Transcript
WEBVTT
00:00:00.220 --> 00:00:02.305
Hello everybody, welcome to the Fire Science Show.
00:00:02.305 --> 00:00:14.483
This podcast is produced for myself, to learn from great people around the world, and while I am learning, I try to share those lessons with you, my dear listeners.
00:00:14.483 --> 00:00:42.066
So we all grow together as better fire professionals, and sometimes there are those episodes that I approach without knowing or understanding what's going to happen and they turn absolutely amazing and they really change my point of view, and that obviously is the case of today's episode, and in this episode we're talking about the interface between the fire safety and security layers in a building.
00:00:42.066 --> 00:00:53.753
You could imagine that this may be not the most exciting topic you could talk about in fire safety engineering and my idea what it's going to be was, let's say, moderately enthusiastic.
00:00:53.753 --> 00:01:00.192
But I've invited brilliant people Steve Queen and Ivo Hahn from Movement Strategies.
00:01:00.192 --> 00:01:02.648
I knew it cannot end up wrongly.
00:01:02.648 --> 00:01:06.620
They came to me and told me, boy, check, let's do an episode on security.
00:01:06.620 --> 00:01:08.123
And I'm like, okay, let's try it.
00:01:08.123 --> 00:01:37.188
And oh boy, this was really, really eye-opening for me, an interface that I have not seen and it was in front of my eyes all the time, and something that really changes the perspective of fire safety engineer in the times that are pretty troubling in the times where we will care about security more and more, and it just gives such an immense level of complexity to things that were not simple to start with.
00:01:37.188 --> 00:01:49.045
It also shows that if we design our fire safety solutions ignorant of other objectives of the building, we could perhaps create harm, even if we want to do good stuff.
00:01:49.045 --> 00:02:01.722
Even if we design the best fire safety system, in certain non-fire related scenarios those systems can lead to pretty dangerous outcomes and they must be tamed.
00:02:01.722 --> 00:02:14.026
They must be controlled by the building itself, and the more you think about it while designing your building, the easier that control will be, the lesser will be the burden on the end user of the building.
00:02:14.026 --> 00:02:16.733
Gosh, these are the lessons I got from the episode.
00:02:16.733 --> 00:02:21.375
You have to stick to the entire thing to understand what do I mean.
00:02:21.375 --> 00:02:30.534
I'm an ignorant fire safety engineer who had no clue about the security objectives of a building and how they interact with the fire safety features.
00:02:30.534 --> 00:02:37.576
And, yeah, after this conversation I feel my eyes have opened and I understand a little bit more.
00:02:37.576 --> 00:02:44.841
I'm definitely more curious in this space and I hope it will be the same for you after you go through this episode.
00:02:44.841 --> 00:02:49.271
So, without further ado, let's spin the intro and jump into the episode.
00:02:49.271 --> 00:02:56.087
Welcome to the Firesize Show.
00:02:56.087 --> 00:02:59.622
My name is Wojciech Wigrzyński and I will be your host.
00:03:15.974 --> 00:03:19.117
This podcast is brought to you in collaboration with OFR Consultants.
00:03:19.117 --> 00:03:22.086
Ofr is the UK's leading fire risk consultancy.
00:03:22.086 --> 00:03:32.890
Its globally established team has developed a reputation for preeminent fire engineering expertise, with colleagues working across the world to help protect people, property and environment.
00:03:32.890 --> 00:03:48.713
Established in the UK in 2016 as a startup business of two highly experienced fire engineering consultants, the business has grown phenomenally in just seven years, with offices across the country in seven locations, from Edinburgh to Bath, and now employing more than 100 professionals.
00:03:48.713 --> 00:04:00.347
Colleagues are on a mission to continually explore the challenges that FHIR creates for clients and society, applying the best research experience and diligence for effective, tailored FHIR safety solutions.
00:04:00.347 --> 00:04:11.449
In 2024, ofr will grow its team once more and is always keen to hear from industry professionals who would like to collaborate on fire safety futures this year.
00:04:11.449 --> 00:04:14.323
Get in touch at OFRconsultantscom.
00:04:15.385 --> 00:04:15.907
Hello everybody.
00:04:15.907 --> 00:04:18.451
I am here today joined by Steve Gwynne
00:04:18.451 --> 00:04:26.810
, a professor of evacuation and pedestrian dynamics at Lund and the research lead at movement strategies hey, steve, welcome back to the podcast, it's good to see you.
