connections to implement access control before people
Primary entry surrounding transport infrastructure and reach the building facade as they are in
Asset
the security checks required. public space.

If a plot has a number of different user groups A combination of planning interventions may
Pedestrian searching Secondary entry with different access rights and privileges, be adopted to improve access control without
secured compromising connectivity:
this will result in different access control
regimes and may even change the number 1. Establish a well-defined movement framework
of entry points to allow for user group and minimise the number of access points
separation. around the building.
Checklist
Where screening is required in addition 2. Use topographic features, landscaping and
to access control checks, there will be an urban design to celebrate ‘main entrances’,
increased spatial requirement at access define transition from public to privately • Is access control needed
control points due to longer processing owned space and improve wayfinding. or will monitoring of
times and additional security equipment. 3. Optimise sight lines surrounding the building access be sufficient?
Option 4: to increase awareness of misuse and
+ Security – • Is it appropriate to
Limited access control and crime and to detect hostile reconnaissance. implement access
temporary searching control at the plot
boundary or at the
Often seen
Facilities for access control and locally at special
building?
Plot boundary not secured
screening are deployed on a events when
• How many access
temporary basis, typically in security needs
Temporary are heightened control points are
a main reception area required and where will
pedestrian searching
they be located?
Primary
entry • How much space is
Asset
required for access
Lobby
control points?
Secondary • Can vehicle and
entry pedestrian access
control points be
integrated?

This entrance is used for staff access only A well defined movement framework helps channel
people through designated access points

134 4. Planning Toolkit 4. Planning Toolkit 135


PT5 Service Access Control
Introduction Plan for Service Access Service Access Control -
Planning Options
Asset Building Plot District

Service access, loading bays and mailrooms Project planners should assess how a project
Five planning options are presented for service
are required for receipt and dispatch of goods will be serviced and allocate appropriate
access control. They range from an aspirational
and mail, including replenishment of on- space in the development plan for service
high security plan where deliveries are Facade Plot Boundary
site consumables. These areas are typically access and facilities. This will ensure there
received and processed off-site, to the lowest
kept out of sight in ‘back of house’ areas for is a location and adequate space for secure
level of security where there is no provision of
aesthetic reasons. Service areas are often storage of valuable goods / mail and will
space for security.
targeted by criminals due to the value of allow a service access control strategy
goods they contain. Also, because there is a to be developed.
It is important to remember that even if
need to allow large service vehicles to access a project is assessed as being low risk at
these areas, they may introduce vulnerability The amount of space required will not
present, changes in threat, the occupiers of
to vehicle borne attack. Given that these areas only depend on the anticipated volume of
the development or special events may
are the location where unsecure deliveries are incoming and outgoing goods, but whether
warrant additional protection in the future. It is
received, they are also the location where an there is a need to screen deliveries before
often difficult to allocate additional space post
Improvised Explosive Device (IED) or Chemical, allowing internal dispatch.
construction and therefore planners should be
Biological or Radiological (CBR) agent is most considering adaptability.
likely to be discovered.
Whichever option is adopted, there is a need
The guidance contained in this section of the to integrate the service access control strategy
Planning Toolkit should be used to reduce with the vehicle access control strategy and
vulnerabilities associated with service access. the pedestrian access control strategy.
It highlights the importance of planning for
service access and deliveries to prevent mail
and deliveries entering a building unchecked.

A series of planning options ranging from Option 1: + Security Logistics efficiency –


high security to low security are outlined Remote secure logistics
below. The project-specific risk assessment system
will help developers and owners to determine
which option is most appropriate for Off-site facilities with a secure
their project. logistics chain for maximum Secure perimeter
security Remote
logistics
facilities Service
entry

VACP Asset

Parking
Secondary entry
secured

136 4. Planning Toolkit 4. Planning Toolkit 137


Ownership
Option 2: + Security Logistics efficiency – Option 4: + Logistics efficiency Security –
Dedicated on-site delivery Standard building delivery
reception area reception area

Allows delivery vehicles onto the Space is allocated within the


plot but screening of goods before Secure perimeter building for storage of goods,
entry into the main building allowing a degree of protection. Plot boundary
A suspicious package is likely to go
unnoticed or, if opened, could cause
contamination or damage
Service access
Asset Asset

On-site
logistics Primary Service access Primary
facility entry entry

VACP

Option 3: + Security Logistics efficiency – Option 5: + Logistics efficiency Security –


Dedicated building delivery No delivery security regime
reception area
Building may potentially be
Secure facility enables secure vulnerable as items can be
storage of goods and a screening delivered directly into the building
regime to prevent entry of Plot boundary
and cannot be held securely Plot boundary
suspicious packages

Asset Asset

Service access Primary Primary


entry entry

138 4. Planning Toolkit 4. Planning Toolkit 139


Louvre
Innovation – Guggenheim Abu Dhabi Abu Dhabi
Service Access Control

The proposed Guggenheim Abu Dhabi and


Louvre Abu Dhabi, planned for the Cultural Logistics Centre
District of Saadiyat Island, are to incorporate
an underground shared remote logistics
facility. This greatly increases security as all
Museum Park
deliveries will be received and processed
off-site before entering the museums.
On-site service vehicles will be used to
Arabian Gulf
transport artwork, via secure connections,
directly to art storage areas and galleries for
public viewing.

Shared logistics centre, Cultural District, Saadiyat Island, Abu Dhabi

Checklist

• Has appropriate space been


allocated for service access and
deliveries?
• Which planning option is most
appropriate given the results of
the risk assessment?
• Can facilities be shared or
located off-site as part of a
secure logistics chain?

Typical service areas and processing operations

140 4. Planning Toolkit 4. Planning Toolkit 141


PT6 Parking Placement
Introduction Safety and Security Risks Balancing Act

An important consideration in site planning In many countries, car parks can become Much can be done to reduce car crime
is the allocation of adequate and appropriate crime ‘hotspots’. Often poorly designed, dark, through the use of Situational Crime
space for vehicle parking. There are many inactive and lacking in natural surveillance, Prevention measures, such as designing cars
competing objectives which influence criminals target people and vehicles in these to make them less vulnerable e.g. the fitting
whether to adopt on or off street surface vulnerable areas. Crime rates for assault, of steering locks, secure door locks and car
parking, a dedicated parking structure or theft of vehicles and theft from vehicles are alarms. The public should also be encouraged
parking within a building. Underground often high along with users fear of crime. to remove attractive items from sight where
parking within buildings is common in Abu In addition, terrorists have used underground possible. However such as, planners and
Dhabi, particularly in dense urban areas car parks as a means to attack target designers also play a role in reducing car crime
where plot sizes are limited and demand for buildings. For example, in February 1993, through the placement and design
parking spaces is high. The use of basements terrorists detonated a large truck bomb in the of car parks.
is often seen as the most economic option car park below the North Tower of the World
and there may be other benefits of this Trade Center in New York City, USA, resulting There is no ‘one size fits all’ solution to World Trade Center Bombing, February 1993, New York City, USA

approach, such as the removal of cars from in six fatalities and over 1,000 casualties. parking placement when it comes to safety
the public realm. and security. Firstly, every project is different
Fortunately crime in Abu Dhabi is low and and will need to balance any safety and
The guidance contained in this section of terrorist attacks have not occurred. However, security requirements with other planning
the Planning Toolkit, will assist a project it is still necessary for the project team to objectives. Secondly, solutions that may
team in determining which approach is most assess the risks and ensure that car parks are address low level crime concerns may not
appropriate given the safety and security appropriately located and well-designed to be the most appropriate for buildings at risk
risks identified for their project. minimise such risks. from hostile vehicle attack. Different security
solutions are required to mitigate different
security risks and in some cases, mitigation
advice can be contradictory. The risk
assessment should help to determine which
solution is most appropriate.

Asset Building Plot District

Parking within Parking away


the plot for from the plot for Local media reports on car crime in September 2011
Facade Plot Boundary CRIME PREVENTION COUNTER -
TERRORISM

142 4. Planning Toolkit 4. Planning Toolkit 143


Planners have several options available to them when placing car parking.
Parking Placement Options Innovation Other innovative solutions include the design of
Each option offers advantages and disadvantages from a community
column shrouds. These may only provide a small
safety and counter terrorism perspective. If underground parking is necessary in order to degree of stand-off distance but may be sufficient
meet other planning objectives, other treatment to prevent collapse. Ultimately, the structure can be
options exist to reduce the risks associated with designed to withstand blast loading, as discussed
Approach Advantage Disadvantage terrorism: in Chapter 5.

Less favourable

Favourable
3. Access Control
Maximum stand off distance can Long distance to walk from vehicles to 1. Spatial Planning
be achieved buildings. This may not be practical for A more operationally focused solution is to
Consider off-setting the underground parking so
certain uses or comfortable due to the incorporate screening and an access control regime.
Activity in public realm and that parking is not located directly below critical
hot climate Screening should be applied prior to entering the
surrounding buildings affords natural structural elements, functions or crowded
surveillance basement car park. However this may be difficult
places.
to achieve in buildings with large peak flow
Premises owners do not take
rates, such as shopping malls. This approach also
responsibility for the vehicles left 2. Hardening
unattended requires additional space. Access control offering
Surface - On street Within the car park, the stand-off distance from
higher levels of trust to certain user groups is a
vehicles to critical structural elements should
viable consideration, but it must be remembered
Users have reduced distance between Vehicle inclusion to the site means reduced be maximised. This can be achieved through
that operations are prone to human error and are
their car and their destination stand-off against vehicle borne attack the placement of non-essential plant or other
reactive rather than preventative.
building functions immediately surrounding
Users’ vehicles can be parked within A degree of access control, traffic
access controlled private spaces management and enforcement will be columns.
required on site
Natural surveillance can be achieved
from surrounding uses More difficult to detect illegitimate users
as there is less open space
Checklist
Surface –Off street
Crime Prevention

Counter Terrorism
VIP

The walk from the vehicle to the A degree of access control, traffic Crowded place • Is the type and placement of parking
users’ destination can be within access management and enforcement will be
controlled space required on site
influenced by safety and security
requirements?
Users vehicles can be parked within Natural surveillance from surrounding Underground
access controlled space uses may be difficult to implement. Car park • Is parking planned to take account of
This may increase reliance on CCTV counter- terrorism or general crime
prevention needs?
Dedicated Structure
• If terrorism is a concern, can parking be
accommodated outside of the building?
Users’ vehicles can be parked within Increased requirements for access
controlled private space control are likely, along with traffic • If underground parking is necessary,
management and enforcement
The walk from the vehicle to the
VIP
has it been offset from critical areas?
users destination can be within Natural surveillance is not available from
access controlled space. This might be other uses. This may require active Crowded place • If underground parking is necessary,
particularly important for VIPs surveillance solutions to be introduced has vehicle access control and screening
Underground
Less favourable

If vehicle borne attack is likely, spatial been considered?


Favourable

Car park
layouts may be constrained, especially the
placement of crowded places and critical
functions. If vehicle borne attack is likely,
then significant design changes may be
Within a Building (Basement parking) required

If parking is required within a building, try to place


critical functions and crowded places away from the
144 4. Planning Toolkit 4. Planning Toolkit 145
parking entrances and exits
PT7 Infrastructure Planning
Introduction Access Control Circumvention Supply Resilience – Locating utility connection points within an
Connection Placement access controlled area reduces opportunities
for tampering or malicious damage. Such
placement of connections allows access to be
This section of the Planning Toolkit presents Infrastructure routes can be used as a controlled and monitored. In some cases, access
infrastructure planning guidance that will means of circumventing access control may be required for utility providers 24 hours
increase resilience, reduce the likelihood of measures. Reducing the number and size a day. Therefore, it is important to consult with
access control circumvention and the misuse of large aperture openings at transitions these providers during the planning stage.
of infrastructure as a means to attack a between zones with different levels of
building. Utilities and infrastructure design access control is the most basic means of
guidance can be found in the Design Toolkit reducing opportunities for circumvention. Plot Perimeter fence Plot
(Chapter 5).

Although the focus of the guidance


contained here is not business continuity,
if the guidance is followed, it will increase Connection Power Connection Power
resilience and in doing so, improve business point point

continuity as part of a comprehensive


Public realm Public realm
business continuity plan.

The infrastructure plan on the right places the above ground electrical connection and substation within
the plot boundary
Restricted
Restricted area
area

Supply Resilience – Routing utilities and infrastructure remotely


Infrastructure Routing from access control points reduces the
likelihood of consequential damage in the
event of a hostile attack.

Sewerage system for rain water Sewerage system for rain water
Plot
Plot
The infrastructure plan on the right avoids routing the rainwater collection within restricted space. This removes all openings
from the restricted space

Utilities
Asset Building Plot District VACP
VACP
Utilities

The infrastructure plan on the right places the utility connection away from the Vehicle Access Control Point
Facade Plot Boundary

146 4. Planning Toolkit 4. Planning Toolkit 147


Supply Resilience – Redundancy Attack Vulnerabilities – Openings
Standby Utility
connection power
point
Building
Determine whether it is necessary to Reduce the number of openings to
designate space for redundant infrastructure. infrastructure systems and place them
There is often a requirement for emergency remotely from publicly accessible areas.
power supplies for fire safety but there Where possible, place water tanks and
may be a need in some projects for redundant ventilation openings on rooftops or within
communications, water supplies, cooling and the access controlled perimeter of a plot
ventilation systems. Avoid placing duty and This building requires dual and standby power connections, where CBR agents cannot be introduced.
standby systems in close proximity where to enhance resilience
they could be subject to simultaneous failure. Inaccessible infrastructure opening

Command and Control Infrastructure


Restricted area

Control room
Appropriate allowances should be made
within plans for command and control
infrastructure and operational support Roof
facilities. This includes, but not limited to,
command and control rooms, storage facilities HVAC
and rest facilities for on-duty personnel. and
Exact spatial requirements will be project- ventilation
Space should be allocated within a building or master plan for
specific and determined in consultation with command and control facilities
the project owner and stakeholders.
Access to roof mounted HVAC systems can be controlled and unauthorised
access easily detected for efficient response
Restricted area
Infrastructure Hazards - Underground
fuel tank
Infrastructure Placement VIP
HVAC
and
Roof ventilation Checklist
Place hazardous installations within access
controlled space to deter, delay, detect and
deny unauthorised access as required. Restricted area • Does the type, quantity and
placement of infrastructure
Where plot constraints allow, crowded take account of safety and
places, critical infrastructure and other assets security risks?
should be placed remotely from hazardous
The fuel tank supplying this facility is underground,
infrastructure installations. This includes within the access controlled plot boundary and remote
• Will systems still function in
During the planning stage of this Government building,
on-site infrastructure and off-site hazards from the main building CBR attack risk was identified and HVAC openings were an emergency?
such as pipelines. relocated to the building roof

148 4. Planning Toolkit 4. Planning Toolkit 149


PT8 Topography
Introduction Natural Surveillance Privacy Space Definition

This section of the Planning Toolkit describes Natural surveillance, where clear sight Topographic features can be used to hide a A simple change in grade, a berm, ditch
how topography and topographic features lines are optimised to provide viewing building from public view where privacy is or water body can be used to define the
can be used to influence surveillance, define opportunities, plays an important role in both required. Such features also shield sensitive use transition between public and private space
space, support access control and mitigate the community safety and protective security. or users from view, reducing opportunities where access control is not required.
impact of different types of malicious attack. This is particularly important where there are for hostile reconnaissance or a malicious attack.
public realm spaces such as parks and surface
The topography of a plot describes its grade parking surrounding a development.
and natural and/or built topographic features,
such as banks, hollows and bodies of water.
These features will have a significant impact
Clear sight lines
on development proposals, construction costs
and ‘buildability’. There will be trade-offs
between safety and security objectives and
those of other disciplines. For example, while
a step change in grade may offer benefits in
preventing vehicle borne attack, it might also
reduce pedestrian accessibility. Planners must
compromise to reach an appropriate solution,
rather than dismissing one objective in order
to meet another.
Landscape Water feature

Later in design, it is normal practice for


developers to employ landscape and urban
designers to develop public and private High-rise building
realm spaces. This often involves the
Sight lines obscured
introduction of changes in grade, slopes and
water features to add variety and texture to
external spaces. The Design Toolkit (Chapter
5) provides design guidance for practitioners
involved in projects where there is a need to High security building
mitigate safety and security risks.

These buildings have clear views that allow monitoring


of their surroundings

A ridge maintains privacy for this high security building, Topographic features used to demarcate spaces
allowing a high-rise building on the neighbouring plot and deter unauthorisead access

Asset Building Plot District

150 4. Planning Toolkit Facade Plot Boundary 4. Planning Toolkit 151


Access Control Topographic features used for access control will be more pronounced than Blast Effects Mitigation
those used for space definition and they may be a significant feature on a Building
plot. It might be necessary to supplement such features with security design
elements to deny access. Terrain shielding
If a project risk assessment determines
that a building is at risk of explosive attack,
topography can be used to reduce the
impact of an attack.
Street

This Government building is shielded from blast effects and fragmentation


2.4m
>

Street Chemical, Biological & Radiological


(CBR) Attack Mitigation CBR agents
Intercontinental Hotel Abu Dhabi A change in grade used to control pedestrian access, rather than installing a fence

Topography can be used to protect a building


against CBR attack. The range of possible
agents, their attributes and behaviour in
different atmospheric conditions means that Building
specialist advice is required to address this
type of attack.

