Keywords

1 Introduction

International terrorism has many dimensions and characteristics depending on factors such as the historical and geographical context, political links or factors related to different terrorist groups and organizations (Tuman 2009). Today security and terrorism are one of the most widespread problems that requires the attention of law enforcement agencies, policy makers and political institutions due to the social and economic impact it generates. Despite this dependence on factors, terrorist attacks have the purpose of creating great harm and consternation in the population. Cities are a spotlight as they cluster large populations in small areas susceptible to terrorist attacks. Therefore, in the field of anti-terrorist urban security, and more broadly in the context of mass events, critical infrastructures and soft targets, it is mandatory to have adequate planning and response strategies to deal with such emergencies. Hence, this paper proposes a Decision Support System (DSS) that can be used during planning and response phases anticipating terrorist threats and while helping to address emergency management issues within the context of smart cities.

According to the (Global Terrorism Database™ (GTD) 2021) more than half of the attacks worldwide are Improvised Explosive Devices (IED), mass shooting, arsons or incendiary/smoke devices attacks. The expected evolution of this kind of attacks (Martin 2016) (EUROPOL 2021) are the necessary foundation for the development of models that can help to minimize their consequences.

More specifically, between 2010 and 2019 29.4% of terrorist attacks were targeted against the population (Global Terrorism Database™ (GTD) 2021), with cities being a major attraction for the terrorists. In this context there is an increment of smart cities that use Information and Communication Technologies (ICT) to increase operational efficiency, share information with the public and improve both the quality of government services and citizen welfare. An important point is that smart cities also need to ensure a secure and safe physical and digital ecosystem for the well-being of citizens. Therefore, it is mandatory to utilize the capabilities already available in smart cities to improve security and safety. These include, for example, anomaly detection, authentication and identification of individuals, threat localisation, behavioural profiling, suspect tracking, traffic monitoring, emergency management and many other capabilities related with awareness, prevention and response (Laufs et al. 2020).

These capabilities have been studied from different perspectives leading to a wide range of results including threats and individuals detection (Chackravarthy et al. 2018) (Bellini et al. 2017), screening and tracking (Brust et al. 2017) (Anees and Kumar 2017), recognition-based authentication (Balla and Jadhao 2018; Boukerche et al. 2017) or the improvement of legacy systems deployed throughout the city endowing them with intelligence (Zingoni et al. 2017; Zhou et al. 2015). However, due to our particular approach, we must emphasise that there are hardly any studies (Dbouk et al. 2014; Bonatsos et al. 2013) that propose a comprehensive DSS involving at the same time emergency management, real-time decision support and forecasting of threats evolution and impact of most common terrorist attacks. The closest in these terms to the existing literature is focused on the management of common crimes such as vandalism and violence, both in terms of management (Fernández et al. 2013), information systems (Truntsevsky et al. 2018), unusual traffic management (Hartama et al. 2017), evacuation (Zhang et al. 2018) and to a lesser extent on the prediction of events such as robbery or homicide (Noor et al. 2013; Araujo et al. 2017).

Thus, this study jointly addresses the facets of predicting and assess the impact of terrorist attacks (IED, mass shooting and arson), together with the management of emergency situations in terms of pedestrian and vehicular intervention, evacuation and monitoring by proposing a comprehensive conceptual and computational model that implements a DSS. This system involves different data sources and computer simulations providing support to decision makers/operators to make appropriate planning, management or response decision (Turban 1995).

2 Material and Method

2.1 Conceptual Model

On the basis of the initial definition of a smart city, a three-layers structure can be used to formalise the mathematical model of the proposed DSS (Decision Support System), see Fig. 1.

Fig. 1.
figure 1

Conceptual model – mathematical modelled schema of layer in smart cities.