00:04:26.810 --> 00:04:34.206
And also joined by Aoife Hunt, market leader at Movement Strategies and Adjunct Professor at the University of Maryland.
00:04:34.206 --> 00:04:35.826
Hey Aoife, good to have you in the show.
00:04:36.540 --> 00:04:37.685
Hi, great to join you Bo.
00:04:38.160 --> 00:04:43.423
Thanks for coming, and that's going to be an interesting subject related to human behaviors in fires.
00:04:43.423 --> 00:04:45.665
That's going to be an interesting subject related to human behaviors in fires.
00:04:45.665 --> 00:04:51.269
We've chosen a theme around security and life safety, two important objectives in our buildings.
00:04:51.269 --> 00:05:00.216
Perhaps you can start defining what's a security objective and what's a life safety objective, and where do they align?
00:05:04.939 --> 00:05:07.567
Where do they cross, because I think that those boundaries will be fundamental for the discussion.
00:05:07.567 --> 00:05:14.009
Yeah, sure, I think it's first worth stepping back a little bit and thinking about building and thinking about how they're used and what we do with them.
00:05:14.009 --> 00:05:17.545
So you can think of the building as a people movement system.
00:05:17.545 --> 00:05:29.387
Basically, people enter the building, they use the building as they normally would, as i ntended, as part of operations, and then they would leave the building so ingress, circulation and egress.
00:05:29.387 --> 00:05:48.564
But then on top of that, overlaid on that, you have these procedural concerns, which include safety in our case, fire safety just normal operation, providing the service and functionality of the building and security and how we experience it as occupants or residents is usually pretty seamless.
00:05:48.564 --> 00:05:51.752
We, we just experience the building, we go in, we use it.
00:05:52.031 --> 00:06:05.992
We are not always subject to these procedures that exist, but we only really feel the impact of the changing responsibilities, if you like, of those procedures, either during an emergency or during change.
00:06:05.992 --> 00:06:16.005
I guess the issue is, even though we experience these things continuously, we often address them in distinct ways, in distinct ways.
00:06:16.005 --> 00:06:26.446
So you'd have people that have responsibilities for safety, people that have responsibility for security and, of course, people that have responsibility for services and operations.
00:06:26.446 --> 00:06:38.990
So I came into this building where I am today, I walked in, I got coffee from someone downstairs, I touched my badge in that's my security concern and then I got the lift, which is at a staircase next to it, but for evacuation.
00:06:38.990 --> 00:06:45.632
And so, however, how these things are managed and addressed in real life is much more discreet.
00:06:45.632 --> 00:06:59.293
Oftentimes it's the transition, the transition from one mode of use, be it entrance and circulation, or one procedure, be it normal operations and security or normal operations.
00:06:59.293 --> 00:07:07.466
That's really where it becomes challenging, I think, and where it tests our approach to planning and managing such spaces.
00:07:08.100 --> 00:07:10.810
I like to think about the roles of those systems.
00:07:10.810 --> 00:07:24.324
Of course, those systems would have completely different roles, but you reach a point where one system may have overlap another, you know, and you're reaching a point in which one system is more important than another, point in which one system is more important than another.
00:07:24.324 --> 00:07:38.625
And I find it really challenging, especially in high value spaces like jewelry shops, for example, like go ahead and design a fire safety strategy for a jewelry shop that makes it open, wide open.
00:07:38.625 --> 00:07:46.052
When there's a smoke around, it's not possible to get it through because it contradicts their main way of operation so much.
00:07:46.052 --> 00:07:49.781
I wonder if you have had similar experiences, eva.
00:07:49.781 --> 00:07:54.531
Perhaps you can comment on your connection between security and life safety and fire safety.
00:07:54.911 --> 00:07:55.613
Yeah, absolutely.
00:07:55.613 --> 00:08:11.189
I mean, I think when we're talking about security, we're talking about protecting people or a building or an organization from threats like just said there with your jewelry shop, like crime or attacks and we can consider sort of a threat as a kind of malicious event.
00:08:11.189 --> 00:08:15.995
Right, that's got the potential to cause harm and in that way it's very different to a fire.
00:08:15.995 --> 00:08:23.045
Right, it's not accidental, it's human driven.
00:08:23.084 --> 00:08:32.504
It's about a person or an individual with malicious intent looking to exploit a vulnerability and then we also think about risk and the risk is the likelihood of that thing happening and if it does happen, would it cause damage or harm?