CBR agents collect in the depression

0.6m This Government building was located in a hollow for privacy reasons,
>

Street
this left it vulnerable to CBR attack involving heavier than air agents.

Abu Dhabi Investment Authority, Abu Dhabi A change in grade used to deny vehicle access
Checklist

• Have the existing topographical


and landscape features of the
plot been used in the safety
and security plan?
• Have all opportunities to alter
topography to increase safety
and security in an unobtrusive
Spoil way been exploited?
• Should sight lines be obstructed
Canal or unobstructed?
Chambord, France A canal used to deny vehicle access

152 4. Planning Toolkit 4. Planning Toolkit 153


PT9 Building Orientation and Shape
Introduction Natural Surveillance
Asset Building Plot District

Taking time during the planning stage to Natural surveillance, where clear sight
consider how building orientation and shape lines are optimised to provide viewing
opportunities, plays an important role in both Facade Plot Boundary
may reduce safety and security risks will
often reduce vulnerabilities and the need for community safety and protective security.
physical security. On projects where there are community
safety concerns, building shape and
The guidance outlined in this part of the orientation should be used to create a
Planning Toolkit can be used to influence building that is seen to ‘open up’ to its
surveillance, avoid the creation of spaces Clear line of sight surroundings, rather than turn its back. This
and features that can be used by criminals will not only enhance surveillance but make a
and reduce the impact of an attack building more inviting to legitimate users.
involving explosives.
The creation of active frontages and the Building

The climate of the Emirate means that building use of glazed facades for regularly occupied
shape and orientation plays an important role spaces, provides ‘eyes on the street’. This is
in reducing solar heat gains, in channeling particularly important where there are public
cool breezes and providing shade of the public realm spaces such as parks and surface
Building
realm. On each project it will be necessary to parking surrounding a development.
balance these competing planning objectives.
Using building orientation and shape to
optimise natural surveillance around a
Recess creates an entrapment area out of sight
building perimeter is important for projects
that need to address security risks, Buildings have been located very close together, limiting
particularly on constrained sites where the natural surveillance

Option 3
facade is the first line of defence. Introducing
clear sight lines will improve:
VIP
• Detection of suspicious activity such as hostile
reconnaissance; and
Original Option 1 Option 2
• Effectiveness of active surveillance systems.

As highlighted in the Principles (Chapter 2),


VIP
VIP there is always a need to balance surveillance Building
Park
with the need for privacy. Building shape and
VIP orientation can be used to create a building
En
tra En En En that ‘turns its back’ on public space where
n tra tra tra
ce nce
nce nce there is a need for privacy, for example to
shield sensitive use or users from view. Building

Changes of shape and building orientation, along with spatial planning, have been used to improve privacy and protection for the VIP area

More open space improves surveillance


154 4. Planning Toolkit 4. Planning Toolkit 155
There are a number of features that can make buildings and users more vulnerable to
Blast Effects Mitigation Innovation - Case Study Building Features
crime. Examples are provided below and planners and architects should avoid these
features that aid criminals and enable inappropriate behaviour.
The shape of the US Embassy in Abu Dhabi
has been heavily influenced by the need to
If a project risk assessment determines that protect it from terrorist explosive attack.
a building is at risk of explosive attack, its
shape can be used to reduce the impact of
an attack by dissipating blast overpressures.
Shapes that accentuate and dissipate air blast
are presented below. Rarely will a building
conform exactly to any one of these shapes
and even where it does, specialist advice
should be sought. A specialist can evaluate
vehicle exclusion, stand-off and design
treatments alongside building orientation and
shape to reduce blast vulnerabilities. US Embassy, Abu Dhabi

Features that inadvertently aid intruders

Checklist

• Do building shapes and


orientation support natural
Shapes that dissipate blast surveillance?
• Have buildings been orientated
so that sensitive spaces are
away from vulnerable or
overlooked facades?
• Will the shape of buildings
minimise the impact of a blast?
• Has the development been
planned bearing in mind that
criminals may use features in
unintended ways?

These recesses provide hiding places and places for entrapment


156 4. Planning Toolkit 4. Planning Toolkit 157
Shapes that accentuate blast
PT10 Development Delivery
Introduction Phasing: Community Safety Construction: Phasing:
Community Safety Physical Security Integrity

The pace and scale of development associated The creation of complete communities SSPM Principle 7 (Public Image) highlights that Although the Planning Submission for a
with Vision 2030 is considerable. This often should be promoted through appropriate plot owners and developers are responsible project will primarily focus on the final build
means that project delivery is phased, with development phasing. Phasing that clusters for the management and maintenance of their out of a project; the safety and security
partial occupation of early phases to fund occupied plots rather than dispersing them plots. This is true even during construction ‘end state’, development phasing should not
ongoing development. will ensure that occupants of early phases do and sites should be made safe and secure to undermine the Safety and Security Plan.
not spend the early years of the project stop misuse, theft of property and access to
If physical security elements intended to
This also means that projects are often living in a construction site. hazardous materials and areas.
protect occupied buildings are not in place as
incomplete for prolonged periods. Therefore, planned, as a result of being delivered in later
it is very important that development delivery The Municipality has powers under the
development phases, occupants may be left
is considered at the planning stage of a project Emirate of Abu Dhabi Environment,
vulnerable to security threats.
to ensure community safety and protective Health & Safety Management System (EHSMS)
security is implemented not only for the to monitor and enforce good practice. This is particularly relevant where security
end state of a project, but during phased planners are looking to use innovative
occupation. solutions such as natural barriers and
topography to create continuous HVM
This section of the Planning Toolkit provides barriers, and ‘collective solutions’ that
guidance intended to ensure vulnerabilities are provide a security zone to protect several
not introduced when formulating development plots or a district.
delivery plans.

Plot under
construction
construction
Plot under

Construction can affect the security of neighbouring occupied buildings

A fully developed community Khalifa City A has many undeveloped plots


158 4. Planning Toolkit 4. Planning Toolkit 159
Phasing:
Community Facilities Phase 3

Phase 1 Fire station


During the planning stage, master developers,
in consultation with Government stakeholders,
are tasked with allocating appropriate
Police station
community facilities.
Phase 2
Included within this task is the need for the
master plan to make provision for facilities
for the emergency services e.g. Civil Defence,
Police and Ambulance stations.

These decisions will be based on each safety


and security agency’s estates strategy and
assumptions relating to emergency response
targets. It is important that master developers Phase 1 Phase 3
have an understanding of their development
Police station
phasing to ensure they do not leave early
phases without sufficient emergency cover. Fire station

Phase 2

Checklist
The impact of phasing on emergency cover

• Does phasing promote


community development?
Phasing: • Are construction sites
Safety & Security Infrastructure appropriately secured?
• Are physical security elements
in place and complete prior to
Planning assumptions made in relation to
occupation?
utilities and infrastructure supply should remain
valid after development delivery decisions are • Are community facilities
made. Safety and security systems, including delivered in the correct phases
firefighting water, emergency power supplies and of development?
communications may be required in early phases.
Utilities and infrastructure phasing should be • Is infrastructure delivery
aligned to avoid unintended vulnerabilities. aligned with development
Safety infrastructure
phasing?

160 4. Planning Toolkit 4. Planning Toolkit 161


5
Design Toolkit

Secure communities
Introduction
For ease of use, the Design Toolkit is presented in three sections,
Chapter 5 presents a series of design tools that may be Navigating the Design Toolkit
each highlighting how members of the project team who are working
on different design aspects can contribute to safety and security.
used to implement Community Safety and Protective
Security in a development project. The guidance contained
here will assist developers and owners to implement DT1: Landscape & Urban Design

the Abu Dhabi Safety and Security Planning and This section deals with exterior design
elements at the plot level, plot boundary and
Design Principles presented in Chapter 2. within the surrounding district.
DT3: Systems Design

This section provides design guidance for


infrastructure protection and the deployment
The Design Toolkit builds on the solid The built environment can be viewed as of safety and security systems.
foundation established by the Planning a series of spatial layers. It is important to be
Toolkit (Chapter 4) and includes international familiar with these layers as they are used
best practice, innovative design ideas and throughout the Design Toolkit to highlight DT2: Architectural Design
draws on existing good practice from around where the guidance in each tool can
the Emirate of Abu Dhabi. be applied. This section outlines the role of architectural
design in asset protection and reducing safety
Decisions relating to which design tools The plot boundary is usually the limit for and security vulnerabilities. It covers design
need to be applied and to what extent they implementing access control and physical decisions relating to interior space, structure
are applied are to be made as part of the security for a project, that is unless and the envelope of the building (facade).
Integrated Development Process (Chapter agreement is reached to share security
3). The documentation submitted as part measures with neighbouring plots or to place
of the Building Permit Submission for security measures outside the privately
High Priority Projects should demonstrate owned plot boundary.
an integrated design solution and highlight
which design tools have been adopted.

Existing Buildings
Asset Building Plot District
Use of the Design Toolkit is not restricted
to new development projects. Owners
of existing buildings will find the Design
Toolkit useful for assessing options for Facade Plot Boundary
retrofitting safety and security measures.

Appropriate design for safety and security relies on an analysis


of the local situation and must take into account competing
design objectives.

164 5. Design Toolkit 5. Design Toolkit 165


DT1 Landscape and Urban Design
This section includes five design tools
Landscape architects and urban designers create and DT 1.1: Boundary Treatment

implement a vision for outdoor spaces. They connect Asset Building Plot District

buildings with the wider built environment, they facilitate


access and connectivity and importantly it is their design Facade Plot Boundary

that implements the Safety and Security Principles


in these spaces.
Specialist Advice
Abu Dhabi Public Realm Design Manual
The lead design disciplines should seek DT 1.2: Hostile Vehicle Mitigation DT 1.3: Vehicle Access Control Points
specialist advice where elements are used The Abu Dhabi Public Realm Design Manual
to address specific safety and security is part of the UPC’s development regulations To date, few
risks, such as hostile vehicle attack. These and is to be used in all public realm designs places in Abu
specialists can ensure physical security across the Emirate of Abu Dhabi. The
elements are cost effective and fit-for- guidance provided in this Manual will assist Dhabi benefit from
purpose. Where practical, any elements used designers and safety and security specialists Hostile Vehicle
for safety and security should serve a dual in selecting appropriate design solutions.
purpose.
Mitigation. It is
anticipated that
its use to deny
In Abu Dhabi, it is common vehicle borne
for plot boundaries to feature attack will become
high walls. This is often more common-
primarily for reasons of privacy, DT 1.4: Pedestrian Access Control Points DT 1.5: Materials Selection and Planting place, particularly
rather than to deter, delay in crowded places
or deny unauthorised access and Government
buildings, so
there is a need for
integrated design
solutions

166 5. Design Toolkit 5. Design Toolkit 167


DT 1.1: Boundary Treatment required. This challenge frequently requires resolution at Natural Boundary Treatments
the plot boundary. Therefore the design team is required to
provide the desired level of protection without turning the Boundary treatments can be natural or man-made. Natural Asset Building Plot District
building or plot into a fortress. The aspiration for boundary barriers, such as wadi’s and steep terrain can be used,
treatment is for subtle and aesthetically pleasing security especially where they are difficult to traverse. Topographical
A boundary treatment is often the most visible element
measures to be used, particularly in the urban environment, changes, which are required in many projects for site
of any security plan. Urban designers will be looking to
with the use of specifically designed security products shaping, drainage and roadways, also present opportunities to
maximise permeability, while security specialists will Facade Plot Boundary
limited to those developments that have been identified unobtrusively enhance security and define the plot boundary.
be looking to reduce permeability, minimise the number
as having higher security requirements. Berms, steep slopes, ridges, decorative landscape elements
of entrances and determine the level of access control
and vegetation can all serve to reinforce territorial ownership
and act as barriers. Sharp leaved and thorny plants and dense
hedges can also create natural barriers. They integrate well
The role of a secure boundary is to: into the landscape design and are relatively inexpensive but
Security Strategy • Define legal property boundaries; irrigation needs to be considered.

A security specialist will look to create and embed the • Control plot access; Design Factors
concept of ‘defence in depth’ into a holistic security plan.
• Provide maximum distance between
The plot boundary is normally the outermost layer of Design must start with an evaluation of the
potential threats and assets to be
defence in higher risk developments. Using the plot boundary project context including:
protected; and
maximises the distance between the first layer of security
• Adjacent properties and neighbours;
and the building or asset to be protected. This may be • Provide opportunities to assess and
difficult to achieve in the urban environment, which may respond to intrusion. • Existing building codes and design guidelines;
inform other design elements, such as the strength of the
facade and its openings. • Surrounding street network, entry points and
parking requirements;
A secure perimeter is used to create a ‘controlled zone’. Man Made Boundary Treatments
• Extent of vehicle and pedestrian access;
It defines the physical boundaries of a space and helps to
restrict, channel or impede access. The degree of access Man-made boundaries such as walls and fences are common • Level of protection required;
control will vary considerably from project to project; it may means of establishing a secure boundary. Fences can provide
high levels of security, and can be constructed in a range of • Aesthetics;
be achieved through territorial reinforcement, by operational
or electronic means, or through the deployment of materials and styles to suit the project security requirements. • Cost;
a physical barrier. They should be used only in high security environments
where individual intruders, rather than vehicles are a threat. • Topography and vegetation;
Some plots are designed so that their security is obvious and A bright, colourful and effective boundary treatment Walls offer a greater opportunity for compatibility with the • Sight lines and visibility;
imposing, others employ a more subtle approach that blends defines the play area, keeps children safe and architectural context; they may also provide higher levels of
in better with the urban environment.
maintains natural surveillance privacy and if designed appropriately, enhanced protection • Material selection and construction techniques;
against ballistics and blast.
• Finish and durability;
Ultimately, boundary treatments provide definition and
deterrence, and offer differing levels of delay and denial. • Height, length and alignment; and
The choice of boundary treatment should be based on the • Infrastructure e.g. power, alarms, lighting
risk assessment and which of these characteristics are and CCTV.
required. For low risk sites, low levels of deterrence are
sufficient. As risk levels increase, boundaries will need to
incorporate increasing levels of delay while for some,
denial may be a requirement.

Planting along the pedestrian walkway maintains sight


lines while demarcating and deterring unauthorised access
168 5. Design Toolkit to the private family beach 5. Design Toolkit 169
1 2
Design Factors

1. Dense planting close to a building can screen


illicit behaviour and conceal items such as
Low risk weapons and contraband. Vegetation must
environment not block important sight lines or create
attractive hiding places.
2. Plants, trees and shrubs can be used to
‘soften’ or screen security elements.
3
3. Walls may restrict surveillance into and out
of a site.
4. A clear zone should exist between the
Vehicle Denial Perimeters boundary treatment and exterior structures
or trees that may serve as climbing aids.
Boundary treatments may also need to
5. Barriers can be compromised through
incorporate specific measures to deny vehicle
deliberate breaching (cutting through) or by
access – see HVM (Design Toolkit).
Medium risk natural elements (overhanging trees, sand
movement, etc.) and therefore should be
environment Security Systems inspected and maintained regularly.
4 6

In high security environments, sensors can 6. Painting fence fabric and structures can
be applied to a boundary treatment to detect minimise visual impact. Different types and
unauthorised entry. If someone attempts to heights minimise their presence and prevent
cross the terrain, or attempts to climb, cut monotonous, negative visual perspectives.
through, or dig under the treatment, an alarm 7. If increased deterrence and delay is required,
is triggered. With a fully integrated system, topping can be placed on a fence or wall.
this can automatically trigger monitoring and
recording by a CCTV system. 8. Clear zones should be maintained on both
sides of a high security barrier to provide
an unobstructed view of the barrier and the
High risk ground adjacent to it.

environment 9. For long boundaries, a road should


5 7 8 9
be provided on the secure side of the
boundary for security patrols.

170 5. Design Toolkit 5. Design Toolkit 171


Maritime Boundaries However, where security risks have been identified, Innovation
additional measures may need to be incorporated. This
Many of the developments in Abu Dhabi have waterfront is a difficult challenge and requires a multi-disciplinary
boundaries. In most circumstances no form of security approach to ensure that access, safety and the maritime
treatment will be required and projects have the design environment is not compromised.
freedom to focus on safety, functionality and aesthetics.