Threat Assessment Layer:

Comprises a set of soft targets, crowded areas and infra-structures \(S=\{{s}_{0},{s}_{1},\dots ,{s}_{n}\}\) where security monitoring is desired. A soft-target can be defined as \({s}_{k}=\{B, P,A,D,O\}\), where \(B=\left\{\left({\phi }_{0},{\theta }_{0}\right),\left({\phi }_{1},{\theta }_{1}\right),\dots , \left({\phi }_{k},{\theta }_{k}\right)\right\}\) represents an enclosed and geographically defined area (longitude, latitude), \(P\) is the spatial distribution of people, \(A\) is the security assets deployed (e.g. controls, cameras or patrols) and \(D a\)nd \(O\) is the set of safe areas and obstacles inside the scenario that are defined by geographical coordinates. Threats being monitored in these areas are therefore defined as \({T}_{i}=\{L, C\}\), where \(L=\left(\phi , \theta \right)\) is the location and \(C\in \{Arson, Smoke, IED, Weapon\}\) is the category.

Pedestrian Movement Layer:

Topological definition of pedestrian transitable areas is replicated through the graph \({G}_{p}=\{N,E\}\), which is arranged by \(N=\{{n}_{0},{n}_{1},\dots ,{n}_{n}\}\) set of nodes and \(E=\{{e}_{0}, {e}_{1}, \dots , {e}_{m}\}\) set of edges. Each node \({n}_{i}=\{L,d, s\}\) is defined by its geographic location and occupant density as well as its current status \(s\in \{Passable, Impassable, Evacuate, Safe\}\). Likewise, each edge \({e}_{i}=\{d, {n}_{o},{n}_{d},f\}\) represents transitable zones and it is defined by people density, origin and destination nodes and available flow.

Traffic Layer:

Traffic network is represented through the graph \({G}_{t}=\{V,E\}\), where \(V=\left\{{v}_{0},{v}_{1},\dots ,{v}_{n}\right\}\) are the vehicular transit reference points associated with physical locations and \(E=\{{e}_{0},{e}_{1},\dots ,{e}_{m}\}\) represents the reachability associations similar to the pedestrian layer but within a traffic environment where the density and flow measurements represent vehicles instead of people. For the generation of traffic profiles, this layer considers the different usual zones \(Z\) of origin and destination of trips, which in turn are related by proximity to a node of the traffic network, generating a set of paths \(P\) between them and an origin-destination weighted matrix \(W=Z\times Z\) (Fig. 2).

Fig. 2.
figure 2

Conceptual model – graphical representation of mathematical layer-based model. From left to right: threat assessment layer, pedestrian movement layer and traffic layer.

Threat Assessment Layer

This layer assesses the threats and possible impacts/consequences of three type of attacks:

  1. 1.

    Arson and Smoke Bomb: Fire Dynamics Simulator (McGrattan et al. 2017) is used for the most likely locations of this type of attacks by simulating several scenarios changing the actual combustion parameters, different wind and fire loads. The generated results providing artificial measurements \({M}_{f}({s}_{i})=\{{m}_{0},{m}_{1},\dots ,{m}_{k}\}\), (e.g. visibility, Fractional Effective Dose (FED)) are classified and stored in a structured way for further use.

  2. 2.

    Improvise Explosive Device (IED): This approach is based on (Cuesta et al. 2019). The boundary box of each soft-target \({s}_{k}\) is calculated and subdivided into small regions shaping a fine grid of squared cells. For each cell \({c}_{ij}\) within the grid, the risk function is calculated as follows:

    $$\begin{aligned} R\left( {s_k ,c_{ij} } \right) & = w_{dt} \cdot d_t \left( {c_{ij} ,E} \right) + w_{da} \cdot d_a \left( {c_{ij} ,A} \right) + w_{dr} \cdot d_r \left( {c_{ij} ,B} \right) \\ & \,\,\,+ \,w_p \cdot p\left( {c_{ij} , P} \right), \\ \end{aligned}$$

    where the functions studied have associated weights \(\{{w}_{dt}, {w}_{da},{w}_{dr},{w}_{p}\}\) that can be modified (e.g. to give more weight to one or another parameter) but, as a general rule, balance the risk function. The rest of the functions that are measured in the equation are:

    • \({d}_{t}\left({c}_{ij},E\right)\) → Inverse (1-p) normalized distance from cell \({c}_{ij}\) to the nearest exit (negative correlation).