00:08:32.504 --> 00:08:43.866
So it's really similar to fire safety in that security looks at mitigating those risks, but it's a lot more complex as well and the way that you mitigate those risks are in your design and your procedures.
00:08:43.866 --> 00:08:55.594
In exactly the same way, as Steve said there at the start, that's going to impact the way that people move and behave and typically researchers and consultants and organizations are considering these things very separately in silos.
00:08:55.594 --> 00:09:07.244
But it's clear that the mitigation that you know that are put in place to make people more secure can impact fire safety, and the mitigations put in place to protect people from fire can impact security.
00:09:07.244 --> 00:09:13.711
So, for example, hostile vehicle mitigation, which is looking at protecting people from hostile vehicles.
00:09:13.711 --> 00:09:16.361
You'll have seen the spate of attacks in the last sort of 10 years.
00:09:16.361 --> 00:09:19.192
That has to be in the form of obstacles.
00:09:19.192 --> 00:09:22.061
You see bollards and you see planters and all that kind of stuff.
00:09:22.061 --> 00:09:27.431
But putting those in in certain places can inhibit the escape routes if there's a fire.
00:09:27.431 --> 00:09:48.466
So it's about weighing up one thing against the other and then on the other side, stuff that's put into support in a fire emergency, like the ability to break open doors in a fire, can inhibit a building or organisation from being able to lock down, being able to protect their staff and their people by locking doors if there's something happening outside, like a shooter, for example.
00:09:49.068 --> 00:09:53.288
And I've got loads more examples we can go into later, but I think the important thing is that the goals are similar.
00:09:53.288 --> 00:09:57.246
Right, it's all about protecting human life, but it's done so separately.
00:09:57.246 --> 00:10:14.360
So you know, we work so often with new buildings, so there's a new building and then there's a flying safety report and then, completely separately, by a completely different consultant, there's a security report or a security assessment, and it's often the operations that are left to pick up the pieces, the people who then have to implement these on the ground.
00:10:14.360 --> 00:10:26.504
And you know we're focusing on security and fly safety here, but it's not also just that, it's health and safety, crowd safety procedures and all those usual businesses, usual operations, crowd safety procedures and all those usual business as usual operations.
00:10:26.504 --> 00:10:38.707
I think the thing we're learning is that when these things are done very separately, without thinking about how one impacts the other, then it can lead to inefficient designs and again having to retrofit and retrothink and use operations to plaster over the gaps.
00:10:39.309 --> 00:10:50.393
I think as well just following on from something Eva said that it gets even more complicated when you look at the staff who are present to manage these various events, various concerns.
00:10:50.393 --> 00:10:54.613
So, for instance, the old classic biosafety in a nightclub.
00:10:54.613 --> 00:11:06.152
And you might have a member of security, a bouncer as we call them here in the UK, and their job is to limit and manage access, physically address matters of security.
00:11:06.152 --> 00:11:11.568
So that affects how people make use of the space, how they enter the space and what they consider viable exits.
00:11:11.568 --> 00:11:16.006
But then, on the flip side, during an evacuation, they may adopt a different role.
00:11:16.006 --> 00:11:22.971
And another example might be a cabin attendant on an aircraft whose job is normally part of the service and to guide you.
00:11:22.971 --> 00:11:25.288
You see, and it's very accommodating.
00:11:25.288 --> 00:11:38.870
During an evacuation their role is to get you off the plane, and so they're adopting a different role in different scenarios, be it safety or be it security, and of course, cabinet attendants can also be part of the security issue as well.
00:11:38.870 --> 00:11:44.432
So it's that complexity that's very much present in the mass of the structure.
00:11:45.094 --> 00:11:50.091
I think your point of view that in the mass of the structure, I think your point of view that it's part of the same system.
00:11:50.130 --> 00:11:56.251
It's not like you have a separate security system including separate security pathways that people would walk through and then evacuate.
00:11:56.251 --> 00:12:08.412
Actually, if you would separate them, you would very highly diminish the effectiveness of evacuation system, like from my talks with Daniel Nielsen in the Uncovered Witness podcast.
00:12:08.412 --> 00:12:10.607
He told me about the theory of affordances.
00:12:10.607 --> 00:12:19.230
How do we make the exits and signage and everything easy to interpret and easy to use in a way that for people is natural to use them?
00:12:19.230 --> 00:12:21.940
And here security is another contradiction.
00:12:21.940 --> 00:12:32.192
If you put the door is locked under alarm on an evacuation door, that's a very easy way, you know, to really lower the effectiveness of evacuation system by.