In low risk environments, breakwaters and harbours will not Maritime security can be achieved operationally through the deployment of
require additional measures law enforcement maritime patrols

Permanent revetment wall construction

In high risk environments, such as critical national infrastructure, maritime security measures may be necessary
Where maritime protection is required without impacting the architectural vision for a project, innovation is required. In this example, water piles have
been designed to deny access to maritime craft but allow access to sea life and enable natural flushing, preventing stagnation

172 5. Design Toolkit 5. Design Toolkit 173


DT 1.2: Hostile Vehicle Mitigation access to buildings assessed to be at risk from crimes
such as armed robbery. During planning, stand-off should
be maximised and in some circumstances, particularly Asset Building Plot District
for crowded places, this requires HVM to be placed in the
public realm, which is a significant challenge. In these
Hostile Vehicle Mitigation (HVM) measures will be
circumstances, HVM measures should be seamlessly
necessary wherever there is a requirement to deny a
integrated into the urban fabric. The guidance contained
determined attacker from using a vehicle to access a Facade Plot Boundary
below will help designers to achieve this aspiration.
space. These measures are primarily deployed to maintain
stand-off distance and reduce the risk from a VBIED. Landscaping
However they may also be necessary to deny close vehicle
and
Level Change

A fresh approach is required


Design Factors
1. If a site does not totally exclude vehicles, it will be
from public realm designers to ensure
necessary to include active HVM and access points that HVM measures are integrated
at the HVM line. seamlessly into the environment to
2. A HVM line must be continuous and integrated with other provide appropriate security whilst Water
elements to provide 360 degree vehicle denial around the Features
asset to be protected. also creating beautiful places. This
3. Designers should aspire to provide HVM through natural Design Toolkit explores design thinking
and topographical features, or through dual purpose and provides technical information to
elements that are already part of the public realm.
demonstrate ways of addressing
4. Walls and fences used as a boundary treatment can be
hardened to resist the impact of a vehicle. However, this challenge.
other more innovative methods can be used that
achieve the same objective in a much more aesthetically
pleasing manner, as well as enhancing pedestrian
connectivity.
Public Art
5. There is no ‘one size fits all’ response to HVM as every
situation requires a well-informed, tailored solution. and Street
Furniture

Emirates Stadium, UK, employs a range of innovative and standard systems


to create a continuous HVM line

174 5. Design Toolkit 5. Design Toolkit 175


6 7
Design Factors Where it has not been possible to adopt natural, existing built environments, HVM measures will not have
landscape or dual purpose elements for HVM, then purpose been considered from the outset and solutions may need to
6. The maximum clear distance between built measures will need to be considered. In these be retrofitted. Unless carefully planned and designed, these
adjacent HVM elements should be circumstances, projects should aspire to use elements solutions may be less effective, be more costly and have a
no greater than 1,200mm. This specifically designed to blend in with the local context. negative aesthetic impact. Temporary measures should be
dimension is designed to prevent Standard security products should only be used as a last avoided as they impact on aesthetics and site functionality
encroachment of vehicles beyond the resort, as lines of bollards can be monotonous and degrade – it is far better to design for adaptability and consider the
HVM line, whilst maintaining access the public realm. In some circumstances, particularly with long-term use of the building and changes in threat.
for pedestrians, wheelchairs and
pushchairs.
7. The 1,200mm clear distance should
be measured between elements at a 1200mm
height of 600mm above ground level.
8. The minimum height for fixed vertical Contextual
structures is 500mm, however
an increased height of 900mm or
Min. 600mm
more will make the measure more
noticeable, assist the visually impaired
and typically reduce penetration of a
hostile vehicle attack.
8 9
9. When located alongside a highway,
HVM should be located at least
450mm from the kerb edge to prevent
conflict with road users.

10. All elements of HVM should be fit-


Security
for-purpose and successfully tested
to either BSI PAS 68 ‘Impact test Furniture
specifications for vehicle security
barriers’ or CWA 16221 ‘Vehicle Min. 450mm
security barriers –performance 500mm
requirements, test methods and
application guidance’.

Kinetic Energy = 1/2 MV


2
A small decrease in speed = a large
decrease in energy = reduced impact =
(where m is the mass of the vehicle
smaller and less intrusive HVM measures Temporary
and v is the velocity or speed)
and possibly reduced costs
(Refer to PT2: Access and Circulation Routes)

176 5. Design Toolkit 5. Design Toolkit 177


Visitor attractions
Business districts
and crowded places

Transport locations

Government buildings

178 5. Design Toolkit 5. Design Toolkit 179


DT 1.3: Vehicle Access Control Points If during project planning it was determined to be necessary 4. Vehicle access control point design and
to protect the building from hostile vehicle attack, then procedures should be tailored to the
active HVM measures will be required to control vehicles different user groups e.g. staff, visitors, Asset Building Plot District
at entrances. At these entrances there will be a series VIPs and deliveries. This may necessitate
of measures deployed to deny unauthorised access and the provision of different access control
Vehicle access control points provide legitimate vehicles
implement any screening deemed necessary to protect infrastructure and facilities at each vehicle
with access through a secure perimeter or HVM line where
assets. These measures will need to maximise the rate of access control point.
vehicle inclusion is required. Facade Plot Boundary
entry of authorised vehicles to prevent excessive delay to
5. Some entrances may be used infrequently
users. A safety and security specialist should be appointed
For low risk projects where stand-off is not required, or for access by fewer users. This may
to ensure any installation is fit-for-purpose.
projects may decide to introduce a degree of vehicle access affect the type of vehicle access control 4 5 7
control for traffic management purposes. Reasons could barrier used e.g. gates versus wedges or
This section shows how the types of access control
include restricting access to reserved parking areas or rising bollards.
components differ depending on the degree of access
simply to monitor what vehicles are on site at any given
control and denial required at a project. 6. Most high security access control points
time. This type of system may be used to detect suspicious
activity or theft of property from a site. will incorporate guard facilities to allow
vehicles and occupants to be assessed.
The design of these facilities should
provide a safe environment for the
occupiers in the event of an attempted
ramming incident and should maintain the 6 8 9
1 2 integrity of the HVM line against the design
Design Factors vehicle and velocity.
1. Vehicle access control points used to deny 7. Where vehicle inspection is required at
vehicle access should be located along high throughput entrances, there should
o
the 360 HVM line. They must offer the be a separate vehicle inspection area or
same security performance against vehicle lane to prevent blocking of subsequent
attack as the fixed (static) HVM barriers vehicles. These areas are often best
located around the vehicle perimeter. screened from public view where space is
2. To deny access, the specification of the available. Vehicles should be inspected on
barriers must take into account vehicle size the non-secure side of the HVM line.
and velocity of attack. This is influenced 8. It is important that the design of the
by the vehicle approach route e.g. gradient, access control point provides for vehicle
direct or indirect approach and the terrain. rejection without needing a vehicle to Rejection lane
3
3. Adequate space should be allocated enter the secure side of the HVM line.
between the point of challenge and 9. Infrastructure is required for guard
the deployable barriers. This space is post facilities, access control and
determined by approach speed and screening systems at vehicle access
allows the device to be fully deployed control points.
Access control points should integrate dedicated
before impact. lanes for pedestrians and bicyclists. If this is not
10. For the highest level of vehicle access
control and denial, a ‘Sally Port’ of
feasible, try to use bollards rather than rising
interlocking barriers may be required. wedges or gates, if these can accommodate the Rejection line

security function

180 5. Design Toolkit 5. Design Toolkit 181


Low Access Control High Access Control

Vehicle Denial
Traffic Management

Typical local examples of traffic management measures Typical examples of vehicle access control points for higher risk environments

Road Signs Integration Innovation

A well-designed system of signage and markings will increase legitimate and Innovative architectural design can transform otherwise mundane control Incorporation of a turntable can provide access through a HVM line and allow greater use of public art and other street design elements
consensual drivers’ awareness when approaching VACPs. However, they will and search locations into visually appealing site design elements
not prevent or even influence a determined vehicle borne attacker

182 5. Design Toolkit 5. Design Toolkit 183


DT 1.4: Pedestrian Access Control Points users to prevent excessive delays, while meeting the security
requirements. A safety and security specialist should be
appointed to ensure any installation is fit-for-purpose. Asset Building Plot District
In low risk projects, an access control point is more likely
to be integrated into the perimeter to deter and/or detect
For a project featuring a secure perimeter at or near unauthorised access or simply to monitor who and how
the plot boundary, pedestrian access control points will many people are on site at a given time. This can be
function to monitor or control access. In a high risk useful at business premises to monitor hours worked by Facade Plot Boundary
environment, these access points will feature a series of employees, detect suspicious activity or attempted theft
measures deployed to deter, delay, detect or even deny and to verify that occupants have evacuated safely in an
unauthorised access and will facilitate any screening and emergency situation. In addition, if there is an increased
searching deemed necessary to protect assets within the security threat, access control can be ‘scaled-up’ at
secure perimeter. The design of each access control point these locations.
will need to maximise the rate of entry of authorised

Low Access Control Medium Access Control High Access Control

Design Factors

1. Each entry point represents a security vulnerability


and increases demands on operations. The number
of access control points should be minimised
while meeting emergency access and evacuation
requirements.
2. Highlight the main access points and use wayfinding
signage so that visitors, staff and commercial visitors
use appropriate entrances.
3. Determine the security access control requirement.
Is it necessary to control access to the site or is
monitoring access to the site sufficient?
4. Access control starts with determining if a user is
legitimate and should be allowed access. This
typically requires reception facilities for visitors
or can utilise automated systems.
5. A manual or automated system may be used to
deter, delay, detect and deny attempted
unauthorised access.

Typical examples of low control pedestrian access points Typical examples of pedestrian access control points that offer Typical examples of pedestrian access control points
medium levels of control offering high levels of control
184 5. Design Toolkit 5. Design Toolkit 185
DT 1.5: Material Selection and Planting elements used should be designed for the intended use The design specification of all elements
and be appropriate, given the context. Certain attributes should take into account the impact Asset Building Plot District
can be used to serve a specific safety and security
function. Designers should note that in many cases .of local environmental conditions
Landscape and urban designers can draw on a palette of
planting may not reach maturity for many years and will The impact of dust, sand, humidity
require ongoing management and maintenance.
materials and plants when designing outdoor spaces. The and salinity need to be considered
Facade Plot Boundary
.when designing in Abu Dhabi

Robust materials used in an area subject Elements selected exhibit design quality, The designers choice of glazing could Trees act as a climbing aid for intruders This boundary wall offers both natural Elements selected are attractive to users
to constant use attract users and instil ownership over result in secondary fragmentation risk in surveillance and is shatter resistant, so
the space a crowded place avoids secondary fragmentation

Transparent materials used to improve natural Planting creates clear sight lines for Perimeter sight lines have been maintained Transparent materials can be used to Ongoing maintenance is required due A simple change of material is used to
surveillance pedestrians and avoids the creation of around this residence through the use of improve community safety to poor design integration between demonstrate change of use
hiding places ornamental fencing active surveillance and landscaping

186 5. Design Toolkit 5. Design Toolkit 187


The use of natural materials is encouraged but they do
require management and maintenance

These bollards are used for parking


management but would not be effective
All metallic elements are painted to avoid corrosion Tamperproof lighting design for hostile vehicle mitigation
The bright and colourful street furniture makes this plaza attractive and welcoming to users

Innovation – Transport Premises

After Improvised Explosive Devices were


left within trash bins at transport stations in
London, the initial reaction of many station
owners and operators was to remove these
bins. This operational response soon led to
issues of littering and complaints of poor
management and maintenance at stations.

A simple and effective solution was the use


of transparent plastic refuse bags that allow
a suspicious device to be easily detected by
staff or members of the public.

Abu Dhabi Bus Station Planting along the pedestrian walkway in this plaza allows users to be aware of their surroundings

188 5. Design Toolkit 5. Design Toolkit 189


DT2 Architectural Design

Architects create and implement the vision for a building


project. Architects are familiar with the importance Asset Building Plot District

of life safety as it is fundamental in the design and


There are three design tools presented in this section
construction of buildings. Although, many architects are Facade Plot Boundary

DT 2-1: Facade Design DT 2-2: Building Entrances DT 2-3: Structural Design


unfamiliar with the Principles of community safety and
protective security.
This part of the Design Toolkit focuses on
“In June 1996, a terrorist truck bomb explosion at the application of physical security to reduce
the Khobar Towers, in Dharan, Saudi Arabia, caused vulnerabilities to intrusion, blast and
ballistic attack.
19 deaths and hundreds of injuries. A Government
report estimated that flying glass shreds from the An architect should seek specialist advice
regarding elements used to address a specific
blast caused up to 90% of the fatalities.” security risk, such as hostile vehicle attack.
(Building Security, Barbara A. Nadel FAIA) A specialist can ensure physical security
elements are cost effective and fit
for purpose.

Abu Dhabi International Building Code

The Abu Dhabi International Building Code Crowded Places


adopted by the Department of Municipal
Affairs does not contain minimum security Many of the design elements
requirements for buildings. This is because presented here will be required at
risks are project and context specific. crowded places such as shopping
malls, transport premises and
To avoid conflicting requirements, this Design exhibition centres.
Toolkit does not mandate any particular
solution, it simply presents guidance to assist These locations, to which members
in design decisions. of the public can gain access, may be
considered a terrorist target. The Abu
It is important that these design decisions are Dhabi Urban Planning Council or the
made using a holistic approach to relevant Municipality Town Planning
ensure integrated security. department can direct the project team
to Government safety and security
advisors if further advice is required. The risks to crowded places may influence the structure, facade and entrance design

190 5. Design Toolkit 5. Design Toolkit 191


DT 2.1: Facade Design protection it offers against blast and the protection it offers Intruder Protection
against ballistic attack.
The first step in reducing the Asset Building Plot District
In many buildings, the facade is the first line of defence likelihood of unauthorised entry
between public and private space. In buildings at risk is to reduce the number and size
The skin of a building contributes to energy performance,
of terrorist attack, it is critical that the facade does not of openings.
aesthetics, fire safety, internal comfort and safety and
contribute to injuries or fatalities by producing large
security. The four aspects to consider from a safety and Facade Plot Boundary
quantities of glass shards (secondary fragmentation).
security perspective are the facades role in surveillance,
The design of the facade should be influenced by the risk
its ability to deter or deny access to the building, the
assessment findings. Khalidiya Police
Station, Abu Dhabi

Facade Openings

Openings in facades are a popular point of unauthorised entry to a building. Access may be gained either
by breaking through a door, window or other aperture; or simply gaining access where the aperture
has been left open. A range of protection options are presented below.

Low Security High Security

Windows
Openable windows Glazed curtain wall Window grilles
Design for privacy Design for natural surveillance

Innovation
Doors
The mashrabiya is used in this case to delay
unauthorised access through this window. It is Glass door Steel door Blast doors
aesthetically pleasing and was specifically designed
by the architectural team to meet the minimum specified
criteria set by the project owner.
Other openings

Unsecured air intake High level air intake Roof mounted HVAC

192 5. Design Toolkit 5. Design Toolkit 193


Blast Resistance of the building. It is widely accepted that in the majority Ballistic Resistance
Glass has widespread use in facade design. If a facade of explosions in urban areas, it is glass that causes more
is subject to blast loading, shards of glass can result in injuries than the explosive blast itself. If a facade is required to offer protection against ballistic Asset Building Plot District
severe injuries to occupants and those in the proximity attack, then it is wise to consult a specialist. Normally,
ballistic glazing is used to protect a particular individual
or user group from an attack. It is rarely practical or
cost effective to protect an entirely glazed facade. If
Facade Plot Boundary
protection is required for an entire building, it would
make sense to avoid transparent materials in the cladding
If the glass must offer a certain level of protection eg. it must not break, system or use other elements of the Planning Toolkit and
Start with the Basics
the project team should consult a specialist, as these systems can be expensive, heavy Design Toolkit, such as topographic features or planting to
and must be designed as an integrated part of the facade and structural design. hide potential targets from sight.

1 3
Use non-glazed Place glazing
facade systems closer to
if blast is a the floor to Special Applications
concern. This will reduce the
reduce secondary distance that
fragmentation glass shards
will fly within
Sheikh Zayed Grand Mosque, Abu Dhabi
perimeter
rooms

2 4
Limit the size and Use laminated
number of glazed glazing,
elements Glass appropriately VIP Area Guard post featuring ballistic rated glazing
anchored to its
PVB film
frame, as its PVB
interlayer will Innovation
Glass reduce secondary
fragmentation The security function of these shutters
Masdar, Abu Dhabi is only required at night when the Museum
is closed.

Existing Buildings The shutters are hidden in this facade during


the day; this was possible through the
It is possible for blast protection to be enhanced without It is not as effective as laminated glass and does not prevent integrated approach adopted by the structural
replacing float or annealed glass windows. Anti-shatter glass from leaving the frame as this will be determined by engineer, facade engineer, architect and the
film, sometimes referred to as security film, is placed on the the anchorage of the existing glazing system. In addition, safety and security specialist.
internal surface of glazing and acts in the same way as a PVB it is necessary to replace the film at periodic intervals
layer in laminated glass, to hold together glass fragments if determined by the supplier, as the film degrades over time
the glass is attacked or experiences blast loading. in ultra-violet light.
Rodin Museum, Paris (France)

194 5. Design Toolkit 5. Design Toolkit 195


DT 2.2: Building Entrances In many buildings, the facade and its associated entrances Interlock Doors
will be the first point of access control from public to
private space. It is therefore of primary importance that Purpose built interlock doors are Asset Building Plot District
the access control needs of the project are understood by used in high security facilities to
the architect. prevent tailgating through access
Each building entrance represents a security vulnerability. control measures at entrances. They
As such, the design of each entrance must address any significantly reduce throughput and are
needs to monitor or control access to a building. typically viable only where access is Facade Plot Boundary

highly controlled to a small user group.