    • \({d}_{a}\left({c}_{ij},A\right)\)→ Inverse normalized distance from cell \({c}_{ij}\) to the nearest asset.

    • \({d}_{r}\left({c}_{ij},B\right)\) → Normalized radial distance from cell \({c}_{ij}\) to the boundary box (positive correlation).

    • \(p({c}_{ij}, P)\) → Normalized population density inside cell \({c}_{ij}\).

After processing all the cells, a matrix \({M}_{r}({s}_{i})\) of risk values is provided which is associated with the threat level, resulting in a probability map with critical locations of IEDs for each soft-target.

  1. 3.

    Mass Shooting Attack (MSA): The soft-target space \({s}_{i}\) is discretized through uniformly distributed reference points and mapped onto nodes of a reachability directed graph \(G=\{N,E\}\), \(N=\{{n}_{0},{n}_{1},\dots , {n}_{k}\}\) for pathing purposes. The optimal path (i.e. minimum distance) from each starting location \(P=\{{p}_{0},{p}_{1},\dots ,{p}_{m}\}\) is calculated, considering the location (static and/or dynamic) of the attacker(s) \({A}_{l}\), by means of Backtracking approach with associated cost function:

    $$c_f \left( {n_i , n_j } \right) = \frac{{\frac{{d_{mean} \left( {n_j , E} \right)}}{{\max_n^{nghbs\left( {n_i } \right)} (d_{mean} \left( {n, E} \right)) }} + \frac{{d_{min} \left( {n_j , E} \right)}}{{{\text{max}}_n^{nghbs\left( {n_i } \right)} \left( {d_{min} \left( {n, E} \right)} \right)}} + \frac{{u\left( {n_j } \right)}}{{{\text{max}}_n^{nghbs\left( {n_i } \right)} \left( {u\left( n \right)} \right)}}}}{{\frac{{d_{mean} \left( {n_j , A_l } \right)}}{{{\text{max}}_n^{nghbs\left( {n_i } \right)} \left( {d_{mean} \left( {n_j , A_l } \right)} \right)}}}}$$

    where function \(nghbs\left({n}_{i}\right)\) represents the neighbours of a particular node, function \({d}_{mean/max}\left(n,S\right)\) is the mean/max distance from node \(n\) to a set \(S\) of locations and \(u\left(n\right)\) is the density of population in the surrounding of \(n\). In conclusion, this function represents three important factors: 1) the proximity of a node to an exit/safe area, 2) the spatial availability of that node, and 3) the risk associated with the location of the attacker(s). Following these paths, a microsimulation approach is used to represent the movement and behaviour of people involved considering interactions between agents and repulsion forces between terrorists, people, scenario boundaries and obstacles through a Social Force model (Helbing and Molnár 1995). A physical shooting dynamics approach is followed (Abreu et al. 2019) to represent persons hit by gunfire, where the probability of being hit is estimated and the number of casualties \({M}_{v}({s}_{i})\) are calculated through a stochastic approach.

Results generated by these methodologies can be summarised as a set of geographic locations linked to counter-terrorism security-related information enabling the lower layers to increase their level of intelligence to enable more accurate modelling results.

Pedestrian Movement Layer

This layer uses threat assessment layer inputs \(\{{M}_{f},{M}_{r}, {M}_{v}\}\) and the pedestrian movement layer the status \(s\) for each node \({n}_{i}\) in the associated graph \({G}_{p}\) to update nodes to be evacuated, safe nodes and affected nodes that are impassable. Also, the occupant densities of the different nodes and edges of the network are updated through one of the following approaches depending on the capabilities of the smart city: 1) historical-based estimates of the expected occupancy, 2) real-time monitoring of occupancy through cameras, Wi-Fi location devices, access controls or similar, and 3) random assumptions of occupancy following expected distributions. This graph is considered as an active graph and it is used to produce a preliminary calculation of shortest paths using Dijkstra's algorithm. Its subsequent optimization is carried out considering nodes availability and through a weighted Multiple Criteria Decision Analysis (MCDA) for the assessment of conflicting nodes through its score function:

$$S\left( {n_i } \right) = w_f \cdot \mathop \sum \limits_n^{nghbs\left( {n_i } \right)} \left( {F\left( n \right)} \right) + w_c \cdot C\left( {n_i } \right) + w_{fn} \cdot \mathop \sum \limits_n^{nghbs\left( {n_i } \right)} \left( {C\left( n \right)} \right) + w_{dt} \cdot d_t \left( {n_i } \right)$$

where \(\{{w}_{f}, {w}_{c},{w}_{fn},{w}_{dt}\}\) are the associated weights with the MCDA and although they are generally assigned the same weight for each variable, they can be modified in each iteration of the optimisation to obtain the required results. Functions \(F\left(n\right)\) and \(C(n)\) represent the available flow for a particular node considering all the related edges and congestions per node. After this, a set of candidate graphs \({S}_{g}=\{{G}_{0},{G}_{1},\dots ,{G}_{k}\}\) solving these conflicts is generated following an iterative process and another score function is applied to choose the optimal graph considering the total estimation of evacuation time \({t}_{e}({G}_{i})\) for each graph and the sum of individual node congestions with associated weights.

$$S\left({G}_{i}\right)={w}_{t}\cdot {t}_{e}\left({G}_{i}\right)+{w}_{sc}\cdot {\sum }_{n}^{n\in {N}_{i}}(C(n))$$

Once the optimal graph has been found, it becomes the active graph again, which can be iteratively re-optimised when the model inputs change. This model provides evacuation routing, estimated egress times and mobility profiles, forecasting the number of people who will go to specific locations in a precise time period by determining and modelling the initial impact on the traffic network.

Traffic Layer

This layer provides a real time expected traffic evolution on different road sections according to date and time after a calibration of the network based on traffic historical data or data obtained through the traffic monitoring sensors deployed in the smart city. This calibration process starts from an uncalibrated network represented by the graph \({G}_{t}\) which solves for the shortest paths considering availability constraints of the road sections and updating the \(W\) origin-destination matrix via path-based (Jayakrishnan et al. 1994) and bush-bashed B algorithms (Dial 2006). Accordingly, following an iterative process for origin-destination matrix adjustment based on gradient approach (Spiess 1990) with some adjustments for large traffic models (Kolovský et al. 2018), the model optimises the set of paths \(P\) and the matrix \(W\) based on real traffic data, paying attention to discrepancies between model and reality.

2.2 System Architecture

All these methodologies have been integrated together in a comprehensive DSS that, following the architecture presented in Fig. 3, assists security decisionmakers in the planning and response phases by leveraging some of the resources and devices already deployed in the smart cities. Examples of resources and devices include cameras, monitoring Wi-Fi devices, access control sensors, etc. These devices could help to estimate the number of people in specific locations or for example traffic monitoring systems make real-time simulation of unusual traffic flow more reliable.

The architecture follows a producer-consumer approach with a centralized distributed data stream platform (Apache Kafka) for the exchange of information between layers. Each layer in turn is implemented as an independent module that has a Graphical User Interface (GUI) for configuration purposes and Application Programming Interface (API) that provides on-demand service to the rest of the layers, except for fire and smoke simulations that, due to the computational cost, must be pre-simulated and stored locally for further use in specific scenarios, if needed.

Fig. 3.
figure 3

DSS architecture overview diagram.

3 Case Study

After the development of the system, a comprehensive case study was performed based on data provided by Správa Informačnich Technologii Mĕsta Plznĕ, p.o. as partner of the S4AllCities project. The soft-target scenario was the Doosan Arena stadium in the city of Pilsen (Czech Republic). A detailed description of the stadium and its surrounding areas as well as the city of Pilsen itself was available, including information such as:

  • Doosan Arena 3D model obtained via Lidar and RGB scanning using DJI Zenmuse L1 and DJI Zenmuse P1 cameras.

  • Initial locations of a possible smoke bomb as well as its device-like specifications (Antari Z 3000 II fog machine).

  • One-year traffic data providing a dataset of 250 million observations

  • from 627 road built-in sensors, with a 90 s granularity in time, traffic model calibrated by the traffic data (Jedlicka et al. 2020).