00:12:32.192 --> 00:12:42.153
I'm not sure if you get any gain in the security system and I wonder if the person putting the sticker on has realized what has happened.
00:12:42.153 --> 00:12:54.006
If you said before that that would be two consultants, two groups of people working separately on those, and here a simple sticker is profound for us Now working on modern buildings.
00:12:54.006 --> 00:13:00.568
Do you see a way to close the gap between those two silos, to make people more aware?
00:13:01.059 --> 00:13:05.981
I mean, one of the key challenges that's unique to the security is how quickly it changes.
00:13:06.363 --> 00:13:16.130
So if you're looking at the threats that might face a building or a site, that will change over time the size threat is pretty constant and pretty well understood.
00:13:16.432 --> 00:13:19.811
So you know, if you're a shop, you might be looking at something like theft.
00:13:19.811 --> 00:13:24.929
If you're a nuclear site, you might be looking to protect information or plans.
00:13:24.929 --> 00:13:27.698
And if you're a major site, you might be looking to protect information or plans.
00:13:27.698 --> 00:13:29.692
And if you're a major event, you might be looking at what would happen if a terrorist tried to conduct an attack.
00:13:29.692 --> 00:13:32.145
The challenge is you've got to take your building.
00:13:32.145 --> 00:13:40.870
You've got to understand what the threats are that it might face, what the associated mitigations are, so it wouldn't be the same for two different buildings.
00:13:40.870 --> 00:13:42.726
Know that that might change over time.
00:13:42.726 --> 00:13:45.206
So the threat you face this year might be different in five years.
00:13:45.206 --> 00:13:49.225
So it's not like a fire safety strategy that's going to work for 50 years for a whole building.
00:13:49.225 --> 00:14:06.274
If it's comprehensive enough, it's got to be kind of a living strategy and then, in terms of how to address it, it would be around working through on a scenario basis how the building would respond under the most likely scenarios, including fire, and pairing them together.
00:14:06.274 --> 00:14:16.206
So I think one of the reasons this has come into more sharp focus in the last few years is that the idea of fire being used as a weapon is now getting more recognised.
00:14:16.206 --> 00:14:26.070
So before it used to be, you know, it could be terrorists with guns and it could be terrorists, you know, using IEDs, or, you know, bombs, explosive devices, or, separately, it could be an accidental fire.
00:14:26.070 --> 00:14:35.750
There's now the question of what if someone's using fire in a hostile way as a weapon, purposely setting off fires, which means that the way that the behavior of the fire will be different.
00:14:35.750 --> 00:14:38.349
Right, because it's been done on purpose for maximum impact.
00:14:38.349 --> 00:14:44.989
It might not be in one location and spreading, as a fire scientist would expect it to, it might be set off in multiple different locations.
00:14:45.289 --> 00:14:55.754
Spreading as a fire scientist would expect it to, it might be set off in multiple different locations and indeed, if the goal of the person who's instigating this kind of attack is to cause as much harm as possible, could the fire safety systems be used as part of the attack?
00:14:55.754 --> 00:15:00.109
Could they be instigating an evacuation in order to send people to a different place?
00:15:00.109 --> 00:15:05.692
This blows it wide open in terms of the number of scenarios that need to be taken into consideration.
00:15:05.692 --> 00:15:08.729
Now, as I said, not every site is going to have to think of this right.
00:15:08.729 --> 00:15:10.988
It's only the ones that have that threat facing them.
00:15:11.580 --> 00:15:30.171
But for those who do have that complicated threat picture, it is about running through the likely scenarios and working with your fire safety consultants not separately from them to say, if we had to come up for a strategy that's going to work in these 10 situations all 10, what's that one strategy that's going to apply?
00:15:30.171 --> 00:15:34.791
It doesn't have to be the same procedure, necessarily, but what's our plan that's going to deal with them all?
00:15:34.791 --> 00:15:39.772
Because we've seen that plans that have been done separately aren't necessarily going to work.
00:15:40.542 --> 00:15:41.203
Can I follow up on that?
00:15:41.203 --> 00:15:43.149
Because I think April raises several very important points.
00:15:43.149 --> 00:15:43.711
One of them.
00:15:43.711 --> 00:15:44.273
Can I follow up there?
00:15:44.273 --> 00:15:46.759
Because I think April writes several very important points.
00:15:46.759 --> 00:15:50.009
One of them we sort of pretty much understand the systems that would be in place for fire safety.
00:15:50.009 --> 00:15:57.589
You'd have a detection system, you'd have potentially a suppression system and then a notification system to inform people.