Low Access Control Medium Access Control High Access Control

Design Factors
1. The number of entrances should be minimised having
regard for fire safety requirements.
2. Highlight the main building entrances so that visitors
and staff use appropriate entrances.
3. Determine whether it is necessary to control access,
such as in an office, or if monitoring access only is
appropriate e.g. in a shopping mall.
4. If there is a need to control access, it is likely that more
space will be required to avoid increased entry time
delays for users.
5. If there is a need to control access, there may be a
need to separate user groups as certain groups will be
more trusted than others e.g. staff vs. visitors.
6. Access control starts with determining if a user is
legitimate and should be allowed access. This typically
requires reception facilities for visitors. Low control measures are primarily intended to deter Low height turnstiles usually used in industrial or back of house areas Searching and screening equipment will be required where banned items
unauthorised users and welcome or direct legitimate users help to prevent tailgating but can be easily vaulted need to be detected such as at stadia or secure Government facilities
7. A manual or automated system may be used to
deter, delay, detect and deny attempted
unauthorised access.
8. Search & screen capability may be required as part
of the regular entry procedure for all pedestrians or
limited to certain user groups.
9. Search & screen capability may be required only
temporarily e.g. special events or increased threat.
It is important to design for adaptability.

As well as providing environmental protection, doors also Speedgates are less industrial and help to prevent tailgating Full height turnstiles do not allow passage until the user has
196 5. Design Toolkit offer deterrence and delay unauthorised access when locked been verified. The risk of tailgating is reduced considerably 5. Design Toolkit 197
DT 2.3: Structural Design instructed to do so following a risk assessment and a
decision by a client or stakeholders to enhance protection.
Prevent Disproportionate Collapse
Asset Building Plot District
This situation arises where the local failure of primary elements of
Structural design plays an important role in protecting
structure leads to progressive failures of elements more remote from
buildings against blast loading, particularly where a
Whereas it is standard practice in Abu Dhabi for a the initial cause. This leads to damage that is disproportionate to the
building benefits from limited stand-off. Structural
structural engineer to design for wind and seismic loading, original cause. Regardless of how well a building needs to be protected
hardening is expensive and should be considered after the
it is unlikely that they will have designed a structure to meet the client and stakeholders objectives, the most important job Facade Plot Boundary
basic design guidance provided here has been incorporated
to resist blast loading. That is unless they have been of the structural engineer is to prevent disproportionate collapse.
to make the structure more resilient.
A resilient structure will exhibit the following attributes to reduce the
likelihood of disproportionate collapse.
Explosive Blast Loading
Specialist Advice
An explosive blast is associated with extreme Redundancy Multiple load paths to accommodate
Structural design for blast loading can be complex and requires but very short duration loading of a structure. abnormal loads Start with the Basics
specialist advice, particularly for innovative structural forms that The pressure acting on the structure can be
are commonly seen in new signature developments in Abu Dhabi. orders of magnitude above wind loading but The guidance below may conflict with other
is experienced for a much shorter duration. design objectives so it is imperative that
Unfortunately, history shows us that building Load Primary and secondary elements and the design team work collaboratively and
damage can range from glazing failure through reversal connections that can accommodate reversal holistically.
• Blast wave breaks windows to disproportionate or complete collapse. of loads 1. Concentrate on the most important
• Exterior walls are blown in elements first
• Columns may be damaged Ductility The ability of elements to deform without 2. Avoid large floor to floor heights,
collapse. Cast-in-place reinforced concrete while complying with minimum building
exhibits this attribute and sees widespread code standards
use in Abu Dhabi.
3. Avoid direct exposure of primary structural
Shear load Elements have sufficient strength and ductility elements e.g. architectural shroud
capacity not to fail in shear. 4. Design with regular, limited structural spans
• Blast wave forces
floors upward
Glazing failure resulting from a large VBIED, Canary
Wharf, London, UK

1 2 3 Concrete column
• Blast wave 4
surrounds the
structure Non-load
Primary Secondary
bearing
• Downward structure structure
elements
pressure on
the roof
• Inward pressure Metal shroud to
provide stand-off
on all sides

Progressive collapse resulting from a large VBIED,


198 5. Design Toolkit 5. Design Toolkit 199
Oklahoma City, USA
DT3 Systems Design
Engineers design, construct and maintain the systems Architects, urban designers and landscape designers ‘CCTV …remains one of the most effective tools to combat crime
that support communication and provide energy, cooling should seek specialist advice to ensure security systems and anti-social behaviour provided the installation, operation and
and clean running water. This Design Toolkit includes are cost effective and fit-for-purpose. Asset Building Plot District
management are of a high standard’
guidelines for the protection of these systems against
UK Home Office Online Report 15/05: the Impact of CCTV, Fourteen Case Studies
malicious attack. It also highlights the role of security
systems in achieving defence in depth.
There are three design tools presented in this section Facade Plot Boundary

DT 3.1: Utilities and Infrastructure

Abu Dhabi Environmental Factors


The safety and security specialist
Case Study -
is tasked with developing a strategy
Not fit-for-purpose
that integrates all three aspects of
A high risk project developed a security a security programme
solution that was not-fit-for purpose.
Key failings included:
• Unbalanced solution – omission of physical
security as the developer’s consultant was
only contracted to provide technical systems; Operations Shaded areas are not covered Placement of cameras allows for
by surveillance effective surveillance
DT 3.2: Plot Security Systems
• No strategy to justify or inform system
deployment;
Large areas of the public realm in Abu Dhabi require shading.
• No operational requirements for systems; and This can drastically impair surveillance coverage unless coordinated
during design.
• Inappropriate selection of technologies for
building environment and security objectives.
Physical Systems
The result for the client was:
• Project delay as numerous iterations of design Strategy
development were required to reach a viable
solution;
DT 3.3 Building Security Systems
• Difficulty in obtaining insurance; and
• Over AED 2 million wasted on systems
procured that could not be used. Selection of equipment must take into
account the local weather conditions.
Temperatures in the summer can exceed
the maximum operating temperatures
of many products. Sandstorms can
also degrade areas of coverage and
dust can create additional maintenance At these buildings in Abu Dhabi, CCTV cameras have been installed below shading canopies

requirements
200 5. Design Toolkit 5. Design Toolkit 201
DT 3.1: Utilities and Infrastructure security installations and support life safety and site
security functions.
Asset Building Plot District
Utility and infrastructure protection requirements are ‘Utilities and infrastructure can be
project-specific and should be assessed as part of the
The Planning Toolkit highlighted how appropriate vulnerable to attack within the district,
Integrated Development Process. It is important that
infrastructure placement can reduce loss of supply and
designers follow applicable Regulations and guidance of at the plot boundary, within the plot and
unauthorised access vulnerabilities at a site. ‘Designing- Facade Plot Boundary
utility providers. Any proposed deviations for safety and
in’ protection of utilities and infrastructure will improve
security reasons shall be subject to a utility provider’s at building entry points’
business continuity, prevent circumvention of physical
‘No Objection Certificate’.

Case Study -
Start with the Basics Case Study -
Manufacturing Plant (Abu Dhabi) Virtual National Bank Data Centre
1. As part of the risk assessment process, determine
what infrastructure is critical to normal, life safety The proposed vehicle access control point for a This data centre handles all debit and credit
and security operations. manufacturing plant was located adjacent to the only card transactions for Virtual National Bank and
electrical substation and all feeds to the site were routed business continuity was identified as a key
2. Minimise access openings to infrastructure. along the same service road. This created a single point of component of the safety and security brief. The
Where possible bury infrastructure or hide it. failure. The utility feeds were fixed by the utility provider, 3 design of utilities and infrastructure included:
and the options for reducing the supply vulnerability
3. Where access is required to meet utility provider
were constrained to: 1.
1 Utility connections – Located within the plot
or system installation standards, incorporate 5 2
appropriate access control and intruder detection secure boundary and accessible under
where justified by risk assessment. • Removing the entry road; 24 hours a day supervision.
6
4. Minimise or close infrastructure openings to • Re-planning the site entrance; 2.
2 Vehicle access control point - Located
prevent unauthorised access to the site or remotely from utility lines.
• Repositioning the electrical substation; and
building (security circumvention) using utility and 7 3.
3 Roof mounted HVAC and chillers – Decreasing
infrastructure routes. • Hardening the utilities.
the vulnerability of operations to tampering
5. Harden critical infrastructure from malicious 4 and intake of hazardous materials.
attack where resilience is not afforded by
4.
4 Remote energy centre – Located within the
dispersed, redundant supplies i.e. there remains
1 plot secure perimeter, the energy centre
a risk of simultaneous failure of primary and
houses generator sets for back-up power
back-up supply.
supplies and life safety systems.

6 5.
5 Sewerage and drainage pipes features lockable
Manufacturing
Plant
manholes and grilles.
6.
6 Redundant and diverse ICT fibre infrastructure.

7.
7 Site-wide fire fighting standpipe system
in addition to automatic sprinkler and gas
suppression systems.

VACP
Substation

202 5. Design Toolkit 5. Design Toolkit 203


DT 3.2 Plot Security Systems deployed in a layered system to achieve defence in depth.
The technology layers should tie in directly with the other Case Study -
physical layers, being used to control access or detect Virtual National Bank Data Centre Asset Building Plot District
unauthorised access through each layer. The number of
technology layers and the type of systems employed
The best performing security sensor is a highly trained,
should be based on the risk assessment and result in an
dedicated human being. Human senses cover all the
integrated security strategy.
necessary operations – sight, hearing, smell, touch, taste, 3 2 Facade Plot Boundary
feeling and a voice to sound an alarm. The human brain
For low risk projects, there is unlikely to be a requirement
is also able to quickly process inputs from all senses
to deploy security technology to the external areas, except 1
simultaneously and make decisions – a truly integrated
perhaps for lighting and minimal surveillance. However,
system. However, putting a sufficient number of the
high risk projects may require a significant number of
right people in place to monitor and secure facilities is an 1
systems, including active surveillance, lighting, intrusion
expensive proposition. Humans are also prone to error and 3 Active Surveillance Systems
detection and access control.
therefore security systems are deployed as an alternative.
As with all other security elements, technology should be Active surveillance is primarily
1 3 used to monitor the plot boundary,
access control points, approach
District-Wide Systems routes, any exclusion areas and
2
Design Factors activity. Camera selection varied
Master developers should consider the considerably depending on location
1. The security strategy should reflect an appropriate balance of physical, deployment of systems on a district-wide basis and function. Surveillance systems
to increase defence in depth. In the future, are monitored in real time and
technical and operational measures. 4
private developers may be asked to contribute recorded.
2. Increased reliance on security systems is likely to result where planning to public safety and security by installing and
and other design tools have not adequately addressed safety and operating public realm safety and security
security risks. systems including surveillance, communication
and dynamic signage. This will be determined on 1 Lighting Systems 2 Automatic Access Control Systems 4 Intruder Detection System (IDS)
3. Security systems should not be deployed without a technical strategy,
a project-by-project basis with stakeholders.
based on a documented Operational Requirement (OR). Well lit spaces improve natural Access control systems have been Exterior Intrusion Detection
surveillance and reduce the fear of deployed at entry points alongside Systems are used to detect an
4. Project teams should appoint a specialist to provide an unbiased
crime. In this case, security lighting other physical and operational intruder crossing a boundary of
assessment of the technical requirement and the most appropriate
is deployed around the plot, building control mechanisms to ensure that protected areas. In this high risk
solutions based on system capability, cost and project needs. System
facades and plot boundary to allow only authorised personnel gain environment, it is provided at the
suppliers may over specify as a means of selling their equipment.
security personnel to monitor during access to critical areas. All control plot boundary and around other
5. System design must take into account operational measures. The darkness. Security lighting has systems use one or more of three critical areas. A range of systems
presence of an on-site security team greatly reduces response times been designed for sensitive areas basic forms of verification: are used including infrared,
and alarm configuration. Conversely, in order to trigger a police response, such as loading bays and the utility • ‘Something you have’ eg. card; seismic, microwave and video
many countries now mandate a minimum specification of alarm system compound. High levels of illumination motion technologies. Due to the
(to reduce false call-outs). are used at entrances. Where • ‘Something you know’ eg. nature of the outdoor environment,
practical, high mast lighting was password; and exterior sensors are more
6. Technical security solutions must be integrated so that they work incorporated as it provides a broader, susceptible to nuisance alarms than
together in an effective and coordinated manner and enhance the • ‘Something you are’ eg. fingerprint.
more natural and uniform light interior sensors. The use of dual
operational response. Where possible, they should also integrate with distribution. Motion activated lighting technology sensors and a thorough
Abu Dhabi wide surveillance system
other building systems. is provided in vulnerable areas and site assessment was vital to the
7. Security systems should be discrete to reduce the risk of tampering and this illuminates when an alarm is delivery of a viable solution for the
should fit the architectural and urban design context. triggered, providing deterrence and bank.
facilitating a quick response.
204 5. Design Toolkit 5. Design Toolkit 205
DT 3.3 Building Security Systems active surveillance, access control and intrusion detection
systems. For high risk security environments such as
Government buildings or research facilities, best practice Asset Building Plot District
would dictate a multiple layered solution, with different
The design factors for the deployment of security systems access control technologies at each layer and multiple
within a building mirror that at a plot level. They should layers of intrusion detection using complementary
still form part of a holistic, balanced solution and be applied technologies to provide early warning of intrusion and Facade Plot Boundary
in accordance with the ‘defence in depth’ concept. The monitoring of intruder movement.
deployment of access control, surveillance and intrusion
detection technologies should accurately reflect the How Much is Enough? Intruder Detector Systems (IDS): Interior intrusion Deterrence
internal zoning of a building. Technology solutions should detection systems are designed to detect penetration or
become more stringent as users transition through the With so many choices of equipment on the market, a attempted penetration through a facade or other zone Technology can deter
challenging issue facing project teams concerns is selecting
building from public to private and then restricted areas.
and installing appropriate technology and determining how
boundary. IDS technologies include structural vibration, intruders by being
For low risk projects, there may still be a need for several glass breakage, passive infrared, video motion, microwave
layers of technical security in internal areas – as minimal much is enough. Specifying appropriate systems is essential and dual technology sensors. visible or by creating
to meeting facility needs and safety and security objectives.
or no layers exist in external spaces. It would be normal the perception of a
in low risk commercial buildings to see the deployment of In some cases e.g. hotels in Abu Dhabi, minimum regulatory
requirements must be observed. Communication Systems: These systems are designed to
security presence. Highly
enable communication on-site and off-site during normal visible detection devices
and emergency operations. Applications include: public
address / voice alarm which uses broadcasting to offer
suggest that other
Projects are often Active Surveillance: Surveillance systems may be used
mass notification, and emergency voice communication devices are also present
systems used for duress and incident management by
quick to resort to a to conduct access control, surveillance and video motion
staff, visitors or the emergency services.
– prompting an intruder
detection. They are normally deployed to monitor building
heavy deployment entrances, movement corridors and points of alarm such
to look elsewhere.
of CCTV as a total as emergency exits and critical areas. Video motion However this does not
detection can generate an alarm when an intruder enters a Search and Screening Systems: Walk-through metal
security solution. selected section of the cameras view and trigger recording detectors and baggage screening equipment are intended apply to a determined
However, CCTV is not or prompt other actions. to detect the presence of concealed weapons or other terrorist who is willing to
prohibited items. They are normally deployed at the
the panacea to safety entrance to the building and will require power and space sacrifice his or her life
and security. Research for queuing and further searching.
Access Control Systems: Access control technologies are
has proven that it is also deployed to building entrances and at transition points
through other internal zones. At the main entrance they
most effective when are likely to be associated with turnstiles, whereas for
Security systems
combined with other other internal areas, they are more likely to be associated must be integrated to
with normal door locking mechanisms.
measures maximise efficiency
and effectiveness

An ergonomically designed control room allows security personnel to monitor security


systems on a 24 hour basis

206 5. Design Toolkit 5. Design Toolkit 207


6
Case Studies

Secure communities

208 6. Case Studies 6. Case Studies 209


Al Bandar
Context Al Bandar demonstrates Principles and Toolkit in Practice benefits from clearly defined boundaries and
transitions between each zone.
the implementation of the Al Bandar consists of spaces to which
Principles, Planning Toolkit different users have varying degrees of Combined with good access control,
access rights and ownership. The plan below landscape design and features, these
Al Bandar is located at the eastern end of Al Raha Beach, within close and Design Toolkit outlined broadly divides the types of spaces open measures help to create a safe and secure
proximity to Abu Dhabi International Airport, Etihad’s headquarters
and the main Abu Dhabi-Dubai Highway. in this Manual. to users into four zones - Private, Semi- environment.
Private, Semi-Public and Public. The scheme
The developer’s intention was to create a living community in Al Raha
Beach, and Al Bandar forms one part of it, fostering a multi-cultural
community and encouraging a sense of place.

