How to Prepare to Implement a Technically Driven Security Model
Robots are increasingly integral to modern and future security operations.
Robotics offer a dynamic and sophisticated capability that can elevate security levels from the ground to naval environments to aerial and space operations. These systems can perform tasks traditionally done by human security personnel, collecting and analyzing data, operating with sensors and actuators, and responding to incidents quickly—often arriving before human responders.
The main benefits of integrating robotics into security management include cost-efficiency and a data-driven approach to security. Robots can deliver security services faster and are particularly valuable in markets with high labor costs. They also enhance asset protection by providing agility in large or challenging environments. Additionally, robotic security systems generate data that can feed into a business's security risk management processes, thereby increasing security maturity through artificial intelligence (AI) integration.
But there are constraints to consider, such as technical limitations in altitude and endurance, power supply issues, and the need for pre-mission selection of payloads like sensors. Severe weather conditions can limit the usability of standard robots, and data management challenges often arise. Legal restrictions also play a significant role, particularly in areas with inhabitants or industrial activities, limiting the flexible use of robots.
Robots can compensate for limited human workforce availability and assist in forensic investigations by collecting and assessing evidence from crime scenes. However, the use of drones and robots by threat actors poses a challenge, requiring businesses to have counter-drone capabilities and comply with legal requirements. Cybersecurity is also a critical consideration, especially for systems dependent on networks, as outlined in standards like IEC 62443.
When defining a target operating model for robotics, it is essential to view drones and data as a platform. Devices should offer multi-sensor capabilities to provide maximum flexibility for security professionals. Hybrid security solutions, combining human and robotic systems, can be a modern approach to security.
AI-driven robotic security systems can leverage uncrewed technology to achieve faster and more comprehensive results. They enable semi- or fully automated mission planning and operations, anomaly detection, automated reporting, and real-time contributions to security intelligence.
CSOs should consider the integration of robotics into security operations for numerous benefits, including cost-efficiency, faster service delivery, and enhanced data-driven decision-making.
Transitioning to a technically driven security model requires a mindset shift and several preparatory steps:
1. Develop a security activity list and map human-based activities to robotic systems.
Creating an overview of activities which are conducted by your human workforce is the first step. It will serve as the foundation to determine what activities vary and what actions are repetitive. The identified repetitive activities can be turned over to robotic systems, while anomaly-affiliated activities will remain with human employees.
Examples on the activity list could be conducting patrols or alarm responses by manned guarding, route selections, control points monitoring, and report finalization. These could all be handed over to a robotic system.
2. Gather data on patterns, requirements, and cost implications.
Data gathered on patterns is a necessary next step to identify activities that are similar in other security domains. These can be programmed for a robot as a permanent technically covered activity.
An example might be gathering data on visitor patterns and requirements for escorts throughout a business site. Once that data is gathered, it can be used to program robotic devices to manage guest guidance or escort guests to areas of the facility that do not require a human companion.
Data gathering for security requirements, however, prepares insights and details for security services to be delivered through technical means.
An example of this is data gathering on the expected time it takes for humans or robotics to respond to an alarm. The assessment could be used to determine whether it’s beneficial to use a robot for initial response instead of a human security practitioner.
It’s also important to gather data on the cost implications of human security guards compared to robotic guarding solutions. Collecting and providing this data set will help secure business support for a technical transition.
3. Analyze governance, processes, manuals, and post orders to identify activities suitable for automation.
Within security frameworks, the roles and responsibilities described entail repetitively conducted operations which can be programmed for robotic systems. A bottom-up approach that works towards the governance level can even change the processes delivered.
Security risks to human life can be mitigated with robotic solutions providing security intelligence.
Examples in human guarding can include route planning, setting irregular schedules for patrols, drafting reports, and creating security communications to stakeholders.
In security investigations, robotic devices or drones can assist forensic units with a rapid response to crime scenes. These technologies can capture an initial snapshot of the scene while also preventing contamination of evidence. They can also conduct surveillance that can be used to identify potential witnesses in the area.
4. Identify life safety risks and cover physical challenges for human workers.
Security risks to human life can be mitigated with robotic solutions providing security intelligence. Drones can provide critical information in real-time to prevent risks from affecting travelers. Robotic systems can cope with physical challenges to security practitioners to provide desired security results, such as patrolling large sites during nighttime or mobile surveillance of suspicious activities.
5. Conduct data acquisition and long-term analytics for anomaly detection.
Collect data from suppliers that can be merged with robotic security operations to contribute to enterprise security risk management approaches, such as through a comprehensive Security Intelligence Collection Plan.
Drones and robots can monitor and assess the asset environment. They can also track changes so that CSOs benefit from continuously updated watchlists of security risks. Practitioners should consider including long-term analytics to identify new vulnerabilities or inefficiencies of security controls.
6. Consider global or regional security requirements for remote access to security activities.
Organizations with a large geographical spread of sites or a decentralized business structure require an adaptable security operating model. Technology, like robotic systems, can support this model by feeding into a centric point of knowledge, like a GSOC or RSOC.
Remotely accessible data of security activities conducted by robots can enable agile situation awareness and asset protection. Robots deployed across multiple sites can perform surveillance operations and share the data they collect, in real-time, with the GSOC.
Taking the above steps will help to implement a technical driven security model where the human workforce is enhanced in its service delivery using new technology. CSOs will leverage the data these new technologies provide to better understand the impact of their security mission. Ultimately, this will allow organizations to achieve higher levels of security and mature their services.
Gunar Korm, CPP, PSP, is a senior manager, advisory services, in consulting. He has more than 25 years of security experience and skillsets gained in the German military, the corporate environment, and the vendor environment.