00:15:58.100 --> 00:16:05.113
Firstly, if it's a non-fire security concern, detection is really hard and working out the nature of the threat.
00:16:05.113 --> 00:16:24.003
And secondly, if it's a fire-based security threat and, as even said, the some of the assumptions on which fire safety is based, which is, you know, you look for where the fire may reasonably start and there might be a single fire scenario and it's based on what's in the building typically rather than what's introduced into the building.
00:16:24.003 --> 00:16:34.865
Well, that's that's, as Eva said, that blows the scenarios off the chart, because it means that the nature of the fire scenarios that might arise could be very, very different and deliberately bad.
00:16:34.865 --> 00:17:01.549
So I think there's that what systems do we have in place that might reasonably account for the range of scenarios that might be faced and might detect them, and what might those scenarios be and how might the normal fire safety approach and fire safety tools be brought to bear to support some of those security concerns, because I think lessons can be brought to the table from both sides and we might be missing some of those tricks if we silo them out.
00:17:02.220 --> 00:17:04.848
What kind of tools of fire safety would you have in mind?
00:17:08.105 --> 00:17:09.326
Like public address systems, what else?
00:17:09.326 --> 00:17:16.170
I think this gets to a really interesting point, which is not just what systems are in place, but what might the responses be?
00:17:16.170 --> 00:17:34.913
Because typically for fire safety, you might say, okay, we will design it such that you can stay in place or that you might evacuate to a place of relative safety or out of the building, and the notification system might support or would support those procedures, ideally.
00:17:34.913 --> 00:17:49.328
And so the concerns of communication in a fire evacuation are to make sure that the people that you need informed are aware of the incident, are aware of what they need to do and aware of where they need to go.
00:17:49.328 --> 00:17:58.593
But in a security scenario, that's a very different approach might be adopted, and I'll let you take it from here, because I think this is an area of particular interest.
00:17:59.434 --> 00:18:13.865
Yeah, so the use of public announcements is very effective in a dynamic, emerging emergency like a terrorist attack, for example, and it's very difficult to automate that in the same way that you could for fire, right.
00:18:13.865 --> 00:18:26.954
So you could have a smart announcement system that can tell people in the building what floor the fire is on and they should evacuate, and they have a drill once a year and everyone knows where they're going and they should evacuate, and they have a drill once a year and everyone knows where they're going.
00:18:26.954 --> 00:18:30.970
And it might be that one exit's taken out but everything else is pretty straightforward and the threat and the hazard isn't moving.
00:18:30.970 --> 00:18:32.075
So lovely, straightforward scenario.
00:18:32.075 --> 00:18:40.681
Then you get something like a marauding attack, where you have one or two or three hostiles moving through a space trying to conduct an attack.
00:18:41.001 --> 00:18:53.221
What's been found is that announcements that very clearly state to people in real time where the attack is happening and asking them to either evacuate or to hide if they can't evacuate, are really effective.
00:18:53.642 --> 00:19:04.039
But that requires something which you don't need for fire systems and that's eyes on, so CCTV footage typically, because giving the wrong information can be very, very dangerous.
00:19:04.240 --> 00:19:11.340
So you have a command and control perspective to a terrorist incident and to certain security incidents that you just don't have.
00:19:11.340 --> 00:19:30.702
In the same way, if it was just a fire and again that becomes more complicated when you have two things happening at the same time very, very tricky to say to a bunch of people in an office building there is fire, a fire on level eight, there's also a moving terrorist attack happening on level four and give instruction that is personalized enough for people to be able to take the right action.
00:19:30.702 --> 00:19:38.516
So the sort of advice is always around letting people know what's happening and where it's happening and before that, the training, not to say exactly.
00:19:38.516 --> 00:19:45.442
In a fire it's very easy for people to practice exactly what they would do in exactly the right way, that they would do it In an attack scenario.
00:19:45.442 --> 00:19:52.351
It has to be much more dynamic where people are able to understand where they are in relation to the threat and able to figure out their roots for themselves.
00:19:58.414 --> 00:20:00.538
I have multiple questions to follow up that, but I think I would need a step back a little bit.
00:20:00.538 --> 00:20:09.270
So in case of a fire, I understand the response of the building, like the hazard is detected, the people are notified, some sort of planned evacuation activity should happen.
00:20:09.270 --> 00:20:19.507
Either it's a phased evacuation, stay put, total evacuation, whatever the fire strategy told you, but for me it's kind of like obvious, almost a linear timeline.