Within the development there is a full-service marina, supermarket,


beverage store, laundry, tennis court, swimming pools, dining areas,
an optician, pharmacy, nail salon as well as other retail, plus a
residents’ clubhouse with multi-purpose facilities.

To Dubai

SITE PLAN

Al Bandar

Abu Dhabi Airport

To Abu Dhabi Single Vehicle Access Control Point

Al Bandar, a high-quality waterfront Zones Access


mixed-use development, exhibits many of Private Residents’ parking
the traits of a safe and secure development.
Semi-private Visitors’ parking

Semi-public Delivery & emergency access

Public

210 6. Case Studies 6. Case Studies 211


Spatial Definition
Vehicle Access Control
Throughout the development, there are
Designers have introduced a single access
clearly defined spaces.
control point to the development. By
minimising entry to the development via
In the example to the right, psychological and
a singular route, it is easier to prevent and
physical cues are used to deter unwanted
monitor unauthorised vehicular access.
access, without resorting to physical barriers.
Vehicle movement is also restricted to the
edges of the development, the exception
being for deliveries and emergency response.
Residents and visitors’ parking areas are
located in underground basements, again
these are accessed near the entrance of the
development, away from the main residential
and commercial buildings.

Ownership Public Image

In the example to the right, changes in The decision taken during the planning and
paving and signage have been used to design stages to create high-quality spaces
define ownership of space. Where physical throughout the development (that are easy
barriers have been used, they are attractively to manage and maintain) has had a positive
designed, blending in with the streetscape. It impact on safety and security. In addition,
is clear to different users where Semi-Public the open spaces offer opportunities to
and Semi-Private areas begin and end; in enhance natural surveillance and are also
this case the space beyond the gate is for adaptable and can be utilised to support
residents’ use only. emergency response and special events.

Caption to be inserted

212 6. Case Studies 6. Case Studies 213


Signage and Wayfinding

The movement framework is well-defined,


offering convenient movement between
public destinations and discouraging use of
more private areas.

Routes and destinations are clearly signed


and oriented, helping users move from
place to place safely. Evacuation routes and
emergency meeting points are well-planned.

The high-quality signage and street


furniture contribute to community and
place identity. SITE PLAN

Activity

The variety of uses, shops, cafes, marina,


housing and other leisure facilities helps
create a mixed-use community. As a result
more people are around at all times,
keeping more eyes on the street.

Surveillance

There are high levels of natural surveillance


throughout the development. Public spaces,
facilities and movement routes can be
observed by residents. In the context of
this mixed-use community, this is highly
desirable as good natural surveillance is more
of a deterrent than active systems.

214 6. Case Studies 6. Case Studies 215


Emirates Palace Hotel
Context The Emirates Palace Hotel
in Abu Dhabi exemplifies a
number of the safety and
The Emirates Palace Hotel is one of the world’s most distinguished
hotels and is one of Abu Dhabi’s most celebrated iconic structures. security planning and design
interventions outlined in
It is frequented by world leaders, celebrities and other members
of elite society and regularly hosts significant special events such the Manual. Elements of
as the 31st GCC summit and Queen Elizabeth II’s 2011 State Visit. the hotel’s physical security
As a result, protective security was a key planning and
design requirement.
programme are apparent
to the public and are
captured in this case study
to illustrate how protective
security can be achieved in
balance with aesthetics and
function. Their visibility acts
as a deterrent, as much as
to detect, delay and deny
intruders.

Principles and Toolkit in Practice

The Emirates Palace security operation has


employed an exemplar physical security
programme across the site that is holistic and
balanced. Key strategies that are transparent
from the public domain include:
• Scalable multi-layer defence system
to respond to a change in threat or to
accommodate a special event;
• Deployment of HVM measures to protect
against vehicle borne attack.

216 6. Case Studies 6. Case Studies 217


Stand-off Movement Framework

The Emirates Palace Hotel benefits from a large The development has a well-defined
open site. The size and layout of the development movement framework plan for vehicles and
helps manage the risk of VBIED attack by pedestrians that benefits access control,
providing sufficient stand-off between the hotel wayfinding and traffic calming. Traffic is
and plot boundary. funnelled into the development through
separated entry points that serve different
functions and user groups.

Service Access Control

Topography
All deliveries for the development are
The topography of the development contributes processed through a dedicated on-site
to HVM by offsetting approaches to the hotel delivery reception area, located away from
and to naturally reduce the speed of advancing the hotel. The location provides sufficient
vehicles. It also contributes to crime prevention stand-off between the facility and the hotel
by enhancing natural surveillance. to help manage the risk of VBIED attack via a
service vehicle.

On-site delivering
reception area

218 6. Case Studies 6. Case Studies 219


Access Control Points Boundary Treatments

Vehicles and people are funnelled into the A wrought iron ornamental fence, designed
development through designated entry for HVM, is applied around the development’s
points which are actively monitored and boundary, with exception to the northern
controlled using a combination of physical boundary. On this boundary, the maritime
and operational measures. domain acts as a natural barrier while
patrolling by CNIA vessels controls access to
the marina.

The fencing creates a secure perimeter


around the Emirates Palace and it is
well-maintained and creates a good public
image. The fence and urban design of
the surrounding area promotes natural
surveillance between the public realm
Each vehicle control point is fit-for- and hotel grounds and prevents quick
purpose to enable vehicle searching circumvention of the fence via tunnelling
and entry or rejection based on the and climbing.
security operator’s findings.

The actual control operation is scalable


and designed to allow the security
operator to quickly respond to change;
lowering or raising the level of control
based on threat or a special event.

220 6. Case Studies 6. Case Studies 221


Adaptability

A number of physical solutions, all


appropriate and proportionate, are employed
in combination with natural barriers to define
and enforce each layer. This helps achieve the
development’s security requirements while
maintaining a welcoming and functional
hotel operation.

Scalable physical solutions, like the active


bollards and wedge pictured, are installed
to enable access (when necessary) through
each layer at a designated entry point.
Permanent solutions like the perimeter fence
and fixed bollards are employed to funnel
traffic to the entry point.

Lowered operation

Heightened operation

222 6. Case Studies 6. Case Studies 223


Wasat Madinat Abu Dhabi (Sector E4-01)
Introduction The Wasat Madinat Context
The Wasat Madinat Abu Dhabi (Sector E4-01) revitalisation project revitalisation project
is featured as a case study in this document because it:
is part of a wider
• Is a master plan project for an existing community;
revitalisation master The development is comprised of
• Demonstrates the value of integrated planning; a dense population and a rich mix of uses;
planning initiative a few of which are not compatible. Certain
• Illustrates the benefits of applying the safety and security planning
and design Principles in an existing environment; intended to help sustain groups of people are not active in the
community because there is a lack of the
• Is a large mixed use community in a downtown setting; and the northern portion right type of community facilities. Others are

• Shows signs of crime and misuse.


of Abu Dhabi Island as forced to misuse available space to sustain
their interest, such as playing cricket in the
newer, significant master car parks.
When tested against the Decision Support Tool, the project would be planned communities
assigned a “Low Priority”, As such, safety and security is important, Pedestrian circulation across the development
but is unlikely to have significant influence on development proposals become available in is not based on an effective movement
and counter terrorism is not a primary planning or design consideration. and around the Island. framework plan and pedestrian routes are
of poor quality. This offers little distinction
This case study will provide evidence that the safety and security between where a person should and should
planning and design principles have been applied to this project not walk, and people can be seen frequently
and helped to improve community safety and security. using utility corridors to reach their
destination. Consequently, some pedestrian
routes are under used and more likely to
experience misuse and crime.

The image of the existing environment is


not positive and unlikely to instill a sense of
ownership or encourage people to contribute
to community safety and security.

Signs of misuse and crime are evident


across the development but are
predominately concentrated in areas
that have no apparent purpose.

224 6. Case Studies 6. Case Studies 225


Key Problem Areas Process A planning and design charrette was hosted
by the team to interview a number of local
residents. Information obtained during the
interviews was then cross analysed with the
The master plan was developed as part site inspection findings.
Natural Surveillance
of an integrated planning and design
process and the project was led by a Once the project’s safety and security needs
The space pictured has limited natural
multi-discipline team, including safety were identified, the project team identified,
surveillance from the surrounding
and security specialists. explored and evaluated a number of planning
community, is poorly lit and is a long
options to ensure that the right concept was
narrow pedestrian route.
The team was first briefed about the vision selected for further development.
of the wider North Island revitalisation
initiative, then carried out a site inspection to The selected safety and security concepts
observe existing conditions that contribute to were then integrated in the master plan
crime and misuse. alongside other planning objectives.

Public Image

The cemetery wall shows strong evidence


of crime and misuse.

Ownership

This space has no defined purpose and


as a result lacks ownership.

Multi-discipline planning and design charrette

226 6. Case Studies 6. Case Studies 227


Principles and Toolkit in Practice Implementation 1 Cemetery / School

The master plan will be constructed over the Visually permeable fencing will
course of many years. replace existing walls around the
Key elements of the project vision that are cemeteries and school; improving
integrated into the master plan include: “Quick wins”will be employed today to help natural surveillance. The plan also
improve areas that experience more crime and 3 proposes to redevelop the school
• A public realm that expresses traditional to include shared facilities with the
misuse. This will help establish a foundation 1 2
Arab culture while serving the diverse, 3 3
community; this will help activate
for development as delivery continues in
multicultural population; the area around the school and
the future.
• A broad array of community facilities southern cemetery, and promote
within walking distance of most residents Quick win suggestions include: 4 ownership.
and businesses; • Additional tamper proof lighting; and
• Access to public transport options; and
2 Community Facilities
• Replacement of cemetery and school
boundary walls.
• Efficient vehicular access and parking facilities 3 Parks and leisure areas are provided
3
3
for the local community.
The master plan contributes to safety and
security by: 3 Public Realm
• Introducing the right types of community
facilities in the right places to balance 4 Existing space with no apparent
activity across the development; purpose will, in many cases, be
programmed as a series of new
• Establishing a well defined movement
open spaces (i.e. linear parks,
framework that offers convenient
community parks, family parks,
movement between places while 4
Meyadeen parks).
discouraging use of more private places; 1

• Improving the public realm to restore 4 Parking


public image and compelling people to
take an interest and become active in their The development’s parking
community; contributing to community requirement was addressed
safety and security as observers; and innovatively using a number
• Adopting designs that make it clear where of strategically placed parking
public space ends and where communal, structures, to limit surface parking.
4 3 3
semi-private or private space begins. This was instrumental in freeing
space to enable the introduction of
more community facilities and open
space across the development.

228 6. Case Studies 6. Case Studies 229


Saadiyat Island Cultural District
Introduction The Cultural District on
Saadiyat Island is to be devoted
to culture and the arts. It
The Saadiyat Island Cultural District Master Plan project is featured as a
case study in this document because it:
aims to be a centre for global
• Is a new master plan that includes four high profile, culture drawing local, regional
iconic, cultural buildings requiring protective security; and international visitors
• Demonstrates the advantages of early project engagement with unique exhibitions,
and integrated planning; and
collections and performances
• Illustrates the benefits of addressing safety and security requirements
using the tools presented in this Manual. at iconic institutions housed
in buildings, which constitute
a statement of the finest The Louvre Abu Dhabi

Context architecture.

The development is predominantly mixed use but will be home


to the Zayed National Museum (ZNM), Louvre Abu Dhabi (LAD),
Guggenheim Abu Dhabi (GAD) and Performing Arts Centre. Each
museum is considered a crowded place and will require protection
against terrorism and specific types of crime, particularly art theft.

Co-location of the four museums is an example of clustering buildings


of similar risk profile.
The Cultural District The Zayed National Museum

The Guggenheim Abu Dhabi The Performing Arts Centre

230 6. Case Studies 6. Case Studies 231


The Process Solution 1:
Realignment of the Canal
The canal was realigned and the ZNM
An integrated development process was relocated to create a natural protective barrier
adopted by the Tourist Development around the museums. This natural barrier
Investment Company (TDIC). This approach was later supplemented by the deployment
was successful for several key reasons: of HVM measures at the bridge locations
crossing the canal, which will enable the
• Security was identified by the client as a
establishment of a security zone during times
primary planning and design requirement;
of heightened threat or special events.
• A safety and security specialist was included
as part of the multi-disciplinary team in the
earliest stages of planning to help identify and Original canal layout
balance requirements for the project;
• The project adopted a risk based approach
to identify and address safety and
security needs;
• Early involvement enabled each design team
to achieve the security objective through very
different, innovative solutions;
Cultural District, Saadiyat Islanc
• The master plan resulted in a significant
reduction in risk through planning and
design; and
• Security requirements were achieved without
negatively impacting on aesthetics or function.

This process resulted in the following five Modified canal layout


solutions:

1. Realignment of the canal


2. Maritime boundary treatment
3. Remote logistics delivery
4. Pedestrian screening
5. Movement framework enhancements

Distinct security zone

232 6. Case Studies 6. Case Studies 233


Solution 2: Solution 3:
Maritime Boundary Treatment Remote Logistics Delivery
Delivery vehicles and loading bays present
Both the LAD and GAD have extensive significant vulnerabilities in the design of a
maritime boundaries that make them museum, potentially facilitating a terrorist
vulnerable to boat borne terrorist attack and attack in the form of large VBIEDs and
high value art theft. The security requirement providing a location for high value art theft.
to achieve maritime denial and access control In order to address these risks, innovative
was achieved through two different but solutions were developed for the three
equally innovative solutions. museums.

Museum maritime boundaries


Remote logistic delivery Centres

Louvre
The LAD design team achieved maritime A shared remote logistics system is to be Guggenheim Abu Dhabi Abu Dhabi
access control through the development of a incorporated into the design for the Museum
concept based on Venetian piles. The piles of Park between the LAD & GAD museums.
different heights and sizes were reinforced This below grade facility will provide secure,
to security specifications, and deployed in dedicated delivery to the two museums, as
an apparently random pattern of layers to well as providing below-grade public parking. Logistics Centre
prevent an unappealing ‘stockade perimeter’. This design greatly increases the level of
deterrence and protection afforded to the
Louvre Abu Dhabi ‘Venetian pile design’ museums, enabling vehicle exclusion zones to
Museum Park
be maintained on each site.

The GAD design team achieved maritime Arabian Gulf


access control through the incorporation
Combined LAD and GAD museums logistic delivery centres below the Museum Park
of the security requirement into the design
of their wave attenuation barriers. The
specification and alignment of the barriers
Deliveries for the ZNM are processed through
was amended to satisfy both requirements.
a dedicated delivery reception area on the
In addition the large platforms surrounding
plot of the ZNM. The facility is located a
the museum served a dual purpose, providing
considerable distance from the museum,
a secondary layer to keep vessels away from
with internal movement through tunnels on
the museum facade, while enabling visitors
electric vehicles. This design also provides
to walk around the outside of the museum.
high levels of deterrence and protection and
enables a vehicle exclusion zone at ground
level to be enforced.
Guggenheim Abu Dhabi combined wave
attention and security barriers
Proposed logistics delivery centre for the ZNM

234 6. Case Studies 6. Case Studies 235


Solution 4: Solution 5:
Pedestrian Screening Movement Framework
The museums were directed to incorporate Enhancements
screening of visitors into their designs, to
mitigate against terrorist attack (particularly Main entrances present significant
PBIEDs and armed attack) as well as crimes vulnerabilities in the design of a museum,
such as armed robbery, theft and vandalism. being susceptible to both terrorism, in the
form of large VBIEDs, and high value art theft,
particularly armed robbery.