  • 2D map of the areas surrounding the stadium with expected attendance (11700 spectators + 3300 people), transit locations, security assets usually deployed, car parks and other minor details (Fig. 4).

Fig. 4.
figure 4

City of Pilsen case study schema with initial “smoke bomb” explosive device location. 1) Doosan Arena stadium (green), 2) Surrounding areas (red) and 3) Parking spaces (blue). (Color figure online)

The next step after the simulation, training and calibration of the models with the provided data, was the definition of four use cases to validate all the capabilities of the system listed in Table 1.

Table. 1. Use cases considered in the case study of the city of Pilsen.

For each of these use cases, the DSS provided results, starting by retrieving the output of the smoke propagation FDS analysis (virtual smoke machine tuned on Antari Z 3000 II fog machine, North-West wind direction) followed by the simulation of threats and likely impact of attacks (Fig. 5). It is important to note that the information provided to the system operator includes the visualization of both the evolution of the different incidents and the data associated with the artificial scenario measurements (IED probability, FED, visibility and casualties). On the other hand, a simulation of pedestrian evacuation and traffic network unusual behaviour impact is also generated as shown in Fig. 5, where the operator is informed about the predicted evacuation times, routes, recognition of traffic/pedestrian congestion and the possibility of dynamically recalculating these results according to the risks deemed appropriate by, for example, cutting roads or blocking pedestrian evacuation nodes.

Fig. 5.
figure 5

DSS Graphical user interfaces. Top-Left: Smoke propagation from FDS simulation, Top-Right: IED and MSA threat assessment and impact analysis, Bot-Left: Pedestrian evacuation management and Bot-Right: Traffic network unusual status simulation.

The simulation of our use cases showed that for the case study of the Doosan Arena stadium and the city of Pilsen the most likely dispersion of the smoke from the device would be initially south-east without affecting additional exits from the stadium (after about 5 min, smoke whirls start sticking to the outer South tribune, Fig. 5, Top-Left). In the case of explosive device threat levels and potential casualties, this would result in the blocking of the front exits of the stadium, as a two-shooter attack in this area would result in an estimated of 139 casualties (dead + wounded) considering two minutes intervention time, in addition to considering the potential locations of explosive devices, as shown in the lighter areas of the heat map in Fig. 5. As shown in Fig. 5, the pedestrian evacuation would be directed mainly to the nearest car parks by using the remaining exits available in the stadium. The effect of these pedestrian evacuation profiles would increase in approx. 700 vehicles per the first hour in the northern traffic section and 900 vehicles per the first hour in the southern section, leaving a high density of vehicles in both directions, as shown in Fig. 5.

4 Conclusions and Discussion

The emerging technologies implemented in smart cities as well as new tools and methodologies for computer simulation applied to threat analysis and citizen security are a breakthrough in the fight against terrorism. In this paper we present the methodological design based on three layers (threat, pedestrian and traffic layers) and implementation of a DSS that allows private operators, law enforcement agencies and local authorities to efficiently protect city soft-targets. Within this system, support is provided for both threat analysis and emergency management of pedestrian evacuation and its impact on the metropolitan traffic network. In addition, this paper presents a case study based on real data in the city of Pilsen where the correct functioning of the different layers that make up the system was evaluated and the benefits and characteristics of the system were presented in a more illustrative way, among which is the study of the analysis of the main terrorist threats, the complete management of an evacuation and the monitoring for decision-making of the state of the traffic network.

It must also be considered that this system has certain limitations that can be corrected in later developments. The first of these is that it does not cover all types of threats within the city. Actual reports suggest that future trends (EUROPOL 2021) in terrorism will evolve to simpler and less expensive (knife attacks) or combined attacks (cascading attacks or sabotage of critical infrastructures). Conversely, there would be an exploratory branch of the possible direct interaction of terrorist threats with the traffic network, being able to carry out developments in the field of anti-ramming measures in urban planning. From our point of view, all these limitations are not an obstacle but rather open up future branches of research and lead to the development of increasingly complete security and safety systems.