00:20:19.507 --> 00:20:22.223
It's just what we've planned for case of a fire.
00:20:22.223 --> 00:20:30.778
But in case of a security threat or an attack on the building there must be multiple strategies, like you've already mentioned, evacuation.
00:20:30.778 --> 00:20:33.987
But I assume in some cases you would like to isolate the space.
00:20:33.987 --> 00:20:40.698
What kind of responses you would expect in that hazard and how would they compare to the evacuation?
00:20:40.698 --> 00:20:43.425
What do you want to do with people in case of security breaches?
00:20:44.295 --> 00:21:04.768
So, firstly, you don't want to ever get to the point where you have to respond, so there's a whole bunch of work before around deterrence, so to stop it happening in the first place, but also detection, fire detection Again, we sort of tick that box very easily on fire science because it's very straightforward Detecting an attack is critical to life safety and to have an appropriate response because it might be.
00:21:04.768 --> 00:21:06.109
Has someone left a bag?
00:21:06.109 --> 00:21:09.017
Is someone leaving suspiciously being able to?
00:21:09.017 --> 00:21:24.605
You know, there are automated systems, like gunshot detection systems, for example, that can be used, or automated video analytics that can be used, that can be put over cameras to say this crowd's behaving in a way that we think an attack is emerging or this person's behaving in a way that is indicative of an attack.
00:21:24.605 --> 00:21:26.037
So there's the time.
00:21:26.037 --> 00:21:32.429
To detect is a really crucial part of I'm not going to say a timeline, because it's just not as linear as we'd love it to be.
00:21:32.429 --> 00:21:38.105
And then, once it's happening, you're exactly right in terms of the sort of procedures you might employ.
00:21:38.105 --> 00:21:39.328
It could be an evacuation.
00:21:39.328 --> 00:21:46.230
It's very unlikely if you had a marauding attack that you would fully evacuate a building because you would certainly be sending people into the hands of the attackers.
00:21:46.230 --> 00:21:52.712
It's more about a multiple layered response, which could be people hiding in lockable rooms.
00:21:52.712 --> 00:21:59.517
So we've got staff members who know where the lockable rooms are, where protected areas are, and knowing to get themselves in there and lock themselves in.
00:22:00.178 --> 00:22:01.642
I'm going to say partial evacuation.
00:22:01.642 --> 00:22:03.935
It's actually just sort of moving away from danger.
00:22:03.935 --> 00:22:10.140
It doesn't necessarily have to be outside of the building, but creating space between individuals and the location of the attack.
00:22:10.140 --> 00:22:15.078
Sometimes an evacuation or a lockdown is another procedure that could be useful.
00:22:15.078 --> 00:22:28.165
Remember during the Paris attacks where Stade de France decided to keep everyone in the stadium knowing that the attacks were happening outside, and it was a good decision to keep that several tens of thousands of people inside that area.
00:22:28.165 --> 00:22:30.455
Sometimes it's a mixture of a few.
00:22:30.455 --> 00:22:38.284
So you have an evacuation because people are close to the attack, but actually people near an exit where the attackers are can go, so they should go as well.
00:22:38.786 --> 00:22:44.183
My point here is that it has to be very dynamic and therefore it has to be managed in real time by a person.
00:22:44.183 --> 00:22:52.145
We're not yet at a place where you could get kind of a lovely dynamic signage system to automatically work out for everyone where they should go.
00:22:52.145 --> 00:22:54.776
And again, going back to my very first point around.
00:22:54.776 --> 00:23:04.426
The differences between this kind of attack and a sire is that this is a person who is a cognizant, thinking individual trying to conduct this attack.
00:23:04.426 --> 00:23:09.086
They'll be using whatever information and procedures you come into the building to their advantage.
00:23:09.086 --> 00:23:16.804
So any information you give to people or instruction you give to people during the attack, the attackers can also hear and take advantage of.
00:23:17.474 --> 00:23:30.005
It's a very difficult thing to get right in a sort of live situation, but I think organizations who it's not about having a single evacuation plan, a single evacuation plan, a single lockdown plan.
00:23:30.005 --> 00:23:37.027
It's about having the command and control procedures so that you can respond to the incident in a dynamic way.
00:23:37.027 --> 00:23:43.838
Now the way that fire can come in and mess everything up is that everyone has a defined idea of how they would respond to a fire.
00:23:43.838 --> 00:23:52.727
So if the people in your building are responding because they think it's a fire when in fact it's an attack, that can work against you and that can be used.