For the LAD, the screening locations were Several options for adapting the vehicle
pushed to the extremities of the development movement framework for the ZNM were
area on the pedestrian approach bridges. considered, each offering differing levels
These are located a considerable distance of access control from vehicle inclusion
from the museum gallery and public spaces through to exclusion schemes. An inclusion
and independent of the main structures of scheme was taken forward and the design
the museum buildings. team elected to close the approach road with
access limited to a small number of invited
Screening
users only.
Locations

Vehicle access control options

LAD screening locations Legend

Option 1:
The GAD project team have created a security Re-route traffic along the
control point for pedestrian screening that existing roads which run
achieves a high level of protection without parallel to the garden
impacting on the aesthetics of the museum
entrance. During design the screening Option 2:
location was moved away from its initial Flip the “U”shaped entry
location at the heart of the museum to its pathway to the south and
new position below grade, independent of divert the road around it
the main structure. Option 3:
Screening Drop the road below grade
GAD screening location Locations
level as it passes the front of
the museum

236 6. Case Studies 6. Case Studies 237


A1
Appendix 1: Risk Management

Secure communities
Risk Management

Introduction • HB436 (2004) Risk Management Guidelines; Applying this approach within the safety and Often balancing risks is difficult as they
Companion to AS/NZS 4360: 2004; and security discipline helps to move the focus of share causal relationships and dependencies.
thinking away from threat alone to a wider Striking this balance is a challenge and
• FEMA Risk Management Series.
consideration of safety and security risk. requires a continual thought and decision
This section of the Manual is not designed to making process. Within that context, different
The various stages of the risk management The need to manage risk systematically people all have different perceptions of, and
be a definitive guide to safety and security
process detailed below should be applies to all organisations and individuals attitudes towards risk. Some people actively
risk management; there are many excellent
incorporated into the wider Integrated and to all functions and activities within seek adventure and take greater risks in their
standards and best practice documents
Development Process; it should form part an organisation. The alternative to risk lives – participating in adventurous sports
that serve that purpose. Its purpose is to
of the main decision making process at management is risky management, or such as skydiving and mountaineering, where
outline the fundamental elements of the
each stage of the project. Ultimately, the making reckless decisions, or decisions that the chances of injury or even fatality are
risk management process and to set an
identification, analysis and evaluation of risk are not based on a careful consideration higher. Equally, others prefer to lead a more
expectation for the decision making process
will form the foundation for the treatment of the facts. This is unlikely to result in a sedentary lifestyle, choosing not to take any
within a project. One of the key weaknesses
options, which will be developed in planning desired outcome. The need for sound and more risks than absolutely necessary.
in the safety and security development
and design. systematic risk management applies to the The challenges of balancing risk and differing
review process to date has been the quality
development process as much as any other risk appetites are two of the key elements in
of risk assessment documentation supporting
What is risk and risk management? business or industry. project decision making.
planning applications. Therefore this section
Risk is widely defined as the potential for a
aims to inform planners and designers of
course of action or activity to result in an Certain land uses, adjacencies and Internationally, attitudes have changed
what to expect from their consultants.
undesirable consequence (or a loss). Risk occupancies can result in the creation of significantly in recent times, with a major
is inherent in everything we do, whether safety and security risks. Equally, the type focus on, and acceptance of the need for, an
The Manual will be supported by a Decision
it be riding a bicycle, managing a project, of business activity of a particular owner/ increased attention to safety and security.
Support Tool (DST) that will broadly
dealing with clients, taking decisions about tenant, or the people that work or visit that In some instances this can be driven by
determine if projects are Low Priority or
the future or deciding not to take any site, can result in additional risk. These misinformed perception, fuelled by an overly
High Priority. If assessed to be low priority,
action at all. We manage risks continuously, risks can greatly impact on our daily quality dramatic media. The result is that security
additional risk assessments will not be
sometimes consciously and sometimes of life. This fact is acknowledged in the investment may be misdirected to where
necessary as part of planning and design
without realizing it – deciding what to do UPC’s vision to plan Abu Dhabi as a safe and the ‘noise’ is, not where it is really required.
approvals process. Project teams will only
and when to make sure life continues as secure environment that promotes quality of This not only applies in terms of risk but also
be required to adhere to the Principles of
smoothly as possible with as few unpleasant life, preserves local values and culture and in relation to ‘favoured’ treatments, such
the Manual. If assessed to be high priority,
surprises as possible. contributes to economic sustainability and as a heavy reliance on the deployment of
projects will be directed to complete a risk
the overall welfare of the Emirate. CCTV cameras. Therefore the project risk
assessment. This should be conducted by a
In a business context, risk should be directly management process must assess and review
competent specialist and should follow the
linked to its impact on business objectives. Many developers and users feel that crime information for its relevancy, accuracy
guidance given in this section. No specific
This is an important definition because it and terrorism risks are the responsibility and credibility to ensure that the process
methodology is mandated, however process
exposes the increasing maturity in thinking of others e.g. Governments, police. Many identifies the relevant risks and results in
and documentation must conform to an
about risk that has occurred over recent years. believe they cannot be controlled or treated the implementation of the most effective
international recognised risk management
by an individual. This is not always the solutions; in short it must enable appropriate
standard, such as:
case and it is incumbent on every project decision making.
development, however large or small, to
• ISO 31000 (2009) Risk Management – consider these risks, how they impact on
Principles and Guidelines; people and their quality of life, and to ensure
• BS 31100 (2008) Risk Management – that they are appropriately addressed.
Code of Practice;
• HB 167 (2006) Security Risk Management

240 A1. Appendix 1: Risk Management A1. Appendix 1: Risk Management 241
Safety and Security Risk Management Process

Establish the Context

“Risk management is a more realistic term All risk methodologies require a systematic
and rigorous process with clear stages, Organisational
Strategic Context
than safety. It implies that hazards are responsibilities and outcomes or deliverables.
context

ever present, that they must be identified,


The following diagram shows the Security risk
analysed, evaluated and controlled or fundamental stages of a general risk management
context
rationally accepted.” management process. Compatible with
this, refined models have been developed
Jerome Lederer, Director of the Flight Safety Foundation for for security risk management, such as that
20 years and NASA’s first director of Manned Flight Safety, offered by HB167, as shown opposite:
quoted in his 9 February 2004 obituary, the New York Times. Threat Vulnerability Criticality
Assessment Assessment Assessment

Identify the Risks

Monitor and Review


Communicate and Consult
Establish the Context
What? When? Where? How? Who?

Identify Risks
Assess the Risks

Likeihood Consequence
Risk Assessment

Monitor and Review


Communicate and Consult

Analyse Risks
Evaluate the Risks

Tolerance Acceptability

Evaluate Risks

Treat the Risks

Avoid Accept

Exploit
Treat Risks

Share Reduce

242 A1. Appendix 1: Risk Management A1. Appendix 1: Risk Management 243
Communicate and consult
Communicate and consult with internal and
Analyse risks
Identify and evaluate existing controls if Fundamentally, safety and The process of mitigating risk is part of a
continuous and ongoing process throughout
external stakeholders as appropriate appropriate. Determining the consequence the lifecycle of the planning, design,
at each stage of the risk management process should the risk be realised and the likelihood security risk management construction, commissioning, occupation
and concerning the process as a whole. of such a risk with that consequence and operation of the building. Planners

Establish the context


occurring. Defining a level of risk based on a requires those involved to have and designers play an important role at
the beginning of this process and should
combination of consequence and likelihood.
Establish the external, internal and safety and
security risk management context, structure Evaluate risks
a thorough understanding think innovatively to remove vulnerabilities
whenever an opportunity arises.
and activities in which the rest of the process
will take place. Criteria against which risk
Compare estimated levels of risk against
the pre-established criteria and consider
of the principles and practice of Although this process commences at the
will be evaluated should be established and
the structure of the analysis defined.
the balance between potential benefits
and adverse outcomes. Determining the
risk management as well earliest stages of planning it must consider
the lifecycle of the project. Key requirements

Identify risks
tolerance to identified risks. Enable decisions
to be made about the extent and nature of
as a thorough understanding of for the process are

Identify where, when, why and how events


could prevent, degrade, delay or enhance
treatments required and about priorities.
safety and security. • Long term strategic planning;

the achievement of project/business Treat risks • Holistic approach;


objectives. In a security context this includes Develop recommendations and implement • Performance criteria; and
determining the threats, the assets under specific cost-effective strategies for
threat, the vulnerability of those elements to the treatment of priority risks. Assign “Risk management does not mean • Risk focus.
the threats identified and identifying specific accountabilities, responsibilities and budget
events and scenarios for risk treatment activities. Analyse and
finding 100 safeguards that are missing
evaluate residual risk. and drumming up a $1million budget
Monitor and review
to address them all. Risk management “From a practical perspective,
It is necessary to monitor the effectiveness means making informed decisions about what one ultimately seeks to
of all steps of the risk management process.
Monitoring of the external and internal
which risks to mitigate and which risks develop by completing a risk
security environments to detect change. to accept” analysis is a prioritised list of
Reviewing of the risks and their treatment
strategies for effectiveness and efficiency.
A White Paper for Health Care Professionals, HIPAA security risks that need to
Security Risk Analysis and Risk management
Methodology, 2010 be addressed with a risk
Within planning and design, the objective of risk mitigation action based on an
management is to reduce safety and security informed decision”
risks to an appropriate level, while balancing A White Paper for Health Care Professionals,
them with other planning and design objectives. HIPAA Security Risk Analysis and Risk
management Methodology, 2010
Risk management solutions should satisfy the
risk appetites of both the development owner
(client) and any Government stakeholders.

244 A1. Appendix 1: Risk Management A1. Appendix 1: Risk Management 245
Communication and Consultation Stage 1 – Establishing the Context

Like the wider development process, Establishing the context is the principal Internal Context
risk management also requires effective activity in developing the scope for safety The focus of developing the internal context
communication and consultation throughout. and security risk management. This includes is to create an agreed understanding of the
Effective internal and external communication establishing both the internal and external organisation’s internal environment and
is important to ensure that those responsible context of the development as well as the issues that may influence the nature of the
for implementing risk management, and safety and security risk management context safety and security risk exposures. The key
those with a vested interest, understand the (objectives, structure, processes, structure, elements of the internal context and areas
basis on which decisions are made and why stakeholders). around which questions should be posed in
particular actions are required. its establishment include:
External Context • The organisation’s objectives, plans and
Effective communication and consultation The term ‘external context’ refers to gaining strategies;
will improve participants’ understanding an understanding of the external environment
of risks, ensure that the varied views of in which the organisation is operating or may • Key business functions and processes;
stakeholders are considered and ensure be operating in the future.
• The type, extent and interaction of operations;
that all participants are aware of their roles
and responsibilities. It is vital in ‘getting The key objective is to identify factors in the • Historical crisis, disruption, disaster,
buy-in’ from stakeholders and should begin external environment that are going to have emergency, safety and security incidents and
at the earliest stages of the security risk an effect on the organisation, the manner in trend information;
management process. which it does business and ultimately, those
• Locations of business sites, accommodation,
factors that will have safety and security
Communication and consultation should and other operations;
risk implications for the organisation. It is
focus on engagement, participation, necessary to place some boundaries on the • Internal hazard locations (e.g. dangerous
information transfer between parties, the exercise to ensure that it remains relevant goods storage); and
perceptions of individual parties involved, to the risk management objectives for the
comprehensiveness and clarity of information planning and design process. • Presence of ‘sensitive targets’ (e.g. high profile
for making decisions and agreement individuals, sensitive information, attractive
between the parties involved on the assets, business critical assets and cash).
expected deliverables.

246 A1. Appendix 1: Risk Management A1. Appendix 1: Risk Management 247
Stage 2 – Risk Identification The full identification of safety and security The criticality assessment should focus on
risks normally involves separate processes: those assets that are of most importance to
• The Criticality Assessment – ‘what’ and the development, community or individual.
‘where’ answers;
Threat
Risk identification is concerned with creating In undertaking risk identification, a list of
• The Threat Assessment – ‘who’, ‘why’ and The aim of the threat assessment is to
a well thought out and comprehensive risks should be developed by considering the
‘when’ answers; and clearly identify the range of potential
determination of the sources of risks and following questions :
• The Vulnerability Assessment – ‘how’ threats arising from the external and internal
potential events that will have an impact
answers. security environments, and their relevance
upon the individual’s, organisation’s, or • How it could happen (a source of risk – for to the development. The threat assessment
community’s objectives. In the safety example a potential threat)? is concerned with identifying those events,
and security context, identification of risk Information to support these processes
• Why it could happen (a cause: actions, aggressors or adversaries that can cause
normally involves the consideration of can be gained from a wide range of
incidents or other underlying factors that losses to the development, organisational,
threat, asset criticality and vulnerability sources including:
create the source of risk)? or individual assets (as identified in the
assessment as primary inputs into the
criticality assessment above).
identification process.
• What could happen (a potential event or • Organisational loss and incident data;
incident, where the source of risk interacts Intentional threats, which are based on the
The words ‘threat’ and ‘risk’ are often • Local incident/crime data;
with some aspect of the entity with an notion of an attacker or adversary, include an
used interchangeably. However, risk is
associated consequence)? • Industry/Sector loss and incident data; assessment of the intent and capability of an
not a synonym of threat, although closely
• Where it could happen (the physical individual or group to undertake actions that
related, the two are significantly different. In • Open source information: media, internet,
locations and assets where the event could will result in harm or the expectation of harm
many circumstances a ‘threat’ will provide public reports;
occur or where the consequences may be to another individual, group, organisation or
a source for one or more risks. It is the
experienced)? • Intelligence assessments (from national community.
interaction between the threat and someone
or something, at a particular instance or over security agencies, industry associations etc);
• When it could happen (specific times or time and This includes:
a period of time that will create the risk.
periods when the event is most likely to occur • identifying the range of potential threats to an
Threats may exist, but not pose a risk. For • Comparative analysis with other organisations
or the consequences realized) individual, organisation or community;
example, a protestor/activist may present or developments that may have similarities in
a threat. However, the risk only emerges • Who could be involved (individuals or groups size, character, operations and locations. • examining the possible ways in which these
if there is some chance (no matter how that may be associated with the threat or may threats may interact with the critical asset,
small) that the threat will interact with impacted by the risk)?
Asset and Criticality either directly or indirectly, and understanding
something (structure, person, etc) to cause
The criticality assessment (or ‘asset the specific impacts that could arise; and
an event resulting in certain consequences Identifying risk is therefore about
(unauthorised entry, assault, criminal assessment’), involves the identification • determining how likely these threats are to
understanding the nature of the threat of the critical assets (people, property,
damage, vandalism). (the source of the risk), interacting with occur within a defined time frame or locality.
information and the processes that support
important elements such as the community, them) that may be exposed to, or harmed
development assets, etc (with importance by the threat. The criticality assessment
expressed through criticality) and in what is a vital step in the identification of risk
manner the nature of these elements will as it provides the starting point for a
THREAT is a function of Capability and Intent facilitate or inhibit this interaction (expressed consideration of the pertinent threats,
through vulnerability). and the development’s or individual user’s
vulnerability to those threats. In many
circumstances it would be difficult and costly
RISK is a function of Threat and Vulnerability to conduct a thorough risk assessment for all
assets, locations and people.

248 A1. Appendix 1: Risk Management A1. Appendix 1: Risk Management 249
Intent and Capability Threat assessments can range from quite Assessing Vulnerability This vulnerability model is of less value
general to very specific, depending on the in the early planning stages of the IDP,
level of information available. Within the The first step in the vulnerability analysis when security controls have yet to be
Threat is often expressed as a function of
development context, where information is considers how each of the credible threats considered. Therefore vulnerability is more
intent and capability. Intent is represented
limited, particularly during the earlier stages, can be realised against each of the critical likely to consider ‘generic’ vulnerabilities
by the expressed aims, objectives, desires,
assessments are more likely to veer towards assets. This involves determining associated with certain land uses and building
or directions of the threat and includes the
the general scale, providing general threat two elements: types. However this model is useful when
motivational factors for such individuals or
levels against types of land use, industries • How a successful ‘attack’ against the asset considering the treatment of risks in order to
groups. Capability considers factors such
or tenants. could be carried out (based on the DBTs); and determine how many layers of defence are
as skills, experience, resources, numbers
required and what should be in each layer.
of attackers, supporting networks and their • The effectiveness of each of the layers of
If possible, the threat assessment should Best practice would dictate that the higher
overall ability to conduct criminal or terrorist defence in preventing this event
culminate in the development of a range the risk, the more layers are required and the
operations. As assessment of intent considers from happening.
of credible threat scenarios or Design more robust each layer should be.
the question “will they attack” while
Basis Threats (DBT’S). These express more Many safety and security controls will exist in
capability considers the question of ‘how
specifically how the threat is likely to a ‘layered’ or ‘defence in depth’ structure. No Summary
effective will they be if they do attack”.
manifest. For example while assessments matter how many layers are in place or how For the identification of risks, it is necessary
may identify a general threat from terrorism, well constructed they are, they cannot be one for all of the above elements to be combined.
it is more helpful, particularly in the planning hundred percent effective for one hundred
and design process, for a range of DBTs to percent of the time. Borrowing a safety model Threat
be considered e.g. a large Vehicle Borne developed by James Reason, each of the layers Who or what will potentially cause harm
Improvised Explosive Device, a Person of security controls or countermeasures) will (informed by the threat assessment).
Borne Improvised Explosive Device and a resemble a slice of Swiss cheese, with holes
Coordinated Small Arms Attack. This helps of varying number and size through it. Under Asset
project teams to better understand how the normal circumstances the holes are covered by What site, area, person, entity, process, or
threat may apply to the development and subsequent layers of controls. However, under other assets will be affected (informed by the
what the vulnerabilities are; this in turn can certain circumstances the holes in all layers will criticality assessment).
be used to inform a more specific treatment line up and all defences can be penetrated. The
plan. These scenarios should be based on aim of the vulnerability analysis must not only Vulnerability
historical trend data, previous incidents, be to identify and characterise holes in each of What controls or other operational parameters
intelligence (from local police crime the layers; it must also consider the potential could be exploited (informed by the
advice/intelligence). for these holes to align. vulnerability assessment).