00:23:53.008 --> 00:24:05.589
That can be used as that confusion, the fact that the attacker, the threat, has agency and has a motive, and has a motive and has a means and is trying to reach that objective.
00:24:05.589 --> 00:24:16.064
Whatever it is, they can use the information available to them and the confusion that they're causing as a means, an additional tool, as an additional means of strengthening their attack.
00:24:16.064 --> 00:24:22.605
We've brushed over it a little bit, but the detection part of this can be incredibly complicated.
00:24:22.605 --> 00:24:34.247
The good thing about most modern buildings, and certainly recent ones, is is that they've got, if there's a fire and that there's smoke detectors, they're going to pretty much detect a fire of a certain size.
00:24:34.247 --> 00:24:37.606
That's why they're in the building trying to detect an attack.
00:24:37.606 --> 00:24:38.811
Why I don't know.
00:24:38.832 --> 00:24:51.938
Something like bladed whip in a crowded space remotely is really hard and people very close to the incident might not even know it's had, whereas a gunshot or an IED or something like that obviously produces different cues.
00:24:51.938 --> 00:25:15.784
So the point being here whereas in fire we have a pretty good understanding of the type of cues that might be produced from the threat, in a security attack that range of cues may vary wildly depending on the nature of the attack and the objective of the attacker, whether it's to cause damage, whether it's to harm an individual or lots of people, or whatever it is.
00:25:15.784 --> 00:25:21.434
There's a range of different motivations that might be present and a range of different weapons that might be present.
00:25:21.695 --> 00:25:38.298
I think one of the important things here as well is that in then asking people to respond to a terrorist attack when they're used to responding to fire evacuation can be really challenging, not just because you're getting them to do things they're not used to doing, but also some of these standard rules that have been, that have been around for years, will need to go.
00:25:38.298 --> 00:25:40.723
Like you can't use fire lifts, for example.
00:25:40.723 --> 00:25:43.994
So let's say you have a high rise building in a city, there isn't a fire.
00:25:43.994 --> 00:25:44.125
That, for example.
00:25:44.125 --> 00:25:50.862
So let's say you have a high-rise building in a city, there isn't a fire, but there's excellent intelligence about something about to happen and this building needs to be evacuated.
00:25:50.862 --> 00:25:54.125
It could be maybe an ID has been indicated or something.
00:25:54.595 --> 00:25:58.214
The lifts would make it much more efficient to evacuate that building.
00:25:58.214 --> 00:26:10.825
But often buildings don't have that plan to say OK, our evacuation plans are all assuming fire, they're not assuming a security threat and we don't have the sort of lift programming to be able to do a really effective evacuation.
00:26:10.825 --> 00:26:16.750
That would need to be another mode we put in because we've got it in business as usual and then in evacuation it's uh, firefighters only.
00:26:16.750 --> 00:26:27.307
So it's again the thinking, getting people who've been really well informed about fires for many years now and their response to do something that they feel isn't part of their usual procedures.
00:26:28.174 --> 00:26:30.662
As someone who's dealing with building automation mostly.
00:26:30.662 --> 00:26:36.444
I'm stressed now because you know my building automation, the way how I would design it for FHIR situation.
00:26:36.444 --> 00:26:49.484
It would be to overtake as many decisions from a human onto an automated execution of a FHIR strategy that I would like and, I believe, many of the things that I would design for my fire strategy.
00:26:49.484 --> 00:27:00.685
In case of an attack, as you've described it, and those strategies that you've described previously, they would be contradictory and they could create very dangerous circumstances.
00:27:00.685 --> 00:27:22.561
And now, as I think about it, the only thing between a person performing an attack and triggering all of that automation I have in my building is pressing one button that's convenient to place at every fire door, the pull-down alarm or whatever, and when you press that you trigger everything I've planned, which will make the process very challenging.
00:27:22.561 --> 00:27:24.351
So I've planned, which will make the process very challenging.
00:27:25.516 --> 00:27:41.858
So I would say, not only I understand that stress and there have been instances where people have deliberately used the advanced technology in the building, fire safety technology for their own ends, and actually just part of this conversation it's just made me think.
00:27:42.680 --> 00:27:49.990
You know, in many instances now and then this may be particular to the UK, but let me just run out the examples.
00:27:49.990 --> 00:28:02.387
If there's a fire and there isn't sufficient emergency elevator provisions, we would put people with movement impairments, disabilities, into refuges, potentially, and then evacuate the rest of the people.