Event
In what manner or circumstances will the
harm be realized (informed by considering
threat, asset and vulnerability).
Hotels Abu Dhabi UAE UK, USA, France Tourists

For example, the following description may


be useful: ‘there is a risk that terrorists
Specific Threat General Threat
could deliver a large VBIED in a private car to
the porte corchere of the hotel, resulting in
considerable damage, fatalities and injuries to
guests and staff.
Deter Detect Delay Respond Recover
The Attack

250 A1. Appendix 1: Risk Management A1. Appendix 1: Risk Management 251
Stage 3 – Risk Analysis Likelihood and Consequence Risk analysis requires a careful consideration
of both likelihood and consequence.
The likelihood refers to the chance or

Risk analysis should provide decision Methodologies


Example Criteria probability of an incident or event. The
likelihood can be estimated as an absolute
probability (e.g. occurring with a probability
makers with sufficient information to Many methodologies exist, quantitative
of between 0 and 1), as a percentage
make an informed decision on the need for versus qualitative, subjective versus Likelihood Criteria
chance of occurrence, as the chance that
increasing or decreasing the investment being objective, some are general while others are Almost Certain • Over 99% Probability, or
something will occur over a defined period
made for protection across the spectrum very detailed in their approach. No single • ‘Happens often’, or
(e.g. ‘over the next two years’) or as a
of assets under consideration. The risk approach is regarded as absolutely correct • Could occur within ‘days to weeks’
general statement of likelihood (e.g. certain,
analysis involves the consideration of the or wrong, all models have implicit flaws to Likely • >50% Probability, or unlikely).
risk description, developed in the previous a larger or lesser extent. Also methodologies
• ‘Could easily happen’, or
identification step, along with the combined should not be rejected out of hand because
• Could occur within ‘weeks to months’ The consequence of safety and security
outputs of those analyses (threat, criticality, they appear to be overly simplistic.
Possible • >10% Probability, or risks can usually be expressed as a measure
and vulnerability analyses) that contributed Some highly sophisticated and complex
• of financial loss, stakeholder/community
to its formulation. The risk analysis should mathematical models can, depending upon ‘Could happen, has occurred before’, or
impact, reputational damage, loss of
examine how these factors interact to the context, be of less utility than much • Could occur within ‘a year or so’
operational capability, or health and safety
determine an overall level of risk through a simpler models. Unlikely • >1% Probability, or
implications. Impacts derived as part of the
consideration of the consequences of the • ‘Has not happened yet, but could, or criticality assessment are used to inform the
event occurring combined with the likelihood However it is important that a known • Could occur ‘after several years’ determination of overall risk consequence.
of the event with that consequence. These methodology is identified and followed. In
Rare • >1% Probability Care should be taken to consider the indirect
risks should be prioritised so that project the IDP context, particularly during the early
• ‘Conceivable but only in extreme circumstances’ consequences, such as loss of reputation,
teams can readily identify which risks require planning and design stages, little information
• loss of revenue during recovery and so on.
the greatest level of consideration during is known and therefore detailed analysis may Exceptionally unlikely, even in the long term future
planning and design and ultimately, how not be possible. Equally specific analysis may • a ‘100 year event’ or greater
much ‘weight’ will be afforded to them as not be necessary – the primary aim of the
‘design drivers’. risk analysis should be to inform planning and
Consequence Financial Rating Reputational Rating Project/Business Rating
design decision making. Rating (AED)

Catastrophic >350,000,000.00
A sensible approach
Extreme negative coverage causing public outcry Serious process breakdown that prevents the
appearing consistently over weeks achievement of mission official objectives
Majority of stakeholders severely disadvantaged (months) Multiple severe injuries, including fatalities

Major >20,000,000.00 Negative significant coverage, appearing Serious process breakdown that substantially impedes
<350,000,000.00
A security consultancy working for a major developer delivered an ‘all hazard’ risk consistently over weeks
Multiple stakeholders severely disadvantaged (weeks-months)
the achievement of a core objective
Multiple severe injuries, or a single fatality
analysis that applied all threats to a full range of assets. The formulaic approach Moderate >200,000.00 Negative coverage lasting for several days, and/or frequent Process breakdown that impedes the achievement of an

allocated a numerical value for threat, vulnerability and consequence with additional <20,000,000.00 occurrence for several weeks
Multiple stakeholders experience significant disadvantage
important objective or causes extensive inefficiencies in
key processes
weighting factors to create overall numerical risk values. The process resulted in (weeks) Multiple casualties requiring hospital attention

Minor >8,000.00
2350 individual risk scenarios of largely irrelevant or inappropriate analysis – such <200,000.00
Minor negative coverage, limited circulation for one day
Minority stakeholders experience disadvantage (days-weeks)
Process breakdown that impedes the achievement of one
or more objectives or some inefficiencies in key processes
as the ‘risk of storm surge to a cash point’ and ‘solar radiation against a road’. The Minor injuries requiring hospital attention

complicated and long-winded process failed in its primary objective – which was to Minimal <8,000.00 Isolated brief coverage, single media outlet
Stakeholders experience minimal disadvantage (days)
Process breakdown or inefficiencies that have a
limited impact on the achievement of an objective
inform the development process and facilitate security decision making. Minor injury requiring first aid only

252 A1. Appendix 1: Risk Management A1. Appendix 1: Risk Management 253
Challenge - Low Likelihood, Most Credible Worst Case Scenario
High Consequence Risks

Small losses rarely present a problem


to an organisation unless the frequency
becomes so high that their aggregate effect In safety and security risk assessments (particularly when focused on national
“There is evidence to indicate that we are
approaches that of a single medium loss. security issues) the consequence of the worst case scenario is often adopted. The
However, large losses present the most generally not very effective at responding to low ultimate worst case scenario of any safety and security risk could potentially be a
serious problem; they rarely happen but if probability high impact risks such as terrorism,
realised, the impact could be catastrophic. catastrophic loss to any project, organisation or community, involving mass fatalities
until it is too late”. and destruction. However, such extreme worst case scenarios are not those that
There are two concerns about focusing on Then, S.K. and Loosemore, M. (2006), Terrorism Prevention, are experienced by the vast majority of organisations that are the victims of such
such risks. Firstly, the obvious danger is that Preparedness, and Response in Built Facilities. Facilities Journal,
the far more likely lower consequence events Volume 24, Number 5/6, pp 157-176, Sydney Australia: Faculty of security incidents. Instead it may be more prudent to consider the concept of
can be missed or given insufficient attention. the Built Environment, University of New South Wales. ‘most credible worst case scenario’, which introduces a degree of practicality and
plausibility into the analysis.
Secondly, there is also an inherent difficulty
in conceptualising these low likelihood high
consequence events. By their very nature For example in a worst case scenario, a small bump of the head could result in
they are outside of the experience of the
delayed concussion later whilst driving, causing a serious road accident involving
majority of people, they are difficult to
subjectively analyse and should they occur, multiple vehicles, resulting in a significant number of fatalities and injuries. The
they can rapidly overwhelm most coping most credible worst case would result in the victim suffering concussion possibly
mechanisms. Human perception being what requiring hospital treatment. Therefore, it is usually appropriate in looking at
it is, these types of events either receive
unwarranted attention or fall outside of usual high consequence (and usually low likelihood) events to use available historical
consideration processes. precedent to determine realistic worst case losses that could be expected from a
particular risk (hence the ‘most credible’ scenario). For both crime and terrorism
related risks, a large database of previous incidents is available to determine
realistic consequences.

254 A1. Appendix 1: Risk Management A1. Appendix 1: Risk Management 255
Overall Risk Rating Stage 4 – Risk Evaluation Transfer
Share, outsource or insure the risk, e.g.
The overall level of risk or ‘risk rating’ request that a Government agency deals
is determined through combining the The 4 Ts: with the risk, especially during high profile,
consequence and likelihood estimations. Terminate The crux of risk management is this forth international events. In reality only part of
The example table right, provides one
example of a matrix approach for estimating
Example Table Transfer stage in the process, the decision making the responsibility for managing the risk can
be transferred, some responsibility and all
related to the identified and analysed
a risk rating. Risk rating in this manner Treat accountability for the risk remains with the
Consequence
risks. The aim of risk planning is to select
allows the risks to be prioritised in order of Tolerate and implement measures to minimise first party.
decreasing relative risk level from ‘Extreme’ Minimal Minor Moderate Major Catastrophic
the expected loss by either reducing the
to ‘Low’. It also provides an aid to decision Almost Certain Medium Significant High Extreme Extreme
likelihood, impact or both. However some Treat
making regarding the tolerability of risk Likely Medium Medium Significant High Extreme
risk will always remain, especially with Mitigate the risk, e.g. install protective
which is determined during risk evaluation. security measures such as HVM barriers (this
Likelihood
Possible Low Medium Significant High High
intentional risks such as terrorism, which
Unlikely Low Low Medium Significant High
cannot be totally eliminated. This is a critical is the main focus of the Safety and Security
Scales and formula Rare Low Low Medium Significant Significant message to consider during the development Planning and Design Toolkit).
A cautionary note on the use of scales in the of the built environment, in particular for
measurement of risk: developments such as hotels and tourist Tolerate
A number of methodologies attempt to destinations, where the standard ‘defence in Accept and plan for risk occurring e.g. allow
perform feats of quantitative analysis that depth’ model with multiple layers of robust vehicles into a development but ensure that
are mathematically unsound, because of the security cannot be adopted. emergency vehicles can respond effectively
very nature of the rating scales that they are to any incident. If this option is chosen then
trying to use. There are certain mathematical stakeholder agreement needs to be sought
things that you just cannot do with certain “Remember, there are just some The 4 Ts
and the level of residual risk (the remaining
It is widely accepted in the risk management
types of scales. For example, ordinal scales, things you cannot do with some discipline that there are four ‘options’ risk that has not been treated) carried over
where data is sorted into comparative into later stages of the project must be
scales (‘High’, ‘Medium’ and ‘Low’ or where types of scales, If you do, the available for reducing identified risks,
clearly articulated.
sometimes referred to as the 4 Ts:
numbers – 1,2, 3,4,5 etc – are assigned for products could be nothing short
relativity but not magnitude) mathematical Security risk decision making will depend on
treatment is likely to be arbitrary in the of nonsense”. the project evaluation criteria, which may
Terminate
absence of zero points. With the interval HB 167 (2006) Security Risk Management Eliminate, withdraw from or not become vary depending upon a range of
scale, where there is a constant interval involved in an activity associated with the factors including:
between numbers (but where the zero point risk e.g. prevention of personal safety risk by • Prevailing political, stakeholder or community
may be arbitrary) for example the Fahrenheit not undertaking overseas travel to a specific sensitivities and expectations;
temperature scale: numbers can be added location at that time. In a development
and subtracted but cannot be multiplied/ • The nature or types of the incident involved;
context this is rarely achievable, although
divided: e.g. 20°F is not twice as hot as 10°F. relocation should be considered if the risks • Existing or emerging incident trends;
are assessed to be very high and treatment
• Strategic or business priorities;
makes the project less financially viable.
• Resource availability for treatment and other
project planning and design constraints; and
• The ability of the organisation, community or
individual to absorb losses.

256 A1. Appendix 1: Risk Management A1. Appendix 1: Risk Management 257
Intolerable
Decisions on the tolerability of risk can Stage 5 – Risk Treatment Safety and security can be an emotive subject
be based upon straightforward decision as invariably parts of a development or some
criteria that divide risks that require buildings will not receive as much treatment
treatment (intolerable) from those that do Immediately as others. It is not possible to protect all
not (tolerable) e.g. any risk with potential assets against all plausible threats. They must
Where a security risk has been determined as
safety or reputational consequences above Treat Near future Incapacity therefore be prioritised to maintain a
to manage
intolerable (during the risk evaluation stage),
‘Moderate’ is intolerable. In reality, tolerance balance between competing planning and
some form of treatment will be required to
is more likely to be exhibited as a gradient, Longer term design objectives.
manage the risk. It will never be possible to
where the risk may become increasingly
completely remove risk. The aim is to manage
less tolerable as the risk level is elevated Monitor Risk treatment is the main focus of
the level of risk to a tolerable level. Such
and where a range of other contextual Tolerable the Manual, in particular reducing the
treatment will usually involve some form of
factors, such as a decreasing capacity to Increasing Risk vulnerabilities within the project plan and
improvements to controls already in place, or
manage the risk will influence the decision design. The Planning Toolkit and Design
the introduction of new controls.
on risk tolerance. This degree of flexibility Toolkit include a suite of guidance to reduce
is particularly relevant to development these vulnerabilities and consequences.
Cost In the safety and security environment, risk
projects, where the application of additional The approach of reducing the risk will
treatment often results in an unhealthy focus
layers of defense may inhibit other design vary depending on project opportunities,
on one particular mitigation to the exclusion
opportunities, which may be unacceptable constraints and level of risks, however the
of other types of control measure e.g. an
for lower risks. Safety focus should be on the innovative use of
+ over reliance on technology such as CCTV,
planning to minimise safety and security
Security or conversely, an over reliance on purely
Therefore the decision may focus not so Intervention risks. Throughout the design process, projects
physical measures. As part of the IDP, it will
much on whether to treat/not treat but should also seek innovative solutions, such
Benefit be necessary to offer a balanced and holistic
rather it will focus on how much safety and as landscaping, street furniture, and public,
solution, applying the most appropriate
security to put in and at what stage of the art before resorting to standard security
and effective package of measures at the
project cycle. Time treatment options.
most appropriate stage of the project life
cycle. Also, projects should be able to show
The decision making will certainly require
a direct link between the measures being
consultation and agreement with all relevant While reducing risks later through proposed and the vulnerabilities that are
stakeholders. In early planning this decision
is particularly difficult as information is operations is a sensible option, being addressed to lower the level of risk. As
the development process is iterative, it would
incomplete. However developers should developers should avoid the easy be appropriate for projects to discuss options
look to reduce the risk through planning and
design where possible; treatment measures and cheaper option of passing the for the treatment of these key vulnerabilities,
which should be accompanied by an
should be proportionate and appropriate. responsibility for risk treatment to later assessment of safety and security and cost
These decisions should be captured in the
project safety and security brief, which in the project life cycle - risks should be benefit, as well as the impact of introducing
the measure on other project disciplines.
should identify the priority risks to be treated as early as possible and where
treated, the overall approach to deciding
how those risks are to be treated, as well the measures can be most appropriate
as highlighting those risks that are to be and effective. “Rarely it is possible to
tolerated.
protect all assets against all
plausible threats.”
“There is no such thing
as zero risk”

258 A1. Appendix 1: Risk Management A1. Appendix 1: Risk Management 259
Stage 6 – Monitoring and Review

The safety and security risk environment is IDP


not constant. Organisations, communities
and individuals are also in continual flux, The Integrated Development Process (IDP)
sometimes discretely, often dramatically is a continuous, iterative process. Equally,
over short periods of time. Perhaps the safety and security risk management
more importantly in the IDP, the project process is dynamic and cyclical in nature.
environment is extremely dynamic, with While these two processes are completed
continual changes in plans and designs that in parallel, they also need to interface and
all have an impact on risk. Monitoring of risk interact regularly. This is primarily achieved
provides the capability to respond effectively through the involvement of the safety and
to these changing environments. Far too security specialist, who constantly updates
many risk management activities finish the assessment and treatment plan as the
with the monitor and review step - it is a plan and design unfolds.
continuing cycle, and should be completed at
each and every step of the project process. It is the role of the safety and security
specialist to ensure that a risk management
In particular, the concept of ‘monitor and process is adhered to and the following
review’ requires project teams to: requirements are met at each stage of
• Continuously examine the external and the IDP:
internal environments and reconsider the
context and its effect on safety and security • Take ownership of the safety and security risk
risk management; management process with regular assessment
of risk and identification of residual risk;
• Redevelop the analytical outputs of the safety
and security risk management process to • The approach to risk management is
reflect the changing context; tailored to the development and the
requirements of stakeholders;
• Assess the efficiency and effectiveness
of treatment plans in mitigating the risks • Key safety and security decision directly relate
identified; and to the reduction in likelihood or consequence
of a risk;
• Re-evaluate the appropriateness of treatment
activities to manage a dynamically changing • Any transferring, sharing or acceptance of
risk and project environment, including residual risk is clearly articulated; and
changes in the plan or design and value
engineering exercises. • Changes to the development or removal
of safety and security measures have an
associated ‘risk cost’ identified.

260 A1. Appendix 1: Risk Management


A2
Appendix 2: Glossary

Secure communities
Glossary
Accessibility: The ability Building Facade: The separation Community Safety: Strategies Decision Support Tool:
for people to move round between the interior and the and measures that seek to A web based ‘on-line’ facility
an area and to reach desired exterior environments of a reduce the risk of crimes to be used by developers at
destinations, including ‘mobility building. It serves as the outer occurring and their potential the pre-planning stage to gain
impaired individuals’ (elderly, shell to protect the indoor harmful effects on individuals an appreciation of how much
disabled people, those with environment as well as to and society, including fear influence safety and security
small children or encumbered facilitate its climate control. of crime, by intervening to may have during planning
with luggage or shopping). Building envelope design is a influence their multiple causes. and design. At the end of the
specialised area of architectural process there will be only two
Access Control: The control of and engineering practice that (UN Economic and Social outcomes, High Priority or Low
persons, vehicles, and materials draws from all areas of building Council, resolution 2002/13 of Priority.
through the implementation science and indoor climate 24 July 2002, Annex)
of security measures for a control. Defence in Depth: The strategy
protected area. Crime: An action or omission of forming layers of protection
Chemical, Biological, which constitutes an offence for an asset (see assets).
Active frontage: An active Radiological and Nuclear and is punishable by law.
frontage is an area where (CBRN): CBRN materials can be Deter, delay, detect and deny:
frequent use or adjacency to used in terrorist attacks. There Crime Prevention Through Key prevention principles in
have so far only been a few
windows, mezzanines etc. Environmental Design designing out the opportunities
examples of terrorists using CBR
provides a high degree of natural (CPTED): A theory that when for crime:
materials, most notably a sarin
surveillance. a development is appropriately
gas attack on the Tokyo subway
designed it can reduce the Deter – This constitutes a
mass transit system and anthrax
Alarm System: Combination likelihood of crimes being visible deterrent to dissuade
letters in the United States.
of sensors, controls, and committed. By introducing such the opportunist; measures may
annunciators (devices that measures it is anticipated that include physical obstructions
Closed-Circuit Television
announce an alarm via sound, (CCTV): See video surveillance this will assist in minimising such as doors, the presence of
light, or other means) arranged system. the incidence of crime and security personnel and technical
to detect and report an intrusion contribute to perceptions of security systems e.g. CCTV.
or other emergency. Collapse - Progressive: increased public safety.
A building undergoes Delay – Measures designed to
Asset: Any tangible or intangible progressive collapse when a Crime Reduction: Any action provide an adequate delay to an
value (people, property, primary structural element to reduce the frequency and intruder for other measures to
information) to the organisation. fails, resulting in the failure of seriousness of criminal events. respond.
adjoining structural elements,
Barrier: A natural or man-made which in turn causes further Crowded Place: A Crowded Detect – Having delayed the
obstacle to the movement/ structural failure. Place is a location to which intruder, measures must be
direction of persons, animals, members of the public can sited to detect and identify
vehicles, or materials. Collapse - Disproportionate: gain access and by virtue of the incident. These measures
The structural collapse of a its crowd density and known can either be covert or overt
Boundary Treatment: building, disproportionate to the terrorist attack methodology depending on the response
Safeguarding of a boundary or cause; it is often, though not may be considered potentially available. The longer the
limit of responsibility. always, progressive. A building liable to terrorist attack. They delay the more successful the
should be constructed so that may be buildings or open air detection layer will function.
in the event of an accident or public spaces and they may be
intentional attack, it will not permanent or temporary.
suffer collapse to an extent
disproportionate to the cause.

264 A2. Appendix 2: Glossary A2. Appendix 2: Glossary 265


Deny – Denies intruders access solution to new developments Personal Borne Improvised Proprietary Information:
to vital assets. Denial is the final during the phases of Pre- Explosive Device (PBIED): Valuable information owned
chance to defeat an intruder / planning, Planning, Design and Bombs made small in size and by a company or entrusted
attacker and usually involves Construction, Commissioning & less conspicuous, so they can to it, which has not been
measures known as ‘target Operation. be placed closer to the intended disclosed publicly; specifically,
hardening’. target, e.g. within a building or information that is not readily
Intrusion Detection System: A structure, carried or delivered accessible to others, that was
Facility: One or more buildings system that uses a sensor(s) to by a person. The term is often created or collected by the
or structures that are related by detect an impending or actual used to describe deadly and owner at considerable cost, and
function and location, and form security breach and to initiate an determined suicide bombers that the owner seeks to keep
an operating entity. alarm or notification of the event. however this is not always confidential.
the case.
HVAC: Heating, ventilation and Lighting: Degree of illumination; Proprietary Security
air conditioning system. also, equipment, used indoors Physical Security: Physical Organisations: Typically, a
and outdoors, for increasing security addresses actions department within a company
Hostile Vehicle Mitigation illumination (usually measured taken to protect buildings, that provides security services
(HVM): Design principle to in lux or foot-candle units). property and assets against for that company.
protect an asset from a range intrusion or attack. It includes
of vehicle borne threats ranging Natural Surveillance: A design physical measures designed Protective Security: An
from vandalism through to concept to facilitate observation to safeguard personnel and organised system of protective
sophisticated attacks by and help create an increased prevent unauthorised access measures implemented to
determined criminals or perception of risk to an to equipment, installations, achieve and maintain security.
terrorists. offender thereby discouraging material, and documents etc. It combines the disciplines of
wrongdoing. Natural personnel, information and
Improvised Explosive Device surveillance occurs by planning Physical Security Measure: physical security to create
(IED): An IED is a bomb and designing the placement A device, system, or practice ‘defence in depth’, where
constructed by the maker to of physical features, activities, of a tangible nature designed multiple layers work together to
allow someone to detonate and people in such a way as to to protect people and prevent deter, detect, delay and deny an
it effectively at the time and maximise visibility. damage to, loss of, or attack.
place required. Some of the unauthorised access to assets
components, including the Operational Requirement (OR): (see assets). Public Realm: The public realm
explosive, may have been A statement of need based includes all exterior places,
homemade. IED’s incorporate upon a thorough and systematic Policy: A general statement of a linkages and built form elements
destructive, lethal, noxious, assessment of the problem to principle according to which an that are physically and /or
pyrotechnic, or incendiary be solved, and the hoped for organisation performs business visually accessible regardless
chemicals, designed to destroy solutions. functions. of ownership. These elements
and incapacitate. IED’s have can include, but are not limited
been the most commonly used Opportunity: Describes the Procedure: Detailed to, streets, pedestrian ways,
method of attack by terrorists in ability of a potential ‘attacker’ implementation instructions for cycleways, bridges, plazas,
recent years. to conduct or carry out acts to carrying out security policies; nodes, squares, transportation
aid an attack often presented as forms or as hubs, gateways, parks,
Integrated Development lists of steps to be taken prior waterfronts, natural features,
Process: A process that brings Pedestrian Access Control to or during a security incident view corridors, landmarks and
together an interdisciplinary Point (PACP): A facility (see security incident). building interfaces.
team to work collaboratively and specifically designed for
iteratively, in pursuit of a single controlling pedestrian access to
integrated safety and security a premises or location.

266 A2. Appendix 2: Glossary A2. Appendix 2: Glossary 267


Risk: The effect of uncertainty Sally Port: Tailgating: The act of or attempt by Token: An electronically
on objectives. It includes both A secure, controlled entry one or more individuals, to enter encoded device (i.e., a card,
positive and negative impacts on point that usually incorporates a controlled area by immediately key-fob, etc.) that contains
objectives. the use of doors or barriers following an individual with proper information capable of being
either side of a secure middle access. Also referred to as ‘piggy- read by an electronic device
Risk Assessment: The process space (airlock). Can be used backing’. placed within or at the entry
of assessing security-related for controlling access for both and exit points of a protected
risks from internal and external vehicles and pedestrians. Target Hardening: A term used facility.
threats to an entity, its assets, in security referring to the
or personnel. Security Incident: An strengthening of the security of Uninterruptible Power Supply
occurrence or action likely to a building in order to reduce or (UPS): A system that provides
Risk Management: The culture, impact upon assets. minimise the risk of attack or continuous power to an
processes and structures theft. alternating current (AC) line
that are directed towards Security Measure: A practice within prescribed tolerances;
the effective management of or device designed to protect Terrorism: Terrorism is the threat protects against over-voltage
potential opportunities and people and prevent damage or use of action, calculated conditions, loss of primary
adverse effects (HB167: 2006 to, loss of, or unauthorised to create an atmosphere of power, and intermittent
Security Risk Management). access to equipment, facilities, fear and alarm. These acts brownouts (darkness resulting
material, and information. are designed to influence the from the extinction of light).
Safety and Security Advisors: Government or to intimidate the Usually utilised in conjunction
Government officials, who will Security Vulnerability: An public or a section of the public, with an emergency generator.
liaise with the development exploitable security weakness. and made for the purpose of
project team to offer advice, advancing a political, religious Vehicle Access Control Point
provide specialist inputs Setback: Setback in terms of or ideological cause. This often (VACP): A facility specifically
on safety and security and land use is the distance of a involves serious violence against designed for controlling
conduct the review of Planning structure from the boundary of a person or serious damage to vehicular access to a premises
Submissions and Building Permit the development plot. This property. Terrorism can come in or location.
Submissions from a safety and is not the equivalent of many forms, not just a physical
security perspective. ‘stand-off’ distance. attack on life and limb. It can Vehicle Borne Improvised
include interference with vital Explosive Device (VBIED):
Safety and Security Specialist: Site Hardening: Implementation information or communication Bombs transported by vehicles,
A suitably experienced and of enhancement measures to systems, causing disruption and one of the most effective
qualified professional who, as make a site more difficult to economic damage. weapons in the terrorist’s
part of the interdisciplinary penetrate. arsenal. They are capable of
development project team, Threat: A potential source of delivering a large quantity of
advises the project client and Stand-off Distance: The loss, harm or disruption. explosives to a target and can
manager on safety and security distance between the asset and cause a great deal of damage.
issues. Within the context of the the threat, typically regarding Throughput: The average rate
SSPM, this person has specific an explosive threat. of flow of people or vehicles
functions to undertake during through an access point / portal.
the Integrated Development Surveillance: Observation of a
Process for High Priority location, activity, or person.
projects.

268 A2. Appendix 2: Glossary A2. Appendix 2: Glossary 269


Urban Design: The art of
making places. Urban design
involves the design of
buildings, groups of buildings,
spaces and landscapes, in
neighbourhoods, districts, cities
and municipalities, and the
establishment of framework
and processes which facilitate
successful development.

Video Surveillance Systems


(VSS): A surveillance system in
which a signal is transmitted to
monitors / recording, and control
equipment. Includes CCTV and
network based video systems.

Vulnerability: The susceptibility


of a target to be effected by a
threat.

270 A2. Appendix 2: Glossary


A3
Appendix 3: Further Reading

Secure communities
Further Reading
Abu Dhabi Public Realm Design CPTED Essentials: Crime Engineering Security: Protective RIBA Guidance on designing for
Manual: Commissioned by the Prevention Through Design for High Risk Buildings: Counter Terrorism: (UK)
UPC to guide the development Environmental Design: New York City Police Department
of a world-class public realm Participant Workbook (Australia) (USA) Safer Design Guidelines for
(Abu Dhabi) Victoria: Principles facilitating
Crime Prevention Through FEMA 426: Reference Manual the planning of safer urban
Abu Dhabi Urban Street Design Environmental Design: to Mitigate Potential Terrorist environments, Department of
Manual: Commissioned by the Applications of Architectural Attacks Against Buildings, Federal Sustainability and Environment
UPC to address the needs of Design and Space Management Emergency Management Agency (Australia)
a growing population and a Concepts, National Crime (USA)
desire to create more walkable Prevention Institute (USA) Safer Places: Planning System
communities (Abu Dhabi) FEMA 430: Site and Urban Design and Crime Prevention, Office of
Crime Prevention Through for Security: Guidance Against the Deputy Prime Minister (UK)
Estidama (Pearl Rating System): Environmental Design: Potential Terrorist Attacks Against
Creating a new sustainability Guidelines for Queensland, Buildings, Federal Emergency Safer Places: Counter Terrorism
framework that will help Queensland Government Management Agency (USA) Supplement, Office of the
preserve and enrich Abu Dhabi’s (Australia) Deputy Prime Minister (UK)
physical and cultural identity, Guidelines for Human Settlement
improve the quality of life Crime Prevention Through Planning and Design Volume 1: Safety Toolbox: Working
for residents and reduce the Environmental Design Compiled under the patronage of Together to Build Safer
Emirates’s carbon footprint by Guidebook: National Crime the Department of Housing, by Communities, Winnipeg
encouraging developers to adopt Prevention Council (Singapore) CSIR Building and Construction Committee for Safety (Canada)
a more sustainable approach to Technology (South Africa)
construction (Abu Dhabi) Crowded Places: the Planning Secured by Design: New Homes
System and Counter Terrorism, Integrated Security: a Public 2010 (UK)
Plan Capital 2030; Plan Al Ain Department for Communities Realm Design Guide for Hostile
City 2030; Plan Al Gharbia and Local Government / Home Vehicle Mitigation, Centre The Site Security Design
2030; Structure framework plans Office (UK) for the Protection of National Guide: US General Services
to guide the Emirate’s urban and Infrastructure (UK) Administration (USA)
regional development, planning Department of Defence
strategies (Abu Dhabi) Minimum Anti-terrorism National Guidelines for Think Thief: A Designer’s
Standards for Buildings: Crime Prevention Through Guide to Designing Out Crime,
ACT Crime Prevention and Unified Facilities Criteria (UFC) Environmental Design in New Design Council Guide funded
Urban Design Resource Manual: system for application of Zealand Part 1: Seven Qualities through the Home Office Crime
Australian Capital Territory, anti-terrorism standards and of Safer Places (New Zealand) Reduction Programme (UK)
Advisory document to assist in recommendations (USA)
incorporating crime prevention Planning and Designing Urban Working Together to Protect
through environmental design Designing Safer Places: A Space, Community and Crime Crowded Places: Home Office
principles into planning and manual for crime prevention Prevention: The Case of Arab (UK)
development activities (Australia) through planning and design Countries - Policy Brief Series No
(South Africa) 16, Dina Shehayeb (Egypt)
Contest: The United Kingdom’s
Strategy for Counter Terrorism Does Regulation of Built- Protecting Crowded Places:
(UK) in Security Reduce Crime: Design and Technical Issues,
Evidence from a Natural Home Office (UK)
Experiment, Ben Vollard and Jan
C van Ours (Holland)

274 A3. Appendix 3: Further Reading A3. Appendix 3: Further Reading 275
A4
Appendix 4:
Acknowledgements

Secure communities
Acknowledgements
Abu Dhabi Urban Planning Steering Committee Technical Advisory Committee Ministry of Foreign Affairs
Council European Affairs Department
• Col Salem Al Zaabi • Abu Dhabi Urban Planning
• H.E. Falah Mohammed Al Ahbabi Council The Abu Dhabi Urban Planning
Office of the Deputy
Council extends special thanks
General Manager, Abu Dhabi Supreme Commander of the • Department of Municipal Affairs to the Ministry of Foreign
Urban Planning Council UAE Forces
• Abu Dhabi City Municipality Affairs for their support during
the development of the Manual.
• Amer Al Hammadi, • Col Saif Hamdan Al Kaabi • Al Ain City Municipality
Director, Planning and Engineering Projects UAE Embassy to the
• Western Region Municipality
Infrastructure Adminstration United Kingdom
Abu Dhabi Police GHQ • Abu Dhabi Police GHQ
• Hasan Al Mehairi The Abu Dhabi Urban Planning
• Department of Transport, Council extends its special
Manager, Safety & Security • Jasem Al Darmaki Abu Dhabi thanks to the Embassy and
Department of Municipal H.E. Ambassador Abdulrahman
• Critical National Infrastructure
• Gavin W Jones Affairs Ghanem Al Mutaiwee
Authority
Safety and Security Specialist
• Abdulla Al Shamsi • National Crisis & Emergency
(SSPM Project Manager) HM Government, United
Management Authority
Abu Dhabi City Municipality Kingdom of Great Britain &
• Stuart Williams • Ministry of Interior Northern Ireland
• Abdulla Al Amiri (State Security)
Safety and Security Specialist
Al Ain City Municipality The Abu Dhabi Urban Planning
Council extends special
• Hunter Burkall Technical Advisory Committee thanks to the UK Foreign and
Safety and Security Specialist • Mubarak Al Hajeri Sounding Board Commonwealth Office, National
Western Region Municipality Counter Terrorism Security
• Tourism Development and Office (NaCTSO) and the Centre
Higher Committee for Crises
• Captain Mansour Al Dhaheri Investment Company (TDIC) for the Protection of National
and Terrorist Acts Management
Infrastructure (CPNI) for
UAE Armed Forces • Aldar Properties PJSC
The Abu Dhabi Urban Planning participation in workshops and
Council extends special thanks • Abu Dhabi National Exhibition hosting benchmarking visits to
Implementation Working Group
to the Chairman and members Centre (ADNEC) the United Kingdom.
of the Higher Committee, who • Abu Dhabi Urban Planning • Musanada Abu Dhabi
have provided wise leadership Council General Services
throughout the development
of the Manual. • Abu Dhabi City Municipality • Khalifa University of Science &
Technology
• Al Ain City Municipality
• CBRn Advisor, Higher Committee
• Western Region Municipality for Crises and Terrorist Acts
• Abu Dhabi Police GHQ Management

• Environment, Health and Safety • University of Huddersfield


Management System Centre

278 A4. Appendix 4: Acknowledgements A4. Appendix 4: Acknowledgements 279

You might also like