00:28:02.387 --> 00:28:22.865
So all of a sudden, the assumption that these two subpopulations have equivalent levels of life safety in a fire evacuation because potentially firefighters might come and rescue the people who are in the refuges that's gone because they're still in the building, potentially in harm's way, and so that's a very simple example.
00:28:22.865 --> 00:28:52.806
But there are many, many other examples that you could come up with where people could literally, you say, deliberately activate fire alarm system whether it's by pulling a switch or what's sent by to a bin and then getting people into a space where they're either less familiar or less protected, or the fire protection provisions in a staircase don't protect people from an attacker, and so the concepts of relative safety, sort of go out the door.
00:28:53.894 --> 00:29:25.464
Yeah, and I think automated announcements and automated evacuation messaging the idea that even if you had a sophisticated control room that had people in it who were managing a situation but they were heavily reliant in a fire situation and automated system giving announcements and providing instruction to people, it can be very tricky in a live dynamic attack scenario for that control room to remember that actually this automated system is probably pumping the following information into the building I need to stop it and override it and give people the reality.
00:29:25.464 --> 00:29:37.086
So if you had someone, a fire has been set off by an attacker in order to pump people out into a certain area, the automated announcements have started up in that control room.
00:29:37.086 --> 00:29:46.784
It can be very tricky to understand whether or not you know what people in the building think is going on and sort of correct them from that path that they're so used to, from their fire training.
00:29:46.784 --> 00:29:56.765
And the other issue that we've seen, particularly in looking at evacuations, drills, training and looking at it from a security perspective, is the idea of muster points.
00:29:56.765 --> 00:30:09.509
So you have your building evacuation, you've been doing the drill for years, everyone knows where they go to, they muster, they meet people with high vis, they wait around for 10 minutes, get a coffee and go back into the building, and that is so ingrained, certainly in our culture here.
00:30:09.509 --> 00:30:15.551
If that's an attack scenario and people think I've left the building, what am I programmed to do here?
00:30:15.551 --> 00:30:17.317
And try and assemble in a muster point.
00:30:17.757 --> 00:30:35.586
That can, of course, create a secondary target, and a sophisticated attacker might know that and do that on purpose, but even a non-sophisticated attacker could see that as an opportunity, and so there is also a need not just to have this idea of evacuation planning for security scenarios and attacks.
00:30:35.586 --> 00:30:38.858
It's about dispersal how are you going to get people away?
00:30:38.858 --> 00:30:42.493
And then what system are you going to use to check, check in on them?
00:30:42.493 --> 00:30:46.065
Right, so it could be a whatsapp group or it could be company teams or whatever.
00:30:46.515 --> 00:31:02.421
But this idea that actually you're giving people, empowering people, if they're in that situation, to get as far away as they can, or go to a public space, into a coffee shop, away from where the threat is, and check in with their workplace on their phones or similar, that's a completely different system.
00:31:02.421 --> 00:31:08.271
Again, but it's not effective to have 10 different procedures and expect everybody to remember them.
00:31:08.271 --> 00:31:11.060
So this is where the whole message around.
00:31:11.060 --> 00:31:20.808
Actually these things need to be thought of together, and it's just an emergency procedure, one of which is a fire emergency, another one of which could be a different type.
00:31:21.215 --> 00:31:25.105
You know, I'm used to have a certain level of robustness in fire safety tool.
00:31:25.105 --> 00:31:28.364
Sets Like a WhatsApp group does not sound very robust to me.
00:31:28.364 --> 00:31:31.704
It sounds like something like I have no control over who's actually in that group.
00:31:31.704 --> 00:31:33.269
I have no control if people's actually in that group.
00:31:33.269 --> 00:31:36.560
I have no control if people are answering live and so on.
00:31:36.560 --> 00:31:43.523
When I'm dealing with live safety systems, I must be certain, I must know where people well, I'm not tracing people in fire.
00:31:43.523 --> 00:31:48.789
Perhaps one day I will but at least I must have trust in the systems that I see.
00:31:48.809 --> 00:31:51.678
You've previously mentioned, for example, the role of CCTV cameras.
00:31:51.678 --> 00:31:55.948
Cctv cameras are perfect to be used for fire and smoke detection.
00:31:55.948 --> 00:32:11.029
We have a bazillion algorithms that help you detect smoke and fire with CCTV cameras, but they're not a part of fire safety systems because they don't go through rigorous testing and integration and everything as the fire automation would go.